• Buro Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, de overheid in Nederland en Europa kritisch volgt. Een grond-rechten kollektief dat al 30 jaar publiceert over uitbreiding van repressieve wetgeving, publiek-private samenwerking, bevoegdheden, overheids-optreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.

  • Categorieën

  • Boundless Informant: the NSA’s secret tool to track global surveillance data

    Revealed: The NSA’s powerful tool for cataloguing global surveillance data – including figures on US collection

    The color scheme ranges from green (least subjected to surveillance) through yellow and orange to red (most surveillance). Note the ‘2007’ date in the image relates to the document from which the interactive map derives its top secret classification, not to the map itself.

    The National Security Agency has developed a powerful tool for recording and analysing where its intelligence comes from, raising questions about its repeated assurances to Congress that it cannot keep track of all the surveillance it performs on American communications.

    The Guardian has acquired top-secret documents about the NSA datamining tool, called Boundless Informant, that details and even maps by country the voluminous amount of information it collects from computer and telephone networks.

    The focus of the internal NSA tool is on counting and categorizing the records of communications, known as metadata, rather than the content of an email or instant message.

    The Boundless Informant documents show the agency collecting almost 3 billion pieces of intelligence from US computer networks over a 30-day period ending in March 2013. One document says it is designed to give NSA officials answers to questions like, “What type of coverage do we have on country X” in “near real-time by asking the SIGINT [signals intelligence] infrastructure.”

    An NSA factsheet about the program, acquired by the Guardian, says: “The tool allows users to select a country on a map and view the metadata volume and select details about the collections against that country.”

    Under the heading “Sample use cases”, the factsheet also states the tool shows information including: “How many records (and what type) are collected against a particular country.”

    A snapshot of the Boundless Informant data, contained in a top secret NSA “global heat map” seen by the Guardian, shows that in March 2013 the agency collected 97bn pieces of intelligence from computer networks worldwide.
    The heat map reveals how much data is being collected from around the world. Note the ‘2007’ date in the image relates to the document from which the interactive map derives its top secret classification, not to the map itself.

    Iran was the country where the largest amount of intelligence was gathered, with more than 14bn reports in that period, followed by 13.5bn from Pakistan. Jordan, one of America’s closest Arab allies, came third with 12.7bn, Egypt fourth with 7.6bn and India fifth with 6.3bn.

    The heatmap gives each nation a color code based on how extensively it is subjected to NSA surveillance. The color scheme ranges from green (least subjected to surveillance) through yellow and orange to red (most surveillance).

    The disclosure of the internal Boundless Informant system comes amid a struggle between the NSA and its overseers in the Senate over whether it can track the intelligence it collects on American communications. The NSA’s position is that it is not technologically feasible to do so.

    At a hearing of the Senate intelligence committee In March this year, Democratic senator Ron Wyden asked James Clapper, the director of national intelligence: “Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?”

    “No sir,” replied Clapper.

    Judith Emmel, an NSA spokeswoman, told the Guardian in a response to the latest disclosures: “NSA has consistently reported – including to Congress – that we do not have the ability to determine with certainty the identity or location of all communicants within a given communication. That remains the case.”

    Other documents seen by the Guardian further demonstrate that the NSA does in fact break down its surveillance intercepts which could allow the agency to determine how many of them are from the US. The level of detail includes individual IP addresses.

    IP address is not a perfect proxy for someone’s physical location but it is rather close, said Chris Soghoian, the principal technologist with the Speech Privacy and Technology Project of the American Civil Liberties Union. “If you don’t take steps to hide it, the IP address provided by your internet provider will certainly tell you what country, state and, typically, city you are in,” Soghoian said.

    That approximation has implications for the ongoing oversight battle between the intelligence agencies and Congress.

    On Friday, in his first public response to the Guardian’s disclosures this week on NSA surveillance, Barack Obama said that that congressional oversight was the American peoples’ best guarantee that they were not being spied on.

    “These are the folks you all vote for as your representatives in Congress and they are being fully briefed on these programs,” he said. Obama also insisted that any surveillance was “very narrowly circumscribed”.

    Senators have expressed their frustration at the NSA’s refusal to supply statistics. In a letter to NSA director General Keith Alexander in October last year, senator Wyden and his Democratic colleague on the Senate intelligence committee, Mark Udall, noted that “the intelligence community has stated repeatedly that it is not possible to provide even a rough estimate of how many American communications have been collected under the Fisa Amendments Act, and has even declined to estimate the scale of this collection.”

    At a congressional hearing in March last year, Alexander denied point-blank that the agency had the figures on how many Americans had their electronic communications collected or reviewed. Asked if he had the capability to get them, Alexander said: “No. No. We do not have the technical insights in the United States.” He added that “nor do we do have the equipment in the United States to actually collect that kind of information”.

    Soon after, the NSA, through the inspector general of the overall US intelligence community, told the senators that making such a determination would jeopardize US intelligence operations – and might itself violate Americans’ privacy.

    “All that senator Udall and I are asking for is a ballpark estimate of how many Americans have been monitored under this law, and it is disappointing that the inspectors general cannot provide it,” Wyden told Wired magazine at the time.

    The documents show that the team responsible for Boundless Informant assured its bosses that the tool is on track for upgrades.

    The team will “accept user requests for additional functionality or enhancements,” according to the FAQ acquired by the Guardian. “Users are also allowed to vote on which functionality or enhancements are most important to them (as well as add comments). The BOUNDLESSINFORMANT team will periodically review all requests and triage according to level of effort (Easy, Medium, Hard) and mission impact (High, Medium, Low).”

    Emmel, the NSA spokeswoman, told the Guardian: “Current technology simply does not permit us to positively identify all of the persons or locations associated with a given communication (for example, it may be possible to say with certainty that a communication traversed a particular path within the internet. It is harder to know the ultimate source or destination, or more particularly the identity of the person represented by the TO:, FROM: or CC: field of an e-mail address or the abstraction of an IP address).

    “Thus, we apply rigorous training and technological advancements to combine both our automated and manual (human) processes to characterize communications – ensuring protection of the privacy rights of the American people. This is not just our judgment, but that of the relevant inspectors general, who have also reported this.”

    She added: “The continued publication of these allegations about highly classified issues, and other information taken out of context, makes it impossible to conduct a reasonable discussion on the merits of these programs.”

    Glenn Greenwald and Ewen MacAskill
    guardian.co.uk, Tuesday 11 June 2013 14.00 BST
    Additional reporting: James Ball in New York and Spencer Ackerman in Washington

    Find this story at 11 June 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Sources: NSA sucks in data from 50 companies

    Analysts at the National Security Agency can now secretly access real-time user data provided by as many as 50 American companies, ranging from credit rating agencies to internet service providers, two government officials familiar with the arrangements said.

    Several of the companies have provided records continuously since 2006, while others have given the agency sporadic access, these officials said. These officials disclosed the number of participating companies in order to provide context for a series of disclosures about the NSA’s domestic collection policies. The officials, contacted independently, repeatedly said that “domestic collection” does not mean that the target is based in the U.S. or is a U.S. citizen; rather, it refers only to the origin of the data.

    The Wall Street Journal reported today that U.S. credit card companies had also provided customer information. The officials would not disclose the names of the companies because, they said, doing so would provide U.S. enemies with a list of companies to avoid. They declined to confirm the list of participants in an internet monitoring program revealed by the Washington Post and the Guardian, but both confirmed that the program existed.

    “The idea is to create a mosaic. We get a tip. We vet it. Then we mine the data for intelligence,” one of the officials said.

    In a statement, Director of National Intelligence James Clapper said that programs collect communications “pursuant to section 702 of the Foreign Intelligence Surveillance Act, ” and “cannot be used to intentionally target any U.S. citizen, any other U.S person, or anyone within the United States.”

    He called the leaks “reprehensible” and said the program “is among the most important” sources of “valuable” intelligence information the government takes in.

    One of the officials who spoke to me said that because data types are not standardized, the NSA needs several different collection tools, of which PRISM, disclosed today by the Guardian and the Washington Post, is one. PRISM works well because it is able to handle several different types of data streams using different basic encryption methods, the person said. It is a “front end” system, or software, that allows an NSA analyst to search through the data and pull out items of significance, which are then stored in any number of databases. PRISM works with another NSA program to encrypt and remove from the analysts’ screen data that a computer or the analyst deems to be from a U.S. person who is not the subject of the investigation, the person said. A FISA order is required to continue monitoring and analyzing these datasets, although the monitoring can start before an application package is submitted to the Foreign Intelligence Surveillance Court.

    From the different types of data, including their credit card purchases, the locations they sign in to the internet from, and even local police arrest logs, the NSA can track people it considers terrorism or espionage suspects in near-real time. An internet geo-location cell is on constant standby to help analysts determine where a subject logs in from. Most of the collection takes place on subjects outside the U.S, but a large chunk of the world’s relevant communication passes through American companies with servers on American soil. So the NSA taps in locally to get at targets globally.

    It is not clear how the NSA interfaces with the companies. It cannot use standard law enforcement transmission channels to do, since most use data protocols that are not compatible with that hardware. Several of the companies mentioned in the Post report deny granting access to the NSA, although it is possible that they are lying, or that the NSA’s arrangements with the company are kept so tightly compartmentalized that very few people know about it. Those who do probably have security clearances and are bound by law not to reveal the arrangement.

    This arrangement allows the U.S. companies to “stay out of the intelligence business,” one of the officials said. That is, the government bears the responsibility for determining what’s relevant, and the company can plausibly deny that it subjected any particular customer to unlawful government surveillance. Previously, Congressional authors of the FAA said that such a “get out of jail free” card was insisted by corporations after a wave of lawsuits revealed the extent of their cooperation with the government.

    It is possible, but not likely, that the NSA clandestinely burrows into servers on American soil, without the knowledge of the company in question, although that would be illegal.

    The 2008 FISA Amendments Act allow the NSA to analyze, with court orders, domestic communications of all types for counter-terrorism, counter-espionage, counter-narcotics and counter-proliferation purposes. If the agency believes that both ends of the communication, or the circle of those communicating, are wholly within the U.S., the FBI takes over. If one end of the conversation is outside the U.S., the NSA keeps control of the monitoring. An administration official said that such monitoring is subject to “extensive procedures,” but as the Washington Post reported, however, it is often very difficult to segregate U.S. citizens and residents from incidental contact.

    One official likened the NSA’s collection authority to a van full of sealed boxes that are delivered to the agency. A court order, similar to the one revealed by the Guardian, permits the transfer of custody of the “boxes.” But the NSA needs something else, a specific purpose or investigation, in order to open a particular box. The chairman of the Senate intelligence committee, Sen. Dianne Feinstein, said the standard was “a reasonable, articulatable” suspicion, but did not go into details.

    Legally, the government can ask companies for some of these records under a provision of the PATRIOT Act called the “business records provision.” Initially, it did so without court cognizance. Now, the FISC signs off on every request.

    Armed with what amounts to a rubber stamp court order, however, the NSA can collect and store trillions of bytes of electromagnetic detritus shaken off by American citizens. In the government’s eyes, the data is simply moving from one place to another. It does not become, in the government’s eyes, relevant or protected in any way unless and until it is subject to analysis. Analysis requires that second order.

    And the government insists that the rules allowing the NSA or the FBI to analyze anything relating to U.S. persons or corporations are strict, bright-line, and are regularly scrutinized to ensure that innocents don’t get caught up in the mix. The specifics, however, remain classified, as do the oversight mechanisms in place.

    The wave of disclosures about the NSA programs have significantly unsettled the intelligence community.

    The documents obtained by the two newspapers are marked ORCON, or originator controlled, which generally means that the agency keeps a record of every person who accesses them online and knows exactly who might have printed out or saved or accessed a copy. The NSA in particular has a good record of protecting its documents.

    The scope of the least suggest to one former senior intelligence official who now works for a corporation that provides data to the NSA that several people with top-level security clearances had to be involved.

    The motive, I suspect, is to punch through the brittle legal and moral foundation that modern domestic surveillance is based upon. Someone, at a very high level, or several people, may have simply found that the agency’s zeal to collect information blinded it to the real-world consequences of such a large and unending program. The minimization procedures might also be well below the threshold that most Americans would expect.

    Clapper said in his statement that the disclosures about the program “risk important protections for the security of Americans.”

    June 6, 2013, at 8:02 PM

    Ambinder is co-author of a new book about government secrecy and surveillance, Deep State: Inside the Government Secrecy Industry.

    Find this story at 6 June 2013

    © 2013 THE WEEK PUBliCATIONS, INC.

    NSA Prism program taps in to user data of Apple, Google and others

    A slide depicting the top-secret PRISM program.

    The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian.

    The NSA access is part of a previously undisclosed program called Prism, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.

    The Guardian has verified the authenticity of the document, a 41-slide PowerPoint presentation – classified as top secret with no distribution to foreign allies – which was apparently used to train intelligence operatives on the capabilities of the program. The document claims “collection directly from the servers” of major US service providers.

    Although the presentation claims the program is run with the assistance of the companies, all those who responded to a Guardian request for comment on Thursday denied knowledge of any such program.

    In a statement, Google said: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a back door for the government to access private user data.”

    Several senior tech executives insisted that they had no knowledge of Prism or of any similar scheme. They said they would never have been involved in such a program. “If they are doing this, they are doing it without our knowledge,” one said.

    An Apple spokesman said it had “never heard” of Prism.

    The NSA access was enabled by changes to US surveillance law introduced under President Bush and renewed under Obama in December 2012.

    The program facilitates extensive, in-depth surveillance on live communications and stored information. The law allows for the targeting of any customers of participating firms who live outside the US, or those Americans whose communications include people outside the US.

    It also opens the possibility of communications made entirely within the US being collected without warrants.

    Disclosure of the Prism program follows a leak to the Guardian on Wednesday of a top-secret court order compelling telecoms provider Verizon to turn over the telephone records of millions of US customers.

    The participation of the internet companies in Prism will add to the debate, ignited by the Verizon revelation, about the scale of surveillance by the intelligence services. Unlike the collection of those call records, this surveillance can include the content of communications and not just the metadata.

    Some of the world’s largest internet brands are claimed to be part of the information-sharing program since its introduction in 2007. Microsoft – which is currently running an advertising campaign with the slogan “Your privacy is our priority” – was the first, with collection beginning in December 2007.

    It was followed by Yahoo in 2008; Google, Facebook and PalTalk in 2009; YouTube in 2010; Skype and AOL in 2011; and finally Apple, which joined the program in 2012. The program is continuing to expand, with other providers due to come online.

    Collectively, the companies cover the vast majority of online email, search, video and communications networks.

    The extent and nature of the data collected from each company varies.

    Companies are legally obliged to comply with requests for users’ communications under US law, but the Prism program allows the intelligence services direct access to the companies’ servers. The NSA document notes the operations have “assistance of communications providers in the US”.

    The revelation also supports concerns raised by several US senators during the renewal of the Fisa Amendments Act in December 2012, who warned about the scale of surveillance the law might enable, and shortcomings in the safeguards it introduces.

    When the FAA was first enacted, defenders of the statute argued that a significant check on abuse would be the NSA’s inability to obtain electronic communications without the consent of the telecom and internet companies that control the data. But the Prism program renders that consent unnecessary, as it allows the agency to directly and unilaterally seize the communications off the companies’ servers.

    A chart prepared by the NSA, contained within the top-secret document obtained by the Guardian, underscores the breadth of the data it is able to obtain: email, video and voice chat, videos, photos, voice-over-IP (Skype, for example) chats, file transfers, social networking details, and more.

    The document is recent, dating to April 2013. Such a leak is extremely rare in the history of the NSA, which prides itself on maintaining a high level of secrecy.

    The Prism program allows the NSA, the world’s largest surveillance organisation, to obtain targeted communications without having to request them from the service providers and without having to obtain individual court orders.

    With this program, the NSA is able to reach directly into the servers of the participating companies and obtain both stored communications as well as perform real-time collection on targeted users.

    The presentation claims Prism was introduced to overcome what the NSA regarded as shortcomings of Fisa warrants in tracking suspected foreign terrorists. It noted that the US has a “home-field advantage” due to housing much of the internet’s architecture. But the presentation claimed “Fisa constraints restricted our home-field advantage” because Fisa required individual warrants and confirmations that both the sender and receiver of a communication were outside the US.

    “Fisa was broken because it provided privacy protections to people who were not entitled to them,” the presentation claimed. “It took a Fisa court order to collect on foreigners overseas who were communicating with other foreigners overseas simply because the government was collecting off a wire in the United States. There were too many email accounts to be practical to seek Fisas for all.”

    The new measures introduced in the FAA redefines “electronic surveillance” to exclude anyone “reasonably believed” to be outside the USA – a technical change which reduces the bar to initiating surveillance.

    The act also gives the director of national intelligence and the attorney general power to permit obtaining intelligence information, and indemnifies internet companies against any actions arising as a result of co-operating with authorities’ requests.

    In short, where previously the NSA needed individual authorisations, and confirmation that all parties were outside the USA, they now need only reasonable suspicion that one of the parties was outside the country at the time of the records were collected by the NSA.

    The document also shows the FBI acts as an intermediary between other agencies and the tech companies, and stresses its reliance on the participation of US internet firms, claiming “access is 100% dependent on ISP provisioning”.

    In the document, the NSA hails the Prism program as “one of the most valuable, unique and productive accesses for NSA”.

    It boasts of what it calls “strong growth” in its use of the Prism program to obtain communications. The document highlights the number of obtained communications increased in 2012 by 248% for Skype – leading the notes to remark there was “exponential growth in Skype reporting; looks like the word is getting out about our capability against Skype”. There was also a 131% increase in requests for Facebook data, and 63% for Google.

    The NSA document indicates that it is planning to add Dropbox as a PRISM provider. The agency also seeks, in its words, to “expand collection services from existing providers”.

    The revelations echo fears raised on the Senate floor last year during the expedited debate on the renewal of the FAA powers which underpin the PRISM program, which occurred just days before the act expired.

    Senator Christopher Coons of Delaware specifically warned that the secrecy surrounding the various surveillance programs meant there was no way to know if safeguards within the act were working.

    “The problem is: we here in the Senate and the citizens we represent don’t know how well any of these safeguards actually work,” he said.

    “The law doesn’t forbid purely domestic information from being collected. We know that at least one Fisa court has ruled that the surveillance program violated the law. Why? Those who know can’t say and average Americans can’t know.”

    Other senators also raised concerns. Senator Ron Wyden of Oregon attempted, without success, to find out any information on how many phone calls or emails had been intercepted under the program.

    When the law was enacted, defenders of the FAA argued that a significant check on abuse would be the NSA’s inability to obtain electronic communications without the consent of the telecom and internet companies that control the data. But the Prism program renders that consent unnecessary, as it allows the agency to directly and unilaterally seize the communications off the companies’ servers.

    When the NSA reviews a communication it believes merits further investigation, it issues what it calls a “report”. According to the NSA, “over 2,000 Prism-based reports” are now issued every month. There were 24,005 in 2012, a 27% increase on the previous year.

    In total, more than 77,000 intelligence reports have cited the PRISM program.

    Jameel Jaffer, director of the ACLU’s Center for Democracy, that it was astonishing the NSA would even ask technology companies to grant direct access to user data.

    “It’s shocking enough just that the NSA is asking companies to do this,” he said. “The NSA is part of the military. The military has been granted unprecedented access to civilian communications.

    “This is unprecedented militarisation of domestic communications infrastructure. That’s profoundly troubling to anyone who is concerned about that separation.”

    A senior administration official said in a statement: “The Guardian and Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. This law does not allow the targeting of any US citizen or of any person located within the United States.

    “The program is subject to oversight by the Foreign Intelligence Surveillance Court, the Executive Branch, and Congress. It involves extensive procedures, specifically approved by the court, to ensure that only non-US persons outside the US are targeted, and that minimize the acquisition, retention and dissemination of incidentally acquired information about US persons.

    “This program was recently reauthorized by Congress after extensive hearings and debate.

    “Information collected under this program is among the most important and valuable intelligence information we collect, and is used to protect our nation from a wide variety of threats.

    “The Government may only use Section 702 to acquire foreign intelligence information, which is specifically, and narrowly, defined in the Foreign Intelligence Surveillance Act. This requirement applies across the board, regardless of the nationality of the target.”

    Additional reporting by James Ball and Dominic Rushe

    Glenn Greenwald and Ewen MacAskill
    The Guardian, Friday 7 June 2013

    Find this story at 7 June 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    NSA has massive database of Americans’ phone calls: 2006

    The National Security Agency has been secretly collecting the phone call records of tens of millions of Americans, using data provided by AT&T, Verizon and BellSouth, people with direct knowledge of the arrangement told USA TODAY.

    The NSA program reaches into homes and businesses across the nation by amassing information about the calls of ordinary Americans — most of whom aren’t suspected of any crime. This program does not involve the NSA listening to or recording conversations. But the spy agency is using the data to analyze calling patterns in an effort to detect terrorist activity, sources said in separate interviews.

    QUESTIONS AND ANSWERS: The NSA record collection program

    “It’s the largest database ever assembled in the world,” said one person, who, like the others who agreed to talk about the NSA’s activities, declined to be identified by name or affiliation. The agency’s goal is “to create a database of every call ever made” within the nation’s borders, this person added.

    For the customers of these companies, it means that the government has detailed records of calls they made — across town or across the country — to family members, co-workers, business contacts and others.

    The three telecommunications companies are working under contract with the NSA, which launched the program in 2001 shortly after the Sept. 11 terrorist attacks, the sources said. The program is aimed at identifying and tracking suspected terrorists, they said.

    The sources would talk only under a guarantee of anonymity because the NSA program is secret.

    Air Force Gen. Michael Hayden, nominated Monday by President Bush to become the director of the CIA, headed the NSA from March 1999 to April 2005. In that post, Hayden would have overseen the agency’s domestic call-tracking program. Hayden declined to comment about the program.

    The NSA’s domestic program, as described by sources, is far more expansive than what the White House has acknowledged. Last year, Bush said he had authorized the NSA to eavesdrop — without warrants — on international calls and international e-mails of people suspected of having links to terrorists when one party to the communication is in the USA. Warrants have also not been used in the NSA’s efforts to create a national call database.

    In defending the previously disclosed program, Bush insisted that the NSA was focused exclusively on international calls. “In other words,” Bush explained, “one end of the communication must be outside the United States.”

    As a result, domestic call records — those of calls that originate and terminate within U.S. borders — were believed to be private.

    Sources, however, say that is not the case. With access to records of billions of domestic calls, the NSA has gained a secret window into the communications habits of millions of Americans. Customers’ names, street addresses and other personal information are not being handed over as part of NSA’s domestic program, the sources said. But the phone numbers the NSA collects can easily be cross-checked with other databases to obtain that information.

    Don Weber, a senior spokesman for the NSA, declined to discuss the agency’s operations. “Given the nature of the work we do, it would be irresponsible to comment on actual or alleged operational issues; therefore, we have no information to provide,” he said. “However, it is important to note that NSA takes its legal responsibilities seriously and operates within the law.”

    The White House would not discuss the domestic call-tracking program. “There is no domestic surveillance without court approval,” said Dana Perino, deputy press secretary, referring to actual eavesdropping.

    She added that all national intelligence activities undertaken by the federal government “are lawful, necessary and required for the pursuit of al-Qaeda and affiliated terrorists.” All government-sponsored intelligence activities “are carefully reviewed and monitored,” Perino said. She also noted that “all appropriate members of Congress have been briefed on the intelligence efforts of the United States.”

    The government is collecting “external” data on domestic phone calls but is not intercepting “internals,” a term for the actual content of the communication, according to a U.S. intelligence official familiar with the program. This kind of data collection from phone companies is not uncommon; it’s been done before, though never on this large a scale, the official said. The data are used for “social network analysis,” the official said, meaning to study how terrorist networks contact each other and how they are tied together.

    Carriers uniquely positioned

    AT&T recently merged with SBC and kept the AT&T name. Verizon, BellSouth and AT&T are the nation’s three biggest telecommunications companies; they provide local and wireless phone service to more than 200 million customers.

    The three carriers control vast networks with the latest communications technologies. They provide an array of services: local and long-distance calling, wireless and high-speed broadband, including video. Their direct access to millions of homes and businesses has them uniquely positioned to help the government keep tabs on the calling habits of Americans.

    Among the big telecommunications companies, only Qwest has refused to help the NSA, the sources said. According to multiple sources, Qwest declined to participate because it was uneasy about the legal implications of handing over customer information to the government without warrants.

    Qwest’s refusal to participate has left the NSA with a hole in its database. Based in Denver, Qwest provides local phone service to 14 million customers in 14 states in the West and Northwest. But AT&T and Verizon also provide some services — primarily long-distance and wireless — to people who live in Qwest’s region. Therefore, they can provide the NSA with at least some access in that area.

    Created by President Truman in 1952, during the Korean War, the NSA is charged with protecting the United States from foreign security threats. The agency was considered so secret that for years the government refused to even confirm its existence. Government insiders used to joke that NSA stood for “No Such Agency.”

    In 1975, a congressional investigation revealed that the NSA had been intercepting, without warrants, international communications for more than 20 years at the behest of the CIA and other agencies. The spy campaign, code-named “Shamrock,” led to the Foreign Intelligence Surveillance Act (FISA), which was designed to protect Americans from illegal eavesdropping.

    Enacted in 1978, FISA lays out procedures that the U.S. government must follow to conduct electronic surveillance and physical searches of people believed to be engaged in espionage or international terrorism against the United States. A special court, which has 11 members, is responsible for adjudicating requests under FISA.

    Over the years, NSA code-cracking techniques have continued to improve along with technology. The agency today is considered expert in the practice of “data mining” — sifting through reams of information in search of patterns. Data mining is just one of many tools NSA analysts and mathematicians use to crack codes and track international communications.

    Paul Butler, a former U.S. prosecutor who specialized in terrorism crimes, said FISA approval generally isn’t necessary for government data-mining operations. “FISA does not prohibit the government from doing data mining,” said Butler, now a partner with the law firm Akin Gump Strauss Hauer & Feld in Washington, D.C.

    The caveat, he said, is that “personal identifiers” — such as names, Social Security numbers and street addresses — can’t be included as part of the search. “That requires an additional level of probable cause,” he said.

    The usefulness of the NSA’s domestic phone-call database as a counterterrorism tool is unclear. Also unclear is whether the database has been used for other purposes.

    The NSA’s domestic program raises legal questions. Historically, AT&T and the regional phone companies have required law enforcement agencies to present a court order before they would even consider turning over a customer’s calling data. Part of that owed to the personality of the old Bell Telephone System, out of which those companies grew.

    Ma Bell’s bedrock principle — protection of the customer — guided the company for decades, said Gene Kimmelman, senior public policy director of Consumers Union. “No court order, no customer information — period. That’s how it was for decades,” he said.

    The concern for the customer was also based on law: Under Section 222 of the Communications Act, first passed in 1934, telephone companies are prohibited from giving out information regarding their customers’ calling habits: whom a person calls, how often and what routes those calls take to reach their final destination. Inbound calls, as well as wireless calls, also are covered.

    The financial penalties for violating Section 222, one of many privacy reinforcements that have been added to the law over the years, can be stiff. The Federal Communications Commission, the nation’s top telecommunications regulatory agency, can levy fines of up to $130,000 per day per violation, with a cap of $1.325 million per violation. The FCC has no hard definition of “violation.” In practice, that means a single “violation” could cover one customer or 1 million.

    In the case of the NSA’s international call-tracking program, Bush signed an executive order allowing the NSA to engage in eavesdropping without a warrant. The president and his representatives have since argued that an executive order was sufficient for the agency to proceed. Some civil liberties groups, including the American Civil Liberties Union, disagree.

    Companies approached

    The NSA’s domestic program began soon after the Sept. 11 attacks, according to the sources. Right around that time, they said, NSA representatives approached the nation’s biggest telecommunications companies. The agency made an urgent pitch: National security is at risk, and we need your help to protect the country from attacks.

    The agency told the companies that it wanted them to turn over their “call-detail records,” a complete listing of the calling histories of their millions of customers. In addition, the NSA wanted the carriers to provide updates, which would enable the agency to keep tabs on the nation’s calling habits.

    The sources said the NSA made clear that it was willing to pay for the cooperation. AT&T, which at the time was headed by C. Michael Armstrong, agreed to help the NSA. So did BellSouth, headed by F. Duane Ackerman; SBC, headed by Ed Whitacre; and Verizon, headed by Ivan Seidenberg.

    With that, the NSA’s domestic program began in earnest.

    AT&T, when asked about the program, replied with a comment prepared for USA TODAY: “We do not comment on matters of national security, except to say that we only assist law enforcement and government agencies charged with protecting national security in strict accordance with the law.”

    In another prepared comment, BellSouth said: “BellSouth does not provide any confidential customer information to the NSA or any governmental agency without proper legal authority.”

    Verizon, the USA’s No. 2 telecommunications company behind AT&T, gave this statement: “We do not comment on national security matters, we act in full compliance with the law and we are committed to safeguarding our customers’ privacy.”

    Qwest spokesman Robert Charlton said: “We can’t talk about this. It’s a classified situation.”

    In December, The New York Times revealed that Bush had authorized the NSA to wiretap, without warrants, international phone calls and e-mails that travel to or from the USA. The following month, the Electronic Frontier Foundation, a civil liberties group, filed a class-action lawsuit against AT&T. The lawsuit accuses the company of helping the NSA spy on U.S. phone customers.

    Last month, U.S. Attorney General Alberto Gonzales alluded to that possibility. Appearing at a House Judiciary Committee hearing, Gonzales was asked whether he thought the White House has the legal authority to monitor domestic traffic without a warrant. Gonzales’ reply: “I wouldn’t rule it out.” His comment marked the first time a Bush appointee publicly asserted that the White House might have that authority.

    Similarities in programs

    The domestic and international call-tracking programs have things in common, according to the sources. Both are being conducted without warrants and without the approval of the FISA court. The Bush administration has argued that FISA’s procedures are too slow in some cases. Officials, including Gonzales, also make the case that the USA Patriot Act gives them broad authority to protect the safety of the nation’s citizens.

    The chairman of the Senate Intelligence Committee, Sen. Pat Roberts, R-Kan., would not confirm the existence of the program. In a statement, he said, “I can say generally, however, that our subcommittee has been fully briefed on all aspects of the Terrorist Surveillance Program. … I remain convinced that the program authorized by the president is lawful and absolutely necessary to protect this nation from future attacks.”

    The chairman of the House Intelligence Committee, Rep. Pete Hoekstra, R-Mich., declined to comment.

    One company differs

    One major telecommunications company declined to participate in the program: Qwest.

    According to sources familiar with the events, Qwest’s CEO at the time, Joe Nacchio, was deeply troubled by the NSA’s assertion that Qwest didn’t need a court order — or approval under FISA — to proceed. Adding to the tension, Qwest was unclear about who, exactly, would have access to its customers’ information and how that information might be used.

    Financial implications were also a concern, the sources said. Carriers that illegally divulge calling information can be subjected to heavy fines. The NSA was asking Qwest to turn over millions of records. The fines, in the aggregate, could have been substantial.

    The NSA told Qwest that other government agencies, including the FBI, CIA and DEA, also might have access to the database, the sources said. As a matter of practice, the NSA regularly shares its information — known as “product” in intelligence circles — with other intelligence groups. Even so, Qwest’s lawyers were troubled by the expansiveness of the NSA request, the sources said.

    The NSA, which needed Qwest’s participation to completely cover the country, pushed back hard.

    Trying to put pressure on Qwest, NSA representatives pointedly told Qwest that it was the lone holdout among the big telecommunications companies. It also tried appealing to Qwest’s patriotic side: In one meeting, an NSA representative suggested that Qwest’s refusal to contribute to the database could compromise national security, one person recalled.

    In addition, the agency suggested that Qwest’s foot-dragging might affect its ability to get future classified work with the government. Like other big telecommunications companies, Qwest already had classified contracts and hoped to get more.

    Unable to get comfortable with what NSA was proposing, Qwest’s lawyers asked NSA to take its proposal to the FISA court. According to the sources, the agency refused.

    The NSA’s explanation did little to satisfy Qwest’s lawyers. “They told (Qwest) they didn’t want to do that because FISA might not agree with them,” one person recalled. For similar reasons, this person said, NSA rejected Qwest’s suggestion of getting a letter of authorization from the U.S. attorney general’s office. A second person confirmed this version of events.

    In June 2002, Nacchio resigned amid allegations that he had misled investors about Qwest’s financial health. But Qwest’s legal questions about the NSA request remained.

    Unable to reach agreement, Nacchio’s successor, Richard Notebaert, finally pulled the plug on the NSA talks in late 2004, the sources said.

    By Leslie Cauley, USA TODAY
    Contributing: John Diamond
    Posted 5/10/2006 11:16 PM ET
    Updated 5/11/2006 10:38 AM ET

    Find this story at 5 October 2006

    Copyright 2011 USA TODAY

    Confirmed: The NSA is Spying on Millions of Americans

    Today, the Guardian newspaper confirmed what EFF (and many others) have long claimed: the NSA is conducting widespread, untargeted, domestic surveillance on millions of Americans. This revelation should end, once and for all, the government’s long-discredited secrecy claims about its dragnet domestic surveillance programs. It should spur Congress and the American people to make the President finally tell the truth about the government’s spying on innocent Americans.

    In a report by Glenn Greenwald, the paper published an order from the Foreign Intelligence Surveillance Court (or FISC) that directs Verizon to provide “on an ongoing daily basis” all call records for any call “wholly within the United States, including local telephone calls” and any call made “between the United States and abroad.”

    In plain language: the order gave the NSA a record of every Verizon customer’s call history — every call made, the location of the phone, the time of the call, the duration of the call, and other “identifying information” for the phone and call — from April 25, 2013 (the date the order was issued) to July 19, 2013. The order does not require content or the name of any subscriber and is issued under 50 USC sec.1861, also known as section 215 of the Patriot Act.

    There is no indication that this order to Verizon was unique or novel. It is very likely that business records orders like this exist for every major American telecommunication company, meaning that, if you make calls in the United States, the NSA has those records. And this has been going on for at least 7 years, and probably longer.

    This type of untargeted, wholly domestic surveillance is exactly what EFF, and others, have been suing about for years. In 2006, USA Today published a story disclosing that the NSA had compiled a massive database of call records from American telecommunications companies. Our case, Jewel v. NSA, challenging the legality of the NSA’s domestic spying program, has been pending since 2008, but its predecessor, Hepting v. AT&T filed in 2006, alleged the same surveillance. In 2011, on the 10th Anniversary of the Patriot Act, we filed a FOIA lawsuit against the Department of Justice for records about the government’s use of Section 215 – the legal authority the government was relying on to perform this type of untargeted surveillance.

    But at each step of the way, the government has tried to hide the truth from the American public: in Hepting, behind telecom immunity; in Jewel, behind the state secrets privilege; in the FOIA case, by claiming the information is classified at the top secret level. In May 2011, Senator Ron Wyden, one of the few courageous voices fighting against the government’s domestic surveillance program, said this in a debate about reauthorizing Section 215:

    I want to deliver a warning this afternoon: when the American people find out how their government has secretly interpreted the Patriot Act, they will be stunned and they will be angry.

    Today is that day. The American people have confirmed how the government has secretly interpreted Section 215. And we’re angry. It’s time to stop hiding behind legal privileges and to come clean about Section 215 and FISA. It’s time to start the national dialogue about our rights in the digital age. And it’s time to end the NSA’s unconstitutional domestic surveillance program.

    June 5, 2013 | By Cindy Cohn and Mark Rumold

    Find this story at 5 June 2013

    A hidden world, growing beyond control (19 July 2010)

    The top-secret world the government created in response to the terrorist attacks of Sept. 11, 2001, has become so large, so unwieldy and so secretive that no one knows how much money it costs, how many people it employs, how many programs exist within it or exactly how many agencies do the same work.

    These are some of the findings of a two-year investigation by The Washington Post that discovered what amounts to an alternative geography of the United States, a Top Secret America hidden from public view and lacking in thorough oversight. After nine years of unprecedented spending and growth, the result is that the system put in place to keep the United States safe is so massive that its effectiveness is impossible to determine.

    The investigation’s other findings include:

    * Some 1,271 government organizations and 1,931 private companies work on programs related to counterterrorism, homeland security and intelligence in about 10,000 locations across the United States.

    * An estimated 854,000 people, nearly 1.5 times as many people as live in Washington, D.C., hold top-secret security clearances.

    * In Washington and the surrounding area, 33 building complexes for top-secret intelligence work are under construction or have been built since September 2001. Together they occupy the equivalent of almost three Pentagons or 22 U.S. Capitol buildings – about 17 million square feet of space.

    * Many security and intelligence agencies do the same work, creating redundancy and waste. For example, 51 federal organizations and military commands, operating in 15 U.S. cities, track the flow of money to and from terrorist networks.

    * Analysts who make sense of documents and conversations obtained by foreign and domestic spying share their judgment by publishing 50,000 intelligence reports each year – a volume so large that many are routinely ignored.

    These are not academic issues; lack of focus, not lack of resources, was at the heart of the Fort Hood shooting that left 13 dead, as well as the Christmas Day bomb attempt thwarted not by the thousands of analysts employed to find lone terrorists but by an alert airline passenger who saw smoke coming from his seatmate.

    They are also issues that greatly concern some of the people in charge of the nation’s security.

    “There has been so much growth since 9/11 that getting your arms around that – not just for the CIA, for the secretary of defense – is a challenge,” Defense Secretary Robert M. Gates said in an interview with The Post last week.

    In the Department of Defense, where more than two-thirds of the intelligence programs reside, only a handful of senior officials – called Super Users – have the ability to even know about all the department’s activities. But as two of the Super Users indicated in interviews, there is simply no way they can keep up with the nation’s most sensitive work.

    “I’m not going to live long enough to be briefed on everything” was how one Super User put it. The other recounted that for his initial briefing, he was escorted into a tiny, dark room, seated at a small table and told he couldn’t take notes. Program after program began flashing on a screen, he said, until he yelled ”Stop!” in frustration.

    “I wasn’t remembering any of it,” he said.

    Underscoring the seriousness of these issues are the conclusions of retired Army Lt. Gen. John R. Vines, who was asked last year to review the method for tracking the Defense Department’s most sensitive programs. Vines, who once commanded 145,000 troops in Iraq and is familiar with complex problems, was stunned by what he discovered.

    “I’m not aware of any agency with the authority, responsibility or a process in place to coordinate all these interagency and commercial activities,” he said in an interview. “The complexity of this system defies description.”

    The result, he added, is that it’s impossible to tell whether the country is safer because of all this spending and all these activities. “Because it lacks a synchronizing process, it inevitably results in message dissonance, reduced effectiveness and waste,” Vines said. “We consequently can’t effectively assess whether it is making us more safe.”

    The Post’s investigation is based on government documents and contracts, job descriptions, property records, corporate and social networking Web sites, additional records, and hundreds of interviews with intelligence, military and corporate officials and former officials. Most requested anonymity either because they are prohibited from speaking publicly or because, they said, they feared retaliation at work for describing their concerns.

    The Post’s online database of government organizations and private companies was built entirely on public records. The investigation focused on top-secret work because the amount classified at the secret level is too large to accurately track.

    Today’s article describes the government’s role in this expanding enterprise. Tuesday’s article describes the government’s dependence on private contractors. Wednesday’s is a portrait of one Top Secret America community. On the Web, an extensive, searchable database built by The Post about Top Secret America is available at washingtonpost.com/topsecretamerica.

    Defense Secretary Gates, in his interview with The Post, said that he does not believe the system has become too big to manage but that getting precise data is sometimes difficult. Singling out the growth of intelligence units in the Defense Department, he said he intends to review those programs for waste. “Nine years after 9/11, it makes a lot of sense to sort of take a look at this and say, ‘Okay, we’ve built tremendous capability, but do we have more than we need?’ ” he said.

    CIA Director Leon Panetta, who was also interviewed by The Post last week, said he’s begun mapping out a five-year plan for his agency because the levels of spending since 9/11 are not sustainable. “Particularly with these deficits, we’re going to hit the wall. I want to be prepared for that,” he said. “Frankly, I think everyone in intelligence ought to be doing that.”

    In an interview before he resigned as the director of national intelligence in May, retired Adm. Dennis C. Blair said he did not believe there was overlap and redundancy in the intelligence world. “Much of what appears to be redundancy is, in fact, providing tailored intelligence for many different customers,” he said.

    Blair also expressed confidence that subordinates told him what he needed to know. “I have visibility on all the important intelligence programs across the community, and there are processes in place to ensure the different intelligence capabilities are working together where they need to,” he said.

    Weeks later, as he sat in the corner of a ballroom at the Willard Hotel waiting to give a speech, he mused about The Post’s findings. “After 9/11, when we decided to attack violent extremism, we did as we so often do in this country,” he said. “The attitude was, if it’s worth doing, it’s probably worth overdoing.”

    Outside a gated subdivision of mansions in McLean, a line of cars idles every weekday morning as a new day in Top Secret America gets underway. The drivers wait patiently to turn left, then crawl up a hill and around a bend to a destination that is not on any public map and not announced by any street sign.

    Liberty Crossing tries hard to hide from view. But in the winter, leafless trees can’t conceal a mountain of cement and windows the size of five Wal-Mart stores stacked on top of one another rising behind a grassy berm. One step too close without the right badge, and men in black jump out of nowhere, guns at the ready.

    Past the armed guards and the hydraulic steel barriers, at least 1,700 federal employees and 1,200 private contractors work at Liberty Crossing, the nickname for the two headquarters of the Office of the Director of National Intelligence and its National Counterterrorism Center. The two share a police force, a canine unit and thousands of parking spaces.

    Liberty Crossing is at the center of the collection of U.S. government agencies and corporate contractors that mushroomed after the 2001 attacks. But it is not nearly the biggest, the most costly or even the most secretive part of the 9/11 enterprise.

    In an Arlington County office building, the lobby directory doesn’t include the Air Force’s mysteriously named XOIWS unit, but there’s a big “Welcome!” sign in the hallway greeting visitors who know to step off the elevator on the third floor. In Elkridge, Md., a clandestine program hides in a tall concrete structure fitted with false windows to look like a normal office building. In Arnold, Mo., the location is across the street from a Target and a Home Depot. In St. Petersburg, Fla., it’s in a modest brick bungalow in a run-down business park.

    Each day at the National Counterterrorism Center in McLean, workers review at least 5,000 pieces of terrorist-related data from intelligence agencies and keep an eye on world events. (Photo by: Melina Mara / The Washington Post)

    Every day across the United States, 854,000 civil servants, military personnel and private contractors with top-secret security clearances are scanned into offices protected by electromagnetic locks, retinal cameras and fortified walls that eavesdropping equipment cannot penetrate.

    This is not exactly President Dwight D. Eisenhower’s “military-industrial complex,” which emerged with the Cold War and centered on building nuclear weapons to deter the Soviet Union. This is a national security enterprise with a more amorphous mission: defeating transnational violent extremists.

    Much of the information about this mission is classified. That is the reason it is so difficult to gauge the success and identify the problems of Top Secret America, including whether money is being spent wisely. The U.S. intelligence budget is vast, publicly announced last year as $75 billion, 21/2 times the size it was on Sept. 10, 2001. But the figure doesn’t include many military activities or domestic counterterrorism programs.

    At least 20 percent of the government organizations that exist to fend off terrorist threats were established or refashioned in the wake of 9/11. Many that existed before the attacks grew to historic proportions as the Bush administration and Congress gave agencies more money than they were capable of responsibly spending.

    The Pentagon’s Defense Intelligence Agency, for example, has gone from 7,500 employees in 2002 to 16,500 today. The budget of the National Security Agency, which conducts electronic eavesdropping, doubled. Thirty-five FBI Joint Terrorism Task Forces became 106. It was phenomenal growth that began almost as soon as the Sept. 11 attacks ended.

    Nine days after the attacks, Congress committed $40 billion beyond what was in the federal budget to fortify domestic defenses and to launch a global offensive against al-Qaeda. It followed that up with an additional $36.5 billion in 2002 and $44 billion in 2003. That was only a beginning.

    With the quick infusion of money, military and intelligence agencies multiplied. Twenty-four organizations were created by the end of 2001, including the Office of Homeland Security and the Foreign Terrorist Asset Tracking Task Force. In 2002, 37 more were created to track weapons of mass destruction, collect threat tips and coordinate the new focus on counterterrorism. That was followed the next year by 36 new organizations; and 26 after that; and 31 more; and 32 more; and 20 or more each in 2007, 2008 and 2009.

    In all, at least 263 organizations have been created or reorganized as a response to 9/11. Each has required more people, and those people have required more administrative and logistic support: phone operators, secretaries, librarians, architects, carpenters, construction workers, air-conditioning mechanics and, because of where they work, even janitors with top-secret clearances.

    With so many more employees, units and organizations, the lines of responsibility began to blur. To remedy this, at the recommendation of the bipartisan 9/11 Commission, the George W. Bush administration and Congress decided to create an agency in 2004 with overarching responsibilities called the Office of the Director of National Intelligence (ODNI) to bring the colossal effort under control.

    While that was the idea, Washington has its own ways.

    The first problem was that the law passed by Congress did not give the director clear legal or budgetary authority over intelligence matters, which meant he wouldn’t have power over the individual agencies he was supposed to control.

    The second problem: Even before the first director, Ambassador John D. Negroponte, was on the job, the turf battles began. The Defense Department shifted billions of dollars out of one budget and into another so that the ODNI could not touch it, according to two senior officials who watched the process. The CIA reclassified some of its most sensitive information at a higher level so the National Counterterrorism Center staff, part of the ODNI, would not be allowed to see it, said former intelligence officers involved.

    And then came a problem that continues to this day, which has to do with the ODNI’s rapid expansion.

    When it opened in the spring of 2005, Negroponte’s office was all of 11 people stuffed into a secure vault with closet-size rooms a block from the White House. A year later, the budding agency moved to two floors of another building. In April 2008, it moved into its huge permanent home, Liberty Crossing.

    Today, many officials who work in the intelligence agencies say they remain unclear about what the ODNI is in charge of. To be sure, the ODNI has made some progress, especially in intelligence-sharing, information technology and budget reform. The DNI and his managers hold interagency meetings every day to promote collaboration. The last director, Blair, doggedly pursued such nitty-gritty issues as procurement reform, compatible computer networks, tradecraft standards and collegiality.

    But improvements have been overtaken by volume at the ODNI, as the increased flow of intelligence data overwhelms the system’s ability to analyze and use it. Every day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases. The same problem bedevils every other intelligence agency, none of which have enough analysts and translators for all this work.

    The practical effect of this unwieldiness is visible, on a much smaller scale, in the office of Michael Leiter, the director of the National Counterterrorism Center. Leiter spends much of his day flipping among four computer monitors lined up on his desk. Six hard drives sit at his feet. The data flow is enormous, with dozens of databases feeding separate computer networks that cannot interact with one another.

    There is a long explanation for why these databases are still not connected, and it amounts to this: It’s too hard, and some agency heads don’t really want to give up the systems they have. But there’s some progress: “All my e-mail on one computer now,” Leiter says. “That’s a big deal.”

    To get another view of how sprawling Top Secret America has become, just head west on the toll road toward Dulles International Airport.

    As a Michaels craft store and a Books-A-Million give way to the military intelligence giants Northrop Grumman and Lockheed Martin, find the off-ramp and turn left. Those two shimmering-blue five-story ice cubes belong to the National Geospatial-Intelligence Agency, which analyzes images and mapping data of the Earth’s geography. A small sign obscured by a boxwood hedge says so.

    Across the street, in the chocolate-brown blocks, is Carahsoft, an intelligence agency contractor specializing in mapping, speech analysis and data harvesting. Nearby is the government’s Underground Facility Analysis Center. It identifies overseas underground command centers associated with weapons of mass destruction and terrorist groups, and advises the military on how to destroy them.

    Clusters of top-secret work exist throughout the country, but the Washington region is the capital of Top Secret America.

    About half of the post-9/11 enterprise is anchored in an arc stretching from Leesburg south to Quantico, back north through Washington and curving northeast to Linthicum, just north of the Baltimore-Washington International Marshall Airport. Many buildings sit within off-limits government compounds or military bases.

    Others occupy business parks or are intermingled with neighborhoods, schools and shopping centers and go unnoticed by most people who live or play nearby.

    Many of the newest buildings are not just utilitarian offices but also edifices “on the order of the pyramids,” in the words of one senior military intelligence officer.

    Not far from the Dulles Toll Road, the CIA has expanded into two buildings that will increase the agency’s office space by one-third. To the south, Springfield is becoming home to the new $1.8 billion National Geospatial-Intelligence Agency headquarters, which will be the fourth-largest federal building in the area and home to 8,500 employees. Economic stimulus money is paying hundreds of millions of dollars for this kind of federal construction across the region.

    Construction for the National Geospatial-Intelligence Agency in Springfield (Photo by: Michael S. Williamson / The Washington Post)

    It’s not only the number of buildings that suggests the size and cost of this expansion, it’s also what is inside: banks of television monitors. “Escort-required” badges. X-ray machines and lockers to store cellphones and pagers. Keypad door locks that open special rooms encased in metal or permanent dry wall, impenetrable to eavesdropping tools and protected by alarms and a security force capable of responding within 15 minutes. Every one of these buildings has at least one of these rooms, known as a SCIF, for sensitive compartmented information facility. Some are as small as a closet; others are four times the size of a football field.

    SCIF size has become a measure of status in Top Secret America, or at least in the Washington region of it. “In D.C., everyone talks SCIF, SCIF, SCIF,” said Bruce Paquin, who moved to Florida from the Washington region several years ago to start a SCIF construction business. “They’ve got the penis envy thing going. You can’t be a big boy unless you’re a three-letter agency and you have a big SCIF.”

    SCIFs are not the only must-have items people pay attention to. Command centers, internal television networks, video walls, armored SUVs and personal security guards have also become the bling of national security.

    “You can’t find a four-star general without a security detail,” said one three-star general now posted in Washington after years abroad. “Fear has caused everyone to have stuff. Then comes, ‘If he has one, then I have to have one.’ It’s become a status symbol.”

    Among the most important people inside the SCIFs are the low-paid employees carrying their lunches to work to save money. They are the analysts, the 20- and 30-year-olds making $41,000 to $65,000 a year, whose job is at the core of everything Top Secret America tries to do.

    At its best, analysis melds cultural understanding with snippets of conversations, coded dialogue, anonymous tips, even scraps of trash, turning them into clues that lead to individuals and groups trying to harm the United States.

    Their work is greatly enhanced by computers that sort through and categorize data. But in the end, analysis requires human judgment, and half the analysts are relatively inexperienced, having been hired in the past several years, said a senior ODNI official. Contract analysts are often straight out of college and trained at corporate headquarters.

    When hired, a typical analyst knows very little about the priority countries – Iraq, Iran, Afghanistan and Pakistan – and is not fluent in their languages. Still, the number of intelligence reports they produce on these key countries is overwhelming, say current and former intelligence officials who try to cull them every day. The ODNI doesn’t know exactly how many reports are issued each year, but in the process of trying to find out, the chief of analysis discovered 60 classified analytic Web sites still in operation that were supposed to have been closed down for lack of usefulness. “Like a zombie, it keeps on living” is how one official describes the sites.

    The problem with many intelligence reports, say officers who read them, is that they simply re-slice the same facts already in circulation. “It’s the soccer ball syndrome. Something happens, and they want to rush to cover it,” said Richard H. Immerman, who was the ODNI’s assistant deputy director of national intelligence for analytic integrity and standards until early 2009. “I saw tremendous overlap.”

    Even the analysts at the National Counterterrorism Center (NCTC), which is supposed to be where the most sensitive, most difficult-to-obtain nuggets of information are fused together, get low marks from intelligence officials for not producing reports that are original, or at least better than the reports already written by the CIA, FBI, National Security Agency or Defense Intelligence Agency.

    When Maj. Gen. John M. Custer was the director of intelligence at U.S. Central Command, he grew angry at how little helpful information came out of the NCTC. In 2007, he visited its director at the time, retired Vice Adm. John Scott Redd, to tell him so. “I told him that after 41/2 years, this organization had never produced one shred of information that helped me prosecute three wars!” he said loudly, leaning over the table during an interview.

    Two years later, Custer, now head of the Army’s intelligence school at Fort Huachuca, Ariz., still gets red-faced recalling that day, which reminds him of his frustration with Washington’s bureaucracy. “Who has the mission of reducing redundancy and ensuring everybody doesn’t gravitate to the lowest-hanging fruit?” he said. “Who orchestrates what is produced so that everybody doesn’t produce the same thing?”

    He’s hardly the only one irritated. In a secure office in Washington, a senior intelligence officer was dealing with his own frustration. Seated at his computer, he began scrolling through some of the classified information he is expected to read every day: CIA World Intelligence Review, WIRe-CIA, Spot Intelligence Report, Daily Intelligence Summary, Weekly Intelligence Forecast, Weekly Warning Forecast, IC Terrorist Threat Assessments, NCTC Terrorism Dispatch, NCTC Spotlight . . .

    It’s too much, he complained. The inbox on his desk was full, too. He threw up his arms, picked up a thick, glossy intelligence report and waved it around, yelling.

    “Jesus! Why does it take so long to produce?”

    “Why does it have to be so bulky?”

    “Why isn’t it online?”

    The overload of hourly, daily, weekly, monthly and annual reports is actually counterproductive, say people who receive them. Some policymakers and senior officials don’t dare delve into the backup clogging their computers. They rely instead on personal briefers, and those briefers usually rely on their own agency’s analysis, re-creating the very problem identified as a main cause of the failure to thwart the attacks: a lack of information-sharing.

    A new Defense Department office complex goes up in Alexandria. (Photo by: Michael S. Williamson / The Washington Post)

    The ODNI’s analysis office knows this is a problem. Yet its solution was another publication, this one a daily online newspaper, Intelligence Today. Every day, a staff of 22 culls more than two dozen agencies’ reports and 63 Web sites, selects the best information and packages it by originality, topic and region.

    Analysis is not the only area where serious overlap appears to be gumming up the national security machinery and blurring the lines of responsibility.

    Within the Defense Department alone, 18 commands and agencies conduct information operations, which aspire to manage foreign audiences’ perceptions of U.S. policy and military activities overseas.

    And all the major intelligence agencies and at least two major military commands claim a major role in cyber-warfare, the newest and least-defined frontier.

    “Frankly, it hasn’t been brought together in a unified approach,” CIA Director Panetta said of the many agencies now involved in cyber-warfare.

    “Cyber is tremendously difficult” to coordinate, said Benjamin A. Powell, who served as general counsel for three directors of national intelligence until he left the government last year. “Sometimes there was an unfortunate attitude of bring your knives, your guns, your fists and be fully prepared to defend your turf.” Why? “Because it’s funded, it’s hot and it’s sexy.”

    Last fall, U.S. Army Maj. Nidal Malik Hasan allegedly opened fire at Fort Hood, Tex., killing 13 people and wounding 30. In the days after the shootings, information emerged about Hasan’s increasingly strange behavior at Walter Reed Army Medical Center, where he had trained as a psychiatrist and warned commanders that they should allow Muslims to leave the Army or risk “adverse events.” He had also exchanged e-mails with a well-known radical cleric in Yemen being monitored by U.S. intelligence.

    But none of this reached the one organization charged with handling counterintelligence investigations within the Army. Just 25 miles up the road from Walter Reed, the Army’s 902nd Military Intelligence Group had been doing little to search the ranks for potential threats. Instead, the 902’s commander had decided to turn the unit’s attention to assessing general terrorist affiliations in the United States, even though the Department of Homeland Security and the FBI’s 106 Joint Terrorism Task Forces were already doing this work in great depth.

    The 902nd, working on a program the commander named RITA, for Radical Islamic Threat to the Army, had quietly been gathering information on Hezbollah, Iranian Republican Guard and al-Qaeda student organizations in the United States. The assessment “didn’t tell us anything we didn’t know already,” said the Army’s senior counterintelligence officer at the Pentagon.

    Secrecy and lack of coordination have allowed organizations, such as the 902nd in this case, to work on issues others were already tackling rather than take on the much more challenging job of trying to identify potential jihadist sympathizers within the Army itself.

    Beyond redundancy, secrecy within the intelligence world hampers effectiveness in other ways, say defense and intelligence officers. For the Defense Department, the root of this problem goes back to an ultra-secret group of programs for which access is extremely limited and monitored by specially trained security officers.

    These are called Special Access Programs – or SAPs – and the Pentagon’s list of code names for them runs 300 pages. The intelligence community has hundreds more of its own, and those hundreds have thousands of sub-programs with their own limits on the number of people authorized to know anything about them. All this means that very few people have a complete sense of what’s going on.

    “There’s only one entity in the entire universe that has visibility on all SAPs – that’s God,” said James R. Clapper, undersecretary of defense for intelligence and the Obama administration’s nominee to be the next director of national intelligence.

    Such secrecy can undermine the normal chain of command when senior officials use it to cut out rivals or when subordinates are ordered to keep secrets from their commanders.

    One military officer involved in one such program said he was ordered to sign a document prohibiting him from disclosing it to his four-star commander, with whom he worked closely every day, because the commander was not authorized to know about it. Another senior defense official recalls the day he tried to find out about a program in his budget, only to be rebuffed by a peer. “What do you mean you can’t tell me? I pay for the program,” he recalled saying in a heated exchange.

    Another senior intelligence official with wide access to many programs said that secrecy is sometimes used to protect ineffective projects. “I think the secretary of defense ought to direct a look at every single thing to see if it still has value,” he said. “The DNI ought to do something similar.”

    The ODNI hasn’t done that yet. The best it can do at the moment is maintain a database of the names of the most sensitive programs in the intelligence community. But the database does not include many important and relevant Pentagon projects.

    Because so much is classified, illustrations of what goes on every day in Top Secret America can be hard to ferret out. But every so often, examples emerge. A recent one shows the post-9/11 system at its best and its worst.

    Last fall, after eight years of growth and hirings, the enterprise was at full throttle when word emerged that something was seriously amiss inside Yemen. In response, President Obama signed an order sending dozens of secret commandos to that country to target and kill the leaders of an al-Qaeda affiliate.

    In Yemen, the commandos set up a joint operations center packed with hard drives, forensic kits and communications gear. They exchanged thousands of intercepts, agent reports, photographic evidence and real-time video surveillance with dozens of top-secret organizations in the United States.

    That was the system as it was intended. But when the information reached the National Counterterrorism Center in Washington for analysis, it arrived buried within the 5,000 pieces of general terrorist-related data that are reviewed each day. Analysts had to switch from database to database, from hard drive to hard drive, from screen to screen, just to locate what might be interesting to study further.

    As military operations in Yemen intensified and the chatter about a possible terrorist strike increased, the intelligence agencies ramped up their effort. The flood of information into the NCTC became a torrent.

    Somewhere in that deluge was even more vital data. Partial names of someone in Yemen. A reference to a Nigerian radical who had gone to Yemen. A report of a father in Nigeria worried about a son who had become interested in radical teachings and had disappeared inside Yemen.

    These were all clues to what would happen when a Nigerian named Umar Farouk Abdulmutallab left Yemen and eventually boarded a plane in Amsterdam bound for Detroit. But nobody put them together because, as officials would testify later, the system had gotten so big that the lines of responsibility had become hopelessly blurred.

    “There are so many people involved here,” NCTC Director Leiter told Congress.

    “Everyone had the dots to connect,” DNI Blair explained to the lawmakers. “But I hadn’t made it clear exactly who had primary responsibility.”

    And so Abdulmutallab was able to step aboard Northwest Airlines Flight 253. As it descended toward Detroit, he allegedly tried to ignite explosives hidden in his underwear. It wasn’t the very expensive, very large 9/11 enterprise that prevented disaster. It was a passenger who saw what he was doing and tackled him. “We didn’t follow up and prioritize the stream of intelligence,” White House counterterrorism adviser John O. Brennan explained afterward. “Because no one intelligence entity, or team or task force was assigned responsibility for doing that follow-up investigation.”

    Blair acknowledged the problem. His solution: Create yet another team to run down every important lead. But he also told Congress he needed more money and more analysts to prevent another mistake.

    More is often the solution proposed by the leaders of the 9/11 enterprise. After the Christmas Day bombing attempt, Leiter also pleaded for more – more analysts to join the 300 or so he already had.

    The Department of Homeland Security asked for more air marshals, more body scanners and more analysts, too, even though it can’t find nearly enough qualified people to fill its intelligence unit now. Obama has said he will not freeze spending on national security, making it likely that those requests will be funded.

    More building, more expansion of offices continues across the country. A $1.7 billion NSA data-processing center will be under construction soon near Salt Lake City. In Tampa, the U.S. Central Command’s new 270,000-square-foot intelligence office will be matched next year by an equally large headquarters building, and then, the year after that, by a 51,000-square-foot office just for its special operations section.

    Just north of Charlottesville, the new Joint-Use Intelligence Analysis Facility will consolidate 1,000 defense intelligence analysts on a secure campus.

    Meanwhile, five miles southeast of the White House, the DHS has broken ground for its new headquarters, to be shared with the Coast Guard. DHS, in existence for only seven years, already has its own Special Access Programs, its own research arm, its own command center, its own fleet of armored cars and its own 230,000-person workforce, the third-largest after the departments of Defense and Veterans Affairs.

    Soon, on the grounds of the former St. Elizabeths mental hospital in Anacostia, a $3.4 billion showcase of security will rise from the crumbling brick wards. The new headquarters will be the largest government complex built since the Pentagon, a major landmark in the alternative geography of Top Secret America and four times as big as Liberty Crossing.

    Staff researcher Julie Tate contributed to this report.

    Methodology and credits

    Comments

    The Top Secret America database was put together by compiling hundreds of thousands of public records of government organizations and private-sector companies over the past two years.

    From these records, The Washington Post identified 45 government organizations (for example, the FBI) engaged in top-secret work and determined that those 45 organizations could be broken down into 1,271 sub-units (for example, the Terrorist Screening Center of the FBI). One of the 45 organizations is represented as “unknown”; this category was created as a catchall for companies doing work for a government organization that could not be determined.

    At the private-sector level, The Post identified 1,931 companies engaged in top-secret work for the government. Private-sector companies were grouped together and listed by a parent company’s name (for example, General Dynamics), even though one company might contain multiple sub-units (for example, General Dynamics Information Technology).

    In a case where a large corporation (for example, Boeing) has a distinctly named sub-unit engaged in top-secret work (for example, Boeing’s Digital Receiver Technology), the name of the sub-unit was used. In the case of large corporations not primarily in the defense industry (for example, AT&T) that have similarly named sub-units that focus on top-secret work (for example, AT&T Government Solutions), the name of the parent company is used and the name of the sub-unit is noted. For every company listed, revenue and employee data and the date of establishment were drawn from public filings, Dun & Bradstreet data and original reporting.

    State and local government organizations generally do not work at the top-secret level; that type of clearance is rarely granted to state officials. But the organizations are all part of a secretive domestic intelligence and homeland security world. The Post examined nearly 1,000 threat documents marked “For Official Use Only” and collected information from government Web sites, reports and other documents to identify 4,058 government organizations involved in domestic counterterrorism and homeland security. Of the total, 2,880 are federal organizations that work at the state level, such as the FBI’s Joint Terrorism Task Forces (JTTFs). There are also 818 state and 360 local organizations. Many of these listed themselves in documents as participants in either Joint Terrorism Task Forces, fusion centers or Anti-Terrorism Advisory Councils in 2009 or 2010.

    More than 20 journalists worked on the investigation, including investigative reporters, cartography experts, database reporters, video journalists, researchers, interactive graphic designers, digital designers, graphic designers, and graphics editors at The Washington Post:

    Stephanie Clark, Ben de la Cruz, Kat Downs, Dan Drinkard, Anne Ferguson-Rohrer, Justin Ferrell, David Finkel, Jennifer Jenkins, Robert Kaiser, Laris Karklis, Jacqueline Kazil, Lauren Keane, Todd Lindeman, Greg Manifold, Jennifer Morehead, Bonnie Jo Mount, Larry Nista, Ryan O’Neil, Sarah Sampsel, Whitney Shefte, Laura Stanton, Julie Tate, Doris Truong, Nathaniel Vaughn Kelso, Michael Williamson, Karen Yourish, Amanda Zamora

    One researcher was funded in part by the Center on Law and Security at New York University Law School.

    Monday, July 19, 2010; 4:50 PM

    Find this story at 19 July 2010

    Find the project at

    © 2013 The Washington Post Company

     

     

    Not just Verizon? Secret NSA effort to gather phone data is years old

    WASHINGTON — The massive National Security Agency collection of telephone records disclosed Wednesday was part of a continuing program that has been in effect nonstop since 2006, according to the two top leaders of the Senate Intelligence Committee.

    “As far as I know, this is the exact three-month renewal of what has been in place for the past seven years,” Sen. Dianne Feinstein (D-Calif.) told reporters Thursday. The surveillance “is lawful” and Congress has been fully briefed on the practice, she added.

    Her Republican counterpart, Saxby Chambliss, concurred: “This is nothing new. This has been going on for seven years,” he said. “Every member of the United States Senate has been advised of this. To my knowledge there has not been any citizen who has registered a complaint. It has proved meritorious because we have collected significant information on bad guys, but only on bad guys, over the years.”

    The statements by the two senators, whose committee positions give them wide access to classified data, appeared to rule out the possibility that the court order directing Verizon to turn over telephone records was related to the Boston Marathon bombings. The order was effective as of April 19, shortly after the bombings, which had sparked speculation about a link.

    Instead, the surveillance, which was revealed Wednesday by Britain’s Guardian newspaper, appears to have been of far longer duration. Although the senators did not specify the scope of the surveillance, the fact that it has been in place since 2006 also suggests that it is not limited to any one phone carrier.

    The Obama administration defended the program Thursday, saying the data collection “has been a critical tool in protecting the nation from terrorist threats to the United States.”

    A senior administration official released a statement which did not confirm the existence of the court order authorizing the surveillance, which, according to the copy released by the Guardian, is marked “Top Secret.” It was issued in late April by the Foreign Intelligence Surveillance Court, a secret court that meets in Washington, and allowed the government to collect the bulk data until July 19.

    “The information acquired does not include the content of any communications or the name of any subscriber,” the official said. “It relates exclusively to metadata, such as a telephone number or the length of a call.

    The court order was authorized under a provision of the Foreign Intelligence Surveillance Act that allows the government to collect business records in bulk if its requests are approved by the court.

    The official said telephone data allow “counterterrorism personnel to discover whether known or suspected terrorists have been in contact with other persons who may be engaged in terrorist activities, particularly people located inside the United States.”

    The official requested anonymity to discuss the counterterrorism program.

    In defending the data collection program, the administration official sought to spread responsibility, noting that “all three branches” of government were tasked with review and oversight of surveillance.

    “There is a robust legal regime in place governing all activities conducted pursuant to the Foreign Intelligence Surveillance Act,” the official said. He said that involves oversight by the Department of Justice, the Office of the Director of National Intelligence and the FISA court.

    Separately, the Justice Department released a letter defending the administration’s handling of the FISA law that they had sent in 2011 to two senators who had objected to it.

    “We do not believe the Executive Branch is operating pursuant to ‘secret law’ or ‘secret opinions of the Department of Justice,’ “ said the letter, signed by Assistant Atty. Gen. Ronald Weich. The “Intelligence Community is conducting court-authorized intelligence activities pursuant to a public statute, with the knowledge and oversight of Congress and the Intelligence Communities of both Houses.”

    “Many other collection activities are classified,” Weich added, saying that “this is necessary because public disclosure of the activities they discuss would harm national security and impede the effectiveness of the intelligence tools that Congress has approved.”

    Weich further defended the program by saying intelligence officials have “determined that public disclosure of the classified use” of the law “would expose sensitive sources and methods to our adversaries and therefore harm national security.”

    He said collection of records, as now underway with Verizon phone logs, was different than material obtained through grand jury subpoenas. Grand jury subpoenas, he said, can be obtained by prosecutors without court approval. In contrast, he said, the intelligence collections can be done only with approval from a federal judge sitting on the Foreign Intelligence Surveillance Court.

    Most importantly, he noted that FISA courts require a showing by officials that the records sought “are relevant to an authorized national security investigation.”

    The Weich letter was sent to Sen. Ron Wyden (D-0re.).

    Atty. Gen. Eric H. Holder Jr. is testifying Thursday morning before the Senate Appropriations Committee, and is expected to address the matter further.

    By Richard A. Serrano and Kathleen Hennessey

    8:54 AM PDT, June 6, 2013Advertisement

    Find this story at 6 June 2013

    Copyright © 2013, Los Angeles Times

    Verizon forced to hand over telephone data – full court ruling

    The US government is collecting the phone records of millions of US customers of Verizon under a top secret court order. Read the Foreign Intelligence Surveillance Court order

    Find this story at 6 June 2013

    guardian.co.uk, Thursday 6 June 2013 00.04 BST

    NSA collecting phone records of millions of Verizon customers daily

    Exclusive: Top secret court order requiring Verizon to hand over all call data shows scale of domestic surveillance under Obama

    Under the terms of the order, the numbers of both parties on a call are handed over, as is location data and the time and duration of all calls. Photograph: Matt Rourke/AP

    The National Security Agency is currently collecting the telephone records of millions of US customers of Verizon, one of America’s largest telecoms providers, under a top secret court order issued in April.

    The order, a copy of which has been obtained by the Guardian, requires Verizon on an “ongoing, daily basis” to give the NSA information on all telephone calls in its systems, both within the US and between the US and other countries.

    The document shows for the first time that under the Obama administration the communication records of millions of US citizens are being collected indiscriminately and in bulk – regardless of whether they are suspected of any wrongdoing.

    The secret Foreign Intelligence Surveillance Court (Fisa) granted the order to the FBI on April 25, giving the government unlimited authority to obtain the data for a specified three-month period ending on July 19.

    Under the terms of the blanket order, the numbers of both parties on a call are handed over, as is location data, call duration, unique identifiers, and the time and duration of all calls. The contents of the conversation itself are not covered.

    The disclosure is likely to reignite longstanding debates in the US over the proper extent of the government’s domestic spying powers.

    Under the Bush administration, officials in security agencies had disclosed to reporters the large-scale collection of call records data by the NSA, but this is the first time significant and top-secret documents have revealed the continuation of the practice on a massive scale under President Obama.

    The unlimited nature of the records being handed over to the NSA is extremely unusual. Fisa court orders typically direct the production of records pertaining to a specific named target who is suspected of being an agent of a terrorist group or foreign state, or a finite set of individually named targets.

    The Guardian approached the National Security Agency, the White House and the Department of Justice for comment in advance of publication on Wednesday. All declined. The agencies were also offered the opportunity to raise specific security concerns regarding the publication of the court order.

    The court order expressly bars Verizon from disclosing to the public either the existence of the FBI’s request for its customers’ records, or the court order itself.

    “We decline comment,” said Ed McFadden, a Washington-based Verizon spokesman.

    The order, signed by Judge Roger Vinson, compels Verizon to produce to the NSA electronic copies of “all call detail records or ’telephony metadata’ created by Verizon for communications between the United States and abroad” or “wholly within the United States, including local telephone calls”.

    The order directs Verizon to “continue production on an ongoing daily basis thereafter for the duration of this order”. It specifies that the records to be produced include “session identifying information”, such as “originating and terminating number”, the duration of each call, telephone calling card numbers, trunk identifiers, International Mobile Subscriber Identity (IMSI) number, and “comprehensive communication routing information”.

    The information is classed as “metadata”, or transactional information, rather than communications, and so does not require individual warrants to access. The document also specifies that such “metadata” is not limited to the aforementioned items. A 2005 court ruling judged that cell site location data – the nearest cell tower a phone was connected to – was also transactional data, and so could potentially fall under the scope of the order.

    While the order itself does not include either the contents of messages or the personal information of the subscriber of any particular cell number, its collection would allow the NSA to build easily a comprehensive picture of who any individual contacted, how and when, and possibly from where, retrospectively.

    It is not known whether Verizon is the only cell-phone provider to be targeted with such an order, although previous reporting has suggested the NSA has collected cell records from all major mobile networks. It is also unclear from the leaked document whether the three-month order was a one-off, or the latest in a series of similar orders.

    The court order appears to explain the numerous cryptic public warnings by two US senators, Ron Wyden and Mark Udall, about the scope of the Obama administration’s surveillance activities.

    For roughly two years, the two Democrats have been stridently advising the public that the US government is relying on “secret legal interpretations” to claim surveillance powers so broad that the American public would be “stunned” to learn of the kind of domestic spying being conducted.

    Because those activities are classified, the senators, both members of the Senate intelligence committee, have been prevented from specifying which domestic surveillance programs they find so alarming. But the information they have been able to disclose in their public warnings perfectly tracks both the specific law cited by the April 25 court order as well as the vast scope of record-gathering it authorized.

    Julian Sanchez, a surveillance expert with the Cato Institute, explained: “We’ve certainly seen the government increasingly strain the bounds of ‘relevance’ to collect large numbers of records at once — everyone at one or two degrees of separation from a target — but vacuuming all metadata up indiscriminately would be an extraordinary repudiation of any pretence of constraint or particularized suspicion.” The April order requested by the FBI and NSA does precisely that.

    The law on which the order explicitly relies is the so-called “business records” provision of the Patriot Act, 50 USC section 1861. That is the provision which Wyden and Udall have repeatedly cited when warning the public of what they believe is the Obama administration’s extreme interpretation of the law to engage in excessive domestic surveillance.

    In a letter to attorney general Eric Holder last year, they argued that “there is now a significant gap between what most Americans think the law allows and what the government secretly claims the law allows.”

    “We believe,” they wrote, “that most Americans would be stunned to learn the details of how these secret court opinions have interpreted” the “business records” provision of the Patriot Act.

    Privacy advocates have long warned that allowing the government to collect and store unlimited “metadata” is a highly invasive form of surveillance of citizens’ communications activities. Those records enable the government to know the identity of every person with whom an individual communicates electronically, how long they spoke, and their location at the time of the communication.

    Such metadata is what the US government has long attempted to obtain in order to discover an individual’s network of associations and communication patterns. The request for the bulk collection of all Verizon domestic telephone records indicates that the agency is continuing some version of the data-mining program begun by the Bush administration in the immediate aftermath of the 9/11 attack.

    The NSA, as part of a program secretly authorized by President Bush on 4 October 2001, implemented a bulk collection program of domestic telephone, internet and email records. A furore erupted in 2006 when USA Today reported that the NSA had “been secretly collecting the phone call records of tens of millions of Americans, using data provided by AT&T, Verizon and BellSouth” and was “using the data to analyze calling patterns in an effort to detect terrorist activity.” Until now, there has been no indication that the Obama administration implemented a similar program.

    These recent events reflect how profoundly the NSA’s mission has transformed from an agency exclusively devoted to foreign intelligence gathering, into one that focuses increasingly on domestic communications. A 30-year employee of the NSA, William Binney, resigned from the agency shortly after 9/11 in protest at the agency’s focus on domestic activities.

    In the mid-1970s, Congress, for the first time, investigated the surveillance activities of the US government. Back then, the mandate of the NSA was that it would never direct its surveillance apparatus domestically.

    At the conclusion of that investigation, Frank Church, the Democratic senator from Idaho who chaired the investigative committee, warned: “The NSA’s capability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter.”

    Additional reporting by Ewen MacAskill and Spencer Ackerman

    The Guardian, Thursday 6 June 2013

    Find this story at 6 June 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    A Bet on Peace for War-Torn Somalia

    Michael Stock is pursuing an extreme version of that basic investor’s principle: Get in early. He’s just finished building a resort on the coast of war-torn Mogadishu, Somalia. WSJ’s Christopher S. Stewart reports. (Photo: Dominic Nahr/WSJ)

    MOGADISHU, Somalia—Michael Stock sees things that others don’t. “Imagine this,” he says one recent afternoon, standing on the sunny second-floor deck of his new oceanside hotel in Somalia’s war-battered capital. “There are banana trees where there’s desert now, and there’s this view.”

    The banana trees haven’t grown in yet, but International Campus, as he calls the complex, is the closest thing to a Ritz for many miles. A fortified compound sprawled across 11 acres of rocky white beach, it offers 212 rooms including $500-a-night villas, several dining rooms, coffee and snack shops, and a curving slate-colored pool where sun-seekers can loll away Somali afternoons.

    “It’s going to be ridiculous!” Mr. Stock said, just weeks before residents began arriving for April’s opening.

    A few hours later, the jittery sound of gunfire split the warm February air not far from his new hotel—a reminder that the country is still muddling through a decades-old conflict and that there are still bullets flying, bombs detonating.
    Bananas in the Desert

    Most Western countries have avoided Somalia, leaving a void to be filled by contractors like Michael Stock’s Bancroft Global Development. He envisions ‘banana trees where there is desert.’

    Dominic Nahr/Magnum Photos for The Wall Street Journal

    Here, Mr. Stock, left, outside Mogadishu, Somalia’s war-battered capital, with an employee, Richard Rouget.

    Mr. Stock isn’t just anyone gambling on a far-fetched idea in a conflict zone. In an unusual twist of the war business, the 36-year-old American is deeply involved in the conflict itself. In addition to being a real estate developer, his company also helps train Somalis in modern military techniques.

    His security company, Bancroft Global Development, has supported African troops since 2008 as they fought al-Shabaab, the Somali Islamic group tied to al Qaeda, which the U.S. views as a terrorist threat. The United Nations and the African Union, with U.S. State Department money, pay Bancroft to support soldiers in everything from counterinsurgency tactics to bomb disposal, sniper training, road building and, as Mr. Stock puts it, “bandaging shot-off thumbs.”

    Security companies have, of course, been rushing into war zones forever, sometimes controversially. A recent congressional study on wartime contracting estimated that the U.S. spent some $206 billion on outside contracts and grants in Iraq and Afghanistan between 2002 and 2011.

    Most Western countries have stayed out of Somalia. Contractors like Bancroft partly fill that void. The U.S., which pulled its troops after American soldiers died in the 1993 Black Hawk Down tragedy, has spent more than $650 million since 2006 on supporting the African Union Mission in Somalia, known as Amisom, and its more than 17,000 soldiers.

    Unlike many security contractors, Mr. Stock’s company, based in Washington, D.C., is a nonprofit not primarily concerned with making money on military support services. In fact, it actually sustains stretches of multimillion-dollar losses, Mr. Stock says. Meanwhile its sister company, Bancroft Global Investment, chases profits by pouring money into war-zone real estate.

    Dominic Nahr/Magnum Photos for The Wall Street Journal

    Michael Stock develops real estate in Somalia and Afghanistan.

    Mr. Stock’s gamble: The security outfit will help guide the country toward peace, turning his investments into big money. “It’s like getting in at the bottom of the stock market,” says Mr. Stock. His unusual war operation is making him into a kind of ultimate gentrifier, a mini mogul of Mogadishu, perhaps.

    His first properties went up in Afghanistan. But Somalia represents his latest push. Along with the new place, Mr. Stock says he has invested more than $25 million in various for-profit ventures, including a “trailer park” hotel built out of shipping containers at the airport, a compound of prefabricated buildings fronting the city’s old port and a cement factory.

    Bancroft is the only contractor supplying military training to Amisom soldiers in the country. Mr. Stock estimates that his team of 100 or so people in Somalia works with roughly a third of the 17,000 Amisom forces at any given time.

    After more than two decades of violence in Somalia, there are glimmers of hope. African troops, with Bancroft’s support, have pushed the insurgents to more rural areas. In January, the U.S. recognized the Somali government for the first time since 1991 and last month a U.S. Agency for International Development official urged at a news conference, “Get in on the ground floor.”

    A new president leads Somalia. Expats are returning to rebuild and there are even people on the beaches. “We swim here all the time,” said a Russian helicopter operator, as a friend floated on an inner tube along a bullet-littered stretch of ocean near the airport. “The water’s good!”

    With dwindling war efforts in Iraq and Afghanistan, other American contractors are moving in, too. A Virginia company, Atlantean, is setting up an airport hotel in the south. Among its board members, according to its website, is former Maj. Gen. William Garrison, who led the mission associated with Black Hawk Down. In the movie version, he was played by Sam Shepard. Maj. Gen. Garrison couldn’t be reached for comment.

    ‘Will we get shot at the first day?’ a colleague asked as they flew into Somalia. ‘Probably,’ Mr. Stock laughed.

    “There are infinite possibilities in a country that has to be literally built from the ground up,” said Ken Menkhaus, a Somalia expert at Davidson College. These possibilities, however, also include the worst: a return to a hell-ripped Somalia. That reality loomed only weeks ago when militants bombed the capital’s main courthouse, killing more than two dozen people.

    Contracting out security has its perils. An investigation by the U.N.’s Monitoring Group on Somalia and Eritrea last summer found companies “operating in an arguably paramilitary fashion.” The investigation found a “growing number” of foreign private security companies working in Somalia with diplomatic missions, international companies and individuals.

    According to one person familiar with the confidential part of the report and unaffiliated with Bancroft, the report found that Bancroft was “very transparent about the way they operated,” whereas some other companies were “more deceptive.”

    Mr. Stock has attracted some big-name attention. In November, he flew in Warren Buffett’s son Howard to look at potential agricultural projects—part of Mr. Stock’s interest in creating a farming operation to service his hotels, among other things.

    “He was the only one who would bring me into the country,” said Mr. Buffett, who has been involved in philanthropy around the Horn of Africa.

    Almost monthly, Mr. Stock commutes here from Washington, D.C. This time his “fast plane,” a 10-seat jet, was in the shop so he borrowed a five-seater Cessna in Kenya from a friend.

    Accompanying him was a new Bancroft recruit. He had been a part of an Army Delta Force squad that chased al Qaeda in Iraq.

    “Will we get shot at the first day?” the former soldier asked at one point.

    “Probably,” Mr. Stock said, laughing. “I promised you some spice!”

    Bancroft says it employs about 200 men around the world. About half work in Somalia. Some have roots in elite military forces including the Navy SEALs, French Foreign Legion and British Special Air Service, the employees say. “It’s like an extreme sport,” says one, Richard Rouget, a South African resident and former French soldier.

    The idea for the business came during a summer job in 1998 with the U.S. embassy in Morocco, where Mr. Stock visited a refugee camp in the Sahara ringed by land mines. “Why hasn’t someone shown them how to remove the mines?” he recalls thinking.

    A year later, after graduating from Princeton, he started a mine-removal company. “Like a dot-com,” is how Mr. Stock describes the early days. He had no full-time staffers and spent months meeting people in the field. There was only sporadic mine-removal work, for little money, in some of the world’s most unstable places: Mali, Chad, and Iraq.

    His family’s wealth helped. His great-grandfather, Lewis Strauss, made tens of millions as partner at the investment firm Kuhn, Loeb & Co. In time, Mr. Stock borrowed some $8 million from different banks and invested about $2 million of his own money.

    As the U.S. military went after the Taliban in 2002, Mr. Stock’s company landed in Afghanistan and offered services through a local partner, Mine Pro. He invested in the company and built a group to train bomb-detecting dogs and do anything from plumbing to car repair.

    But his company operated at a loss, he says. It didn’t make money for about two years, the time it took to get his local Afghan partner up to speed and wait for it to win contracts.

    A more profit-minded security contractor might have called it quits. Mr. Stock, however, had another idea. “My thinking was that you could lose money on security to bet on development,” he says.

    Afghanistan certainly lacked decent, secure accommodation. Initially he built an eight-bedroom compound in Kabul and another, bigger residence in Herat, the country’s third-largest city. He started a car rental service, too.

    Eventually, security began paying off, Mr. Stock says. He started receiving a share of his partner company’s contracts, with that revenue peaking at about $1.8 million in 2005.

    But the bigger money was in his properties. Today, the original two have been expanded into protected city blocks of multiple buildings. They house tenants associated with the World Bank and the International Development Law Organization, among others.

    Over the past eight years, the real estate and other commercial services like car rental in Afghanistan have brought in about $32 million in net revenue, according to financial documents provided by Bancroft. Much of that money is now being invested in Somalia.

    “It was like Stalingrad in 1942,” Mr. Stock says of the day in late 2007 when he flew into Mogadishu. The city was a smoky battlefield of bomb explosions and firefights between the Shabaab and the African troops, who had arrived earlier in the year.

    But that was the point, he says. “We wanted get in at the worst time, when it’s really bad.”

    The Shabaab, Arabic for “The Youth,” had taken over much of the capital. They built power over years, though the bloodshed had begun long before, in 1991, when armed clans forced out Somalia’s military-run government.

    His team set up tents at the airport and struck a deal with the African troops, he says. “We said we’ll help you, if you keep us from getting killed.”

    Some worry that contractors like Bancroft face little scrutiny—an issue of “accountability,” as one Western intelligence analyst put it. “Who works for them?” he said. “What are they doing?”

    “The pro side,” he said, “is that they were here when no one else would come.”

    A person familiar with the U.S. State Department’s policy on Somalia said that the company had helped create an “effective fighting force.” A U.N. official, meanwhile, noted that Bancroft’s training in roadside bombs had reduced deaths among African soldiers.

    Mr. Stock winces at the terms “mercenary” and “hired guns,” which he considers inaccurate. He calls his men “mentors” who train people rather than fight.

    Even though they don’t carry weapons, working closely with soldiers, medics and others means that they are in the line of fire. “If the African forces are overrun, we’re all dead,” he says.

    Dressed in body armor and a helmet one morning, Mr. Stock says he had never considered joining the military himself. “I don’t take orders well,” he joked, riding along in a convoy of armored carriers in downtown Mogadishu, gunners manning the roof hatches. It was part of a sweep Burundi and Somali soldiers for insurgents.

    The streets alternated between bombed-out buildings and stretches of fresh paint. Soon, a sniper was spotted. Later, a gunfight broke out. Then, an exploded roadside bomb brought the convoy to a halt. By the end, six suspected militants were detained and Bancroft took the bomb for analysis.

    “Danger comes and goes quickly here,” says Mr. Stock. “It’s like lightning. If it hits, it hits.”

    It was nearly three years of free security training in Somalia, and $6 million out of pocket, according to financial filings, before he landed his first contract with the U.N. Various U.N. agencies have paid the company some $15 million since then and the African Union, with the U.S. State Department money, will have paid Bancroft a total of about $25 million by the end of the year.

    All along, though, he expanded into real estate. In 2011, he created the for-profit side of the company, Bancroft Global Investment. That year, he sold an 18% stake, just under $1 million, in the Somali properties to a Washington, D.C., developer, Michael Darby.

    “When you hear Somalia, you think of the most dangerous place on earth,” says Mr. Darby. “But I’m prone to take more risks than others.”

    Making real-estate deals in Somalia wasn’t easy, Mr. Stock says. It took “dozens” of meetings with government officials, clan leaders and neighbors of the properties. “You have to spend a lot of time figuring out who is who,” he says. There is no formal contract for the land, but rather “consensus building,” he says, that results in a verbal go-ahead from the collective parties.

    Mr. Stock made a similar land deal, a public-private partnership with the Somali government for some beach property near the port, but didn’t work out as well.

    A version of this article appeared April 27, 2013, on page A1 in the U.S. edition of The Wall Street Journal, with the headline: A Bet on Peace for War-Torn Somalia.

    Updated April 26, 2013, 10:37 p.m. ET

    By CHRISTOPHER S. STEWART

    Write to Christopher S. Stewart at christopher.stewart@wsj.com

    Find this story at 26 April 2013

    Copyright 2012 Dow Jones & Company, Inc.

    Private Army Formed to Fight Somali Pirates Leaves Troubled Legacy

    WASHINGTON — It seemed like a simple idea: In the chaos that is Somalia, create a sophisticated, highly trained fighting force that could finally defeat the pirates terrorizing the shipping lanes off the Somali coast.

    But the creation of the Puntland Maritime Police Force was anything but simple. It involved dozens of South African mercenaries and the shadowy security firm that employed them, millions of dollars in secret payments by the United Arab Emirates, a former clandestine officer with the Central Intelligence Agency, and Erik Prince, the billionaire former head of Blackwater Worldwide who was residing at the time in the emirates.

    And its fate makes the story of the pirate hunters for hire a case study in the inherent dangers in the outsourced wars in Somalia, where the United States and other countries have relied on proxy forces and armed private contractors to battle pirates and, increasingly, Islamic militants.

    That strategy has had some success, including a recent offensive by Kenyan and African Union troops to push the militant group Al Shabab from its stronghold in the port city of Kismayu.

    But with the antipiracy army now abandoned by its sponsors, the hundreds of half-trained and well-armed members of the Puntland Maritime Police Force have been left to fend for themselves at a desert camp carved out of the sand, perhaps to join up with the pirates or Qaeda-linked militants or to sell themselves to the highest bidder in Somalia’s clan wars — yet another dangerous element in the Somali mix.

    A United Nations investigative group described the effort by a company based in Dubai called Sterling Corporate Services to create the force as a “brazen, large-scale and protracted violation” of the arms embargo in place on Somalia, and has tried to document a number of grisly cases in which Somali trainees were beaten and even killed. In one case in October 2010, according to the United Nations group, a trainee was hogtied with his arms and feet bound behind his back and beaten. The group said the trainee had died from his injuries, an accusation disputed by the company.

    Sterling has portrayed its operation as a bold private-sector attempt to battle the scourge of piracy where governments were failing. Lafras Luitingh, a senior manager for the project, described the October 2010 occurrence as a case of “Somali-on-Somali violence” that was not indicative of the overall training program. He said that the trainee had recovered from his injuries, and that “the allegations reflect not the professional training that occurred but the fact that professional training was needed,” he said.

    A lawyer for the company, Stephen Heifetz, wrote an official response to the United Nations report, calling it “a collection of unsubstantiated and often false innuendo assembled by a group with extreme views regarding participants in Somali politics.”

    Sterling officials have pointed out that in March, a United Nations counterpiracy organization — a separate entity from the investigative group that criticized Sterling — praised the semiautonomous Somali region of Puntland for creating the program. Moreover, the company argues, Somalia already is a playground for clandestine operations, with the C.I.A. now in the midst of an extensive effort to arm and equip Somali spies. Why, they ask, is Sterling Corporate Services singled out for criticism?

    Concerned about the impact of piracy on commercial shipping in the Middle East, the United Arab Emirates has sought to take the lead in battling Somali pirates, both overtly and in secret by bankrolling operations like Sterling’s.

    American officials have said publicly that they never endorsed the creation of the private army, but it is unclear if Sterling had tacit support from parts of the United States government. For instance, the investigative group reported in July that the counterpiracy force shared some of the same facilities as the Puntland Intelligence Service, a spy organization answering to Puntland’s president, Abdirahman Farole, that has been trained by C.I.A. officers and contractors for more than a decade.

    With the South African trainers gone, the African Union has turned to a different security contractor, Bancroft Global Development, based in Washington, to assess whether the pirate hunters in Puntland can be assimilated into the stew of other security forces in Somalia sanctioned both by the United States and the African Union. Among those groups are a 10,000-man Somali national army and troops of Somalia’s National Security Agency, based in Mogadishu, which is closely allied with the C.I.A.

    Michael Stock, Bancroft’s president, said a team of his that recently visited the camp where the Puntland force is based witnessed something out of the Wild West: nearly 500 soldiers who had gone weeks without pay wandering the main compound and two other small camps, an armory of weapons amassed over two years at their disposal.

    Although the force is far from the 1,000-man elite unit with helicopters and airplanes described in the United Nations report, Mr. Stock and independent analysts said the Puntland soldiers still posed a potential threat to the region if left unchecked.

    “Sterling is leaving behind an unpaid but well-armed security force in Puntland,” said Andre Le Sage, a senior research fellow who specializes in Africa at the National Defense University in Washington. “It’s important to find a way to make them part of a regular force or to disarm them and take control of them. If that’s not done, it could make things worse.”

    Mr. Stock, whose company trains soldiers from Uganda and Burundi for counterinsurgency missions in Somalia under the African Union banner, said Bancroft would not take over Sterling’s counterpiracy mission.

    The Sterling operation was shrouded in a degree of secrecy from the time Mr. Luitingh and a small group of South Africans traveling in a private plane first touched down in Bosasso, Puntland’s capital, in 2010. The men worked for Saracen International, a South African private military firm hired by the emirates and composed of several former members of the Civil Cooperation Bureau, the feared paramilitary squad during the apartheid era.

    The following year, after The New York Times wrote about the operation, Saracen hired a prominent Washington law firm to advocate for the mission at the State Department and the Pentagon, and a rebranding campaign began. A new company, Sterling Corporate Services, was created in Dubai to oversee the training in Puntland. It was an attempt to put distance between the Somalia operations and Saracen’s apartheid-era past, but some of the officers of the two companies were the same.

    Two well-connected Americans were also involved in the project. Michael Shanklin, a former C.I.A. station chief in Mogadishu, was hired to tap a network of contacts both in Washington and East Africa to build support for the counterpiracy force. More significant was the role of Mr. Prince, who had become an informal adviser to the crown prince of Abu Dhabi, Sheik Mohamed bin Zayed Al Nahyan.

    At the time, Mr. Prince was also involved in a project to train Colombian mercenaries at a desert camp in the emirates to carry out missions at the behest of the Emirati government.

    But the emirates’ refusal to publicly acknowledge their role in the operation, or to make a formal case to the United Nations Security Council to receive permission to build the army under the terms of the Somalia arms embargo, drew the ire of United Nations arms monitors, who repeatedly pressed the emirates to shut down the mission.

    Lawyers for Sterling gave extensive briefings on the program to the State Department, the Pentagon and various United Nations agencies dealing with piracy.

    Yousef Al Otaiba, the emirates’ ambassador to Washington, declined to comment for this article.

    American officials said they had urged Sterling’s lawyers, from the firm of Steptoe & Johnson, to have the operation approved by the Security Council. Mr. Heifetz, the company’s lawyer, said Puntland and other Somali authorities did receive permission to build the police force. A spokeswoman for the State Department said the United States government never approved Sterling’s activities.

    “We share the monitoring group’s concerns about the lack of transparency regarding the Saracen and Sterling Corporate Services’ train-and-equip program for the Puntland Maritime Police Force, as well as the abuses alleged to have occurred during the training,” said Hilary Renner, a State Department spokeswoman, referring to the United Nations Monitoring Group on Somalia and Eritrea, the investigative arm.

    October 4, 2012
    By MARK MAZZETTI and ERIC SCHMITT

    Find this story at 4 October 2012

    © 2012 The New York Times Company

    Private Security Companies in Somalia are in violation of the arms embargo – UN

    The United Nations is concerned that member states are failing to uphold the arms embargo on Somalia by allowing private security companies (PSCs) to operate in the country. South Africa, Uganda, Ethiopia and the United Arab Emirates were singled out in a UN report.

    In its Report of the Monitoring Group on Somalia and Eritrea, the United Nations said that the provision of security assistance, in the absence of UN authorisation, “constitutes a violation of the general and complete arms embargo on Somalia.” It added that the Monitoring Group was concerned that member states “routinely fail to fulfil their obligations” which require them to prevent “the direct or indirect supply, sale or transfer of weapons and military equipment and the direct or indirect supply of technical assistance or training, financial or other assistance” to Somalia.

    The report highlights several of the numerous security companies operating in Somalia, notably Sterling Corporate Services/Saracen International Lebanon. In late 2011, the assets, personnel and operations of Saracen International Lebanon were transferred to Sterling Corporate Services (SCS), reportedly a Dubai registered company, which resumed large-scale military training, technical assistance and support to the Puntland Maritime Police Force (PMPF).

    “Established in May 2010, with the involvement of Erik Dean Prince, the American founder of Blackwater U.S.A., this externally-financed assistance programme has remained the most brazen violation of the arms embargo by a PSC,” the report said. “In 2011, Saracen’s training camp near Bosaaso became the best-equipped military facility in Somalia after AMISOM’s bases in Mogadishu. The SCS base today includes a modern operational command centre, control tower, airstrip, helicopter deck and about 70 tents, which can host up to 1,500 trainees.”

    “Thanks to this massive initiative, the Puntland Maritime Police Force is now a well-equipped elite force, over 1,000 strong, with air assets used to carry out ground attacks, that operates beyond the rule of law and reports directly to the President of Puntland. This private army disingenuously labeled a ‘counter-piracy’ force, has been financed by zakat [Muslim charity] contributions mainly from high-ranking officials from the United Arab Emirates, including Crown Prince and Deputy Supreme Commander of the UAE Armed Forces, Sheikh Mohammed bin Zayed Al Nahyan. The UAE government, however, has officially denied any involvement in the project,” the UN reports.

    The Monitoring Group stated that SCS was characterised by a lack of transparency, accountability or regard for international law and this was unlikely to change without intervention from its state sponsor.

    Another private security company mentioned in the report was the South African-based Pathfinder, which in August 2011 was contracted by Africa Oil, via its local subsidiaries, to provide security advice and risk analysis. Pathfinder personnel on the ground liaise with local authorities in charge of security and oversee the Exploration Security Unit (ESU), a special branch of the Puntland security forces established to protect oil exploration and exploitation.

    The UN report noted that Pathfinder’s transparency and its efforts to comply with the sanctions regime arguably represent ‘best practices’ for private security companies in Somalia. “However, its ‘temporary issue’ of military equipment and the direct funding of the ESU by Africa Oil (via its subsidiary, Canmex) constitute violations of Security Council resolution 733 (1992).”

    Also singled out in the report was the Washington DC-based charity Bancroft Global Development, operating in Somalia under the auspices of AMISOM. The report said it is currently the only private company providing assistance to Somali security sector institutions that complies with UN resolutions.

    Other security providers form part of a growing network of private contractors that provide security details for individuals, foreign companies, diplomatic missions, international non-governmental organisations and international organizations in Somalia. They supervise local militias, provide armed escorts and static guards, often importing armoured vehicles, personal protective equipment (PPE) and operating in an arguably paramilitary fashion, according to the United Nations report.

    Apart from organisations based in Somalia, private security companies are also used to provide protection to diplomats, international NGO workers, journalists, foreign contractors and businessmen visiting Mogadishu. Since November 2011, even the United Nations has also engaged a private local militia in Mogadishu to protect the movements of its staff.

    Written by defenceWeb
    Wednesday, 08 August 2012 14:28

    Find this story at 8 August 2012

    © defenceweb

    Secret mission? UK “homeland security” firms were in India three weeks before David Cameron’s February trade mission

    In late January, Conservative MP and Minister for Security James Brokenshire led a delegation of nearly 25 “homeland security” firms to India on a trip which, in sharp contrast to the trade mission to India undertaken by David Cameron in February, received no coverage in the press whatsoever.

    From 20 to 25 January multinational giants such as Agusta Westland, BAE Systems, G4S and Thales were taken to a number of Indian cities: Delhi, “for the government perspective”; Hyderabad, “the centre of the vast Naxal terrorism-troubled region and the home of a growing high tech industry base” where there was a “round table discussion with local security forces”; and Mumbai, “the focus of safer cities and coastal security initiatives” where attendees were treated to “a conference and round table discussion with local government security agencies and business.” [1]

    A number of lesser-known firms were present alongside the major corporations. Evidence Talks attended, which was founded in 1993 and describes itself as “one of the most highly regarded digital forensic consultancies in the UK.” The company supplies tools for the extraction and analysis of data from digital devices and boasts that its SPEKTOR tool is “used worldwide by police, military, government and commercial customers…[and] enables users with minimal skills to safely, quickly and forensicly [sic] review the contents of computers, removable media and even cell phones.” [2]

    Cunning Running also went on UKTI’s trip, and claims to provide “threat visualisation for the real world.” The firm say that they “develop high quality software solutions for the defence and homeland security markets,” supplying “direct to governments, law enforcement agencies, and militaries in the UK, USA, Europe and Australia.” [3]

    “The security sector in India is vast and desperate to modernise,” said UKTI’s flyer for the mission. “India has approximately 1.2 million police and 1.3 million paramilitary forces personnel. With this, the Central Reserve Police Force, at 350,000, is the largest paramilitary force in the world” – a vast number of personnel who could be equipped with the latest “homeland security” gadgets and expertise.

    The flyer for the mission seems to highlight the fact that backing the security industry as it moves into developing economies is seen as a national endeavour. “The [Indian] market is the subject of stiff competition from international competitors such as the US, Israel and France,” UKTI said, “but is simply too big to ignore.”

    UKTI highlighted that “the on-the-ground costs of this mission (receptions, ground transport, conference facilities, promotional literature) are being wholly subsidised on behalf of UK companies by UKTI and its partners/sponsors” (emphasis in original). Those partners and sponsors included the Indian Home Ministry and the Confederation of Indian Industries.

    Furthermore, companies were “able to avail a government-negotiated rate at the hotels being used throughout the programme.”

    The “only charge to companies” was for the UKTI Overseas Market Introduction Service (OMIS) – a “flexible business tool, letting you use the services of our trade teams, located in our embassies, high commissions and consulates across the world, to benefit your business.” [4]

    The government has recently made additional funding available in order to encourage wider use of OMIS by UK firms, with a 50% discount (up to a maximum of £750) available to “all eligible companies commissioning an order linked to a UKTI, Scottish Development International (SDI), Welsh Government (WG) or Invest Northern Ireland (INI) supported outward mission or Market Visit Support (MVS).” [5]

    While UKTI has clawed back some money from the firms who went on the trade mission to India, the department – described by Campaign Against Arms Trade (CAAT) as “a taxpayer-funded arms sales unit” [6] – initially spent over £35,000 subsidising companies. In its response to a freedom of information (FOI) request from Statewatch, UKTI said that “we have also generated income of £13,485 with another £1,170 expected. Therefore the net cost minus the expenses still to come is £20,997.98.”

    This amount pales in comparison to the total amount of subsidies it is estimated are awarded to defence and security firms by the UK government every year, but it also highlights the breadth of support given to a highly controversial industry.

    Research by the Stockholm International Peace Research Institute estimated that, between 2007 and 2010, total government subsidies for UK arms exports (including both defence and security firms) totalled at its highest £751.2 million, and at its lowest £668.3 million. [7]

    A spokesperson for CAAT criticised the mission to India, saying that: “Unfortunately the UK government continues to prioritise promoting corporate interests over promoting human rights and real security – and expects the UK public to subsidise this.”

    David Cameron’s February trade mission to India received heavy press coverage and saw the Prime Minister accompanied by a number of CEOs from defence and security firms, including Dick Oliver, the chairman of BAE Systems; Robin Southwell, the CEO of EADS UK; Steve Wadley, the UK managing director of the missile firm MBDA; and Victor Chavez, the chief executive of Thales UK. [8]

    Sources
    [1] UKTI DSO, UKTI homeland security trade mission to India
    [2] Evidence Talks, Company Profile
    [3] Cunning Running website
    [4] UKTI, OMIS – Overseas Market Introduction Service, 25 January 2012
    [5] UKTI, Response to FOI request, 22 March 2013
    [6] Campaign Against Arms Trade, UKTI: Armed & Dangerous, 8 July 2011
    [7] Susan T. Jackson, SIPRI assessment of UK arms export subsidies, 25 May 2011
    [8] Kaye Stearman, Cameron’s Indian odyssey – brickbats and cricket bats, fighter jets and on-message execs, CAATblog, 22 February 2013
    [9] Global Day of Action on Military Spending

    15.4.2013

    Find this story at 15 April 2013

    Home page | Statewatch News Online | In the News & News Digest | What’s New | Statewatch Journal
    © Statewatch ISSN 1756-851X. Personal usage as private individuals/”fair dealing” is allowed. We also welcome links to material on our site. Usage by those working for organisations is allowed only if the organisation holds an appropriate licence from the relevant reprographic rights organisation (eg: Copyright Licensing Agency in the UK) with such usage being subject to the terms and conditions of that licence and to local copyright law.

    G4S boss who oversaw botched Olympics contract lands bigger pay packet for 2012 despite firm’s £88m loss on London games

    G4S chief executive Nick Buckles paid £1.19m, up £170,000 on last year
    Company lost £88m in Olympics fiasco when they failed to provide security

    The chief executive of the company behind the security-scandal at the London Olympics last summer received a record pay packet in 2012, following million pound losses during the Games.

    G4S boss Nick Buckles was paid a total £1.19million in 2012, up £170,000 on his 2011 paycheck, despite the company nursing an £88million loss on the London 2012 contract.

    The security giant failed to provide the 10,400 guards needed during this summer’s main event and the military was forced to step in.

    Big Bucks: Nick Buckles, pictured defending his company in the Commons after G4S’s Olympics blunder, was paid an extra £170,000 in 2012 compared to the previous year

    As well as an £830,000 salary, Mr Buckles’ 2012 pay packet included £23,500 in benefits and £332,000 in payments in lieu of pension. Mr Buckles 2012 pay packet was boosted by bigger pension payments.

    However, neither he nor other executive directors earned a performance-related bonus.

    G4S said in its annual report Mr Buckles’ and other executives’ salaries were frozen in 2012 and will not increase this year – the fourth time in five years their salaries have been frozen.

    But it revealed plans to increase potential long-term share bonuses this year to ‘ensure that the directors continue to be incentivised and motivated’.

    Mr Buckles’ maximum shares bonus could rise to 2.5 times his salary from a maximum of two times in 2012 – meaning a potential £2.1 million in shares if he hits targets.

    Loss: G4S lost £88m in the London Olympics Games contract after they failed to provide all the security guards needed for the Games

    Performance-related bonuses will also now depend on factors including organic growth, cash generation, strategic execution and organisation, instead of being tied purely to profits.

    G4S’s Olympics failure saw Mr Buckles hauled before MPs, during which he admitted it was a ‘humiliating shambles for the company’. Extra military personnel had to be called in to fill the gap left by G4S’s failure to supply enough staff for the £284 million contract.

    Mr Buckles said in the annual report it marked ‘one of the toughest periods in the group’s history’.

    By Daily Mail Reporter

    PUBLISHED: 18:12 GMT, 15 April 2013 | UPDATED: 06:42 GMT, 16 April 2013

    Find this story at 15 April 2013

    © Associated Newspapers Ltd

    US defence contractor accused of passing on nuclear secrets

    Ex-army officer Benjamin Pierce Bishop charged with communicating national defence information to Chinese woman

    Benjamin Pierce Bishop, who works for a defence contractor at US Pacific Command in Oahu, Hawaii, was arrested on Friday . Photograph: Alamy

    A US defence contractor in Hawaii has been arrested on charges of passing national military secrets, including classified information about nuclear weapons, to a Chinese woman with whom he was romantically involved, authorities have said.

    Benjamin Pierce Bishop, 59, a former US army officer who works as a civilian employee of a defence contractor at US Pacific Command in Oahu, was arrested on Friday and made his first appearance in federal court on Monday, said the US attorney’s office for the District of Hawaii.

    He is charged with one count of willfully communicating national defence information to a person not entitled to receive it and one count of unlawfully retaining documents related to national defence. If convicted Bishop faces a maximum of 20 years in prison.

    Bishop met the woman – a 27-year-old Chinese national referred to as Person 1 – in Hawaii during a conference on international military defence issues, according to the affidavit.

    He had allegedly been involved in a romantic relationship since June 2011 with the woman, who was living in the US on a visa and had no security clearance.

    From May 2011 until December 2012 he allegedly passed national defence secrets to her including classified information about nuclear weapons and the planned deployment of US strategic nuclear systems.

    Reuters
    guardian.co.uk, Tuesday 19 March 2013 07.13 GMT

    Find this story at 19 March 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Exclusive: Court Docs Reveal Blackwater’s Secret CIA Past

    It was the U.S. military’s most notorious security contractor—but it may also have been a virtual extension of the CIA. Eli Lake reports.

    Last month a three-year-long federal prosecution of Blackwater collapsed. The government’s 15-felony indictment—on such charges as conspiring to hide purchases of automatic rifles and other weapons from the Bureau of Alcohol, Tobacco, Firearms, and Explosives—could have led to years of jail time for Blackwater personnel. In the end, however, the government got only misdemeanor guilty pleas by two former executives, each of whom were sentenced to four months of house arrest, three years’ probation, and a fine of $5,000. Prosecutors dropped charges against three other executives named in the suit and abandoned the felony charges altogether.

    via office of the King of Jordan

    But the most noteworthy thing about the largely failed prosecution wasn’t the outcome. It was the tens of thousands of pages of documents—some declassified—that the litigation left in its wake. These documents illuminate Blackwater’s defense strategy—and it’s a fascinating one: to defeat the charges it was facing, Blackwater built a case not only that it worked with the CIA—which was already widely known—but that it was in many ways an extension of the agency itself.

    Founded in 1997 by Erik Prince, heir to an auto-parts family fortune, Blackwater had proved especially useful to the CIA in the early 2000s. “You have to remember where the CIA was after 9/11,” says retired Congressman Pete Hoekstra, who served as the Republican chairman of the House Permanent Select Committee on Intelligence from 2004 to 2006 and later as the ranking member of the committee. “They were gutted in the 1990s. They were sending raw recruits into Afghanistan and other dangerous places. They were looking for skills and capabilities, and they had to go to outside contractors like Blackwater to make sure they could accomplish their mission.”

    But according to the documents Blackwater submitted in its defense—as well as an email exchange I had recently with Prince—the contractor’s relationship with the CIA was far deeper than most observers thought. “Blackwater’s work with the CIA began when we provided specialized instructors and facilities that the Agency lacked,” Prince told me recently, in response to written questions. “In the years that followed, the company became a virtual extension of the CIA because we were asked time and again to carry out dangerous missions, which the Agency either could not or would not do in-house.”

    A prime example of the close relationship appears to have unfolded on March 19, 2005. On that day, Prince and senior CIA officers joined King Abdullah of Jordan and his brothers on a trip to Blackwater headquarters in Moyock, North Carolina, according to lawyers for the company and former Blackwater officials. After traveling by private jet from Washington to the compound, Abdullah (a former Jordanian special-forces officer) and Prince (a former Navy SEAL) participated in a simulated ambush, drove vehicles on a high-speed racetrack, and raided one of the compound’s “shoot houses,” a specially built facility used to train warriors in close-quarters combat with live ammo, Prince recalls.

    At the end of the day, company executives presented the king with two gifts: a modified Bushmaster AR-15 rifle and a Remington shotgun, both engraved with the Blackwater logo. They also presented three Blackwater-engraved Glock pistols to Abdullah’s brothers. According to Prince, the CIA asked Blackwater to give the guns to Abdullah “when people at the agency had forgotten to get gifts for him.”

    Three years later, the ATF raided the Moyock compound. In itself, this wasn’t unusual; the ATF had been conducting routine inspections of the place since 2005, when Blackwater informed the government that two of its employees had stolen guns and sold them on the black market. Typically, agents would show up in street clothes, recalled Prince. “They knew our people and our processes.”

    But the 2008 visit, according to Prince, was different. “ATF agents had guns drawn and wore tactical jackets festooned with the initials ATF. It was a cartoonish show of force,” he said. (Earl Woodham, a spokesman for the Charlotte field division of the ATF, disputes this characterization. “This was the execution of a federal search warrant that requires they be identified with the federal agency,” he says. “They had their firearms covered to execute a federal search warrant. To characterize this as anything other than a low-key execution of a federal search warrant is inaccurate.”)

    During the raid, the ATF seized 17 Romanian AK-47s and 17 Bushmaster AR-13 rifles the bureau claimed were purchased illegally through the sheriff’s office in Camden County, North Carolina. It also alleged that Blackwater illegally shortened the barrels of rifles and then exported them to other countries in violation of federal gun laws. Meanwhile, in the process of trying to account for Blackwater’s guns, the ATF discovered that the rifles and pistols presented in 2005 to King Abdullah and his brothers were registered to Blackwater employees. Prosecutors would subsequently allege that Gary Jackson—the former president of Blackwater and one of the two people who would eventually plead guilty to a misdemeanor—had instructed employees to falsely claim on ATF forms that the guns were their own personal property and not in the possession of Jordanian royalty.

    In all of these instances—the purchase of the rifles through the Camden County sheriff, the shipment of the guns to other countries, and the gifts to Abdullah—Blackwater argued that it was acting on behalf of the U.S. government and the CIA. All of these arguments, obviously, were very much in Blackwater’s legal interest. That said, it provided the court with classified emails, memoranda, contracts, and photos. It also obtained sealed depositions from top CIA executives from the Directorate of Operations, testifying that Blackwater provided training and weapons for agency operations. (A CIA spokesman declined to comment for this story.)

    One document submitted by the defense names Jose Rodriguez, the former CIA chief of the Directorate of Operations, and Buzzy Krongard, the agency’s former executive director, as among those CIA officers who had direct knowledge of Blackwater’s activities, in a section that is still partially redacted. This document is the closest Blackwater has come to acknowledging that Prince himself was a CIA asset, something first reported in 2010 by Vanity Fair. One of the names on the list of CIA officers with knowledge of Blackwater’s work in the document is “Erik P”—with the remaining letters whited out.

    This document made Blackwater’s defense clear: “the CIA routinely used Blackwater in missions throughout the world,” it said. “These efforts were made under written and unwritten contracts and through informal requests. On many occasions the CIA paid Blackwater nothing for its assistance. Blackwater also employed CIA officers and agents, and provided cover to CIA agents and officers operating in covert and clandestine assignments. In many respects, Blackwater, or at least portions of Blackwater, was an extension of the CIA.”

    When I asked Prince why Blackwater would often work for free, he responded, “I agreed to provide some services gratis because, in the wake of 9/11, I felt it my patriotic duty. I knew that I had the tools and resources to help my country.”

    Moreover, according to still-sealed testimony described to The Daily Beast, the agency had its own secure telephone line and a facility for handling classified information within Blackwater’s North Carolina headquarters. CIA officers trained there and used an area—fully shielded from view inside the rest of the Blackwater compound by 20-foot berms—to coordinate operations.

    Sara D. Davis/AP

    In the wake of the major charges being dropped, the U.S. attorney who prosecuted the case against Blackwater, Thomas Walker, told me that it would be wrong to dismiss the prosecution as a waste of time. “The company looks completely different now than before the investigation,” he said. “For example, in 2009, Erik Prince was the sole owner. This company now has a governing board that is accountable.”

    In 2010 Prince sold Blackwater, which is now known as Academi, for an estimated $200 million. Prince retains control of numerous companies that were part of Blackwater before he sold it, but he told me that he had “ceased providing any services” to the U.S. government.

    Walker would not discuss Blackwater’s relationship with the CIA. But he did say the defense that the company was acting for the government did not excuse any violations of federal law. “Our evidence showed there was a mentality at the company that they considered themselves above the law,” Walker said. “That is a slippery slope. There came a time when there had to be accountability at Blackwater.”

    by Eli Lake Mar 14, 2013 4:45 AM EDT

    Find this story at 14 March 2013

    © 2013 The Newsweek/Daily Beast Company LLC

    overheid werkt(e) met besmet beveiligingsbedrijf

    Ondanks de voorkennis omtrent gruwelijke misdragingen door veiligheidsagenten van Blackwater, ging het KLPD en de AIVD in 2009 voor een training van (geheim) agenten in zee met dit obscure Amerikaanse particuliere beveiligingsbedrijf.

    “Op 17 november 2009 vertrok ik samen met de majoors Edwin en Mark naar Afghanistan. Wij maken deel uit van de nieuwe missie NTM-A” (Nato Training Mission – Afghanistan), schrijft Kees Poelma (Kmar) op zijn weblog.

    “In mijn vorige functie had ik hele goede contacten opgebouwd met mensen van XE-Services (beter bekend als het voormalige Blackwater)”, zo vervolgt Poelma zijn relaas. “Misschien is ‘beter’ niet het juiste woord, maar daarvoor moet je Blackwater maar eens googelen. Sinds Irak zijn ze namelijk zodanig ‘verstoken van gunsten’ dat ze hun naam maar eens moesten veranderen. XE leidt de Afghan Border Police op en dat doen ze op vier verschillende trainingsites in Afghanistan.”

    Poelma werd uitgenodigd door XE-Services om hun trainingsites te bekijken. Het bedrijf heeft haar naam ondertussen opnieuw gewijzigd in Academi. Zoals Poelma opmerkt is het bedrijf besmet. Het is dan ook opmerkelijk dat het Nederlandse leger en politie ‘hele goede contacten’ onderhouden met de ‘private contractor’.

    Contract

    Op 24 februari 2010 verklaarde de democratische voorzitter Carl Levin van de Armed Services Committee van de Amerikaanse Senaat dat de PEO STRI (Program Executive Office for Simulation, Training and Instrumentation) van het Amerikaanse leger het volgende: “relied on a Dutch officer to act as a Technical Officer Representative to oversee the contract.”

    Het contract waar Levin op duidt, betreft een afspraak met Paravant LLC, een dochteronderneming van XE-Services, voor de training van de Afghan National Army Troops. De hoorzitting vond plaats in verband met diefstal, moord en andere vergrijpen door medewerkers van Paravant in Afghanistan.

    De Nederlandse officier zou werkzaam zijn geweest op het CSTC-A, de plaats waar de trainingen van de Afghaanse politie en het leger worden gecoördineerd. Welke rol de Nederlandse officier bij CSTC-A heeft gespeeld in het verwerven van het contract, en welke relatie de officier met Paravant/Blackwater had, is onduidelijk.

    Blackwater werd in 1997 opgericht door oud Navy Seals man Erik Prince. Voorafgaande de oorlogen in Afghanistan en vooral Irak deed het bedrijf voornamelijk kruimelwerk. De invasie in Irak van 20 maart 2003 betekende een flinke boost voor het bedrijf. De private beveiligingsbedrijven die zowel persoons- als transportbeveiliging uitvoeren, misdroegen zich echter op grote schaal.

    De onvrede onder De Irakese bevolking bouwde zich na de invasie in sneltreinvaart op en kwam tot uitbarsting bij de aanslag op vier medewerkers van Blackwater in Fallujah, maart 2004. De wereld beschuldigde meteen Al Qaeda of de rebellen van de lynchpartij, maar de aanslag was een reactie op het opereren van de ‘private contractors’.

    Gewelddadig optreden

    Hoe de medewerkers van Blackwater zich bijvoorbeeld gedroegen in Irak toont Harper’s Magazine met de publicatie The Warrior Class, geschreven door Charles Glass (april 2012). Het artikel is eigenlijk gebaseerd op een verzameling video’s die Glass van medewerkers van Blackwater heeft gekregen http://harpers.org/archive/2012/04/hbc-90008515. Op de beelden is te zien dat mensen worden overreden, auto’s van de weg worden gereden, er willekeurig wordt geschoten op voorbijgangers en auto’s, dat er wordt gescholden en dat de schending van alle basale rechten van Irakezen met voeten worden getreden.

    Veel beelden waren er nog niet voorhanden, maar de verhalen van schandalig optreden wel degelijk. Februari 2005 schoot een beveiligingsteam van Blackwater machinegeweren leeg op een auto in Bagdad. Dit incident kwam naar buiten omdat Blackwater op dat moment een lid van het Amerikaanse State Department beveiligde. Veel incidenten komen niet aan het licht omdat medewerkers van Blackwater na een incident gewoon doorrijden, zoals de videobeelden laten zien.

    De wetteloosheid van medewerkers van Blackwater vindt zijn dieptepunt op 16 september 2007 op het Nisour Square in Bagdad. Een beveiliger van het bedrijf schoot een bestuurder van een rijdende auto dood, die tengevolge niet tot stilstand kwam. Wat volgde was een bloedbad, waarbij de medewerkers van Blackwater op alles schoten wat bewoog. Bij deze slachting kwamen 17 mensen om het leven.

    Het bedrijf ontkende dat zij verantwoordelijk was voor de moordpartij en dat de beveiligingsagenten slechts reageerden op schoten die op hen afgevuurd werden. De verdachten werden uiteindelijk Irak uit gesmokkeld. Naar aanleiding van de schietpartij op het Nisour Square schreef Jeremy Scahill Blackwater: The Rise of the World’s Most Powerful Mercenary Army (2007), een boek dat de aard, omvang en gedrag van het bedrijf uit de doeken doet.

    Goede contacten

    Kees Poelma van de Koninklijke Marechaussee beschrijft op zijn weblog de goede contacten die hij onderhoudt met ‘mensen van XE-Services’. Over welke contacten heeft hij het? Op 12 januari 2005 sluiten de ‘Dutch Special Forces’ en Blackwater USA een contract voor het gebruik van het Blackwater Training Center, tegenwoordig bekent onder de naam United States Training Center.

    Minister Rosenthal beantwoordt op 14 december 2010 vragen van de Kamerleden Van Bommel en Van Dijk ten aanzien van Blackwater. “Het Korps Commando Troepen heeft van 10 t/m 23 februari 2005 met 60 personen getraind op het Blackwater trainingscomplex in North Carolina. Gedurende deze trainingsperiode is alleen gebruik gemaakt van faciliteiten. Trainingen zijn uitsluitend door eigen instructeurs verzorgd.”

    Het contract vermeldt tevens: ‘Blackwater Training Center welcomes the opportunity to provide range rental for your continuing firearms training.’ Hoewel het Korps Commando Troepen zijn eigen instructeurs heeft meegenomen volgens de minister, wordt in proposal #226 wel een ‘number of personnel 57’ opgevoerd. Of dit slaat op de 60 mariniers is onduidelijk. Waarschijnlijk wel, maar het blijft onduidelijk of Blackwater geen instructeurs heeft geleverd.

    De folder van Blackwater Training Center prijst haar eigen instructeurs op allerlei manieren aan. ‘On over 6000 acres of private land, we have trained and hosted over 50.000 Law Enforcement, Military and civilian personnel. […] Our instructors are ranked the best in the world and our facilities are second to none.’

    De minister zegt dat de “trainingen uitsluitend door eigen instructeurs zijn verzorgd”, maar de aantallen, ook die voor de lunch en het diner, roepen vragen op over de aanwezigheid van Blackwater-instructeurs. ‘Lunch for 75 persons for 11 days and dinner for 75 persons for 11 days.’

    De Sales Coordinator van Blackwater voegt daar op 12 januari 2005 nog aan toe dat ’the houses are not intended to practice charge calculations. They are designed to practice techniques involved in breaching placement of charges, placement of shooters in relation to the charge and command and control and detonation the charge.’ Het schrijven van 12 januari 2005 lijkt op een set huisregels van Blackwater.

    Voorkennis

    De training vond in februari 2005 plaats, dezelfde maand waarin Blackwater-medewerkers een willekeurige auto in Bagdad onder vuur namen, waarvan het lot van de inzittenden onduidelijk is. Of het ministerie van Defensie op de hoogte was van dit incident valt te betwijfelen. In een voorblad zonder datum met de titel contract Blackwater wordt vermeld dat ‘het gerucht dat de firma Blackwater onder de USNAVY valt en dat het schietterrein van de USNAVY is wil ik bij deze ook heel snel ontkrachten.’

    Het voorblad is opgesteld door de eerste verwerver, een kapitein van de C-Logistiek Brigade/Divisie Logistiek Commando uit Apeldoorn. Opvallend aan het voorblad is de expliciete vermelding dat er geen gebruik wordt gemaakt van instructeurs van de firma Blackwater. Dit wordt vermeld onder het kopje ‘marktverkenning’ dat begint met de zin ‘er is geen concurrentie mogelijk, het betreft hier een monopolist. Het betreft hier een privé onderneming op privéterrein. Wel dienen er vergunningen aangevraagd te worden, indien er gebruik wordt gemaakt van instructeurs van de firma Blackwater.’

    De verwarring van de eerste verwerver over de relatie tussen Blackwater en de USNAVY viel misschien in 2005 nog te begrijpen, na het Nisour Square incident in september 2007 was dat niet langer mogelijk. De status en de rol van Blackwater was toen duidelijk. De kritiek op het bedrijf ook. Het is dan ook onbegrijpelijk dat ruim een jaar later er contact wordt opgenomen met Total Intelligence Solutions LLC voor het bestellen van een Mirror Image Training Program.

    Daar tegenover kan worden opgemerkt dat de Department of Special Interventions (DSI) van het KLPD niet wist dat Total Intelligence Solutions LLC onderdeel uitmaakte van de Prince Group van Erik Prince, de toenmalige CEO van Blackwater, maar het adres in Arlington in de Verenigde Staten zal toch op zijn minst enkele bellen hebben doen rinkelen? Nu staat de DSI niet bekend om haar doortastendheid – zie de wijze waarop een belwinkel in Rotterdam op kerstavond 2010 werd vernield door leden van het team – maar enige background check van bedrijven die worden ingehuurd zou er toch moeten zijn.

    Duidelijkheid

    De Washington Post besteedde op 3 november 2007, twee maanden na de slachting op Nisour Square, een artikel aan Total Intelligence Solutions (TIS) onder de kop ‘Blackwaters Owner Has Spies for Hire’. Het is dus onwaarschijnlijk dat het de overheid is ontgaan dat er een contract met Blackwater werd afgesloten. En hoe staat een contract met Blackwater in verhouding met het principe van duurzaam inkopen dat de overheid hanteert?

    In de overeenkomst met de KLPD die Total Intelligence Solutions LLC op 17 november 2008 opstuurt, worden dan ook naast TIS de bedrijven EP Investments LLC, Terrorism Research Center INC en Blackwater Lodge and Training Center INC vermeld. Het lijken aparte bedrijven, maar vallen allemaal onder Blackwater, later XE Services genoemd, zoals blijkt uit amendment no 1 van 8 juni 2009. In dat amendment is de naam van de Blackwater Lodge ondertussen ook gewijzigd in U.S. Training Center. Al met al was het duidelijk dat Blackwater in het spel was.

    Ook de status van het bedrijf was duidelijk. Op 7 november 2007 beantwoordden de ministers van Defensie en Buitenlandse Zaken, Middelkoop en Verhagen, vragen van kamerlid Pechtold. De ministers verzekeren dat ‘Nederland nooit Blackwater in dienst heeft gehad. De ministeries van Buitenlandse Zaken en Defensie werken wel samen met andere particuliere beveiligingsbedrijven’.

    In het antwoord van de regering komt het huren van de trainingsfaciliteiten van Blackwater door het Korps Commando Troepen niet aan de orde. Opvallend omdat voor de minister van Defensie toch duidelijk moet zijn geweest hoe gevoelig de zaak lag. Pechtold onderstreepte nota bene de onrust door de slachting op Nisour Square.

    Een maand later beschreef de Adviesraad Internationale Vraagstukken in het rapport ‘De inhuur van private militaire bedrijven’ de zorgen over Blackwater. ‘De affaire Blackwater heeft de grote risico’s die aan de inzet van PMC’s zijn verbonden nog eens onderstreept. Het roekeloze en onverantwoordelijke optreden van sommige PMC’s, vooral de veiligheidsbedrijven onder hen, die in Irak immuniteit voor de lokale rechtsmacht genieten, brengt het winnen van de hearts and minds en daarmee zelfs van de hele counter-insurgency in gevaar.’

    Het 59ste advies gaat verder door te stellen dat ‘het in opspraak gekomen Amerikaanse bedrijf Blackwater een negatieve uitstraling op de hele bedrijfstak heeft.’ Extra voorzichtig zijn dus bij het inhuren of gebruiken van diensten van het bedrijf.

    Mirror Image Training

    Een jaar later sluiten de Dienst Speciale interventies (DSI) en Blackwater een overeenkomst voor een Mirror Image Training, verzorgd door het Terrorism Research Center (TRC). TRC maakt deel uit van Total Intel, dat op haar beurt sinds februari 2007 weer onderdeel uitmaakt van Blackwater sinds februari 2007. Voorafgaande de overeenkomst had Blackater al een strategisch partnership met het centrum.

    De Mirror Image Training was er op gericht om in de huid van de terrorist te kruipen. ‘Hierdoor is de deelnemer in staat om zichzelf ook daadwerkelijk als terrorist te zien en door diens ogen de zwakke punten binnen de eigen werkomgeving te herkennen en te begrijpen, die men zelf vaak over het hoofd ziet’, vermeldt de doelstelling van het reisverslag Mirror Image Training in Moyock, NC.

    De laatste zin van de doelstelling is veelzeggend, gelet op het gedrag van Blackwater-medewerkers, maar ook dat van de DSI-medewerkers in gedachten: ‘Met deze inzichten op zak zijn deelnemers na het afronden van de training beter in staat te anticiperen, te voorkomen en te reageren op terroristische dreigingen.’

    Om een beeld te krijgen waar de Nederlandse commando’s en leden van de KLPD en AIVD hun training hebben gekregen, hier een beschrijving van Moyock door Nathan Lodge. In zijn artikel Blackwater: Lawyers, guns and Money van 6 april 2007 probeert Lodge de omvang van het terrein te omschrijven. http://www.wired.com/dangerroom/2007/04/inside_the_bell/

    Lodge: ‘It’s hard to understate how massive the Moyock facility is. The place has 34 shooting ranges, three driving tracks and an airfield. It boasts several ‘shoot houses’ (for indoor shooting drills), a maritime training facility (for hostile boarding practice) and a breaching facility (for breaking down doors), as well as a full armory. It’s like a military base – without the golf course.’

    Mindset

    De cursus voor de leden van de KLPD gaat over het creëren van een ‘mindset’ waarbij ‘de rol van de radicale islam van groot belang is. Dit komt onder andere naar voren tijdens de dagelijkse gebeden en de lessen over de geschiedenis van de islam. Daarnaast wordt ook inzicht geboden in vormen van westers terrorisme, waaronder de IRA.’

    De mindset kan vertaald worden naar de ‘situatie in tal van regio’s, waaronder Afghanistan, Irak, Colombia, Gaza en de West Bank evenals stedelijke gebieden en verschillende terroristische groeperingen.’ De mindset wordt vooral bepaald door ‘contraterroristische technieken gebaseerd op Britse en Israëlische ervaringen’, vermeldt het reisverslag van de training.

    Nu kan het zo zijn dat de Israëliërs veel ervaring hebben met de oorlog in het Midden-Oosten, maar tegelijkertijd roepen hun acties ook veel vragen op. De laatste operatie in de Gaza, Cast Lead, is door verschillende zijden veroordeeld. Ook de Europese Unie is zeer kritisch over de wijze waarop de Israëliërs regelmatig huishouden in de bezette gebieden.

    De Britten zijn overigens ook weer niet het beste voorbeeld van omgang met de opstand in Noord-Ierland. De IRA pleegde regelmatig aanslagen, maar de Britten hebben in de loop van de strijd regelmatig zelf vele slachtoffers gemaakt door infiltratie, informanten, valse beschuldigingen en andere schendingen van mensenrechten.

    Hoewel de training misschien interessant kan zijn, moet een land dat vaak zijn vingertje opsteekt over de mensenrechten in andere landen toch grote zorgvuldigheid in acht nemen als het gaat om samenwerking met bedrijven waar een zweem omheen hangt van strafbare feiten en onoorbaar optreden.

    Laten we daarom nog even een andere mindset van het bedrijf Blackwater bekijken. Naast het wild om zich heen schieten, heeft het bedrijf ook een nogal verwrongen beeld van recht en orde. Het programma Countdown van MSNBC besteedt op 6 augustus 2009 aandacht aan het gebruik van hoeren door leden van Blackwater. http://www.rawstory.com/rawreplay/2009/08/blackwater-provided-child-prostitutes-to-contractors-lawsuit/

    ‘Keith Olbermann (van MSNBC) quoted on Thursday from the employees sworn declarations that Blackwater was guilty of using child prostitutes at its compound in Baghdads fortified Green Zone. The declarations describe Blackwater as having young girls provide oral sex to Enterprise members in the Blackwater Man Camp in exchange for one American dollar.’

    Nu is het zo dat het programma van MSNBC vier maanden na de training van de DSI werd uitgezonden, maar de mindset is wel degelijk belangrijk. Verantwoordelijken binnen de KLPD en als laatste verantwoordelijke, de minister van Veiligheid en Justitie, hadden gezien de status van het bedrijf vraagtekens moeten zetten bij een training door Blackwater.

    Vraagtekens die al in de reactie van het ministerie van Defensie en Buitenlandse Zaken expliciet worden gezet in een reactie op het advies ‘Inhuur civiele dienstverleners in operatiegebieden’. Adviesraad Internationale Vraagstukken in april 2008. ‘De groei van de inzet van particuliere beveiligingsbedrijven in operatiegebieden is niet onomstreden. De recente ophef over het optreden van de firma Blackwater in Irak is aanleiding geweest voor vele kritische vragen.’

    Lofuitingen

    Terug naar de training. De DSI besloot om zich door personeel van Blackwater te laten opleiden. Waarschijnlijk werden ze op positieve wijze beïnvloed door het artikel van David Crane uit oktober 2003. Zijn verhaal ‘Blackwater Training Center Tactical Training For Professionals and Civilians’ in Defense Review is één grote loftuiting op de kwaliteiten van het bedrijf.

    Rick Skwiot doet het in de PortFolio Weekly dunnetjes over onder de titel ‘On the Firing Line The Blackwater Training Center’. ‘The Blackwater Training Center in Moyock teaches soldiers, cops and ordinary citizens how to keep their edge in an increasingly dangerous world.’ En: ‘The most dangerous creatures lurking in The Great Dismal Swamp that spans the Virginia-North Carolina line are not the 600-pound black bears, rattlesnakes or water moccasins. Rather, they’re the men and women—soldiers, sailors, SWAT teams and civilians—taking aim with live ammo in the 5,200-acre Blackwater Training Center.’

    De training van de DSI vond plaats van 27 maart 2009 tot en met 6 april 2009. Niet alleen de DSI doet aan de training mee. Volgens de minister gaat het om vijftien medewerkers van de KLPD. De dienstreizen formulieren die openbaar zijn gemaakt, vermelden vier leden van de DSI, twee leden van de DKDB, twee leden van de DSRT, twee leden van de DNR van de verschillende KLPD onderdelen en twee leden van de AIVD, de inlichtingendienst. Het totaal komt op twaalf.

    Ook op het bestel-aanvraagformulier is sprake van twaalf tickets naar Norfolk in de Verenigde Staten, voor de overnachtingen betreft het twaalf personen. De DSI overnacht het langst, tien dagen, de medewerkers van de AIVD het kortst, twee dagen. Bij de vouchers voor de overnachtingen is het aantal van 27 maart 2009 tot en met 29 maart 2009 ook twaalf. De voucher-nummers van de overige overnachtingen zijn niet vrijgegeven.

    De eerste trainingsdag van 27 maart werd besteed aan het ontwikkelen van het concept mirror image training. ‘Course to be conducted should be designed to replicate terrorism recruitment training, techniques and operational methodology in order to better prepare students to fight the War on Terror. Course of instruction should look towards placing students into simulated terrorist cells in order to receive insight into the mindset and rationale of the terrorist through hands on experience. Cells shall be comprised of approximately eight students per cell with an assigned instructor per cell. Instructors shall have strong backgrounds in unconventional warfare. For instructions and presentations addressing terrorism, contractor shall provide personnel who are high level experts in their field. (CIA, FBI, Department of State, etc…)’, schrijft agent Yvonne C. Frederico over een training van the Naval Special Warfare Group One in juni 2008.

    William J. Henry van het National Guard Bureau is nog explicieter: ‘This training is an intensive, one week classroom and field training program, designed to realistically simulate terrorist recruiting, training techniques and operational tactics. This is a total-immersion course that places the student inside a terrorist organization in order to better teach him how to think and operate like a terrorist. This course includes lodging and meals tailored to simulate living as a terrorist cell.’

    Celadviseur

    De training van de DSI zal er niet zoveel van afwijken omdat de Nederlanders het terrein deelden met Belgische, Amerikaanse en Canadese militairen, politieambtenaren en leden van inlichtingendiensten. Het enige dat de minister van Veiligheid en Justitie los wil laten over die eerste dag is dat ‘na de les de cellen een celadviseur toegewezen krijgen en een operatie werd voorbereid.’

    Op maandagochtend 28 maart werd de operatie uitgevoerd na ‘het ochtendgebed, gevolgd door een les over de geschiedenis van de islam en in het bijzonder de scheiding tussen de sjiieten en soennieten.’ Over de operatie laat de minister angstvallig niets los, maar wel over de lunch ‘bestaande uit een plat broodje, een plak kaas, een bakje humus, fruit en thee of water.’ Maandag stond voor de rest in het teken van HUMINT ‘human intelligence’, informanten en infiltranten en werd ‘de mindset binnen een terroristische cel’ besproken waar ‘bij nieuwe leden van een cel op wordt gelet.’

    Evan Wright beschrijft in ‘Camp Jihad, A ragtag army of cops, soldiers, and G.I. Joe wannabes play terrorist for a week in a counterintuitive counterterrorism program’ (New York Magazine, 21 mei 2005) om wat voor operaties het zou kunnen gaan. De gespeelde cel waar Wright deel van uitmaakte moet een ongelovige vrouw ontvoeren. ‘When I spot the approaching SUVs, I frantically signal LDR. Gunshots start to crackle. A Marine in our cell charges the lead SUV, screaming, Allah akbar!’

    De cel van Wright slaagde in haar opzet, misschien ook de Nederlandse DSI/AIVD terroristencel, want dinsdagochtend ‘volgde een presentatie over middelen tot overwinning.’ De rest van de dag stond in het teken van interne veiligheid en de financiering van de terreur. Na het avondeten kwam een gastspreker een lezing houden.

    De Nederlanders hebben de ontvoering ook nagespeeld, want laat die avond werd er gesproken over losgeld. ‘De groepering die hem had ontvoerd, wilde losgeld van de […] Geld was ook het motief van deze ontvoering. Er was geen sprake van een religieus uitgangspunt’, vermeldt pagina 8 van het dossier dat de minister van Veiligheid en Justitie openbaar heeft gemaakt.

    Woensdag 1 april is ‘net als voorgaande dagen’, vermeldt het verslag. ‘Ochtendgebed, les in de Arabische taal en …’ iets dat geheim blijft. Wright die de training heeft meegemaakt, beschrijft in zijn artikel Camp Jihad dat deze leek op een ‘Renaissance Faire’, zoals de Elf Fantasy Fair in slot Haarzuilens bij Utrecht.

    Wright: ‘Whether a week spent wearing Arab head garb and shooting AK-47s will actually help cops and soldiers plumb the complexities of our enemies’ hearts and minds is an open question. […] But when I first witness my fellow students donning their scarves, some of them shouting, for comic effect, ‘Praise Allah!’ in their best Ali G accents, I momentarily feel as if I’ve entered a weird, terrorist-camp version of a suburban Renaissance Faire.’

    Andrew Garfield

    De training had echter niet alleen een speels karakter, er moest de deelnemers ook wat bijgebracht worden. Naast de lezing op dinsdagavond volgde woensdagmiddag een gedragswetenschapper die een lezing hield over de ‘mindset in het Midden-Oosten’. De minister schrijft, in antwoord op een bezwaarprocedure in het kader van de Wet Openbaarheid van Bestuur (Wob), dat de naam van deze wetenschapper niet meer te achterhalen valt.

    Gedurende de training waar Wright echter aan deelnam, kwam Andrew Garfield, een oud Britse inlichtingenfunctionaris, als spreker opdraven die in het kader van de Terrorist Fair leuk meespeelde in de creatie van het cel-denken. ‘Our Jihad is succeeding beyond our wildest expectations. Look at how the Americans are blundering around in Iraq, filling our ranks with new recruits.’

    Garfield duidde in zijn rol als ’terroristen-expert’ op het lompe gedrag van de Amerikanen in Afghanistan, Irak en elders. De boodschap van Garfield bij de Mirror Image training was enigszins surrealistisch. Zo zei hij tegen Wright dat ‘killing terrorists or insurgents will not kill the movement.’ Waarom is de training er dan opgericht om terroristen nader te begrijpen om hen te bestrijden?

    Gezien het respectloze gedrag van Blackwater-medewerkers in Irak en Afghanistan, waarbij slachtoffers vielen, is de grote vraag of het bedrijf überhaupt wel in staat is om de ‘mindset in het Midden-Oosten’ te beschrijven. Het kan al niet eens normaal omgaan met burgers, zoals blijkt uit de films die Harper’s Magazine online heeft geplaatst.

    Het feit dat het bedrijf in de afgelopen jaren talrijke naamsveranderingen heeft ondergaan – Blackwater, Xe Services, Paravant LLC, Greystone Limited, XPG, Raven, Constellation, Total Intelligence Solutions, EP Investments, US Training Center, GSD manufacturing, Presidenial Airlines, Select PTC, Academi, R2, Reflex Responses etc. – duidt er tevens op dat het haar naam niet wil verbeteren, maar de aandacht wil afleiden van de vele mensenrechtenschendingen en andere vergrijpen van haar medewerkers. De mindset van Blackwater is het probleem, en daarmee de Mirror Image training.

    De een na laatste dag van de training stond in het teken van de finale. Woensdagavond werd het ‘plan voorgelegd aan een militaire raad’ en donderdag was ‘het de bedoeling om het getrainde in wedstrijdvorm in praktijk te brengen.’ Die dag verliep een beetje rommelig, want naast de wedstrijd gaat het ook over de ‘zelfmoordaanslagen in de metro van Londen op 7 juli 2005’, ‘de politieactie van 22 juli 2005 op metrostation Stockwell’ (het doodschieten van de Braziliaan Jean Charles de Menezes), ‘een blik op de toekomst’, de ‘documentaire Meeting Resistance’ en als afsluiting het ‘martelaarsfeest’.

    Geheime conclusies

    Veel informatie werd via de Wob-procedure niet vrij gekregen omdat er anders er een mirror mirror image training kon worden georganiseerd om de training van de KLPD’ers en de AIVD’ers te spiegelen. De conclusies worden ons volledig onthouden, maar het beeld van de training dat op basis van verschillende artikelen boven komt drijven, is dat van het spel ‘vlag veroveren plus’, met veel testosteron.

    Misschien verklaart de training wel de aanpak van de inval van het belhuis in Rotterdam op Kerstavond 2010. Vraag is alleen of dit iets te maken heeft met het winnen van hearts and minds of het slechten van de oorlog tegen de terreur. Misschien is dat laatste echter in het geheel niet de bedoeling.

    Wright sprak een van de mirror image trainers Frank Willoughby, specialist in hinderlagen en Improvised Explosive Devices, geïmproviseerde bommen. Willoughby staat symbool voor de vercommercialisering van oorlog. ‘The prospect of mounting chaos seems, frankly, to excite some instructors. At times, Frank Willoughby is unable to conceal how glad he is that the war on terrorism promises to be endless. […] Punching his fist into his hand, he adds, ‘Soon as they hit us 9/11′, I told my wife, ’the game is on!’, schrijft Wright in Camp Jihad.

    Blackwater’s verderfelijke reputatie is een reden om niet met het bedrijf in zee te gaan. Maar een belangrijkere conclusie van dit verhaal is dat de belangen van de private sector niet gericht zijn op vrede. Zij willen oorlog en chaos creëren, omdat dat nu eenmaal de voorwaarden zijn om geld mee te verdienen. Een politiedienst die in deze voetsporen treedt, roept bij elke deur die nutteloos wordt opengetrapt, net als Willoughby, the game is on.

    Find this story at 19 June 2012

    Amputee dies in G4S ambulance due to ‘insufficient’ staff training

    Inquest told the victim’s wheelchair was not secured and he died when it tipped over

    A double amputee died when his unsecured wheelchair tipped over backwards as he was being transported to hospital in an ambulance operated by under-fire outsourcing firm G4S.

    An inquest jury found that the driver and staff of the security firm had not received sufficient training to move patients safely between their homes, hospitals and clinics.

    Retired newsagent Palaniappan Thevarayan, 47, suffered fatal head injuries when his wheelchair came loose from the floor clamps in the back of the vehicle taking him to St Helier Hospital, in Sutton, Surrey, from a dialysis centre in Epsom hospital in May 2011.

    The jury at Westminster Magistrates Court this week heard that driver John Garner, who had worked for the company since 2005, and fellow G4S staff had not had their manual handling training updated since 2009. G4S, which was heavily criticised for its failure to recruit enough security guards for last year’s Olympic Games, operates public sector contracts in border control, security, prisoner and patient transport worth £350million a year. The global security company continues to work with St Helier along with four other NHS Trusts in the London area carrying out 400,000 patient journeys a year.

    Westminster Coroners Court heard that Mr Thevarayan’s wheelchair tipped backwards resulting in a serious head injury. It emerged that the chair had not been attached to the ambulance floor by the necessary ratchet clamps and was not securely restrained. He was being taken to hospital after developing problems with a blocked catheter.

    Delivering a narrative verdict, the jury said: “Patient transport service staff were not sufficiently trained in the safe transportation of patients by ambulance.”

    Mr Thevarayan, who was originally from India, had previously had both legs amputated after suffering complications with his diabetes. He was undergoing dialysis three times a week for kidney failure and was nearing the top of the transplant list.

    The inquest heard that he had to wait for more than six hours for emergency surgery after being transferred to St George’s Hospital, Tooting, following the incident. His wife and full time carer Nirmala said he had been given only a 50:50 chance of survival if operated on immediately.

    She told the inquest she wanted answers about his treatment by G4S and wanted to know why it had taken so long for him to receive surgery. ‘I want to know why they didn’t look after him properly’, she said. “And in hospital, why did they take so long to treat him?” she added.

    Assistant deputy coroner Kevin McLoughlin said to Mrs Thevarayan and her son and daughter who sat through the four-day inquest: “I pay tribute to the calm dignity which you and your family have conducted yourself through what must have been heart-breaking evidence.”

    In a statement G4S said: “We can confirm that the member of staff involved in this tragic incident had received all the mandatory training required at the time.

    “Following this incident we immediately installed an additional team of professionals to review our procedures and ensure that training fully covers all points pertinent to this incident. Improvements have been made to our systems for recording training, and the content of our staff training has been reviewed and enhanced to address lessons learned from this incident.”

    JONATHAN BROWN

    Friday 08 March 2013

    Find this story at 8 March 2013

    © independent.co.uk

    Olympics Fiasco: G4S Profits Fall By A Third

    The company which failed to meet its Olympics security contract confirms a big fall in profits.

    Annual profits fell by a worse than expected 32% at G4S, the firm at the centre of last year’s Olympics security fiasco.

    Pre-tax profit for 2012 dropped to £175m from £257m the previous year as a result of a £70m loss on its contract to supply security personnel to the Olympic and Paralympic Games in London.

    The Armed Forces had to be called in to cover staff shortfalls when G4S admitted just ahead of the Games that it had failed to hire enough guards to cover its contract.

    It had been obliged to provide 10,400 people but managed to fulfil 83% of its contracted shifts.

    The failures led to chief operating officer David Taylor-Smith and Ian Horseman Sewell, who was head of global events, to quit their jobs while chief executive Nick Buckles remained in his post.

    Mr Buckles told MPs on the Home Affairs Select Committee in July that the staffing failure was a fiasco and a “humiliating shambles”.

    A report for G4S by auditors PwC found that monitoring and tracking of the security workforce was inadequate and that management failed to appreciate the scale and exact nature of the project.

    8:27am UK, Wednesday 13 March 2013

    Find this story at 13 March 2013

    Copyright ©2013 BSkyB

    Olympic fiasco continues to haunt G4S

    G4S failed to supply enough personnel for the London 2012 Olympics, forcing the Government to draft in soldiers Getty Images

    G4S’s Olympics fiasco drove annual profits down by a third at the security company last year.

    The company also announced this morning that its chief financial officer, Trevor Dighton, would retire on April 30. He will be replaced by Ashley Almanza, who held the same position at energy company BG Group.

    Katherine Griffiths
    Last updated at 12:08PM, March 13 2013

    Find this story at 13 March 2013

    © Times Newspapers Limited 2013

    Revealed: who can fly drones in UK airspace

    Missile manufacturer, police forces and golf video company among more than 130 groups licensed to use technology

    A surveillance drone used by Merseyside police, one of three forces that have permission to use UAVs. Photograph: John Giles/PA

    Defence firms, police forces and fire services are among more than 130 organisations that have permission to fly small drones in UK airspace, the Guardian can reveal.

    The Civil Aviation Authority list of companies and groups that have sought approval for the use of the unmanned aerial vehicles, UAVs, has not been published before – and it reflects the way the technology is now being used. The BBC, the National Grid and several universities are now certified to use them – as is Video Golf Marketing, which provides fly-over videos of golf courses.

    Including multiple or expired licences, the CAA has granted approval to fly small UAVs more than 160 times.

    “People are going to see more and more of these small vehicles operating around the country,” said John Moreland, general secretary of the Unmanned Aerial Vehicle Systems Association (UAVS), a trade body with more than 100 members. “There are any number of uses for them, and the technology is getting easier to use and cheaper all the time. These vehicles can operate anywhere in the UK, within reason.”

    However, privacy campaigners have grave concerns about the proliferation of the technology and want an urgent review of regulations. “The increasing use of drones by private companies and government bodies poses a unique set of problems,” said Eric King, head of research at campaign group Privacy International.

    “The CAA considers health and safety issues when deciding whether or not to grant licences to operate drone technology, but this is a very low bar. We need new regulation to ensure privacy and other civil liberties are also taken into account during the decision-making process.”

    In the last two years the CAA has required anyone who wants to fly a small UAV in British airspace to apply for permission. The aircraft must weigh less than 20kg and operators have to abide by certain rules. These include not flying them higher than 122 metres (400ft), or further away from the operator than 500 metres – this is deemed the pilot’s “line of sight”.

    The CAA list shows that three police forces, Merseyside, Staffordshire and Essex, have permission to use UAVs, as do three fire services, Dorset, West Midlands and Hampshire.

    Some of Europe’s biggest defence companies can also fly them, including BAE Systems, Qinetiq and missile manufacturer MBDA. A company that supplies UAVs and other equipment to the Ministry of Defence, Marlborough Communications, is also registered, along with crime-scene and counter-terrorism specialist GWR & Associates.

    Shane Knight, a spokesman for Marlborough, said: “If you can put these systems up in the sky, and they are safe, then they have many uses. If you are a police force, a fire or ambulance service, and, for instance, you are responding to a large fire, then you have a choice of sending out your people to do reconnaissance of an area, or you could use one of these small UAVs. Why put people in danger when you can use one of these systems? These UAVs are getting much better, and much smaller.”

    The National Grid uses them to inspect power lines, while the Scottish Environment Protection Agency wants one to patrol and photograph remote areas, said Susan Stevens, a scientist in the agency’s marine ecology department. “The UAV equipment is currently being trialled,” she said.

    “As an operational service it will have many uses, such as capturing aerial imagery of estuaries, wetlands and riverbanks, and to provide a snapshot of the environment before and after development work,” she said.

    Moreland said the unmanned systems suffered from the perception that they were all “killer robots” flying in the sky, but he thought this would diminish as the public got used to seeing them.

    “We are going to see all sorts of systems coming out over the years,” he said. “The operating bubble is going to expand like mad. Some of these systems will be able to look after themselves, and others will rely on the quality of the operators.

    “You don’t have to be a qualified pilot … The person could come from a modelling background, or he may be a video game player. There are plenty of people you could imagine being able to control these systems in a delicate way.”

    Gordon Slack, who owns Video Golf Marketing, said he had taught himself to use his UAV. “Once you know how to operate it, it is not too complicated. We’ve done six videos for golf courses, with a few more in the pipeline.”

    (Owner ID number/Company name)

    1 HoverCam

    2 Meggitt Defence Systems

    3 EagleEye (Aerial Photography) Ltd

    4 Remote Services Limited

    5 High Spy RC Aerial Photography

    6 Magsurvey Limited

    7 Pi In The Sky

    8 Qinetiq

    9 Eye In The Sky

    10 AngleCam

    11 Helicam Ltd

    12 Flying Minicameras Ltd

    13 S & C Thermofluids Ltd

    14 Remote Airworks (pty) Ltd

    15 National Grid

    16 Dragonfly Aerial Photography

    17 BlueBear Systems Research

    18 William Walker

    19 European UAV Systems Centre Ltd

    20 In-House Films Ltd

    21 MBDA UK Ltd

    22 European UAV Systems Centre

    23 Dorset Fire & Rescue Service

    24 Conocophillips Limited

    25 Hampshire Fire & Rescue Service

    26 West Midlands Fire Service

    27 Advanced Ceramics Research

    28 UA Systems Ltd (Swisscopter)

    29 Hybrid Air Vehicles Ltd

    30 Flight Refuelling Limited

    31 BAE Systems (Operations) Ltd

    32 Lindstrand Technologies Ltd

    33 Upper Cut Productions

    34 Cranfield University

    35 Peregrine Media Ltd

    36 Horizon Aerial Photography

    37 Rory Game

    38 Alan Stevens

    39 Helipix LLP

    40 Re-use*

    41 Mike Garner

    42 Cyberhawk Innovations Ltd

    43 Staffordshire Police TPU

    44 Merseyside Police

    45 Health and Safety Laboratory

    46 David Hogg

    47 MRL Ltd

    48 MRL Ltd

    49 Re-use*

    50 Dominic Blundell

    51 Re-use*

    52 Re-use*

    53 Skylens Aerial Photography

    54 Bonningtons Aerial Surveys

    55 Small UAV Enterprises

    56 British Technical Films

    57 CARVEC Systems Ltd

    58 Flying-Scots’Cam

    59 Pulse Corporation Ltd (t/a Overshoot Photography)

    60 Motor Bird Ltd

    61 Advanced Aerial Imagery

    62 AM-UAS Limited

    63 Re-use*

    64 Gatewing NV

    65 Questuav Ltd

    66 Advanced UAV Technology Ltd

    67 Air 2 Air

    68 MW Power Systems Limited

    69 Re-use*

    70 Roke Manor Research Ltd

    71 Re-use*

    72 NPIA

    73 Pete Ulrick

    74 Re-use*

    75 SSE Power Distribution

    76 University of Worcester

    77 Re-use*

    78 Rovision Ltd

    79 Callen-Lenz Associates Ltd (Gubua Group)

    80 SKM Studio

    81 GWR Associates

    82 Phoenix Model Aviation

    83 Copycat

    84 HD Skycam

    85 Re-use*

    86 Gary White

    87 Aerial Target Systems Ltd

    88 Aerial Target Systems

    89 Re-use*

    90 Video Golf Marketing Ltd

    91 Re-use*

    92 Helivisuals Ltd

    93 Essex Police

    94 Marlborough Comms Ltd

    95 Re-use*

    96 Siemans Wind Power A/S

    97 Altimeter UK Ltd t/a Visionair

    98 T/A Remote Imaging

    99 Re-use*

    100 Daniel Baker

    101 Sky Futures

    102 Aerovironment Inc

    103 Spherical Images Ltd

    104 Flying Camera Systems

    105 Highviz Photography

    106 ESDM Ltd

    107 Flying Camera Systems Limited

    108 Edward Martin

    109 Digital Mapping and Survey Ltd

    110 EDF NNB GenCo Ltd

    111 EDF

    112 Re-use*

    113 AerialVue Ltd

    114 Minerva NI Limited

    115 Flying Fern Films Ltd

    116 Out Filming Ltd

    117 Hexcam Ltd

    118 McKenzie Geospatial Surveys Ltd

    119 Resource UAS

    120 Plum Pictures

    121 Jonathan Malory

    122 Mas-UK Ltd

    123 Bailey Balloons Ltd

    124 David Bush

    125 Southampton University

    126 Helipov

    127 Costain Ltd

    128 Sky-Futures

    129 Jonathan Blaxill

    130 Roke Manor Research Ltd

    131 Colin Bailie

    132 British Broadcasting Corp

    133 Simon Hailey

    134 Re-use*

    135 Trimvale Aviation

    136 PSH Skypower Ltd

    137 Aerosight Ltd

    171 Re-use*

    173 Colin Bailie

    174 Simon Field

    175 Re-use*

    176 Aerial Graphical Services

    177 Think Aerial Photography

    178 Hedge Air Limited

    179 Scottish Environment Protection Agency

    180 Skypower Limited

    181 Elevation Images

    182 Universal Sky Pictures

    183 MBDA UK Ltd

    184 Helicammedia

    185 Oculus Systems Ltd

    186 MASA Ltd

    187 Doozee Aerial Systems Ltd

    188 Selex Galileo

    189 Whisperdrone

    190 Z-Axis

    191 Rotarama Ltd

    192 Re-use*

    193 BBC (Natural History Unit)

    194 Flying Camera Company

    195 Flying Camera Company

    * Short-term approval that was granted, but now no longer applies

    Source: CAA

    Nick Hopkins
    The Guardian, Friday 25 January 2013 20.02 GMT

    Find this story at 25 January 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Major blow to G4S as police multimillion-pound deal to outsource services collapses

    Multimillion-pound plans by three police forces to outsource services to the firm at the centre of the Olympics security debacle have collapsed.

    Hertfordshire Police and Crime Commissioner David Lloyd said the Bedfordshire, Cambridgeshire and Hertfordshire Strategic Alliance had discontinued negotiations with G4S.

    The three forces were looking in to working with G4S in a bid to save £73 million by outsourcing support functions.

    The proposals involved switching 1,100 roles, including human resources, IT and finance to the security contractor.

    But doubts were raised after the company was forced to admit severe failings over the Olympics security contract last summer, which led to police officers and 3,500 extra troops being deployed to support the operation.

    In a statement, Mr Lloyd said: “I have always said that I would make my decision once the evidence was received and assessed.

    “It is now clear that the G4S framework contract through Lincolnshire Police was not suitable for the unique position of the three forces.”

    But he added that outsourcing to other companies would still be considered.

    Mr Lloyd said: “I am already in discussion with other market providers and will continue to talk with G4S about how they can assist policing support services in Hertfordshire. My clear position is that all elements of support work will be considered for outsourcing or other use of the market.

    “I made my decision based on evidence and on the recommendations from the Chief Constables. I still believe that substantial elements of policing support services will be best delivered by the private sector and will ensure that this option is immediately pursued.

    “We will now move forward looking at organisational support services, as before.”

    Police and Crime Commissioner for Bedfordshire, Olly Martins, said: “The concerns that I had about this proposal are on record but I am pleased that following the evaluation and subsequent discussions, the three Police and Crime Commissioners have ended up in agreement with a shared view that this contract does not deliver what we need.

    “However, we do still have to save money. Strengthening the ways in which we collaborate with Hertfordshire and Cambridgeshire is a crucial element of our on-going investment in all our police services.

    “I now look forward to working with my fellow commissioners to develop new and innovative ways in which we can progress our collaborative approach.”

    The force’s Chief Constable Alf Hitchcock said: “As an Alliance we have been working together to explore a range of options for making savings at a time when all three forces are facing significant financial challenges.

    “Along with my Chief Constable colleagues in Cambridgeshire and Hertfordshire and the three commissioners, we are continuing to explore other opportunities, whilst in Bedfordshire we are using the Option 10 and Lean processes to achieve savings in-house and protect front line policing.”

    Kim Challis, chief executive of G4S Government and outsourcing solutions, said: “We have put forward a compelling proposition to the police forces of Bedfordshire, Cambridgeshire and Hertfordshire which would have guaranteed them savings of over £100 million over the next ten years, allowing them to meet the financial challenge of the Comprehensive Spending Review without compromising on efficiency or public safety.

    “Our proposition was to operate back office services at the volume and scale required to deliver significant savings to forces, enabling them to concentrate their resources on frontline roles: it was never about replacing police officers. This has already proved to be the case in Lincolnshire, where we have a successful partnership which, in less than a year, has seen us deliver savings in running costs of around 16%.

    Jennifer Cockerell
    Wednesday, 30 January 2013

    Find this story at 30 January 2013

    © independent.co.uk

    Jantje Beton wil geen geld meer van G4S

    Jantje Beton zet de sponsorovereenkomst met beveiligingsbedrijf G4S Cash Solutions Nederland stop. Dit omdat het hoofdkantoor van het bedrijf G4S in de media werd beschuldigd van betrokkenheid bij de beveiliging van Israëlische gevangenissen waar Palestijnse politieke gevangenen onterecht vast zouden zitten. Dat meldde Jantje Beton.

    De partijen besloten na goed overleg dat het „onwenselijk” was om te blijven samenwerken.

     

    ma 24 dec 2012, 16:09

    Find this story at 24 December 2012

    © 1996-2012 Telegraaf Media Nederland | Landelijke Media B.V., Amsterdam.

    Olympics shambles firm G4S set to win call centre contract after MPs’ calls to blacklist it are ignored

    MPs say decision is ‘unbelievable’ and they should be banned after London 2012 fiasco
    G4S failed to recruit enough staff and more than 10,000 troops had to be drafted in at the last minute
    Bosses say decision proves Government recognises they can ‘still win business’

    Bungling Olympic security firm G4S is set to be offered another gold-plated Government contract despite its failure to provide enough staff for London 2012.

    The company, which MPs want blacklisted from taxpayer-funded deals because the Army had to rescue it this summer, has now been shortlisted to help in several call centres.

    G4S has been picked by the Department for Work and Pensions above 16 other firms and now looks likely to help advise the public on benefits.

    Scandal: G4S’s mishandling of its Olympic security contract led to the military being called in, but it has now been shortlisted for another taxpayer-funded deal

    Its inability to cope with an Olympics security contract meant that 18,000 troops and 12,000 police were drafted in to form the ‘ring of steel’ around venues that G4S had promised, causing national outrage.

    G4S signed a £284million deal to provide 10,400 Games security guards, but just 16 days before the opening ceremony it admitted it had only fulfilled 83 per cent of contracted shifts.

    Laughing: G4S boss Nick Buckles managed to keep his £5.3m a year job despite the embarrassing problems this summer

    Politicians have today vented their fury at the news.

    Shadow sports minister Clive Efford said: ‘This is unbelievable after the way they let down the country.’

    Tory MP Patrick Mercer and former Army officer added: ‘I would be deeply concerned about further taxpayers’ money being spent on the firm that caused such chaos.’

    But despite their catastrophic failings this summer G4S, which offers a wide range of services, not just security, said they could do the job.

    Sean Williams, managing director of its employment support services arm, said the decision showed it could ‘still win business’.

    ‘We’ve done a massive amount of work for the Government over the past few years and we hope the Government recognises that,’ he added.

    G4S look set to run call centres linked to the Coalition’s roll out of its Universal credits system.

    The six main benefits will be rolled into one over the next five years and G4S staff could help answer calls from the public.

    A DWP spokesperson said: ‘Framework agreements with six suppliers will allow DWP to procure contact centre requirements over the next four years, if needed.

    ‘DWP’s own call centres remain the primary point of contact for claimants and there is no guaranteed work for any suppliers on the Framework.’

    Changes: British soldiers were denied holiday and brought back from warzones to fill in for G4S

    G4S SIGNS UP NEW DIRECTORS TO SURE UP BUSINESS

    G4S announced the appointment of three new directors today as the security group looks to move on following its Olympics Games contract fiasco.

    ITV chief executive Adam Crozier and Paul Spence, who has served on Capgemini’s management committee, will join the G4S board next month, while Tim Weller, chief financial officer of Petrofac, will start in April.

    The non-executive appointments replace Bo Lerenius and Paul Condon, who will retire from the company’s board in June following nine years service.

    Shares in the FTSE 100 Index group were 3 per cent higher today.

    The head of the bungling security firm kept his job despite an independent review finding the company guilty of ‘mishandling’ its Olympic contract.

    By Martin Robinson

    PUBLISHED: 13:31 GMT, 18 December 2012 | UPDATED: 17:49 GMT, 18 December 2012

    Find this story at 18 December 2012

    © Associated Newspapers Ltd

    University of Oslo to end G4S contract over support for Israeli apartheid

    Student campaigners created stickers imitating G4S’ logo to raise awareness on campus. (Photo courtesey of Palestine Committee at the University of Oslo)

    In a major success for the campaign against Israeli prison contractor G4S, the University of Oslo has announced that it will terminate its contract with the company in July 2013.

    G4S is a private security company that has a contract to provide equipment and services to Israeli prisons at which Palestinian political prisoners, including child prisoners, are detained and mistreated. G4S also provides equipment and services to checkpoints, illegal settlements and businesses in settlements. The Israeli governmentrecently confirmed that G4S also provides equipment to Israel’s illegal apartheid wall.

    Student activists with the Palestine Committee at the University of Oslo began campaigning in August for the university to not renew its contract with G4S, which has been providing security services on campus since 2010. Campaigners plastered the campus with “Boycott G4S” stickers that imitated real G4S stickers and the student parliament voted to support the campaign. Students have also held demonstrations and other actions on campus.

    The university had the option to extend the contract for another year beyond its original expiry date of March 2013 but has now negotiated a termination date of 1 July 2013. The University of Oslo does not want to “support companies that operate in an ethical grey area” and new ethical procurement guidelines will be developed to prevent any future contracts with companies involved in human rights abuses, university director Ole Petter Ottersen has said.

    In November, a petition signed by 21 organizations including trade unions, political parties and nongovernmental organizations such as Amnesty International was sent to G4S Norway. The signatories stated: ”G4S must immediately withdraw from all activities on occupied Palestinian land and halt all deliveries to Israeli prisons in which Palestinian prisoners are imprisoned in violation of the Geneva conventions.”

    There are campaigns against G4S in several other European countries including Denmark, Sweden, the UK and Belgium and several public bodies, nongovernmental organizations and private companies have already been succesfully persuaded to cut their ties to the company.
    Continued deception

    While attempting to defend its support for Israeli violations of international law to Norwegian media outlets, G4S repeated earlier claims that it intends to pull out of several contracts to provide equipment to Israeli settlements and checkpoints by 2015, creating the false impression that it is ending all support for Israeli violations of international law.

    Yet if G4S is serious about ending its complicity, why doesn’t it end all involvement in settlements immediately? The comapny has so far not announced any plans to end its provision of security services to private businesses in illegal Israeli settlements.

    Most importantly, G4S continues to omit any mention of its role in prisons inside Israelin its public communications in response to campaigns, making clear its intent to continue its role in the Israeli prison system, underlining the need for continued campaigning.

    Posted on December 11, 2012 by Michael Deas at Electronic Intifada

    Find this story at 11 December 2012

    G4S tagging contract now at risk

    G4S will face its “next big test” of government support as early as next month after it was stripped of a key prison contract in the wake of the company’s Olympics security shambles.
    FTSE 100 security group is waiting to hear whether it will be reappointed on a contract to provide electronic tagging of offenders. MPs stopped short of calling for the resignation of chief executive Nick Buckles after the Olympics fiasco.

    The FTSE 100 security group is waiting to hear whether it will be reappointed on a contract to provide electronic tagging of offenders services across England and Wales, worth £50m of annual revenue to the company.

    G4S and Serco gained an extension to an existing contract in 2009, which is due to expire in March 2013. It is understood that the Ministry of Justice (MoJ) is considering bids for the next phase of the contract with an announcement expected next month.

    Under the existing contract G4S and Serco manage the entire process including the technology, tagging, and monitoring of offenders, in two regions each. Under the next phase, the contract will not be split into regions but “services”, with one company providing technology across England and Wales and the other providing tagging for example. In September G4S won a contract to provide tagging services in Scotland.

    G4S declined to comment on the contract in England and Wales, but David Brockton, analyst at Espirito Santo, said it would be “the next big test”.

    The MoJ said on Thursday it would strip G4S of its contract to manage HMP Wolds in East Yorkshire when its contract expires in July 2013, with management reverting to the public sector.
    Related Articles
    Olympics security firm G4S loses contract to run Wolds prison 08 Nov 2012
    G4S rebounds after Olympics fiasco 06 Nov 2012
    Olympics fiasco: G4S to be frozen out in future 22 Jul 2012
    Political risks are getting too hot for private companies 08 Nov 2012.

    By Angela Monaghan

    7:30AM GMT 11 Nov 2012

    Find this story at 11 November 2012

    © Copyright of Telegraph Media Group Limited 2012

    Homes, G4S style: Rubbish, rising damp… and ‘roaches’

    Another shambles as security giant leaves asylum seeker living in squalor

    An asylum seeker with a five-month-old baby claims she was placed in a property by the private contractor G4S that was infested with cockroaches and slugs. The woman, who was trafficked to the UK and sold into prostitution before seeking asylum, claims she and her baby were left in the house for weeks before the local council intervened to ensure they were rehoused.

    Leeds City Council contacted G4S, and their property sub-contractors Cascade, earlier this week after their inspectors found the property was a “Category 1 Hazard” and unfit for human habitation in its current condition. G4S holds contracts to supply accommodation to asylum contracts across much of England as part of the UK Border Agency’s COMPASS project.

    The woman, known as Angela, says she was “dumped” at the property after she refused to accept an alternative place offered to her on the basis that the filth, mould and damp there would pose a health risk to her child.

    She made repeated complaints to both G4S and Cascade and was told by the firms that they had carried out their own inspections and were satisfied the accommodations was “decent”.

    “One of the people said to me when I rang ‘slugs are not harmful, even if your baby eats one of them’” she told The Independent.

    Angela, who was forced into prostitution after being trafficked to the UK in 2000, was initially housed in a “nice” one-bed flat by UKBA after seeking refuge from her handlers.

    But when her son was born she was moved to an area contracted to G4S and sub-contracted to property firm Cascade. “When I came here I said ‘this house doesn’t look safe for me and my child to live in’, there were cockroaches and slugs,” Angela recalls. “They took me to another property and that was absolutely disgusting, worse than this one. The kitchen smells of wee, the whole place, words cannot describe I was crying, I was screaming”.

    Charlotte Philby
    Friday, 14 December 2012

    Find This story at 14 December 2012

    © independent.co.uk

    Nominee Directors Linked to Intelligence, Military

    Companies making use of offshore secrecy include firm that supplied surveillance software used by repressive regimes.

    A number of so-called nominee directors of companies registered in the British Virgin Islands (BVI) have connections to military or intelligence activities, an investigation has revealed.

    In the past, the British arms giant BAE was the most notorious user of offshore secrecy. The Guardian in 2003 revealed the firm had set up a pair of covert BVI entities.

    The undeclared subsidiaries were used to distribute hundreds of millions of pounds in secret payments to get overseas arms contracts.

    Today the investigation by the International Consortium of Investigative Journalists and the Guardian uncovers the identities of other offshore operators.

    Louthean Nelson owns the Gamma Group, a controversial computer surveillance firm employing ex-military personnel. It sells bugging technology to Middle East and south-east Asian governments.

    Nelson owns a BVI offshore arm, Gamma Group International Ltd.

    Gamma’s spyware, which can be used against dissidents, has turned up in the hands of both Egyptian and Bahraini state security police, although Nelson’s representative claims this happened inadvertently.

    He initially denied to us that Nelson was linked to Gamma, and denied that Nelson owned the anonymous BVI affiliate.

    Martin Muench, who has a 15 per cent share in the company’s German subsidiary, said he was the group’s sole press spokesman, and told us: “Louthean Nelson is not associated with any company by the name of Gamma Group International Ltd. If by chance you are referring to any other Gamma company, then the explanation is the same for each and every one of them.”

    After he was confronted with evidence obtained by the ICIJ/Guardian investigation, Muench changed his position. He told us: “You are absolutely right, apparently there is a Gamma Group International Ltd.”

    He added: “So in effect I was wrong – sorry. However I did not say that Louthean Nelson was not associated with any Gamma company, only the one that I thought did not exist.”

    Nelson set up his BVI offshoot in 2007, using an agency, BizCorp Management Pte, located in Singapore. His spokesman claimed the BVI company was not involved in sales of Gamma’s “Finfisher” spyware. But he refused to disclose the entity’s purpose.

    Earlier this year, computer researchers in California told the New York Times they had discovered Finfisher being run from servers in Singapore, Indonesia, Brunei, Mongolia and a government ministry in Turkmenistan. The spying software was previously proved to have infected the computers of political activists in Bahrain, which Louthean Nelson visited in June 2006.

    The Finfisher progamme is marketed as a technique for so-called “IT intrusion”. The code disguises itself as a software update or an email attachment, which the target victim is unaware will transmit back all his or her transactions and keystrokes.

    Gamma calls itself “a government contractor to state intelligence and law enforcement agencies for … high-quality surveillance vans” and telephone tapping of all kinds.

    Activists’ investigations into Finfisher originally began in March 2011, after protesters who broke into Egypt’s state security headquarters discovered documents showing the bugging system was being marketed to the then president Hosni Mubarak’s regime, at a price of $353,000.

    Muench said demonstration copies of the Finfisher software must have been “stolen”. He refused to identify Gamma’s customers.

    Nelson’s father, Bill Nelson, is described as the CEO of the UK Gamma, which sells a range of covert surveillance equipment from a modern industrial estate outside Andover in Hampshire, near the family home in the village of Winterbourne Earls.

    In September this year, the German foreign minister, Guido Westerwelle, called for an EU-wide ban on the export of such surveillance software to totalitarian states. “These regimes should not get the technical instruments to spy on their own citizens,” Westerwelle said.

    The UK has now agreed that future Finfisher exports from Andover to questionable regimes will need government permission.

    Other types of anonymous offshore user we have identified in this area include a south London private detective, Gerry Moore, who operated Swiss bank accounts. He did not respond to invitations to comment.

    Another private intelligence agency, Ciex, was used as a postbox by the financier Julian Askin to set up a covert entity registered in the Cook Islands, called Pastech. He too did not respond to invitations to comment.

    An ex-CIA officer and a South African mercenary soldier, John Walbridge and Mauritz Le Roux, used London agents to set up a series of BVI-registered companies in 2005, after obtaining bodyguarding contracts in Iraq and Afghanistan. Le Roux told us one of his reasons was to accommodate “local partnerships” in foreign countries. Walbridge did not respond.

    A former BAE software engineer from Hull, John Cunningham, says he set up his own offshore BVI company in the hope of selling helicopter drones for purely civilian use.

    Now based in Thailand, he previously designed military avionics for Britain’s Hawk and Typhoon war planes.

    He told us: “That account was set up by my ‘friend’ in Indonesia who does aerial mapping with small UAVs [unmanned aerial vehicles]. He was going to pay me a commission through that account … However, this was my first attempt to work in Asia and as I have found, money tends to be not forthcoming. I have never used that account.”
    The military and intelligence register

    Gerry Moore

    Company: GM Property Developments, LHM Property Holdings

    Story: South London private detective sets up BVI companies with Swiss bank accounts

    Details: Moore founded “Thames Investigation Services”, later “Thames Associates”, in Blackheath, south London. He opened a Swiss bank account with UBS Basel in 1998. In 2007, he sought to open another account with Credit Suisse, Zurich, for his newly-registered BVI entity GM Property Developments. He sought to register a second offshore company, LHM Property Holdings, using his wife Linda’s initials.

    Intermediary: Netincorp. BVI (Damien Fong)

    Comment: No response. Thames Associates website taken down after Guardian approaches.

    John Walbridge and Mauritz Le Roux

    Companies: Overseas Security & Strategic Information Ltd, Remington Resources (Walbridge), Safenet UXO, Sparenberg, Gladeaway, Maplethorpe, Hawksbourne (Le Roux)

    Story: Former CIA officer and South African ex-mercenary provide guards in Iraq and Afghanistan

    Details: John H Walbridge Jr says he served with US special forces in Vietnam and then with the CIA in Brazil. His Miami-based private military company, OSSI Inc teamed up with South African ex-soldier and Executive Outcomes mercenary Mauritz Le Roux to win contracts in Kabul in 2005. Walbridge set up his 2 BVI entities with his wife Cassandra via a London agency in June and August 2005, and Le Roux incorporated 5 parallel BVI companies.

    Intermediary: Alpha Offshore, London

    Comment: Le Roux told us some of his offshore entities were kept available “in case we need to start up operations in a country where we would need to have local partnerships”. His joint venture with OSSI was based offshore in Dubai, he said, but used BVI entities ” to operate within a legal framework under British law, rather than the legal framework of the UAE”. Walbridge did not respond to invitations to comment.

    Julian Askin

    Company: Pastech

    Story: Businessman used private intelligence agency to set up covert offshore entity in the Cook Islands

    Details: Askin was a British football pools entrepreneur. He alleged Afrikaner conspiracies against him in South Africa, when his Tollgate transport group there collapsed. The apartheid regime failed to have him extradited, alleging fraud. He hired the Ciex agency to report on ABSA, the South African bank which foreclosed on him. Ciex was founded by ex-MI6 senior officer Michael Oatley along with ex-MI6 officer Hamilton Macmillan. In May 2000, they were used to help set up Pastech for their client in the obscure Pacific offshore location of Rarotonga, in the Cook Islands, with anonymous nominee directors and shareholders. Askin now lives in Semer, Suffolk.

    Intermediary: Ciex, Buckingham Gate, London

    Comment: He did not respond to invitations to comment.

    Louthean Nelson

    Company: Gamma Group International

    Story: Gamma sells Finfisher round the world, spying software which infects a target’s computer.

    Details: Nelson set up a UK company in 2007 on an Andover industrial estate, to make and sell Finfisher – a so-called Trojan which can remotely spy on a victim’s computer, by pretending to be a routine software update. He set up a parallel, more covert company with a similar name, registered in the BVI, via an agency in Singapore, using his father’s address at Winterbourne Earls, near Andover. He also sells to the Middle East via premises in Beirut. He ran into controversy last year when secret police in Egypt and Bahrain were alleged to have obtained Finfisher, which he denies knowingly supplying to them.

    Intermediary: Bizcorp Management Pte Ltd, Singapore

    Comment: His spokesman declines to say what was the purpose of the group’s BVI entity.

    John Cunningham

    Company: Aurilla International

    Story: Military avionics software engineer from Hull with separate UK company, launches civilian venture in Indonesia

    Details: Cunningham set up a BVI entity in 2007. His small UK company, On-Target Software Solutions Ltd has worked on “black boxes” for BAE Hawk and Typhoon warplanes, and does foreign consultancy. He also has interests in Thailand in a drone helicopter control system.

    Intermediary: Allen & Bryans tax consultants, Singapore

    Comment: Cunningham says the offshore account was never activated. “I actually make systems for civilian small UAVs (unmanned aerial vehicles). I have never sold to the military. That account was set up by my ‘friend’ in Indonesia who does aerial mapping with small UAVs. He was going to pay me a commission through that account”.

    By David Leigh, Harold Frayman and James Ball November 28, 2012, 2:15 pm

    Find This story at 28 November 2012

    Copyright © 2012. The Center for Public Integrity®. All Rights Reserved. Read our privacy policy and the terms under which this service is provided to you.

    Offshore company directors’ links to military and intelligence revealed

    Companies making use of offshore secrecy include firm that supplied surveillance software used by repressive regimes

    Bahraini protesters flee teargas. Activists’ computers in the country were infected with Finfisher spying software. Photograph: Mohammed al-Shaikh/AFP/Getty Images

    A number of nominee directors of companies registered in the British Virgin Islands (BVI) have connections to military or intelligence activities, an investigation has revealed.

    In the past, the British arms giant BAE was the most notorious user of offshore secrecy. The Guardian in 2003 revealed the firm had set up a pair of covert BVI entities. The undeclared subsidiaries were used to distribute hundreds of millions of pounds in secret payments to get overseas arms contracts.

    Today the investigation by the International Consortium of Investigative Journalists (ICIJ) and the Guardian uncovers the identities of other offshore operators.

    Louthean Nelson owns the Gamma Group, a controversial computer surveillance firm employing ex-military personnel. It sells bugging technology to Middle East and south-east Asian governments. Nelson owns a BVI offshore arm, Gamma Group International Ltd.

    Gamma’s spyware, which can be used against dissidents, has turned up in the hands of Egyptian and Bahraini state security police, although Nelson’s representative claims this happened inadvertently. He initially denied to us that Nelson was linked to Gamma, and denied that Nelson owned the anonymous BVI affiliate. Martin Muench, who has a 15% share in the company’s German subsidiary, said he was the group’s sole press spokesman, and told us: “Louthean Nelson is not associated with any company by the name of Gamma Group International Ltd. If by chance you are referring to any other Gamma company, then the explanation is the same for each and every one of them.”

    After he was confronted with evidence obtained by the Guardian/ICIJ investigation, Muench changed his position. He told us: “You are absolutely right, apparently there is a Gamma Group International Ltd. So in effect I was wrong – sorry. However I did not say that Louthean Nelson was not associated with any Gamma company, only the one that I thought did not exist.”

    Nelson set up his BVI offshoot in 2007, using an agency, BizCorp Management Pte, located in Singapore. His spokesman claimed the BVI company was not involved in sales of Gamma’s Finfisher spyware. But he refused to disclose the entity’s purpose.

    Earlier this year, computer researchers in California told the New York Times they had discovered Finfisher being run from servers in Singapore, Indonesia, Brunei, Mongolia and a government ministry in Turkmenistan. The spying software was previously proved to have infected the computers of political activists in Bahrain, which Nelson visited in June 2006.

    The Finfisher programme is marketed as a technique for so-called “IT intrusion”. The code disguises itself as a software update or an email attachment, which the target victim is unaware will transmit back all his or her transactions and keystrokes. Gamma calls itself “a government contractor to state intelligence and law enforcement agencies for … high-quality surveillance vans” and telephone tapping of all kinds.

    Activists’ investigations into Finfisher began in March 2011, after protesters who broke into Egypt’s state security headquarters discovered documents showing the bugging system was being marketed to the then president Hosni Mubarak’s regime, at a price of $353,000.

    Muench said demonstration copies of the software must have been stolen. He refused to identify Gamma’s customers.

    Nelson’s father, Bill Nelson, is described as the CEO of the UK Gamma, which sells a range of covert surveillance equipment from a modern industrial estate outside Andover, Hampshire, near the family home in the village of Winterbourne Earls, Wiltshire.

    In September, the German foreign minister, Guido Westerwelle, called for an EU-wide ban on the export of such surveillance software to totalitarian states. “These regimes should not get the technical instruments to spy on their own citizens,” he said. The UK has now agreed that future Finfisher exports from Andover to questionable regimes will need government permission.

    Other types of anonymous offshore user we have identified in this area include a south London private detective, Gerry Moore, who operated Swiss bank accounts. He did not respond to invitations to comment.

    Another private intelligence agency, Ciex, was used as a postbox by the financier Julian Askin to set up a covert entity registered in the Cook Islands, called Pastech. He too did not respond to invitations to comment.

    An ex-CIA officer and a South African mercenary soldier, John Walbridge and Mauritz Le Roux, used London agents to set up a series of BVI-registered companies in 2005, after obtaining bodyguarding contracts in Iraq and Afghanistan. Le Roux told us one of his reasons was to accommodate “local partnerships” in foreign countries. Walbridge did not respond.

    A former BAE software engineer from Hull, John Cunningham, says he set up his own offshore BVI company in the hope of selling helicopter drones for purely civilian use. Now based in Thailand, he previously designed military avionics for Britain’s Hawk and Typhoon war planes. He told us: “That account was set up by my ‘friend’ in Indonesia who does aerial mapping with small UAVs [unmanned aerial vehicles]. He was going to pay me a commission through that account … However, this was my first attempt to work in Asia and as I have found, money tends to be not forthcoming. I have never used that account.”

    The military and intelligence register
    Gerry Moore

    Company: GM Property Developments, LHM Property Holdings Story: south London private detective sets up BVI companies with Swiss bank accounts Details: Moore founded “Thames Investigation Services”, later “Thames Associates”, in Blackheath, south London. He opened a Swiss bank account with UBS Basel in 1998. In 2007, he sought to open another account with Credit Suisse, Zurich, for his newly registered BVI entity GM Property Developments. He sought to register a second offshore company, LHM Property Holdings, using his wife Linda’s initials.

    Intermediary: Netincorp. BVI (Damien Fong)

    Comment: No response. Thames Associates website taken down after Guardian approaches.

    John Walbridge and Mauritz le Roux

    Companies: Overseas Security & Strategic Information Ltd, Remington Resources (Walbridge), Safenet UXO, Sparenberg, Gladeaway, Maplethorpe, Hawksbourne (Le Roux)

    Story: former CIA officer and South African ex-mercenary provide guards in Iraq and Afghanistan Details: John H Walbridge Jr says he served with US special forces in Vietnam and then with the CIA in Brazil. His Miami-based private military company OSSI Inc teamed up with the South African ex-soldier and Executive Outcomes mercenary Mauritz le Roux to win contracts in Kabul in 2005. Walbridge set up his two BVI entities with his wife, Cassandra, via a London agency in June and August 2005, and Le Roux incorporated five parallel BVI companies.

    Intermediary: Alpha Offshore, London Comment: Le Roux told us some of his offshore entities were kept available “in case we need to start up operations in a country where we would need to have local partnerships”. His joint venture with OSSI was based offshore in Dubai, he said, but used BVI entities “to operate within a legal framework under British law, rather than the legal framework of the UAE”. Walbridge did not respond to invitations to comment.

    Julian Askin

    Company: Pastech Story: exiled businessman used a private intelligence agency to set up covert offshore entity in the Cook Islands Details: Askin was a British football pools entrepreneur. He alleged Afrikaner conspiracies against him in South Africa, when his Tollgate transport group there collapsed. The apartheid regime failed to have him extradited, alleging fraud. He hired the Ciex agency to report on ABSA, the South African bank which foreclosed on him. Ciex was founded by the ex-MI6 senior officer Michael Oatley along with ex-MI6 officer Hamilton Macmillan. In May 2000, they were used to help set up Pastech for their client in the obscure Pacific offshore location of Rarotonga, in the Cook Islands, with anonymous nominee directors and shareholders. Askin now lives in Semer, Suffolk.

    Intermediary: Ciex, Buckingham Gate, London Comment: he did not respond to invitations to comment.

    Louthean Nelson

    Company: Gamma Group International Story: Gamma sells Finfisher around the world, spying software which infects a target’s computer.

    Details: Nelson set up a UK company in 2007 on an Andover industrial estate to make and sell Finfisher – a so-called Trojan which can remotely spy on a victim’s computer by pretending to be a routine software update. He set up a parallel, more covert company with a similar name, registered in the BVI, via an agency in Singapore, using his father’s address at Winterbourne Earls, near Andover. He also sells to the Middle East via premises in Beirut. He ran into controversy last year when secret police in Egypt and Bahrain were alleged to have obtained Finfisher, which he denies knowingly supplying to them.

    Intermediary: Bizcorp Management Pte Ltd, Singapore Comment: his spokesman declines to say what was the purpose of the group’s BVI entity.

    John Cunningham

    Company: Aurilla International Story: military avionics software engineer from Hull with separate UK company launches civilian venture in Indonesia Details: Cunningham set up a BVI entity in 2007. His small UK company, On-Target Software Solutions Ltd, has worked on “black boxes” for BAE Hawk and Typhoon war planes, and does foreign consultancy. He also has interests in Thailand in a drone helicopter control system.

    David Leigh
    The Guardian, Wednesday 28 November 2012 19.35 GMT

    Find this story at 28 November 2012

    © 2012 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    ‘Unacceptable force’ used by G4S staff deporting pregnant woman

    Disclosure in first report of prisons inspector on UK Border Agency’s ‘family-friendly’ Cedars unit near Gatwick

    G4S staff manage security and the facilities at Cedars, the UK Border Agency’s holding centre near Gatwick for families facing deportation. Photograph: David Jones/PA

    A pregnant woman in a wheelchair was tipped up and had her feet held by staff from G4S, the firm behind the Olympics security shambles, as she was forcibly removed from the country. The disclosure comes in the first report into conditions at a new centre designed to hold families facing deportation from the UK.

    Nick Hardwick, the chief inspector of prisons, and his team made an unannounced inspection of Cedars, the UK Border Agency’s new pre-departure accommodation near Gatwick, where families are housed for the final 72 hours before they are removed from the UK.

    Nick Clegg promised in the Liberal Democrats’ 2010 manifesto that he would put an end to the detention of children. Replacing the controversial Yarl’s Wood detention centre with Cedars was at the heart of the coalition’s family-friendly removal policy.

    Hardwick said the unit is “an exceptional facility [which] has many practices which should be replicated in other areas of detention.”

    “It is to the considerable credit of staff at Cedars that children held were, in general, happily occupied and that parents were able to concentrate on communication with solicitors, family and friends,” he added.

    But inspectors also said unacceptable force was used when a pregnant woman was given a wheelchair in the departures area. When she resisted “substantial force” was used by G4S staff and the wheelchair “was tipped up with staff holding her feet”.

    “At one point she slipped down from the chair and the risk of injury to the unborn child was significant,” the report said. “There is no safe way to use force against a pregnant woman, and to initiate it for the purpose of removal is to take an unacceptable risk.”

    Inspectors also reported that although most work from family escort staff was commendable, they “observed unprofessional behaviour by an officer on a different escort in the hearing of children”.

    The report also said that although “considerable efforts were made to avoid force at the point of removal, it had been used against six of the 39 families going through Cedars”.

    Judith Dennis, policy officer at the Refugee Council, said: “The numbers of children in detention are increasing. The government acknowledged then how harmful this practice is for children, so why are they still continuing to do it?

    Amelia Hill
    The Guardian, Tuesday 23 October 2012

    Find this story at 23 October 2012
    © 2012 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Is CIA Lying About its Blackwater Contacts?

    After CIA director Leon Panetta revealed last summer that private contractor Blackwater was part of a covert CIA hit squad, tasked with summary killings and assassinations of al-Qaeda operatives, the CIA vowed to sever its contacts with the trigger-happy security firm. But did it do so? It doesn’t look like it. Last November, it became known that the company, (recently renamed Xe Services) remains part of a covert CIA program in Pakistan that includes planned assassinations and kidnappings of Taliban and al-Qaeda suspects. More recently, it was revealed that two of the seven Americans who died in the December 30 bomb attack at Forward Operating Base Chapman in Khost, Afghanistan, were actually Blackwater employees subcontracted by the CIA.

    The question is, why were these two Blackwater employees present during a sensitive security debriefing at the base, involving the entire leadership of the CIA team there, and even the Agency’s second-in-command in Afghanistan? As Nation magazine’s Jeremy Scahill correctly points out, “the fact that two Blackwater personnel were in such close proximity to the […] suicide bomber shows how deeply enmeshed Blackwater remains in sensitive CIA operations, including those CIA officials claim it no longer participates in, such as intelligence gathering and briefings with valuable agency assets”.

    January 8, 2010 by intelNews 11 Comments

    By JOSEPH FITSANAKIS | intelNews.org |

    Find this story at 8 Januari 2010 

    Tycoon, Contractor, Soldier, Spy

    Erik Prince, recently outed as a participant in a C.I.A. assassination program, has gained notoriety as head of the military-contracting juggernaut Blackwater, a company dogged by a grand-jury investigation, bribery accusations, and the voluntary-manslaughter trial of five ex-employees, set for next month. Lashing back at his critics, the wealthy former navy seal takes the author inside his operation in the U.S. and Afghanistan, revealing the role he’s been playing in America’s war on terror.

    Erik Prince, founder of the Blackwater security firm (recently renamed Xe), at the company’s Virginia offices. Photograph by Nigel Parry.

    I put myself and my company at the C.I.A.’s disposal for some very risky missions,” says Erik Prince as he surveys his heavily fortified, 7,000-acre compound in rural Moyock, North Carolina. “But when it became politically expedient to do so, someone threw me under the bus.” Prince—the founder of Blackwater, the world’s most notorious private military contractor—is royally steamed. He wants to vent. And he wants you to hear him vent.

    Erik Prince has an image problem—the kind that’s impervious to a Madison Avenue makeover. The 40-year-old heir to a Michigan auto-parts fortune, and a former navy seal, he has had the distinction of being vilified recently both in life and in art. In Washington, Prince has become a scapegoat for some of the Bush administration’s misadventures in Iraq—though Blackwater’s own deeds have also come in for withering criticism. Congressmen and lawyers, human-rights groups and pundits, have described Prince as a war profiteer, one who has assembled a rogue fighting force capable of toppling governments. His employees have been repeatedly accused of using excessive, even deadly force in Iraq; many Iraqis, in fact, have died during encounters with Blackwater. And in November, as a North Carolina grand jury was considering a raft of charges against the company, as a half-dozen civil suits were brewing in Virginia, and as five former Blackwater staffers were preparing for trial for their roles in the deaths of 17 Iraqis, The New York Times reported in a page-one story that Prince’s firm, in the aftermath of the tragedy, had sought to bribe Iraqi officials for their compliance, charges which Prince calls “lies … undocumented, unsubstantiated [and] anonymous.” (So infamous is the Blackwater brand that even the Taliban have floated far-fetched conspiracy theories, accusing the company of engaging in suicide bombings in Pakistan.)

    In Hollywood, meanwhile, a town that loves nothing so much as a good villain, Prince, with his blond crop and Daniel Craig mien, has become the screenwriters’ darling. In the film State of Play, a Blackwater clone (PointCorp.) uses its network of mercenaries for illegal surveillance and murder. On the Fox series 24, Jon Voight has played Jonas Hodges, a thinly veiled version of Prince, whose company (Starkwood) helps an African warlord procure nerve gas for use against U.S. targets.

    But the truth about Prince may be orders of magnitude stranger than fiction. For the past six years, he appears to have led an astonishing double life. Publicly, he has served as Blackwater’s C.E.O. and chairman. Privately, and secretly, he has been doing the C.I.A.’s bidding, helping to craft, fund, and execute operations ranging from inserting personnel into “denied areas”—places U.S. intelligence has trouble penetrating—to assembling hit teams targeting al-Qaeda members and their allies. Prince, according to sources with knowledge of his activities, has been working as a C.I.A. asset: in a word, as a spy. While his company was busy gleaning more than $1.5 billion in government contracts between 2001 and 2009—by acting, among other things, as an overseas Praetorian guard for C.I.A. and State Department officials—Prince became a Mr. Fix-It in the war on terror. His access to paramilitary forces, weapons, and aircraft, and his indefatigable ambition—the very attributes that have galvanized his critics—also made him extremely valuable, some say, to U.S. intelligence. (Full disclosure: In the 1990s, before becoming a journalist for CBS and then NBC News, I was a C.I.A. attorney. My contract was not renewed, under contentious circumstances.)

    But Prince, with a new administration in power, and foes closing in, is finally coming in from the cold. This past fall, though he infrequently grants interviews, he decided it was time to tell his side of the story—to respond to the array of accusations, to reveal exactly what he has been doing in the shadows of the U.S. government, and to present his rationale. He also hoped to convey why he’s going to walk away from it all.

    To that end, he invited Vanity Fair to his training camp in North Carolina, to his Virginia offices, and to his Afghan outposts. It seemed like a propitious time to tag along.
    Split Personality

    Erik Prince can be a difficult man to wrap your mind around—an amalgam of contradictory caricatures. He has been branded a “Christian supremacist” who sanctions the murder of Iraqi civilians, yet he has built mosques at his overseas bases and supports a Muslim orphanage in Afghanistan. He and his family have long backed conservative causes, funded right-wing political candidates, and befriended evangelicals, but he calls himself a libertarian and is a practicing Roman Catholic. Sometimes considered arrogant and reclusive—Howard Hughes without the O.C.D.—he nonetheless enters competitions that combine mountain-biking, beach running, ocean kayaking, and rappelling.

    The common denominator is a relentless intensity that seems to have no Off switch. Seated in the back of a Boeing 777 en route to Afghanistan, Prince leafs through Defense News while the film Taken beams from the in-flight entertainment system. In the movie, Liam Neeson plays a retired C.I.A. officer who mounts an aggressive rescue effort after his daughter is kidnapped in Paris. Neeson’s character warns his daughter’s captors:

    If you are looking for ransom, I can tell you I don’t have money. But what I do have are a very particular set of skills … skills that make me a nightmare for people like you. If you [don’t] let my daughter go now … I will look for you, I will find you, and I will kill you.

    Prince comments, “I used that movie as a teaching tool for my girls.” (The father of seven, Prince remarried after his first wife died of cancer in 2003.) “I wanted them to understand the dangers out there. And I wanted them to know how I would respond.”

    You can’t escape the impression that Prince sees himself as somehow destined, his mission anointed. It comes out even in the most personal of stories. During the flight, he tells of being in Kabul in September 2008 and receiving a two a.m. call from his wife, Joanna. Prince’s son Charlie, one year old at the time, had fallen into the family swimming pool. Charlie’s brother Christian, then 12, pulled him out of the water, purple and motionless, and successfully performed CPR. Christian and three siblings, it turns out, had recently received Red Cross certification at the Blackwater training camp.

    But there are intimations of a higher power at work as the story continues. Desperate to get home, Prince scrapped one itinerary, which called for a stay-over at the Marriott in Islamabad, and found a direct flight. That night, at the time Prince would have been checking in, terrorists struck the hotel with a truck bomb, killing more than 50. Prince says simply, “Christian saved Charlie’s life and Charlie saved mine.” At times, his sense of his own place in history can border on the evangelical. When pressed about suggestions that he’s a mercenary—a term he loathes—he rattles off the names of other freelance military figures, even citing Lafayette, the colonists’ ally during the Revolutionary War.

    Prince’s default mode is one of readiness. He is clenched-jawed and tightly wound. He cannot stand down. Waiting in the security line at Dulles airport just hours before, Prince had delivered a little homily: “Every time an American goes through security, I want them to pause for a moment and think, What is my government doing to inconvenience the terrorists? Rendition teams, Predator drones, assassination squads. That’s all part of it.”

    Such brazenness is not lost on a listener, nor is the fact that Prince himself is quite familiar with some of these tactics. In fact Prince, like other contractors, has drawn fire for running a company that some call a “body shop”—many of its staffers having departed military or intelligence posts to take similar jobs at much higher salaries, paid mainly by Uncle Sam. And to get those jobs done—protecting, defending, and killing, if required—Prince has had to employ the services of some decorated vets as well as some ruthless types, snipers and spies among them.

    Erik Prince flies coach internationally. It’s not just economical (“Why should I pay for business? Fly coach, you arrive at the same time”) but also less likely to draw undue attention. He considers himself a marked man. Prince describes the diplomats and dignitaries Blackwater protects as “Al Jazeera–worthy,” meaning that, in his view, “bin Laden and his acolytes would love to kill them in a spectacular fashion and have it broadcast on televisions worldwide.”

    Stepping off the plane at Kabul’s international airport, Prince is treated as if he, too, were Al Jazeera–worthy. He is immediately shuffled into a waiting car and driven 50 yards to a second vehicle, a beat-up minivan that is native to the core: animal pelts on the dashboard, prayer card dangling from the rearview mirror. Blackwater’s special-projects team is responsible for Prince’s security in-country, and except for their language its men appear indistinguishable from Afghans. They have full beards, headscarves, and traditional knee-length shirts over baggy trousers. They remove Prince’s sunglasses, fit him out with body armor, and have him change into Afghan garb. Prince is issued a homing beacon that will track his movements, and a cell phone with its speed dial programmed for Blackwater’s tactical-operations center.

    Prince in the tactical-operations center at a company base in Kabul. Photograph by Adam Ferguson.

    Once in the van, Prince’s team gives him a security briefing. Using satellite photos of the area, they review the route to Blackwater’s compound and point out where weapons and ammunition are stored inside the vehicle. The men warn him that in the event that they are incapacitated or killed in an ambush Prince should assume control of the weapons and push the red button near the emergency brake, which will send out a silent alarm and call in reinforcements.
    Black Hawks and Zeppelins

    Blackwater’s origins were humble, bordering on the primordial. The company took form in the dismal peat bogs of Moyock, North Carolina—not exactly a hotbed of the defense-contracting world.

    In 1995, Prince’s father, Edgar, died of a heart attack (the Evangelical James C. Dobson, founder of the socially conservative Focus on the Family, delivered the eulogy at the funeral). Edgar Prince left behind a vibrant auto-parts manufacturing business in Holland, Michigan, with 4,500 employees and a line of products ranging from a lighted sun visor to a programmable garage-door opener. At the time, 25-year-old Erik was serving as a navy seal (he saw service in Haiti, the Middle East, and Bosnia), and neither he nor his sisters were in a position to take over the business. They sold Prince Automotive for $1.35 billion.

    Erik Prince and some of his navy friends, it so happens, had been kicking around the idea of opening a full-service training compound to replace the usual patchwork of such facilities. In 1996, Prince took an honorable discharge and began buying up land in North Carolina. “The idea was not to be a defense contractor per se,” Prince says, touring the grounds of what looks and feels like a Disneyland for alpha males. “I just wanted a first-rate training facility for law enforcement, the military, and, in particular, the special-operations community.”

    Business was slow. The navy seals came early—January 1998—but they didn’t come often, and by the time the Blackwater Lodge and Training Center officially opened, that May, Prince’s friends and advisers thought he was throwing good money after bad. “A lot of people said, ‘This is a rich kid’s hunting lodge,’” Prince explains. “They could not figure out what I was doing.”

    Blackwater outpost near the Pakistan border, used for training Afghan police. Photograph by Adam Ferguson.

    Today, the site is the flagship for a network of facilities that train some 30,000 attendees a year. Prince, who owns an unmanned, zeppelin-esque airship and spent $45 million to build a fleet of customized, bomb-proof armored personnel carriers, often commutes to the lodge by air, piloting a Cessna Caravan from his home in Virginia. The training center has a private landing strip. Its hangars shelter a petting zoo of aircraft: Bell 412 helicopters (used to tail or shuttle diplomats in Iraq), Black Hawk helicopters (currently being modified to accommodate the security requests of a Gulf State client), a Dash 8 airplane (the type that ferries troops in Afghanistan). Amid the 52 firing ranges are virtual villages designed for addressing every conceivable real-world threat: small town squares, littered with blown-up cars, are situated near railway crossings and maritime mock-ups. At one junction, swat teams fire handguns, sniper rifles, and shotguns; at another, police officers tear around the world’s longest tactical-driving track, dodging simulated roadside bombs.

    In keeping with the company’s original name, the central complex, constructed of stone, glass, concrete, and logs, actually resembles a lodge, an REI store on steroids. Here and there are distinctive touches, such as door handles crafted from imitation gun barrels. Where other companies might have Us Weekly lying about the lobby, Blackwater has counterterror magazines with cover stories such as “How to Destroy Al Qaeda.”

    In fact, it was al-Qaeda that put Blackwater on the map. In the aftermath of the group’s October 2000 bombing of the U.S.S. Cole, in Yemen, the navy turned to Prince, among others, for help in re-training its sailors to fend off attackers at close range. (To date, the company says, it has put some 125,000 navy personnel through its programs.) In addition to providing a cash infusion, the navy contract helped Blackwater build a database of retired military men—many of them special-forces veterans—who could be called upon to serve as instructors.

    When al-Qaeda attacked the U.S. mainland on 9/11, Prince says, he was struck with the urge to either re-enlist or join the C.I.A. He says he actually applied. “I was rejected,” he admits, grinning at the irony of courting the very agency that would later woo him. “They said I didn’t have enough hard skills, enough time in the field.” Undeterred, he decided to turn his Rolodex into a roll call for what would in essence become a private army.

    After the terror attacks, Prince’s company toiled, even reveled, in relative obscurity, taking on assignments in Afghanistan and, after the U.S. invasion, in Iraq. Then came March 31, 2004. That was the day insurgents ambushed four of its employees in the Iraqi town of Fallujah. The men were shot, their bodies set on fire by a mob. The charred, hacked-up remains of two of them were left hanging from a bridge over the Euphrates.

    “It was absolutely gut-wrenching,” Prince recalls. “I had been in the military, and no one under my command had ever died. At Blackwater, we had never even had a firearms training accident. Now all of a sudden four of my guys aren’t just killed, but desecrated.” Three months later an edict from coalition authorities in Baghdad declared private contractors immune from Iraqi law.

    Subsequently, the contractors’ families sued Blackwater, contending the company had failed to protect their loved ones. Blackwater countersued the families for breaching contracts that forbid the men or their estates from filing such lawsuits; the company also claimed that, because it operates as an extension of the military, it cannot be held responsible for deaths in a war zone. (After five years, the case remains unresolved.) In 2007, a congressional investigation into the incident concluded that the employees had been sent into an insurgent stronghold “without sufficient preparation, resources, and support.” Blackwater called the report a “one-sided” version of a “tragic incident.”

    After Fallujah, Blackwater became a household name. Its primary mission in Iraq had been to protect American dignitaries, and it did so, in part, by projecting an image of invincibility, sending heavily armed men in armored Suburbans racing through the streets of Baghdad with sirens blaring. The show of swagger and firepower, which alienated both the locals and the U.S. military, helped contribute to the allegations of excessive force. As the war dragged on, charges against the firm mounted. In one case, a contractor shot and killed an Iraqi father of six who was standing along the roadside in Hillah. (Prince later told Congress that the contractor was fired for trying to cover up the incident.) In another, a Blackwater firearms technician was accused of drinking too much at a party in the Green Zone and killing a bodyguard assigned to protect Iraq’s vice president. The technician was fired but not prosecuted and later settled a wrongful-death suit with the man’s family.

    Those episodes, however, paled in comparison with the events of September 16, 2007, when a phalanx of Blackwater bodyguards emerged from their four-car convoy at a Baghdad intersection called Nisour Square and opened fire. When the smoke cleared, 17 Iraqi civilians lay dead. After 15 months of investigation, the Justice Department charged six with voluntary manslaughter and other offenses, insisting that the use of force was not only unjustified but unprovoked. One guard pleaded guilty and, in a trial set for February, is expected to testify against the others, all of whom maintain their innocence. The New York Times recently reported that in the wake of the shootings the company’s top executives authorized secret payments of about $1 million to Iraqi higher-ups in order to buy their silence—a claim Prince dismisses as “false,” insisting “[there was] zero plan or discussion of bribing any officials.”

    Nisour Square had disastrous repercussions for Blackwater. Its role in Iraq was curtailed, its revenue dropping 40 percent. Today, Prince claims, he is shelling out $2 million a month in legal fees to cope with a spate of civil lawsuits as well as what he calls a “giant proctological exam” by nearly a dozen federal agencies. “We used to spend money on R&D to develop better capabilities to serve the U.S. government,” says Prince. “Now we pay lawyers.”

    Does he ever. In North Carolina, a federal grand jury is investigating various allegations, including the illegal transport of assault weapons and silencers to Iraq, hidden in dog-food sacks. (Blackwater denied this, but confirmed hiding weapons on pallets of dog food to protect against theft by “corrupt foreign customs agents.”) In Virginia, two ex-employees have filed affidavits claiming that Prince and Blackwater may have murdered or ordered the murder of people suspected of cooperating with U.S. authorities investigating the company—charges which Blackwater has characterized as “scandalous and baseless.” One of the men also asserted in filings that company employees ran a sex and wife-swapping ring, allegations which Blackwater has called “anonymous, unsubstantiated and offensive.”

    Meanwhile, last February, Prince mounted an expensive rebranding campaign. Following the infamous ValuJet crash, in 1996, ValuJet disappeared into AirTran, after a merger, and moved on to a happy new life. Prince, likewise, decided to retire the Blackwater name and replace it with the name Xe, short for Xenon—an inert, non-combustible gas that, in keeping with his political leanings, sits on the far right of the periodic table. Still, Prince and other top company officials continued to use the name Blackwater among themselves. And as events would soon prove, the company’s reputation would remain as combustible as ever.

    Prince at a Kandahar airfield. Photograph Adam Ferguson.

    Spies and Whispers

    Last June, C.I.A. director Leon Panetta met in a closed session with the House and Senate intelligence committees to brief them on a covert-action program, which the agency had long concealed from Congress. Panetta explained that he had learned of the existence of the operation only the day before and had promptly shut it down. The reason, C.I.A. spokesman Paul Gimigliano now explains: “It hadn’t taken any terrorists off the street.” During the meeting, according to two attendees, Panetta named both Erik Prince and Blackwater as key participants in the program. (When asked to verify this account, Gimigliano notes that “Director Panetta treats as confidential discussions with Congress that take place behind closed doors.”) Soon thereafter, Prince says, he began fielding inquisitive calls from people he characterizes as far outside the circle of trust.

    It took three weeks for details, however sketchy, to surface. In July, The Wall Street Journal described the program as “an attempt to carry out a 2001 presidential authorization to capture or kill al Qaeda operatives.” The agency reportedly planned to accomplish this task by dispatching small hit teams overseas. Lawmakers, who couldn’t exactly quibble with the mission’s objective, were in high dudgeon over having been kept in the dark. (Former C.I.A. officials reportedly saw the matter differently, characterizing the program as “more aspirational than operational” and implying that it had never progressed far enough to justify briefing the Hill.)

    On August 20, the gloves came off. The New York Times published a story headlined cia sought blackwater’s help to kill jihadists. The Washington Post concurred: cia hired firm for assassin program. Prince confesses to feeling betrayed. “I don’t understand how a program this sensitive leaks,” he says. “And to ‘out’ me on top of it?” The next day, the Times went further, revealing Blackwater’s role in the use of aerial drones to kill al-Qaeda and Taliban leaders: “At hidden bases in Pakistan and Afghanistan … the company’s contractors assemble and load Hellfire missiles and 500-pound laser-guided bombs on remotely piloted Predator aircraft, work previously performed by employees of the Central Intelligence Agency.”

    E
    rik Prince, almost overnight, had undergone a second rebranding of sorts, this one not of his own making. The war profiteer had become a merchant of death, with a license to kill on the ground and in the air. “I’m an easy target,” he says. “I’m from a Republican family and I own this company outright. Our competitors have nameless, faceless management teams.”

    Prince blames Democrats in Congress for the leaks and maintains that there is a double standard at play. “The left complained about how [C.I.A. operative] Valerie Plame’s identity was compromised for political reasons. A special prosecutor [was even] appointed. Well, what happened to me was worse. People acting for political reasons disclosed not only the existence of a very sensitive program but my name along with it.” As in the Plame case, though, the leaks prompted C.I.A. attorneys to send a referral to the Justice Department, requesting that a criminal investigation be undertaken to identify those responsible for providing highly classified information to the media.

    By focusing so intently on Blackwater, Congress and the press overlooked the elephant in the room. Prince wasn’t merely a contractor; he was, insiders say, a full-blown asset. Three sources with direct knowledge of the relationship say that the C.I.A.’s National Resources Division recruited Prince in 2004 to join a secret network of American citizens with special skills or unusual access to targets of interest. As assets go, Prince would have been quite a catch. He had more cash, transport, matériel, and personnel at his disposal than almost anyone Langley would have run in its 62-year history.

    The C.I.A. won’t comment further on such assertions, but Prince himself is slightly more forthcoming. “I was looking at creating a small, focused capability,” he says, “just like Donovan did years ago”—the reference being to William “Wild Bill” Donovan, who, in World War II, served as the head of the Office of Strategic Services, the precursor of the modern C.I.A. (Prince’s youngest son, Charles Donovan—the one who fell into the pool—is named after Wild Bill.) Two sources familiar with the arrangement say that Prince’s handlers obtained provisional operational approval from senior management to recruit Prince and later generated a “201 file,” which would have put him on the agency’s books as a vetted asset. It’s not at all clear who was running whom, since Prince says that, unlike many other assets, he did much of his work on spec, claiming to have used personal funds to road-test the viability of certain operations. “I grew up around the auto industry,” Prince explains. “Customers would say to my dad, ‘We have this need.’ He would then use his own money to create prototypes to fulfill those needs. He took the ‘If you build it, they will come’ approach.”

    According to two sources familiar with his work, Prince was developing unconventional means of penetrating “hard target” countries—where the C.I.A. has great difficulty working either because there are no stations from which to operate or because local intelligence services have the wherewithal to frustrate the agency’s designs. “I made no money whatsoever off this work,” Prince contends. He is unwilling to specify the exact nature of his forays. “I’m painted as this war profiteer by Congress. Meanwhile I’m paying for all sorts of intelligence activities to support American national security, out of my own pocket.” (His pocket is deep: according to The Wall Street Journal, Blackwater had revenues of more than $600 million in 2008.)

    Clutch Cargo

    The Afghan countryside, from a speeding perch at 200 knots, whizzes by in a khaki haze. The terrain is rendered all the more nondescript by the fact that Erik Prince is riding less than 200 feet above it. The back of the airplane, a small, Spanish-built eads casa C-212, is open, revealing Prince in silhouette against a blue sky. Wearing Oakleys, tactical pants, and a white polo shirt, he looks strikingly boyish.

    A Blackwater aircraft en route to drop supplies to U.S. Special Forces in Afghanistan in September. Photograph by Adam Ferguson.

    As the crew chief initiates a countdown sequence, Prince adjusts his harness and moves into position. When the “go” order comes, a young G.I. beside him cuts a tether, and Prince pushes a pallet out the tail chute. Black parachutes deploy and the aircraft lunges forward from the sudden weight differential. The cargo—provisions and munitions—drops inside the perimeter of a forward operating base (fob) belonging to an elite Special Forces squad.

    Five days a week, Blackwater’s aviation arm—with its unabashedly 60s-spook name, Presidential Airways—flies low-altitude sorties to some of the most remote outposts in Afghanistan. Since 2006, Prince’s company has been conscripted to offer this “turnkey” service for U.S. troops, flying thousands of delivery runs. Blackwater also provides security for U.S. ambassador Karl Eikenberry and his staff, and trains narcotics and Afghan special police units.

    Once back on terra firma, Prince, a BlackBerry on one hip and a 9-mm. on the other, does a sweep around one of Blackwater’s bases in northeast Afghanistan, pointing out buildings recently hit by mortar fire. As a drone circles overhead, its camera presumably trained on the surroundings, Prince climbs a guard tower and peers down at a spot where two of his contractors were nearly killed last July by an improvised explosive device. “Not counting civilian checkpoints,” he says, “this is the closest base to the [Pakistani] border.” His voice takes on a melodramatic solemnity. “Who else has built a fob along the main infiltration route for the Taliban and the last known location for Osama bin Laden?” It doesn’t quite have the ring of Lawrence of Arabia’s “To Aqaba!,” but you get the picture.
    Going “Low-Pro”

    Blackwater has been in Afghanistan since 2002. At the time, the C.I.A.’s executive director, A. B. “Buzzy” Krongard, responding to his operatives’ complaints of being “worried sick about the Afghans’ coming over the fence or opening the doors,” enlisted the company to offer protection for the agency’s Kabul station. Going “low-pro,” or low-profile, paid off: not a single C.I.A. employee, according to sources close to the company, died in Afghanistan while under Blackwater’s protection. (Talk about a tight-knit bunch. Krongard would later serve as an unpaid adviser to Blackwater’s board, until 2007. And his brother Howard “Cookie” Krongard—the State Department’s inspector general—had to recuse himself from Blackwater-related oversight matters after his brother’s involvement with the company surfaced. Buzzy, in response, stepped down.)

    As the agency’s confidence in Blackwater grew, so did the company’s responsibilities, expanding from static protection to mobile security—shadowing agency personnel, ever wary of suicide bombers, ambushes, and roadside devices, as they moved about the country. By 2005, Blackwater, accustomed to guarding C.I.A. personnel, was starting to look a little bit like the C.I.A. itself. Enrique “Ric” Prado joined Blackwater after serving as chief of operations for the agency’s Counterterrorism Center (CTC). A short time later, Prado’s boss, J. Cofer Black, the head of the CTC, moved over to Blackwater, too. He was followed, in turn, by his superior, Rob Richer, second-in-command of the C.I.A.’s clandestine service. Of the three, Cofer Black had the outsize reputation. As Bob Woodward recounted in his book Bush at War, on September 13, 2001, Black had promised President Bush that when the C.I.A. was through with al-Qaeda “they will have flies walking across their eyeballs.” According to Woodward, “Black became known in Bush’s inner circle as the ‘flies-on-the-eyeballs guy.’” Richer and Black soon helped start a new company, Total Intelligence Solutions (which collects data to help businesses assess risks overseas), but in 2008 both men left Blackwater, as did company president Gary Jackson this year.

    Prince in his Virginia office. His company took in more than $1 billion from government contracts during the George W. Bush era. Photograph by Nigel Parry.

    Off and on, Black and Richer’s onetime partner Ric Prado, first with the C.I.A., then as a Blackwater employee, worked quietly with Prince as his vice president of “special programs” to provide the agency with what every intelligence service wants: plausible deniability. Shortly after 9/11, President Bush had issued a “lethal finding,” giving the C.I.A. the go-ahead to kill or capture al-Qaeda members. (Under an executive order issued by President Gerald Ford, it had been illegal since 1976 for U.S. intelligence operatives to conduct assassinations.) As a seasoned case officer, Prado helped implement the order by putting together a small team of “blue-badgers,” as government agents are known. Their job was threefold: find, fix, and finish. Find the designated target, fix the person’s routine, and, if necessary, finish him off. When the time came to train the hit squad, the agency, insiders say, turned to Prince. Wary of attracting undue attention, the team practiced not at the company’s North Carolina compound but at Prince’s own domain, an hour outside Washington, D.C. The property looks like an outpost of the landed gentry, with pastures and horses, but also features less traditional accents, such as an indoor firing range. Once again, Prince has Wild Bill on his mind, observing that “the O.S.S. trained during World War II on a country estate.”

    Among the team’s targets, according to a source familiar with the program, was Mamoun Darkazanli, an al-Qaeda financier living in Hamburg who had been on the agency’s radar for years because of his ties to three of the 9/11 hijackers and to operatives convicted of the 1998 bombings of U.S. Embassies in East Africa. The C.I.A. team supposedly went in “dark,” meaning they did not notify their own station—much less the German government—of their presence; they then followed Darkazanli for weeks and worked through the logistics of how and where they would take him down. Another target, the source says, was A. Q. Khan, the rogue Pakistani scientist who shared nuclear know-how with Iran, Libya, and North Korea. The C.I.A. team supposedly tracked him in Dubai. In both cases, the source insists, the authorities in Washington chose not to pull the trigger. Khan’s inclusion on the target list, however, would suggest that the assassination effort was broader than has previously been acknowledged. (Says agency spokesman Gimigliano, “[The] C.I.A. hasn’t discussed—despite some mischaracterizations that have appeared in the public domain—the substance of this effort or earlier ones.”)

    The source familiar with the Darkazanli and Khan missions bristles at public comments that current and former C.I.A. officials have made: “They say the program didn’t move forward because [they] didn’t have the right skill set or because of inadequate cover. That’s untrue. [The operation continued] for a very long time in some places without ever being discovered. This program died because of a lack of political will.”

    W
    hen Prado left the C.I.A., in 2004, he effectively took the program with him, after a short hiatus. By that point, according to sources familiar with the plan, Prince was already an agency asset, and the pair had begun working to privatize matters by changing the team’s composition from blue-badgers to a combination of “green-badgers” (C.I.A. contractors) and third-country nationals (unaware of the C.I.A. connection). Blackwater officials insist that company resources and manpower were never directly utilized—these were supposedly off-the-books initiatives done on Prince’s own dime, for which he was later reimbursed—and that despite their close ties to the C.I.A. neither Cofer Black nor Rob Richer took part. As Prince puts it, “We were building a unilateral, unattributable capability. If it went bad, we weren’t expecting the chief of station, the ambassador, or anyone to bail us out.” He insists that, had the team deployed, the agency would have had full operational control. Instead, due to what he calls “institutional osteoporosis,” the second iteration of the assassination program lost steam.

    Sometime after 2006, the C.I.A. would take another shot at the program, according to an insider who was familiar with the plan. “Everyone found some reason not to participate,” says the insider. “There was a sick-out. People would say to management, ‘I have a family, I have other obligations.’ This is the fucking C.I.A. They were supposed to lead the charge after al-Qaeda and they couldn’t find the people to do it.” Others with knowledge of the program are far more charitable and question why any right-thinking officer would sign up for an assassination program at a time when their colleagues—who had thought they had legal cover to engage in another sensitive effort, the “enhanced interrogations” program at secret C.I.A. sites in foreign countries—were finding themselves in legal limbo.

    America and Erik Prince, it seems, have been slow to extract themselves from the assassination business. Beyond the killer drones flown with Blackwater’s help along the Afghanistan-Pakistan border (President Obama has reportedly authorized more than three dozen such hits), Prince claims he and a team of foreign nationals helped find and fix a target in October 2008, then left the finishing to others. “In Syria,” he says, “we did the signals intelligence to geo-locate the bad guys in a very denied area.” Subsequently, a U.S. Special Forces team launched a helicopter-borne assault to hunt down al-Qaeda middleman Abu Ghadiyah. Ghadiyah, whose real name is Badran Turki Hishan Al-Mazidih, was said to have been killed along with six others—though doubts have emerged about whether Ghadiyah was even there that day, as detailed in a recent Vanity Fair Web story by Reese Ehrlich and Peter Coyote.

    And up until two months ago—when Prince says the Obama administration pulled the plug—he was still deeply engaged in the dark arts. According to insiders, he was running intelligence-gathering operations from a secret location in the United States, remotely coordinating the movements of spies working undercover in one of the so-called Axis of Evil countries. Their mission: non-disclosable.
    Exit Strategy

    Flying out of Kabul, Prince does a slow burn, returning to the topic of how exposed he has felt since press accounts revealed his role in the assassination program. The firestorm that began in August has continued to smolder and may indeed have his handlers wondering whether Prince himself is more of a liability than an asset. He says he can’t understand why they would shut down certain high-risk, high-payoff collection efforts against some of America’s most implacable enemies for fear that his involvement could, given the political climate, result in their compromise.

    He is incredulous that U.S. officials seem willing, in effect, to cut off their nose to spite their face. “I’ve been overtly and covertly serving America since I started in the armed services,” Prince observes. After 12 years building the company, he says he intends to turn it over to its employees and a board, and exit defense contracting altogether. An internal power struggle is said to be under way among those seeking to define the direction and underlying mission of a post-Prince Blackwater.

    He insists, simply, “I’m through.”

    In the past, Prince has entertained the idea of building a pre-positioning ship—complete with security personnel, doctors, helicopters, medicine, food, and fuel—and stationing it off the coast of Africa to provide “relief with teeth” to the continent’s trouble spots or to curb piracy off Somalia. At one point, he considered creating a rapidly deployable brigade that could be farmed out, for a fee, to a foreign government.

    For the time being, however, Prince contends that his plans are far more modest. “I’m going to teach high school,” he says, straight-faced. “History and economics. I may even coach wrestling. Hey, Indiana Jones taught school, too.”

    Stepping off the plane at Kabul’s international airport, Prince is treated as if he, too, were Al Jazeera–worthy. He is immediately shuffled into a waiting car and driven 50 yards to a second vehicle, a beat-up minivan that is native to the core: animal pelts on the dashboard, prayer card dangling from the rearview mirror. Blackwater’s special-projects team is responsible for Prince’s security in-country, and except for their language its men appear indistinguishable from Afghans. They have full beards, headscarves, and traditional knee-length shirts over baggy trousers. They remove Prince’s sunglasses, fit him out with body armor, and have him change into Afghan garb. Prince is issued a homing beacon that will track his movements, and a cell phone with its speed dial programmed for Blackwater’s tactical-operations center.

    Prince in the tactical-operations center at a company base in Kabul. Photograph by Adam Ferguson.

    Once in the van, Prince’s team gives him a security briefing. Using satellite photos of the area, they review the route to Blackwater’s compound and point out where weapons and ammunition are stored inside the vehicle. The men warn him that in the event that they are incapacitated or killed in an ambush Prince should assume control of the weapons and push the red button near the emergency brake, which will send out a silent alarm and call in reinforcements.
    Black Hawks and Zeppelins

    Blackwater’s origins were humble, bordering on the primordial. The company took form in the dismal peat bogs of Moyock, North Carolina—not exactly a hotbed of the defense-contracting world.

    In 1995, Prince’s father, Edgar, died of a heart attack (the Evangelical James C. Dobson, founder of the socially conservative Focus on the Family, delivered the eulogy at the funeral). Edgar Prince left behind a vibrant auto-parts manufacturing business in Holland, Michigan, with 4,500 employees and a line of products ranging from a lighted sun visor to a programmable garage-door opener. At the time, 25-year-old Erik was serving as a navy seal (he saw service in Haiti, the Middle East, and Bosnia), and neither he nor his sisters were in a position to take over the business. They sold Prince Automotive for $1.35 billion.

    Erik Prince and some of his navy friends, it so happens, had been kicking around the idea of opening a full-service training compound to replace the usual patchwork of such facilities. In 1996, Prince took an honorable discharge and began buying up land in North Carolina. “The idea was not to be a defense contractor per se,” Prince says, touring the grounds of what looks and feels like a Disneyland for alpha males. “I just wanted a first-rate training facility for law enforcement, the military, and, in particular, the special-operations community.”

    Business was slow. The navy seals came early—January 1998—but they didn’t come often, and by the time the Blackwater Lodge and Training Center officially opened, that May, Prince’s friends and advisers thought he was throwing good money after bad. “A lot of people said, ‘This is a rich kid’s hunting lodge,’” Prince explains. “They could not figure out what I was doing.”

    Blackwater outpost near the Pakistan border, used for training Afghan police. Photograph by Adam Ferguson.

    Today, the site is the flagship for a network of facilities that train some 30,000 attendees a year. Prince, who owns an unmanned, zeppelin-esque airship and spent $45 million to build a fleet of customized, bomb-proof armored personnel carriers, often commutes to the lodge by air, piloting a Cessna Caravan from his home in Virginia. The training center has a private landing strip. Its hangars shelter a petting zoo of aircraft: Bell 412 helicopters (used to tail or shuttle diplomats in Iraq), Black Hawk helicopters (currently being modified to accommodate the security requests of a Gulf State client), a Dash 8 airplane (the type that ferries troops in Afghanistan). Amid the 52 firing ranges are virtual villages designed for addressing every conceivable real-world threat: small town squares, littered with blown-up cars, are situated near railway crossings and maritime mock-ups. At one junction, swat teams fire handguns, sniper rifles, and shotguns; at another, police officers tear around the world’s longest tactical-driving track, dodging simulated roadside bombs.

    In keeping with the company’s original name, the central complex, constructed of stone, glass, concrete, and logs, actually resembles a lodge, an REI store on steroids. Here and there are distinctive touches, such as door handles crafted from imitation gun barrels. Where other companies might have Us Weekly lying about the lobby, Blackwater has counterterror magazines with cover stories such as “How to Destroy Al Qaeda.”

    In fact, it was al-Qaeda that put Blackwater on the map. In the aftermath of the group’s October 2000 bombing of the U.S.S. Cole, in Yemen, the navy turned to Prince, among others, for help in re-training its sailors to fend off attackers at close range. (To date, the company says, it has put some 125,000 navy personnel through its programs.) In addition to providing a cash infusion, the navy contract helped Blackwater build a database of retired military men—many of them special-forces veterans—who could be called upon to serve as instructors.

    When al-Qaeda attacked the U.S. mainland on 9/11, Prince says, he was struck with the urge to either re-enlist or join the C.I.A. He says he actually applied. “I was rejected,” he admits, grinning at the irony of courting the very agency that would later woo him. “They said I didn’t have enough hard skills, enough time in the field.” Undeterred, he decided to turn his Rolodex into a roll call for what would in essence become a private army.

    After the terror attacks, Prince’s company toiled, even reveled, in relative obscurity, taking on assignments in Afghanistan and, after the U.S. invasion, in Iraq. Then came March 31, 2004. That was the day insurgents ambushed four of its employees in the Iraqi town of Fallujah. The men were shot, their bodies set on fire by a mob. The charred, hacked-up remains of two of them were left hanging from a bridge over the Euphrates.

    “It was absolutely gut-wrenching,” Prince recalls. “I had been in the military, and no one under my command had ever died. At Blackwater, we had never even had a firearms training accident. Now all of a sudden four of my guys aren’t just killed, but desecrated.” Three months later an edict from coalition authorities in Baghdad declared private contractors immune from Iraqi law.

    Subsequently, the contractors’ families sued Blackwater, contending the company had failed to protect their loved ones. Blackwater countersued the families for breaching contracts that forbid the men or their estates from filing such lawsuits; the company also claimed that, because it operates as an extension of the military, it cannot be held responsible for deaths in a war zone. (After five years, the case remains unresolved.) In 2007, a congressional investigation into the incident concluded that the employees had been sent into an insurgent stronghold “without sufficient preparation, resources, and support.” Blackwater called the report a “one-sided” version of a “tragic incident.”

    After Fallujah, Blackwater became a household name. Its primary mission in Iraq had been to protect American dignitaries, and it did so, in part, by projecting an image of invincibility, sending heavily armed men in armored Suburbans racing through the streets of Baghdad with sirens blaring. The show of swagger and firepower, which alienated both the locals and the U.S. military, helped contribute to the allegations of excessive force. As the war dragged on, charges against the firm mounted. In one case, a contractor shot and killed an Iraqi father of six who was standing along the roadside in Hillah. (Prince later told Congress that the contractor was fired for trying to cover up the incident.) In another, a Blackwater firearms technician was accused of drinking too much at a party in the Green Zone and killing a bodyguard assigned to protect Iraq’s vice president. The technician was fired but not prosecuted and later settled a wrongful-death suit with the man’s family.

    Those episodes, however, paled in comparison with the events of September 16, 2007, when a phalanx of Blackwater bodyguards emerged from their four-car convoy at a Baghdad intersection called Nisour Square and opened fire. When the smoke cleared, 17 Iraqi civilians lay dead. After 15 months of investigation, the Justice Department charged six with voluntary manslaughter and other offenses, insisting that the use of force was not only unjustified but unprovoked. One guard pleaded guilty and, in a trial set for February, is expected to testify against the others, all of whom maintain their innocence. The New York Times recently reported that in the wake of the shootings the company’s top executives authorized secret payments of about $1 million to Iraqi higher-ups in order to buy their silence—a claim Prince dismisses as “false,” insisting “[there was] zero plan or discussion of bribing any officials.”

    Nisour Square had disastrous repercussions for Blackwater. Its role in Iraq was curtailed, its revenue dropping 40 percent. Today, Prince claims, he is shelling out $2 million a month in legal fees to cope with a spate of civil lawsuits as well as what he calls a “giant proctological exam” by nearly a dozen federal agencies. “We used to spend money on R&D to develop better capabilities to serve the U.S. government,” says Prince. “Now we pay lawyers.”

    Does he ever. In North Carolina, a federal grand jury is investigating various allegations, including the illegal transport of assault weapons and silencers to Iraq, hidden in dog-food sacks. (Blackwater denied this, but confirmed hiding weapons on pallets of dog food to protect against theft by “corrupt foreign customs agents.”) In Virginia, two ex-employees have filed affidavits claiming that Prince and Blackwater may have murdered or ordered the murder of people suspected of cooperating with U.S. authorities investigating the company—charges which Blackwater has characterized as “scandalous and baseless.” One of the men also asserted in filings that company employees ran a sex and wife-swapping ring, allegations which Blackwater has called “anonymous, unsubstantiated and offensive.”

    Meanwhile, last February, Prince mounted an expensive rebranding campaign. Following the infamous ValuJet crash, in 1996, ValuJet disappeared into AirTran, after a merger, and moved on to a happy new life. Prince, likewise, decided to retire the Blackwater name and replace it with the name Xe, short for Xenon—an inert, non-combustible gas that, in keeping with his political leanings, sits on the far right of the periodic table. Still, Prince and other top company officials continued to use the name Blackwater among themselves. And as events would soon prove, the company’s reputation would remain as combustible as ever.

    Prince at a Kandahar airfield. Photograph Adam Ferguson.

    Spies and Whispers

    Last June, C.I.A. director Leon Panetta met in a closed session with the House and Senate intelligence committees to brief them on a covert-action program, which the agency had long concealed from Congress. Panetta explained that he had learned of the existence of the operation only the day before and had promptly shut it down. The reason, C.I.A. spokesman Paul Gimigliano now explains: “It hadn’t taken any terrorists off the street.” During the meeting, according to two attendees, Panetta named both Erik Prince and Blackwater as key participants in the program. (When asked to verify this account, Gimigliano notes that “Director Panetta treats as confidential discussions with Congress that take place behind closed doors.”) Soon thereafter, Prince says, he began fielding inquisitive calls from people he characterizes as far outside the circle of trust.

    It took three weeks for details, however sketchy, to surface. In July, The Wall Street Journal described the program as “an attempt to carry out a 2001 presidential authorization to capture or kill al Qaeda operatives.” The agency reportedly planned to accomplish this task by dispatching small hit teams overseas. Lawmakers, who couldn’t exactly quibble with the mission’s objective, were in high dudgeon over having been kept in the dark. (Former C.I.A. officials reportedly saw the matter differently, characterizing the program as “more aspirational than operational” and implying that it had never progressed far enough to justify briefing the Hill.)

    On August 20, the gloves came off. The New York Times published a story headlined cia sought blackwater’s help to kill jihadists. The Washington Post concurred: cia hired firm for assassin program. Prince confesses to feeling betrayed. “I don’t understand how a program this sensitive leaks,” he says. “And to ‘out’ me on top of it?” The next day, the Times went further, revealing Blackwater’s role in the use of aerial drones to kill al-Qaeda and Taliban leaders: “At hidden bases in Pakistan and Afghanistan … the company’s contractors assemble and load Hellfire missiles and 500-pound laser-guided bombs on remotely piloted Predator aircraft, work previously performed by employees of the Central Intelligence Agency.”

    E
    rik Prince, almost overnight, had undergone a second rebranding of sorts, this one not of his own making. The war profiteer had become a merchant of death, with a license to kill on the ground and in the air. “I’m an easy target,” he says. “I’m from a Republican family and I own this company outright. Our competitors have nameless, faceless management teams.”

    Prince blames Democrats in Congress for the leaks and maintains that there is a double standard at play. “The left complained about how [C.I.A. operative] Valerie Plame’s identity was compromised for political reasons. A special prosecutor [was even] appointed. Well, what happened to me was worse. People acting for political reasons disclosed not only the existence of a very sensitive program but my name along with it.” As in the Plame case, though, the leaks prompted C.I.A. attorneys to send a referral to the Justice Department, requesting that a criminal investigation be undertaken to identify those responsible for providing highly classified information to the media.

    By focusing so intently on Blackwater, Congress and the press overlooked the elephant in the room. Prince wasn’t merely a contractor; he was, insiders say, a full-blown asset. Three sources with direct knowledge of the relationship say that the C.I.A.’s National Resources Division recruited Prince in 2004 to join a secret network of American citizens with special skills or unusual access to targets of interest. As assets go, Prince would have been quite a catch. He had more cash, transport, matériel, and personnel at his disposal than almost anyone Langley would have run in its 62-year history.

    The C.I.A. won’t comment further on such assertions, but Prince himself is slightly more forthcoming. “I was looking at creating a small, focused capability,” he says, “just like Donovan did years ago”—the reference being to William “Wild Bill” Donovan, who, in World War II, served as the head of the Office of Strategic Services, the precursor of the modern C.I.A. (Prince’s youngest son, Charles Donovan—the one who fell into the pool—is named after Wild Bill.) Two sources familiar with the arrangement say that Prince’s handlers obtained provisional operational approval from senior management to recruit Prince and later generated a “201 file,” which would have put him on the agency’s books as a vetted asset. It’s not at all clear who was running whom, since Prince says that, unlike many other assets, he did much of his work on spec, claiming to have used personal funds to road-test the viability of certain operations. “I grew up around the auto industry,” Prince explains. “Customers would say to my dad, ‘We have this need.’ He would then use his own money to create prototypes to fulfill those needs. He took the ‘If you build it, they will come’ approach.”

    According to two sources familiar with his work, Prince was developing unconventional means of penetrating “hard target” countries—where the C.I.A. has great difficulty working either because there are no stations from which to operate or because local intelligence services have the wherewithal to frustrate the agency’s designs. “I made no money whatsoever off this work,” Prince contends. He is unwilling to specify the exact nature of his forays. “I’m painted as this war profiteer by Congress. Meanwhile I’m paying for all sorts of intelligence activities to support American national security, out of my own pocket.” (His pocket is deep: according to The Wall Street Journal, Blackwater had revenues of more than $600 million in 2008.)

    Clutch Cargo

    The Afghan countryside, from a speeding perch at 200 knots, whizzes by in a khaki haze. The terrain is rendered all the more nondescript by the fact that Erik Prince is riding less than 200 feet above it. The back of the airplane, a small, Spanish-built eads casa C-212, is open, revealing Prince in silhouette against a blue sky. Wearing Oakleys, tactical pants, and a white polo shirt, he looks strikingly boyish.

    A Blackwater aircraft en route to drop supplies to U.S. Special Forces in Afghanistan in September. Photograph by Adam Ferguson.

    As the crew chief initiates a countdown sequence, Prince adjusts his harness and moves into position. When the “go” order comes, a young G.I. beside him cuts a tether, and Prince pushes a pallet out the tail chute. Black parachutes deploy and the aircraft lunges forward from the sudden weight differential. The cargo—provisions and munitions—drops inside the perimeter of a forward operating base (fob) belonging to an elite Special Forces squad.

    Five days a week, Blackwater’s aviation arm—with its unabashedly 60s-spook name, Presidential Airways—flies low-altitude sorties to some of the most remote outposts in Afghanistan. Since 2006, Prince’s company has been conscripted to offer this “turnkey” service for U.S. troops, flying thousands of delivery runs. Blackwater also provides security for U.S. ambassador Karl Eikenberry and his staff, and trains narcotics and Afghan special police units.

    Once back on terra firma, Prince, a BlackBerry on one hip and a 9-mm. on the other, does a sweep around one of Blackwater’s bases in northeast Afghanistan, pointing out buildings recently hit by mortar fire. As a drone circles overhead, its camera presumably trained on the surroundings, Prince climbs a guard tower and peers down at a spot where two of his contractors were nearly killed last July by an improvised explosive device. “Not counting civilian checkpoints,” he says, “this is the closest base to the [Pakistani] border.” His voice takes on a melodramatic solemnity. “Who else has built a fob along the main infiltration route for the Taliban and the last known location for Osama bin Laden?” It doesn’t quite have the ring of Lawrence of Arabia’s “To Aqaba!,” but you get the picture.
    Going “Low-Pro”

    Blackwater has been in Afghanistan since 2002. At the time, the C.I.A.’s executive director, A. B. “Buzzy” Krongard, responding to his operatives’ complaints of being “worried sick about the Afghans’ coming over the fence or opening the doors,” enlisted the company to offer protection for the agency’s Kabul station. Going “low-pro,” or low-profile, paid off: not a single C.I.A. employee, according to sources close to the company, died in Afghanistan while under Blackwater’s protection. (Talk about a tight-knit bunch. Krongard would later serve as an unpaid adviser to Blackwater’s board, until 2007. And his brother Howard “Cookie” Krongard—the State Department’s inspector general—had to recuse himself from Blackwater-related oversight matters after his brother’s involvement with the company surfaced. Buzzy, in response, stepped down.)

    As the agency’s confidence in Blackwater grew, so did the company’s responsibilities, expanding from static protection to mobile security—shadowing agency personnel, ever wary of suicide bombers, ambushes, and roadside devices, as they moved about the country. By 2005, Blackwater, accustomed to guarding C.I.A. personnel, was starting to look a little bit like the C.I.A. itself. Enrique “Ric” Prado joined Blackwater after serving as chief of operations for the agency’s Counterterrorism Center (CTC). A short time later, Prado’s boss, J. Cofer Black, the head of the CTC, moved over to Blackwater, too. He was followed, in turn, by his superior, Rob Richer, second-in-command of the C.I.A.’s clandestine service. Of the three, Cofer Black had the outsize reputation. As Bob Woodward recounted in his book Bush at War, on September 13, 2001, Black had promised President Bush that when the C.I.A. was through with al-Qaeda “they will have flies walking across their eyeballs.” According to Woodward, “Black became known in Bush’s inner circle as the ‘flies-on-the-eyeballs guy.’” Richer and Black soon helped start a new company, Total Intelligence Solutions (which collects data to help businesses assess risks overseas), but in 2008 both men left Blackwater, as did company president Gary Jackson this year.

    Prince in his Virginia office. His company took in more than $1 billion from government contracts during the George W. Bush era. Photograph by Nigel Parry.

    Off and on, Black and Richer’s onetime partner Ric Prado, first with the C.I.A., then as a Blackwater employee, worked quietly with Prince as his vice president of “special programs” to provide the agency with what every intelligence service wants: plausible deniability. Shortly after 9/11, President Bush had issued a “lethal finding,” giving the C.I.A. the go-ahead to kill or capture al-Qaeda members. (Under an executive order issued by President Gerald Ford, it had been illegal since 1976 for U.S. intelligence operatives to conduct assassinations.) As a seasoned case officer, Prado helped implement the order by putting together a small team of “blue-badgers,” as government agents are known. Their job was threefold: find, fix, and finish. Find the designated target, fix the person’s routine, and, if necessary, finish him off. When the time came to train the hit squad, the agency, insiders say, turned to Prince. Wary of attracting undue attention, the team practiced not at the company’s North Carolina compound but at Prince’s own domain, an hour outside Washington, D.C. The property looks like an outpost of the landed gentry, with pastures and horses, but also features less traditional accents, such as an indoor firing range. Once again, Prince has Wild Bill on his mind, observing that “the O.S.S. trained during World War II on a country estate.”

    Among the team’s targets, according to a source familiar with the program, was Mamoun Darkazanli, an al-Qaeda financier living in Hamburg who had been on the agency’s radar for years because of his ties to three of the 9/11 hijackers and to operatives convicted of the 1998 bombings of U.S. Embassies in East Africa. The C.I.A. team supposedly went in “dark,” meaning they did not notify their own station—much less the German government—of their presence; they then followed Darkazanli for weeks and worked through the logistics of how and where they would take him down. Another target, the source says, was A. Q. Khan, the rogue Pakistani scientist who shared nuclear know-how with Iran, Libya, and North Korea. The C.I.A. team supposedly tracked him in Dubai. In both cases, the source insists, the authorities in Washington chose not to pull the trigger. Khan’s inclusion on the target list, however, would suggest that the assassination effort was broader than has previously been acknowledged. (Says agency spokesman Gimigliano, “[The] C.I.A. hasn’t discussed—despite some mischaracterizations that have appeared in the public domain—the substance of this effort or earlier ones.”)

    The source familiar with the Darkazanli and Khan missions bristles at public comments that current and former C.I.A. officials have made: “They say the program didn’t move forward because [they] didn’t have the right skill set or because of inadequate cover. That’s untrue. [The operation continued] for a very long time in some places without ever being discovered. This program died because of a lack of political will.”

    W
    hen Prado left the C.I.A., in 2004, he effectively took the program with him, after a short hiatus. By that point, according to sources familiar with the plan, Prince was already an agency asset, and the pair had begun working to privatize matters by changing the team’s composition from blue-badgers to a combination of “green-badgers” (C.I.A. contractors) and third-country nationals (unaware of the C.I.A. connection). Blackwater officials insist that company resources and manpower were never directly utilized—these were supposedly off-the-books initiatives done on Prince’s own dime, for which he was later reimbursed—and that despite their close ties to the C.I.A. neither Cofer Black nor Rob Richer took part. As Prince puts it, “We were building a unilateral, unattributable capability. If it went bad, we weren’t expecting the chief of station, the ambassador, or anyone to bail us out.” He insists that, had the team deployed, the agency would have had full operational control. Instead, due to what he calls “institutional osteoporosis,” the second iteration of the assassination program lost steam.

    Sometime after 2006, the C.I.A. would take another shot at the program, according to an insider who was familiar with the plan. “Everyone found some reason not to participate,” says the insider. “There was a sick-out. People would say to management, ‘I have a family, I have other obligations.’ This is the fucking C.I.A. They were supposed to lead the charge after al-Qaeda and they couldn’t find the people to do it.” Others with knowledge of the program are far more charitable and question why any right-thinking officer would sign up for an assassination program at a time when their colleagues—who had thought they had legal cover to engage in another sensitive effort, the “enhanced interrogations” program at secret C.I.A. sites in foreign countries—were finding themselves in legal limbo.

    America and Erik Prince, it seems, have been slow to extract themselves from the assassination business. Beyond the killer drones flown with Blackwater’s help along the Afghanistan-Pakistan border (President Obama has reportedly authorized more than three dozen such hits), Prince claims he and a team of foreign nationals helped find and fix a target in October 2008, then left the finishing to others. “In Syria,” he says, “we did the signals intelligence to geo-locate the bad guys in a very denied area.” Subsequently, a U.S. Special Forces team launched a helicopter-borne assault to hunt down al-Qaeda middleman Abu Ghadiyah. Ghadiyah, whose real name is Badran Turki Hishan Al-Mazidih, was said to have been killed along with six others—though doubts have emerged about whether Ghadiyah was even there that day, as detailed in a recent Vanity Fair Web story by Reese Ehrlich and Peter Coyote.

    And up until two months ago—when Prince says the Obama administration pulled the plug—he was still deeply engaged in the dark arts. According to insiders, he was running intelligence-gathering operations from a secret location in the United States, remotely coordinating the movements of spies working undercover in one of the so-called Axis of Evil countries. Their mission: non-disclosable.
    Exit Strategy

    By Adam Ciralsky

    Find this story at Januari 2010

     

    Vanity Fair © Condé Nast Digital. Your California Privacy Rights.

    Blackwater/Academy settles weapons-smuggling charges

    In the eyes of many, the United States-based security firm formerly known as Blackwater is synonymous with ‘scandal’. Founded in 1997 by self-confessed CIA agent Erik Prince, the company was awarded hundreds of millions of dollars in non-competitive contract bids by the Bush administration, to provide wide-ranging security services in Iraq. But the company’s ‘shoot-first-ask-questions-later’ attitude resulted in numerous bloody incidents in the country, including the 2007 Nisur Square massacre, in which at least 14 Iraqi civilians were killed by trigger-happy Blackwater guards. In 2009, a frustrated US Department of State refused to renew the company’s governmental contracts, after which Blackwater terminated its partnership with the US government (or did it?). What is perhaps less known about the company, now renamed to Academi LLC, is that it has for years been the subject of several investigations by US authorities for a host of criminal offences, ranging from selling secret plans to foreign governments to illicit weapons trafficking. According to court documents unsealed yesterday at the United States District Court in New Bern, North Carolina, Academi has agreed to pay $7.5 million to settle some of these charges. Under the agreement, the company has owned up to 17 different criminal violations with which it was charged after a five-year multi-agency federal investigation led by the Department of Justice. The charges include possessing unregistered fully automatic weapons in the US, illegally exporting encrypted satellite-telephone hardware to Sudan, training foreign nationals without a license, giving classified documents to foreign governments, as well as selling weapons to the Kingdom of Jordan without US government authorization and then lying about it to US federal firearms officials. It is worth noting that yesterday’s settlement was in addition to a separate $42 million settlement agreed in 2010 with the US Department of State. The latter had charged Blackwater/Academi with violating the US Arms Export Control and the International Trafficking in Arms Regulations Acts. Interestingly, the attorney for the US government, Thomas G. Walker, chose his words carefully yesterday in speaking publicly about the case. He said that the proceedings concluded “a lengthy and complex investigation into a company which has provided valuable services to the United States government, but which, at times, and in many ways, failed to comply with important laws and regulations concerning how we, as a country, interact with our international allies and adversaries”. But some of the investigators who actually worked on the ground in the case were far less diplomatic in their court testimony. Jeannine A. Hammett, a Special Agent and Criminal Investigator with the Internal Revenue Service, accused Blackwater/Academi’s senior leadership of breaking the trust of the American public by committing crimes “to line their own pockets”.

    August 8, 2012 by intelNews 1 Comment

    By JOSEPH FITSANAKIS | intelNews.org |

    Find this story at 8 August 2012

    New Blackwater Iraq Scandal: Guns, Silencers and Dog Food

    Ex-employees Tell ABC News the Firm Used Dog Food Sacks to Smuggle Unauthorized Weapons to Iraq

    A federal grand jury in North Carolina is investigating allegations the controversial private security firm Blackwater illegally shipped assault weapons and silencers to Iraq, hidden in large sacks of dog food, ABCNews.com has learned.

    Under State Department rules, Blackwater is prohibited from using certain assault weapons and silencers in Iraq because they are considered “offensive” weapons inappropriate for Blackwater’s role as a private security firm protecting US diplomatic missions.

    “The only reason you need a silencer is if you want to assassinate someone,” said former CIA intelligence officer John Kiriakou, an ABC News consultant.

    Six Blackwater employees are under investigation by another federal grand jury, in Washington, D.C., in connection with the shooting deaths of at least 17 civilians in September 2007 at a Baghdad traffic circle. Prosecutors are expected to return indictments in the next few weeks, according to people familiar with the case.

    The investigation of the alleged dog food smuggling scheme began last year after two Blackwater employees were caught trying to sell stolen weapons in North Carolina. The two, Kenneth Cashwell and William “Max” Grumiaux pleaded guilty in February and became government witnesses, according to court documents.

    Two other former employees tell ABCNews.com they also witnessed the dog food smuggling operation. They say the weapons were actually hidden inside large sacks of dog food, packaged at company headquarters in North Carolina and sent to Iraq for the company’s 20 bomb-sniffing dogs.

    Larger items, including M-4 assault weapons, were secreted on shipping pallets surrounded by stacks of dog food bags, the former employees said. The entire pallet would be wrapped in cellophane shrink wrap, the former employees said, making it less likely US Customs inspectors would look too closely.

    In a statement, Blackwater did not address directly the allegations involving silencers but says “all firearms shipped to Iraq by Blackwater were given proper US government license.” The statement denied Blackwater owned or possessed any M4 weapons in Iraq.

    US Army officials told ABCNews.com earlier this year, at least one Blackwater M4 weapon was discovered during a raid on an suspected insurgent location in Iraq.

    Last year, a US Department of Commerce inspector at JFK airport in New York discovered a two-way radio hidden in a dog food sack being shipped by Blackwater to Iraq, according to people familiar with the incident.

    Blackwater says the radio did not need a license and was hidden among the dog food sacks, not inside the dog food.

    The company says it is a common practice “to prevent corrupt foreign customs agents and shipping workers from stealing the valuables.”

    In addition to the grand jury investigation, Blackwater sources say the company is facing a multi-million dollar fine for some 900 instances in which it violated State Department licensing requirements for the export of certain weapons and technical know-how.

    Blackwater acknowledged in its statements “numerous mistakes in complex and demanding area of export compliance,” saying most of the violations were failures of paperwork not “nefarious smuggling.”

    Of the 900 cases, about 100 of them have been referred to the Department of Justice for possible criminal prosecution, according to lawyers briefed on the case.

    By BRIAN ROSS and JASON RYAN

    November 14, 2008—

    Find this story at 14 November 2008

    Copyright © 2012 ABC News Internet Ventures

    Why did US Government Take Blackwater to Court?

    Last week I gave a live television interview to the main news program of RT, about the company formerly known as Blackwater. As intelNews reported on August 8, the private military outfit, which rebranded itself to Academi in late 2011, agreed to pay $7.5 million to settle no fewer than 17 violations of United States federal laws, including several charges of illegal weapons exports. This was hardly the first time that the scandal-prone company made headlines for breaking the law. Last week’s settlement followed a separate $42 million settlement agreed in 2010 with the US Department of State. The latter had charged Blackwater/Academi with violating the US Arms Export Control and International Trafficking in Arms Regulations Acts. Those familiar with the murky world of private military contractors are aware that these companies are often hired by governments precisely because they are willing and able to break the law in pursuit of tactical directives. In fact, the main difference between Blackwater/Academi and other private military contractors is not its disregard for legal boundaries, but the lack of discretion with which it keeps breaking the law. This is precisely the reason why it regularly finds itself charged with a host of different criminal violations.

    Now, there is little doubt that the services Blackwater/Academi provided to the US government in Iraq and Afghanistan far exceeded things such as VIP protection or tactical training. In one typical case, the company was found to have illegally shipped to Iraq weapon silencers, hidden among sacks of dog food intended for its K-9 unit. As I told RT news, one does not have to be an expert on the operational side of intelligence to realize that there is really only one thing you need gun silencers for —and it’s not VIP protection.

    But if Blackwater/Academi resorted to breaking the law in order to assist the US government’s military or intelligence objectives in Iraq, Afghanistan, and elsewhere, why was it taken to court by that very government? The answer, as I told RT, has to do with the fact that governments —including America’s— are not monolithic. They are complex amalgamations of actors, often with competing interests, who fight for bureaucratic dominance as often as they collaborate in pursuit of common goals.

    Blackwater/Academi is a case in point: the company has for over a decade had a very cozy relationship with certain elements of the US government apparatus, notably the CIA, the George W. Bush White House, and some offices in the State Department. But other governmental interest groups, including parts of the Pentagon, the Internal Revenue Service, as well as the Federal Bureau of Investigation, have been skeptical about Blackwater/Academi’s operations since even before 9/11. It is not surprising, therefore, that government agencies like the IRS or the FBI examine Blackwater/Academi’s role with reference to their own, narrow administrative goals, while disregarding the broader strategic benefits that others in the US government may attribute to these very operations. It is plausible, for instance, that by presenting the King of Jordan with a birthday present consisting of a case of state-of-the-art fully automatic weapons, Blackwater/Academi was acting as a conduit for the US Department of State or the CIA. The FBI, which has always considered Blackwater/Academi as a band of mercenary cowboys, could care less about the relationship between the Royal House of Jordan and the State Department. It therefore takes the company to court, and as in fact it did, for illegally exporting weapons to a foreign country.

    August 13, 2012 by intelNews

    By JOSEPH FITSANAKIS | intelNews.org |

    Find this story at 13 August 2012

    MoD lobbying claims: the key figures

    Top brass are said to have boasted of access to ministers, sparking a crackdown on lobbying at the Ministry of Defence

    General Lord Richard Dannatt, the former head of the army

    The Sunday Times claimed Dannatt had offered to help two executives from a South Korean defence company who wanted to sell the UK military a hi-tech drone. Dannatt offered to speak to Bernard Gray, the civilian chief of defence materiel. He was quoted as saying he had engineered a seat at a formal dinner with the Ministry of Defence’s new permanent secretary, Jon Thompson, to help another company, Capital Symonds, which is bidding for a £400m contract to manage the MoD’s estates. The two men were school friends, he said.

    In a lengthy rebuttal, Dannatt said he had made it clear to the undercover reporters that “I would need to meet the manufacturer and verify for myself whether the product was viable. I also told them that I was not particularly up-to-date with defence procurement matters and in particular had no idea whether the MoD had already contracted to acquire such a mini UAV.” He admitted that an “indirect approach” to senior people such as General Sir David Richards, chief of the defence staff, Gray and Thompson might be helpful. With regard to Capital Symonds, Dannatt said he had “no contract with them, have received no payment or benefit from them, hold no shares in the company and am not a director”.

    He said he had “never been asked to lobby and have no intention of lobbying” for them and said the Sunday Times had got confused about the conversation. The general said he had not lobbied in a way that contravened rules and would regard any such claim as “seriously defamatory”.

    Lieutenant General Sir John Kiszely, president of the Royal British Legion

    The Sunday Times claimed Kiszley boasted he knew the 10 currently serving generals that he regarded as worth talking to with regard to procurement. The paper said Kiszely described having a close relationship with the new armed forces minister, Andrew Robathan, who was going to stay with him over Christmas. Kiszely also said his ceremonial roles for the legion gave him access to Philip Hammond, the defence secretary, and Richards. One such occasion was the annual Festival of Remembrance, when he stands next to the prime minister. Confronted by the Sunday Times, Kiszley insisted he “always kept my role as national president of the Royal British Legion completely separate from my business interests”. The MoD said Robathan had not received an invitation to Kiszely’s at Christmas. “They have only met infrequently and he never raised the work of private clients,” the MoD said. The Royal British Legion said it intended to hold its own investigation into whether Kiszely had broken any rules.

    Admiral Sir Trevor Soar

    The commander in chief of the Royal Navy fleet until March this year, Soar told the undercover reporters he knew “all the ministers” at the MoD. As he has only recently retired, Soar is one of two former officers who could have flouted the guidelines set out by the Advisory Committee on Business Appointments (ACOBA). This stipulates that you cannot lobby for two years after retiring. Soar is quoted as saying “theoretically we are banned from lobbying ministers … we call it something different”. Soar said he preferred the term consultant. He has since said all his private jobs had been given official approval and that he is only motivated by wanting to bring “battle-winning equipment to the navy”. He denied breaking rules.

    Lieutenant General Sir Richard Applegate

    The Sunday Times claimed the former head of army procurement boasted about having spent the past 18 months working on behalf of an Israeli arms firm and had successfully lobbied the MoD to release £500m for a helicopter safety programme. If true, he could be in breach of the ACOBA rules – because the activity would have taken place within two years of him leaving service. But, approached by the paper, he denied breaking any rules and said: “At no stage did I lobby or agree to a covert political lobbying campaign.”

    Lord Stirrup, the air chief marshal and former chief of the defence staff

    Stirrup made clear he had never lobbied the government for private clients, but told the undercover reporters the defence minister in the Lords was “a friend” and that he also knew the minister for the armed forces and other serving senior members of the military.

    Speaking on Sky news, Stirrup said: “I was asked about my contacts. If you’re pressed about them then of course you say what they are. I was asked about whether I know ministers – and I do. What I also said, which was not reported, was that approaching ministers is not the way to do it … you need to understand the military’s requirements, and they’re not set by ministers.”

    General Sir Mike Jackson

    guardian.co.uk, Sunday 14 October 2012 19.13 BST

    Find this story at 14 October 2012
    © 2012 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Arms firms call up ‘generals for hire’

    TOP-RANKING retired military officers have been secretly filmed boasting about lobbying to win multi-million-pound defence deals for arms firms in breach of official rules.

    The “generals for hire” can be exposed after a Sunday Times investigation recorded them offering their contacts with ministers and former colleagues for six-figure sums.

    During a three-month investigation into the revolving door between the Ministry of Defence (MoD) and private arms companies:

    ■ Lieutenant-General Sir John Kiszely, a Falklands war hero and former head of the Defence Academy, confided that he could use his role as president of the Royal British Legion to push his clients’ agenda with the prime minister and other senior figures at Remembrance Day events. He also bragged about lobbying on a multimillion-pound contract that was in official “purdah”.

    ■ Lieutenant-General Richard Applegate, a former MoD procurement chief, described a secret and successful lobbying campaign in parliament for a £500m military programme on

    Insight Published: 14 October 2012

    Find this story at 14 October 2012

    © Times Newspapers Ltd 2012

    MoD staff and thousands of military officers join arms firms

    Guardian research in the aftermath of the ‘jobs for generals’ scandal shows extent of links between MoD and private sector

    Lt General Sir John Kiszely, who has resigned as president of the Royal British Legion, was one of several former senior members of the military caught in a lobbying sting. Photograph: Fiona Hanson/Press Association

    Senior military officers and Ministry of Defence officials have taken up more than 3,500 jobs in arms companies over the past 16 years, according to figures that reveal the extent of the “revolving door” between the public and private sector.

    The data, compiled by the Guardian from freedom of information requests, shows how the industry swoops on former officials and military personnel once they have left service, with hundreds of senior officers being given jobs every year.

    The figures for 2011-12 show 231 jobs went to former officials and military personnel – a rise from the previous year’s total of 101. Another 93 have been approved since January. In total 3,572 jobs have been approved since 1996.

    The disclosure comes in the aftermath of a “jobs for generals” scandal that led to the resignation of the president of the Royal British Legion, Lieutenant General Sir John Kiszely, who was embarrassed in a newspaper lobbying sting.

    Kiszely was one of several former senior members of the military caught on film by Sunday Times reporters who were pretending to seek lobbyists for a South Korean defence company.

    Boasting about his connections, Kiszely described the annual Festival of Remembrance as a “tremendous networking opportunity” and said he was spending Christmas with the armed forces minister, Andrew Robothan.

    In his resignation letter, Kiszely admitted he had made “exaggerated and foolish claims”, but denied any impropriety.

    Admiral Trevor Soar, second in command of the Royal Navy until the spring, has also quit his role as an advisor at the large UK defence and engineering company Babcock. The firm said Kiszely had been sacked from his role at the company, too.

    The MoD began its own inquiry on Monday into the access that former members of the military have to serving officials. This may lead to a tightening of current restrictions and blanket bans on certain individuals approaching senior staff in the ministry.

    Figures obtained by the Guardian relate to the number of jobs approved under business appointment rules for armed forces personnel and MoD civilians. They show that there has been a regular flow into the private sector every year since records began in 1996. There has never been fewer than 101 and the highest is 360.

    Bernard Jenkin, the Conservative MP who chairs a Commons committee that oversees the rules governing the appointment of former military personnel and ministers, told the Guardian it was time the government legislated in this area to bring proper transparency and accountability.

    Jenkin said the advisory committee on business appointments (Acoba), which scrutinises when the top brass can accept new jobs, was toothless because it could be ignored.

    “The Acoba is merely advisory and it will not do,” he said. “There is no way that the present arrangements provide the reassurance to the public or protection to anyone that might be crossing from the public sector to the private sector.”

    The furore began at the weekend with the Sunday Times investigation in which six former members of the military were approached for help by journalists purporting to be working for a defence firm.

    Those fooled by the sting included Lord Dannatt, a former head of the army; Lieutenant General Richard Applegate, a former head of procurement at the MoD; and Lord Stirrup, a former chief of the defence staff.

    All of those involved intimated they knew people at the top of the MoD who could help the firm. Some bragged about their connections to ministers and the MoD’s most senior civil servants.

    Though they all denied wrongdoing, at least two of them appear to have been in breach of Acoba guidelines. These state that senior officers have to wait up to two years before they can lobby on behalf of defence companies. Soar, who retired this March, suggested he could ignore those guidelines if he was described as a consultant. Applegate, who has only just past the two years’ “purdah”, claimed he had spent the past 18 months working on behalf of an Israeli arms firm and had successfully lobbied the MoD to release £500m for a helicopter safety programme.

    But even if the men have defied the Acoba rules, there is no way of sanctioning them or the firms with whom they might have been working.

    Jenkin said the public administration select committee (Pasc) had flagged this problem to the government in July and had recommended adopting a much tougher regime.

    “We recommended that there should be a statutory appointment of a conflict of interest and ethics commissioner, with statutory rules so that it is very clear what people can and cannot do. Acoba does not have any powers. This episode shows that and I hope the government will now look favourably on our proposals. They have yet to respond to them.”

    A Cabinet Office spokesman said: “This is an important issue as events over the weekend have shown. We are currently considering issues in relation to business appointment rules as part of our response to the Pasc report published in July.”

    Jim Murphy, the shadow defence secretary, said the system needed to be changed. “It is ludicrous that rules can be broken without sanction and so we must see systematic change to restore confidence and standards.

    “Military expertise should not be lost after retirement, but contact on defence contracts must be transparent and within established guidelines. We must get to the bottom of what happened. We must also establish the facts of ministerial involvement and awareness in these cases.”

    Labour has tabled a series of questions on the issue, including a demand for details of meetings between former members of the military and serving civil servants, senior officers and ministers.

    Babcock announced that Kiszely and Soar had quit the company. They had both been recruited as advisers – the former to offer insight into the potential future needs of the military, the latter on exports. “The statements made by Sir John Kiszely, in the course of his attempt to win a job elsewhere, do not reflect his role for us,” the company said.

    “The facts are that he was not recruited to perform any lobbying role; he has never been asked to perform such a role and indeed, irrespective of his comments, he has never performed any such role for this company. We have a very clear code of conduct for all of our employees, and these inaccurate comments clearly fall foul of our code. For this reason, Sir John will not continue to work with Babcock. Sir Trevor Soar has expressed regret over the embarrassment caused by his interview, and his resignation has been accepted by the company.”

    Nick Hopkins, Rob Evans and Richard Norton-Taylor
    The Guardian, Monday 15 October 2012 21.56 BST

    Find this story at 15 October 2012

    © 2012 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    G4S ‘warned’ over killer security guard Danny Fitzsimons

    Security firm G4S was sent warnings not to employ an armed guard in Iraq just days before he murdered two colleagues, a BBC investigation has found.

    Private security guard Paul McGuigan, from the Scottish Borders, was shot dead by Danny Fitzsimons in 2009 in Baghdad while on a protection contract.

    Another man, Australian Darren Hoare, was also killed.

    All were working for UK contractor G4S, which was operating under the name ArmorGroup in the region.
    Violent criminal

    In a BBC documentary, it is revealed that a G4S worker sent a series of emails to the company in London, warning them about Fitzsimons’s previous convictions and unstable behaviour.

    The anonymous whistleblower signed one email “a concerned member of the public and father”.

    The worker warned G4S: “I am alarmed that he will shortly be allowed to handle a weapon and be exposed to members of the public.

    “I am speaking out because I feel that people should not be put at risk.”

    Another email, sent as Fitzsimons was due to start work in Baghdad, said: “Having made you aware of the issues regarding the violent criminal Danny Fitzsimons, it has been noted that you have not taken my advice and still choose to employ him in a position of trust.

    “I have told you that he remains a threat and you have done nothing.”

    Within 36 hours of arriving in Iraq in August 2009, Fitzsimons – a former paratrooper – had shot and killed the two men after what he claimed was a drunken brawl.

    An Iraqi colleague was also wounded as Fitzsimons tried to flee the scene.

    Fitzsimons had worked as a private security contractor before in Iraq, but he had been sacked for punching a client.

    At the time he was taken on by G4S, Fitzsimons also had a criminal record, was facing outstanding charges of assault and a firearms offence, and had been diagnosed by doctors as having PTSD (post-traumatic stress disorder).

    In the documentary, the parents of Paul McGuigan call for the company to face criminal charges over the killing.

    His mother Corinne Boyd-Russell, from Innerleithen in the Borders, said: “[Fitzsimons] fired the bullets. But the gun was put in his hand by G4S ArmorGroup. They put the gun in that man’s hand.

    “I want G4S to be charged with corporate manslaughter and be held accountable for what they did.”

    The parents of Danny Fitzsimons, who is serving 20 years in a Baghdad prison after being sentenced for the murders in February 2011, were also shocked to hear about the existence of the emails.

    Liz Fitzsimons, from Manchester, said: “And they still took him out there? They [G4S] need to be taken to task for that.

    “The people who we feel are responsible, who we hold responsible for putting that gun in Danny’s hand, are without a shadow of a doubt G4S.”

    A G4S spokesman admitted that its screening of Danny Fitzsimons “was not completed in line with the company’s procedures”.

    It said vetting had been tightened since the incident.

    Regarding the email warnings, the spokesman G4S told the BBC it was aware of the allegations but that an internal investigation showed “no such emails were received by any member of our HR department”.

    He did not say whether anyone else in the company had seen them.

    An inquest into the death of Paul McGuigan, a former Royal Marine, is due to begin in December.

    The revelations in the Fitzsimons case come just weeks after G4S found itself at the centre of a crisis over its inability to meet its commitment to recruit security staff for the Olympics in London.

    It is the biggest security company in the world in an industry that is worth about £400bn globally.

    Often controversial, the sector has been dogged by allegations of abuse and violence in countries such as Iraq and Afghanistan.

    However, in the BBC documentary, Britain’s Private War, it reveals the growing extent to which the UK government relies on armed security companies to protect its interests overseas.

    The UK has spent almost half a billion pounds on such firms since the end of the Iraq war in 2003.

    Yet British companies – said to be the key players – remain unregulated.

    The programme-makers heard stories of contractors being forced to work on dangerous missions with inadequate equipment, incident reports sanitised to protect company reputations and numerous deaths of former soldiers.

    One security contractor, Bob Shepherd, said: “We know when a soldier dies it’s all over the newspapers, it’s on the TV. But we never know when security contractors die.

    “For the companies it’s bad for business, for the government it’s hiding the true cost of these conflicts.

    “If the British taxpayers knew the total numbers of people that have died on behalf of British security companies in places like Iraq and Afghanistan they would be shocked.”

    Instead of formal regulation, the UK government has opted for the companies to set up their own body to monitor themselves, called the Security in Complex Environments Group (SCEG).

    Chris Sanderson, the chairman of SCEG, told the programme his organisation did not have powers to punish poor behaviour.

    Asked what action he would be able to take against companies which did not uphold the best standards, he said: “If they continue to operate underneath the radar, very little.

    “What the majority of the industry is keen to do is to ensure that those companies who are behaving less professionally are identified and commercially disadvantaged.

    “At the moment, signing an international code of conduct means nothing apart from perhaps a wish to differentiate themselves in the market place.

    “In terms of substance and performance it means nothing.

    “What will mean a great deal is when the standards are in the place and there is an independent verification of those standards.”

    In a statement, the foreign Office said it was vital to work in partnership with the industry to effectively prevent abuses by private security companies abroad.

    BBC Scotland Investigates: Britain’s Private War, BBC Two Scotland on Monday 1 October at 21:00 and soon after on the BBC iplayer.

    Find this story at 1 October 2012

    BBC © 2012 The BBC is not responsible for the content of external sites. Read more.

    Briton Danny Fitzsimons jailed in Iraq for contractors’ murders

    Danny Fitzsimons avoids death sentence but family say his PTSD meant he should never had been employed in a war zone

    Danny Fitzsimons is escorted out of court after his sentencing in Baghdad. Photograph: Karim Kadim/AP

    A former British soldier who claims to be suffering from post-traumatic stress disorder has been jailed for 20 years in Iraq for the murder of two fellow security contractors during a whisky-fuelled argument, becoming the first westerner convicted in the country since the 2003 invasion.

    Danny Fitzsimons, 31, a former paratrooper from Middleton, Manchester, shot dead Briton Paul McGuigan and Australian Darren Hoare, colleagues at the UK security firm ArmorGroup, now part of G4S, and injured an Iraqi security guard 36 hours after arriving in Iraq in 2009.

    His family said they were “euphoric” that Fitzsimons had escaped the death penalty, but said he was suffering from severe PTSD and should never had been employed in a war zone.

    Fitzsimons’s stepmother and father, Liz and Eric Fitzsimons, from Rochdale, said the Ministry of Defence had “let him down and continue to let down an awful lot of soldiers who come out with PTSD and aren’t offered any help”.

    They called for legislation to help vet those hired by private security firms.

    Fitzsimons, who joined the army at 16 and was discharged eight years later, admitted shooting the men but claimed it was in self-defence – an argument rejected by the court.

    McGuigan, 37, a former Royal Marine originally from Peebles, Scottish Borders, was shot twice in the chest and through the mouth. Weeks after his death his fiancee, Nicci Prestage, from Tameside, Greater Manchester, gave birth prematurely to his daughter, Elsie-Mai.

    Hoare, also 37, a father of three from Brisbane, was shot through the temple at close range.

    Fitzsimons said as he was led from the courtroom that he was happy with the sentence. But asked whether he thought his trial had been fair, he said: “No.”

    His Iraqi lawyer, Tariq Harb, said: “This is a very good sentence. I saved him from the gallows.”

    He told Reuters: “A year in prison in Iraq is nine months and this means that 20 years in prison will, in fact, be 15 years.”

    Caroline Davies
    The Guardian, Monday 28 February 2011 17.23 GMT

    Find this story at 28 February 2012

    © 2012 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    << oudere artikelen  nieuwere artikelen >>