• Buro Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, de overheid in Nederland en Europa kritisch volgt. Een grond-rechten kollektief dat al 30 jaar publiceert over uitbreiding van repressieve wetgeving, publiek-private samenwerking, bevoegdheden, overheids-optreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.

  • Categorieën

  • Behind the secret plan to bring Nazi scientists to US

    As the Allied troops advanced through France in November 1944, three experts in biological weapons huddled, by candlelight, in a grand apartment in Strasbourg, France, guarded by US soldiers.

    The scientists were poring through documents left behind by Dr. Eugen Haagen, a high-ranking Nazi who specialized in weaponizing deadly viruses. They were looking for evidence of the Third Reich’s progress in atomic and biochemical warfare; what they found were chronicles of devastating carnage.

    “Of the 100 prisoners you sent me, 18 died in transport,” Haagen wrote in a memo dated Nov. 15, 1943. “Only 12 are in a condition suitable for my experiments. I therefore request that you send me another 100 prisoners, between 20 and 40 years of age, who are healthy and in a physical condition comparable to soldiers. Heil Hitler.”
    Modal Trigger

    Hermann Oberth (forefront) with officials of the Army Ballistic Missile Agency at Huntsville, Alabama in 1956.
    Photo: Corbis

    Haagen was once a world-renowned genius who had won a fellowship from the Rockefeller Foundation in New York City, who had been shortlisted for a Nobel Prize, who helped create the first vaccine for yellow fever. Yet here was evidence that he — and could it only have been just one doctor? — had been conducting medical experiments on live humans.

    Samuel Goudsmit, leader of this investigative unit, made a list. Haagen was at the top, and he added any names referenced or copied on Haagen’s memos, including Dr. Kurt Blome, the Third Reich’s deputy surgeon general, and Walter Schreiber, the surgeon general. These men were now among America’s most wanted — but not in the way one might assume.

    Within the year, hundreds of the Third Reich’s upper echelon would be relocated to the United States, where they would be given excellent jobs, healthy salaries, and all the benefits of living in a free society.
    Modal Trigger

    The von Braun rocket team is congratulated by Nazi brass in 1942
    Photo: Corbis

    It was a secret program known as Paperclip, and it remains one of the most complicated and controversial epochs in American history. And, still, one of the most classified.

    In her new book “Operation Paperclip: The Secret Intelligence Program to Bring Nazi Scientists to America” (Little, Brown and Company), author Annie Jacobsen uses newly released documents, court transcripts, and family-held archives to give the fullest accounting yet of this endeavor — one shared by the British, the French, and the Russians, all of whom enlisted and embraced top Nazis.

    Wernher von Braun, the Nazi scientist crucial to the development of the V-2 rocket — which held a payload of 2,000 pounds and flew five times beyond the speed of sound — saw it coming: In March 1945, he conscripted two friends to stash his most important research out in an abandoned mine; when Germany lost, von Braun said, he’d use these documents to broker a new life in the United States.

    He knew that no matter what atrocities were eventually discovered, no major world power would refuse the technological advances made by the Nazis — nor could they afford not to know how to combat them, vaccinate against them, outpace them.

    That same year, the Department of Defense created a top-secret, elite task force called the Joint Intelligence Objectives Agency, or JOIA. They were subordinate to the Joint Intelligence Committee, which briefed the Joint Chiefs of Staff on national security threats.

    “To understand the mind-set of the Joint Intelligence Committee,” Jacobsen writes, “consider this: Within one year of the atomic bombing of Hiroshima and Nagasaki, the JIC warned the Joint Chiefs of Staff that the United States needed to prepare for ‘total war’ with the Soviets — to include atomic, chemical, and biological warfare — and they even set an estimated start date of 1952.”

    As of May 1945, Werner von Braun was No. 1 on America’s list for desired Nazi rocket scientists. When he surrendered to US forces on May 2 — having voluntarily decamped from a luxury ski resort in the Alps — von Braun and his colleagues were treated to a hearty breakfast of eggs, coffee and bread, then given freshly made beds in which to sleep.
    Modal Trigger

    President Truman ‘was not made aware of the initiative’
    Photo: Harry S. Truman Library

    “I did not expect to be kicked in the teeth,” von Braun later told an American reporter. “The V-2 was something we had and you didn’t have. Naturally, you wanted to know all about it.”

    Also at the top of the list was Dr. Kurt Blome, Hitler’s head of cancer research and a diehard Nazi. He was discovered at a checkpoint on May 17, 1945, and in his initial interrogation, Blome admitted that he had seen experiments “which led to later atrocities e.g. mass sterilization, gassing of Jews.”

    Then came the capture of Georg Rickhey, an expert on the Third Reich’s impenetrable underground bunkers. Rickhey was interrogated by Col. Peter Beasley, who told him, “As an American officer, I want my country to have full possession of all your knowledge. To my superiors, I shall recommend that you be taken to the United States.”

    Among those tasked with finding and apprehending the most wanted men in the Third Reich — and the number of government agencies that became involved — there was deep discord about the morality of Operation Paperclip.

    Jacobsen accessed the transcript of a volatile meeting, secretly recorded, at the War Department. The names were redacted.

    “One of the ground rules for bringing them over,” said one general, “is that it will be temporary, and at the return of their exploitation they will be sent back to Germany.”

    “I’m opposed,” said another general. “And Pop Powers [nickname of an unknown official] is opposed, the whole War Department is opposed.”

    It didn’t matter. Unofficial US policy held that it was imperative to secretly procure those Nazis who could accelerate America’s scientific, technological and economic advancement.

    This was an increasingly delicate operation. On May 7, 1945, Life magazine had run a series of photos from the concentration camps, and the official US line held that countries such as Uruguay and Argentina, which were welcoming Nazi refugees, should turn them over to stand trial.

    Simultaneously, the US government was learning more and more about just what the Nazis had done: the extermination of millions of Jews; the mass sterilization, the live experiments and operations conducted without anesthesia on humans code-named “adult pigs,” the systematic yanking of gold teeth, the slave labor and starvation, the drowning of men in ice-cold tubs and the many failed attempts to resurrect them, the exploding bodies forced into high-altitude chambers in efforts to master space flight.

    “German science presents a grim spectacle,” wrote Dr. Leopold Alexander, a Viennese Jew who immigrated to the US in 1933. When the US entered the war, Alexander enlisted, and at its end was sent to Germany to determine what the Nazis had wrought and learned medically.
    Modal Trigger

    Wernher von Braun holds a model rocket Aug. 5, 1955, at the Pentagon in Washington.
    Photo: AP

    “Grim for many reasons,” he continued. “First it became incompetent and then it was drawn into the maelstrom of depravity of which this country reeks — the smell of concentration camps, the smell of violent death, torture and suffering.”

    He went on to call the Third Reich’s experimentation “really depraved pseudoscientific criminality . . . It sometimes seems as if the Nazis had taken special pains in making practically every nightmare come true.”

    Meanwhile, the Allies held elite Nazis in two luxurious locales: the Palace Hotel in Luxembourg, renamed “Ashcan,” and Crane Mountain Castle in Hesse, Germany, renamed “Dustbin.”

    Here, the most warped and wicked Nazis lounged in well-appointed rooms, strolled through apple orchards, played chess, smoked and drank, and gave each other lectures in grand halls. In the mornings, Hitler’s doctor taught a workout class.

    In June 1945, officers at Dustbin put out an alert for Dr. Otto Ambros, valuable for his work with toxic gases — specifically tabun, developed by the Nazis and a chemical far more lethal than sarin. Ambros was picked up by an American soldier, who then drove him to a meeting in Heidelberg with members of the US Chemical Warfare Service.

    So comfortable were these negotiations that when the US contingent told Ambros to retrieve the documents relating to tabun production, they let him drive off on his own. Ambros never returned; instead, he fled to an area controlled by the French, who let him return to civilian life in Germany.

    The War Department moved quickly. In July, they made their top-secret project official, circulating a memo titled “Exploitation of German Specialists in Science and Technology in the United States.”

    Jacobsen writes that President Truman “was not made aware of the initiative,” which was initially known as Operation Overcast.

    Months later, when the War Department began tagging the files of their most reprehensible Nazi recruits with paper clips as intra-office code — these Nazis were truly to be smuggled in, made known to no other bureaucracies — the program became known as Operation Paperclip.

    Meanwhile, Truman ordered the Department of Commerce to propagandize the advances made by the Nazis, ones that were now making Americans’ lives easier, more comfortable: Women could buy stockings that wouldn’t run, butter churned so fast and juice now sterilized so simply that there would be an abundance for all. Electrical equipment that had once been the size of crates was no bigger than your smallest finger.
    Modal Trigger

    William Picketing, James Van Allen, and Wernher von Braun (L to R) brandish a model of the first American satellite “Explorer 1″, 31 January 1958.
    Photo: OFF/AFP/Getty Images

    By January 1946, two months after the Nuremberg trials had begun, there were more than 160 Nazis — many with their families — living and working in the United States.

    A good number were housed at a facility called Hilltop in Dayton, Ohio, where many complained they were little more than “caged animals.” The US military scientists working alongside them were disgusted by their new colleagues, expressing “emotions . . . ranging from vehemence to frustration.”

    The other group — at 115, the largest — was a team of rocket scientists held on Fort Bliss in Texas. Their leader was Wernher von Braun, who, it turned out, really loved America. He was enthralled with the desert and the open-air jeeps driven by Army personnel. He became an evangelical Christian. He was permitted to return to Germany to marry his 18-year-old cousin — von Braun was 46 — and bring her back to the US. If he had one complaint, it was his research budget.

    As he later said, while working for the Third Reich “we’d been coddled. Here they were counting pennies.”

    In November 1946, shortly after 10 Nazis were executed at Nuremberg by US Master Sgt. John C. Woods (“I hanged those 10 Nazis . . . and I am proud of it”), news broke that the US had smuggled hundreds of Nazis into the country, and that about 1,000 more were coming. (The final count was close to 1,600.) The government attempted damage control, then message control: These men, so mild-mannered with their silver hair and American sport jackets, had never been members of the Nazi party. The Army disseminated pictures of the men and their families engaged in wholesome outdoor activities, and any reporter requesting an interview had to submit their copy, pre-publication, to the army for approval.

    Not everyone was fooled. Eleanor Roosevelt publicly decried the program, as did Albert Einstein. By March 1947, Paperclip had generated such lacerating public opinion that General Eisenhower, then the US Army chief of staff, demanded a briefing. It lasted 20 minutes, and upon emerging, Eisenhower said he approved of the project.

    The legacy of Paperclip, Jacobsen writes, speaks to the triumph of pragmatism and self-interest above unthinkable atrocity.

    Wernher von Braun helped get us to the moon; in the years before the landing, he was photographed with President Kennedy. Heinrich Rose and Konrad Buttner, two hardcore Nazis, conducted experiments for the US on how best to protect soldiers in atomic warfare.

    Today, the Space Medicine Association and the National Space Club continue to bestow awards named after Nazis. When Jacobsen asked Steve Griffin, head of the National Space Club, why they memorialize Nazi Kurt Debus in this way, he was dispassionate and logical.

    “Simple as it is,” he said, “Kurt Debus is an honored American.”

    By Maureen Callahan February 1, 2014 | 12:29pm

     Find this story at 1 February 2014

    © 2014 NYP Holdings, Inc.

    Nazis Were Given ‘Safe Haven’ in U.S., Report Says

    WASHINGTON — A secret history of the United States government’s Nazi-hunting operation concludes that American intelligence officials created a “safe haven” in the United States for Nazis and their collaborators after World War II, and it details decades of clashes, often hidden, with other nations over war criminals here and abroad.

    The 600-page report, which the Justice Department has tried to keep secret for four years, provides new evidence about more than two dozen of the most notorious Nazi cases of the last three decades.

    It describes the government’s posthumous pursuit of Dr. Josef Mengele, the so-called Angel of Death at Auschwitz, part of whose scalp was kept in a Justice Department official’s drawer; the vigilante killing of a former Waffen SS soldier in New Jersey; and the government’s mistaken identification of the Treblinka concentration camp guard known as Ivan the Terrible.

    The report catalogs both the successes and failures of the band of lawyers, historians and investigators at the Justice Department’s Office of Special Investigations, which was created in 1979 to deport Nazis.

    Perhaps the report’s most damning disclosures come in assessing the Central Intelligence Agency’s involvement with Nazi émigrés. Scholars and previous government reports had acknowledged the C.I.A.’s use of Nazis for postwar intelligence purposes. But this report goes further in documenting the level of American complicity and deception in such operations.

    The Justice Department report, describing what it calls “the government’s collaboration with persecutors,” says that O.S.I investigators learned that some of the Nazis “were indeed knowingly granted entry” to the United States, even though government officials were aware of their pasts. “America, which prided itself on being a safe haven for the persecuted, became — in some small measure — a safe haven for persecutors as well,” it said.

    The report also documents divisions within the government over the effort and the legal pitfalls in relying on testimony from Holocaust survivors that was decades old. The report also concluded that the number of Nazis who made it into the United States was almost certainly much smaller than 10,000, the figure widely cited by government officials.

    The Justice Department has resisted making the report public since 2006. Under the threat of a lawsuit, it turned over a heavily redacted version last month to a private research group, the National Security Archive, but even then many of the most legally and diplomatically sensitive portions were omitted. A complete version was obtained by The New York Times.

    The Justice Department said the report, the product of six years of work, was never formally completed and did not represent its official findings. It cited “numerous factual errors and omissions,” but declined to say what they were.

    More than 300 Nazi persecutors have been deported, stripped of citizenship or blocked from entering the United States since the creation of the O.S.I., which was merged with another unit this year.

    In chronicling the cases of Nazis who were aided by American intelligence officials, the report cites help that C.I.A. officials provided in 1954 to Otto Von Bolschwing, an associate of Adolph Eichmann who had helped develop the initial plans “to purge Germany of the Jews” and who later worked for the C.I.A. in the United States. In a chain of memos, C.I.A. officials debated what to do if Von Bolschwing were confronted about his past — whether to deny any Nazi affiliation or “explain it away on the basis of extenuating circumstances,” the report said.

    The Justice Department, after learning of Von Bolschwing’s Nazi ties, sought to deport him in 1981. He died that year at age 72.

    The report also examines the case of Arthur L. Rudolph, a Nazi scientist who ran the Mittelwerk munitions factory. He was brought to the United States in 1945 for his rocket-making expertise under Operation Paperclip, an American program that recruited scientists who had worked in Nazi Germany. (Rudolph has been honored by NASA and is credited as the father of the Saturn V rocket.)

    The report cites a 1949 memo from the Justice Department’s No. 2 official urging immigration officers to let Rudolph back in the country after a stay in Mexico, saying that a failure to do so “would be to the detriment of the national interest.”

    Justice Department investigators later found evidence that Rudolph was much more actively involved in exploiting slave laborers at Mittelwerk than he or American intelligence officials had acknowledged, the report says.

    Some intelligence officials objected when the Justice Department sought to deport him in 1983, but the O.S.I. considered the deportation of someone of Rudolph’s prominence as an affirmation of “the depth of the government’s commitment to the Nazi prosecution program,” according to internal memos.

    The Justice Department itself sometimes concealed what American officials knew about Nazis in this country, the report found.

    In 1980, prosecutors filed a motion that “misstated the facts” in asserting that checks of C.I.A. and F.B.I. records revealed no information on the Nazi past of Tscherim Soobzokov, a former Waffen SS soldier. In fact, the report said, the Justice Department “knew that Soobzokov had advised the C.I.A. of his SS connection after he arrived in the United States.”

    (After the case was dismissed, radical Jewish groups urged violence against Mr. Soobzokov, and he was killed in 1985 by a bomb at his home in Paterson, N.J. )

    The secrecy surrounding the Justice Department’s handling of the report could pose a political dilemma for President Obama because of his pledge to run the most transparent administration in history. Mr. Obama chose the Justice Department to coordinate the opening of government records.

    The Nazi-hunting report was the brainchild of Mark Richard, a senior Justice Department lawyer. In 1999, he persuaded Attorney General Janet Reno to begin a detailed look at what he saw as a critical piece of history, and he assigned a career prosecutor, Judith Feigin, to the job. After Mr. Richard edited the final version in 2006, he urged senior officials to make it public but was rebuffed, colleagues said.

    When Mr. Richard became ill with cancer, he told a gathering of friends and family that the report’s publication was one of three things he hoped to see before he died, the colleagues said. He died in June 2009, and Attorney General Eric H. Holder Jr. spoke at his funeral.

    “I spoke to him the week before he died, and he was still trying to get it released,” Ms. Feigin said. “It broke his heart.”

    After Mr. Richard’s death, David Sobel, a Washington lawyer, and the National Security Archive sued for the report’s release under the Freedom of Information Act.

    The Justice Department initially fought the lawsuit, but finally gave Mr. Sobel a partial copy — with more than 1,000 passages and references deleted based on exemptions for privacy and internal deliberations.

    Laura Sweeney, a Justice Department spokeswoman, said the department is committed to transparency, and that redactions are made by experienced lawyers.

    The full report disclosed that the Justice Department found “a smoking gun” in 1997 establishing with “definitive proof” that Switzerland had bought gold from the Nazis that had been taken from Jewish victims of the Holocaust. But these references are deleted, as are disputes between the Justice and State Departments over Switzerland’s culpability in the months leading up to a major report on the issue.

    Another section describes as “a hideous failure” a series of meetings in 2000 that United States officials held with Latvian officials to pressure them to pursue suspected Nazis. That passage is also deleted.

    So too are references to macabre but little-known bits of history, including how a director of the O.S.I. kept a piece of scalp that was thought to belong to Dr. Mengele in his desk in hopes that it would help establish whether he was dead.

    The chapter on Dr. Mengele, one of the most notorious Nazis to escape prosecution, details the O.S.I.’s elaborate efforts in the mid-1980s to determine whether he had fled to the United States and might still be alive.

    It describes how investigators used letters and diaries apparently written by Dr. Mengele in the 1970s, along with German dental records and Munich phone books, to follow his trail.

    After the development of DNA tests, the piece of scalp, which had been turned over by the Brazilian authorities, proved to be a critical piece of evidence in establishing that Dr. Mengele had fled to Brazil and had died there in about 1979 without ever entering the United States, the report said. The edited report deletes references to Dr. Mengele’s scalp on privacy grounds.

    Even documents that have long been available to the public are omitted, including court decisions, Congressional testimony and front-page newspaper articles from the 1970s.

    A chapter on the O.S.I.’s most publicized failure — the case against John Demjanjuk, a retired American autoworker who was mistakenly identified as Treblinka’s Ivan the Terrible — deletes dozens of details, including part of a 1993 ruling by the United States Court of Appeals for the Sixth Circuit that raised ethics accusations against Justice Department officials.

    That section also omits a passage disclosing that Latvian émigrés sympathetic to Mr. Demjanjuk secretly arranged for the O.S.I.’s trash to be delivered to them each day from 1985 to 1987. The émigrés rifled through the garbage to find classified documents that could help Mr. Demjanjuk, who is currently standing trial in Munich on separate war crimes charges.

    Ms. Feigin said she was baffled by the Justice Department’s attempt to keep a central part of its history secret for so long. “It’s an amazing story,” she said, “that needs to be told.”

    New York Times, November 12, 2010

    By Eric Lichtblau

    Find this story at 12 November 2010

    The report

    Copyright New York Times 2010

    Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters

    Top-secret documents from the National Security Agency and its British counterpart reveal for the first time how the governments of the United States and the United Kingdom targeted WikiLeaks and other activist groups with tactics ranging from covert surveillance to prosecution.

    The efforts – detailed in documents provided previously by NSA whistleblower Edward Snowden – included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at what the U.S. government calls “the human network that supports WikiLeaks.” The documents also contain internal discussions about targeting the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous.

    One classified document from Government Communications Headquarters, Britain’s top spy agency, shows that GCHQ used its surveillance system to secretly monitor visitors to a WikiLeaks site. By exploiting its ability to tap into the fiber-optic cables that make up the backbone of the Internet, the agency confided to allies in 2012, it was able to collect the IP addresses of visitors in real time, as well as the search terms that visitors used to reach the site from search engines like Google.

    Another classified document from the U.S. intelligence community, dated August 2010, recounts how the Obama administration urged foreign allies to file criminal charges against Assange over the group’s publication of the Afghanistan war logs.

    A third document, from July 2011, contains a summary of an internal discussion in which officials from two NSA offices – including the agency’s general counsel and an arm of its Threat Operations Center – considered designating WikiLeaks as “a ‘malicious foreign actor’ for the purpose of targeting.” Such a designation would have allowed the group to be targeted with extensive electronic surveillance – without the need to exclude U.S. persons from the surveillance searches.

    In 2008, not long after WikiLeaks was formed, the U.S. Army prepared a report that identified the organization as an enemy, and plotted how it could be destroyed. The new documents provide a window into how the U.S. and British governments appear to have shared the view that WikiLeaks represented a serious threat, and reveal the controversial measures they were willing to take to combat it.

    In a statement to The Intercept, Assange condemned what he called “the reckless and unlawful behavior of the National Security Agency” and GCHQ’s “extensive hostile monitoring of a popular publisher’s website and its readers.”

    “News that the NSA planned these operations at the level of its Office of the General Counsel is especially troubling,” Assange said. “Today, we call on the White House to appoint a special prosecutor to investigate the extent of the NSA’s criminal activity against the media, including WikiLeaks, its staff, its associates and its supporters.”

    Illustrating how far afield the NSA deviates from its self-proclaimed focus on terrorism and national security, the documents reveal that the agency considered using its sweeping surveillance system against Pirate Bay, which has been accused of facilitating copyright violations. The agency also approved surveillance of the foreign “branches” of hacktivist groups, mentioning Anonymous by name.

    The documents call into question the Obama administration’s repeated insistence that U.S. citizens are not being caught up in the sweeping surveillance dragnet being cast by the NSA. Under the broad rationale considered by the agency, for example, any communication with a group designated as a “malicious foreign actor,” such as WikiLeaks and Anonymous, would be considered fair game for surveillance.

    Julian Sanchez, a research fellow at the Cato Institute who specializes in surveillance issues, says the revelations shed a disturbing light on the NSA’s willingness to sweep up American citizens in its surveillance net.

    “All the reassurances Americans heard that the broad authorities of the FISA Amendments Act could only be used to ‘target’ foreigners seem a bit more hollow,” Sanchez says, “when you realize that the ‘foreign target’ can be an entire Web site or online forum used by thousands if not millions of Americans.”
    GCHQ Spies on WikiLeaks Visitors

    The system used by GCHQ to monitor the WikiLeaks website – codenamed ANTICRISIS GIRL – is described in a classified PowerPoint presentation prepared by the British agency and distributed at the 2012 “SIGDEV Conference.” At the annual gathering, each member of the “Five Eyes” alliance – the United States, United Kingdom, Canada, Australia and New Zealand – describes the prior year’s surveillance successes and challenges.

    In a top-secret presentation at the conference, two GCHQ spies outlined how ANTICRISIS GIRL was used to enable “targeted website monitoring” of WikiLeaks (See slides 33 and 34). The agency logged data showing hundreds of users from around the world, including the United States, as they were visiting a WikiLeaks site –contradicting claims by American officials that a deal between the U.K. and the U.S. prevents each country from spying on the other’s citizens.

    The IP addresses collected by GCHQ are used to identify individual computers that connect to the Internet, and can be traced back to specific people if the IP address has not been masked using an anonymity service. If WikiLeaks or other news organizations were receiving submissions from sources through a public dropbox on their website, a system like ANTICRISIS GIRL could potentially be used to help track them down. (WikiLeaks has not operated a public dropbox since 2010, when it shut down its system in part due to security concerns over surveillance.)

     

    In its PowerPoint presentation, GCHQ identifies its target only as “wikileaks.” One slide, displaying analytics derived from the surveillance, suggests that the site monitored was the official wikileaks.org domain. It shows that users reached the targeted site by searching for “wikileaks.org” and for “maysan uxo,” a term associated with a series of leaked Iraq war logs that are hosted on wikileaks.org.

    The ANTICRISIS GIRL initiative was operated by a GCHQ unit called Global Telecoms Exploitation (GTE), which was previously reported by The Guardian to be linked to the large-scale, clandestine Internet surveillance operation run by GCHQ, codenamed TEMPORA.

    Operating in the United Kingdom and from secret British eavesdropping bases in Cyprus and other countries, GCHQ conducts what it refers to as “passive” surveillance – indiscriminately intercepting massive amounts of data from Internet cables, phone networks and satellites. The GTE unit focuses on developing “pioneering collection capabilities” to exploit the stream of data gathered from the Internet.

    As part of the ANTICRISIS GIRL system, the documents show, GCHQ used publicly available analytics software called Piwik to extract information from its surveillance stream, not only monitoring visits to targeted websites like WikiLeaks, but tracking the country of origin of each visitor.

    It is unclear from the PowerPoint presentation whether GCHQ monitored the WikiLeaks site as part of a pilot program designed to demonstrate its capability, using only a small set of covertly collected data, or whether the agency continues to actively deploy its surveillance system to monitor visitors to WikiLeaks. It was previously reported in The Guardian that X-KEYSCORE, a comprehensive surveillance weapon used by both NSA and GCHQ, allows “an analyst to learn the IP addresses of every person who visits any website the analyst specifies.”

    GCHQ refused to comment on whether ANTICRISIS GIRL is still operational. In an email citing the agency’s boilerplate response to inquiries, a spokeswoman insisted that “all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorized, necessary and proportionate, and that there is rigorous oversight.”

    But privacy advocates question such assurances. “How could targeting an entire website’s user base be necessary or proportionate?” says Gus Hosein, executive director of the London-based human rights group Privacy International. “These are innocent people who are turned into suspects based on their reading habits. Surely becoming a target of a state’s intelligence and security apparatus should require more than a mere click on a link.”

    The agency’s covert targeting of WikiLeaks, Hosein adds, call into question the entire legal rationale underpinning the state’s system of surveillance. “We may be tempted to see GCHQ as a rogue agency, ungoverned in its use of unprecedented powers generated by new technologies,” he says. “But GCHQ’s actions are authorized by [government] ministers. The fact that ministers are ordering the monitoring of political interests of Internet users shows a systemic failure in the rule of law.”
    Going After Assange and His Supporters

    The U.S. attempt to pressure other nations to prosecute Assange is recounted in a file that the intelligence community calls its “Manhunting Timeline.” The document details, on a country-by-country basis, efforts by the U.S. government and its allies to locate, prosecute, capture or kill alleged terrorists, drug traffickers, Palestinian leaders and others. There is a timeline for each year from 2008 to 2012.

     

    An entry from August 2010 – headlined “United States, Australia, Great Britain, Germany, Iceland” – states: “The United States on August 10 urged other nations with forces in Afghanistan, including Australia, United Kingdom, and Germany, to consider filing criminal charges against Julian Assange.” It describes Assange as the “founder of the rogue Wikileaks Internet website and responsible for the unauthorized publication of over 70,000 classified documents covering the war in Afghanistan.”

     

    In response to questions from The Intercept, the NSA suggested that the entry is “a summary derived from a 2010 article” in the Daily Beast. That article, which cited an anonymous U.S. official, reported that “the Obama administration is pressing Britain, Germany, Australia, and other allied Western governments to consider opening criminal investigations of WikiLeaks founder Julian Assange and to severely limit his nomadic travels across international borders.”

    The government entry in the “Manhunting Timeline” adds Iceland to the list of Western nations that were pressured, and suggests that the push to prosecute Assange is part of a broader campaign. The effort, it explains, “exemplifies the start of an international effort to focus the legal element of national power upon non-state actor Assange, and the human network that supports WikiLeaks.” The entry does not specify how broadly the government defines that “human network,” which could potentially include thousands of volunteers, donors and journalists, as well as people who simply spoke out in defense of WikiLeaks.

    In a statement, the NSA declined to comment on the documents or its targeting of activist groups, noting only that the agency “provides numerous opportunities and forums for their analysts to explore hypothetical or actual circumstances to gain appropriate advice on the exercise of their authorities within the Constitution and the law, and to share that advice appropriately.”

    But the entry aimed at WikiLeaks comes from credentialed officials within the intelligence community. In an interview in Hong Kong last June, Edward Snowden made clear that the only NSA officials empowered to write such entries are those “with top-secret clearance and public key infrastructure certificates” – a kind of digital ID card enabling unique access to certain parts of the agency’s system. What’s more, Snowden added, the entries are “peer reviewed” – and every edit made is recorded by the system.

    The U.S. launched its pressure campaign against WikiLeaks less than a week after the group began publishing the Afghanistan war logs on July 25, 2010. At the time, top U.S. national security officials accused WikiLeaks of having “blood” on its hands. But several months later, McClatchy reported that “U.S. officials concede that they have no evidence to date that the documents led to anyone’s death.”

    The government targeting of WikiLeaks nonetheless continued. In April 2011, Salon reported that a grand jury in Virginia was actively investigating both the group and Assange on possible criminal charges under espionage statutes relating to the publication of classified documents. And in August of 2012, the Sydney Morning Herald, citing secret Australian diplomatic cables, reported that “Australian diplomats have no doubt the United States is still gunning for Julian Assange” and that “Australia’s diplomatic service takes seriously the likelihood that Assange will eventually be extradited to the US on charges arising from WikiLeaks obtaining leaked US military and diplomatic documents.”

    Bringing criminal charges against WikiLeaks or Assange for publishing classified documents would be highly controversial – especially since the group partnered with newspapers like The Guardian and The New York Times to make the war logs public. “The biggest challenge to the press today is the threatened prosecution of WikiLeaks, and it’s absolutely frightening,” James Goodale, who served as chief counsel of the Times during its battle to publish The Pentagon Papers, told the Columbia Journalism Review last March. “If you go after the WikiLeaks criminally, you go after the Times. That’s the criminalization of the whole process.”

    In November 2013, The Washington Post, citing anonymous officials, reported that the Justice Department strongly considered prosecuting Assange, but concluded it “could not do so without also prosecuting U.S. news organizations and journalists” who had partnered with WikiLeaks to publish the documents. According to the Post, officials “realized that they have what they described as a ‘New York Times problem’” – namely, that any theory used to bring charges against Assange would also result in criminal liability for the Times, The Guardian, and other papers which also published secret documents provided to WikiLeaks.
    NSA proposals to target WikiLeaks

    As the new NSA documents make clear, however, the U.S. government did more than attempt to engineer the prosecution of Assange. NSA analysts also considered designating WikiLeaks as a “malicious foreign actor” for surveillance purposes – a move that would have significantly expanded the agency’s ability to subject the group’s officials and supporters to extensive surveillance.

    Such a designation would allow WikiLeaks to be targeted with surveillance without the use of “defeats” – an agency term for technical mechanisms to shield the communications of U.S. persons from getting caught in the dragnet.

    That top-secret document – which summarizes a discussion between the NSA’s Office of the General Counsel and the Oversight and Compliance Office of the agency’s Threat Operations Center – spells out a rationale for including American citizens in the surveillance:

    “If the foreign IP is consistently associated with malicious cyber activity against the U.S., so, tied to a foreign individual or organization known to direct malicious activity our way, then there is no need to defeat any to, from, or about U.S. Persons. This is based on the description that one end of the communication would always be this suspect foreign IP, and so therefore any U.S. Person communicant would be incidental to the foreign intelligence task.”

    In short, labeling WikiLeaks a “malicious foreign target” would mean that anyone communicating with the organization for any reason – including American citizens – could have their communications subjected to government surveillance.

    When NSA officials are asked in the document if WikiLeaks or Pirate Bay could be designated as “malicious foreign actors,” the reply is inconclusive: “Let us get back to you.” There is no indication of whether either group was ever designated or targeted in such a way.

    The NSA’s lawyers did, however, give the green light to subject other activists to heightened surveillance. Asked if it would be permissible to “target the foreign actors of a loosely coupled group of hackers … such as with Anonymous,” the response is unequivocal: “As long as they are foreign individuals outside of the US and do not hold dual citizenship … then you are okay.”
    NSA Lawyers: “It’s Nothing to Worry About”

    Sanchez, the surveillance expert with the Cato Institute, says the document serves as “a reminder that NSA essentially has carte blanche to spy on non-Americans. In public statements, intelligence officials always talk about spying on ‘terrorists,’ as if those are the only targets — but Section 702 [of the 2008 FISA Amendments Act] doesn’t say anything about ‘terrorists.’ They can authorize collection on any ‘persons reasonably believed to be [located] outside the United States,’ with ‘persons’ including pretty much any kind of group not ‘substantially’ composed of Americans.”

    Sanchez notes that while it makes sense to subject some full-scale cyber-attacks to government surveillance, “it would make no sense to lump together foreign cyberattackers with sites voluntarily visited by enormous numbers of Americans, like Pirate Bay or WikiLeaks.”

    Indeed, one entry in the NSA document expressly authorizes the targeting of a “malicious” foreign server – offering Pirate Bay as a specific example –“even if there is a possibility that U.S. persons could be using it as well.” NSA officials agree that there is no need to exclude Americans from the surveillance, suggesting only that the agency’s spies “try to minimize” how many U.S. citizens are caught in the dragnet.

    Another entry even raises the possibility of using X-KEYSCORE, one of the agency’s most comprehensive surveillance programs, to target communications between two U.S.-based Internet addresses if they are operating through a “proxy” being used for “malicious foreign activity.” In response, the NSA’s Threat Operations Center approves the targeting, but the agency’s general counsel requests “further clarification before signing off.”

    If WikiLeaks were improperly targeted, or if a U.S. citizen were swept up in the NSA’s surveillance net without authorization, the agency’s attitude seems to be one of indifference. According to the document – which quotes a response by the NSA’s Office of General Counsel and the oversight and compliance office of its Threat Operations Center – discovering that an American has been selected for surveillance must be mentioned in a quarterly report, “but it’s nothing to worry about.”

    The attempt to target WikiLeaks and its broad network of supporters drew sharp criticism from the group and its allies. “These documents demonstrate that the political persecution of WikiLeaks is very much alive,” says Baltasar Garzón, the Spanish former judge who now represents the group. “The paradox is that Julian Assange and the WikiLeaks organization are being treated as a threat instead of what they are: a journalist and a media organization that are exercising their fundamental right to receive and impart information in its original form, free from omission and censorship, free from partisan interests, free from economic or political pressure.”

    For his part, Assange remains defiant. “The NSA and its U.K. accomplices show no respect for the rule of law,” he told The Intercept. “But there is a cost to conducting illicit actions against a media organization.” Referring to a criminal complaint that the group filed last year against “interference with our journalistic work in Europe,” Assange warned that “no entity, including the NSA, should be permitted to act against a journalist with impunity.”

    Assange indicated that in light of the new documents, the group may take further legal action.

    “We have instructed our general counsel, Judge Baltasar Garzón, to prepare the appropriate response,” he said. “The investigations into attempts to interfere with WikiLeaks’ work will go wherever they need to go. Make no mistake: those responsible will be held to account and brought to justice.”

    By Glenn Greenwald and Ryan Gallagher
    18 Feb 2014, 1:50 AM EST

    Find this story at 18 February 2014

    © 2014 First Look Productions, Inc.

    Leaked NSA documents show debate over tracking WikiLeaks, The Pirate Bay, and others

    Leaked documents posted by Glenn Greenwald and Ryan Gallagher hint at the discussions that took place around online actors like WikiLeaks, The Pirate Bay, and Anonymous, as well as the standards for spying on foreign and domestic internet users. At The Intercept, Greenwald and Gallagher have revealed details about when the NSA and agencies abroad believe it’s acceptable to target a person or site without “defeats” or measures to prevent collecting American information, with an eye towards groups that have proved a thorn in the side of government agencies.

    Julian Assange appears in national security ‘Manhunting Timeline’

    “Can we treat a foreign server who stores, or potentially disseminates leaked or stolen US data on it’s [sic] server as a ‘malicious foreign actor’ for the purpose of targeting with no defeats? Examples: WikiLeaks, thepiratebay.org, etc.” says one of several frequently asked questions apparently posted to an intelligence wiki for the US and other nations in the Five Eyes surveillance partnership. “Let us get back to you,” said a response from the NSA/CSS [Central Security Service] Threat Operation Center and the NSA’s Office of General Counsel. Another question asks whether it’s legal to target members of Anonymous who operate outside the US. “As long as they are foreign individuals outside of the US and do not hold dual citizenship… then you are okay,” came the answer. Agencies were not, however, apparently allowed to store copies of classified documents leaked by Anonymous or other groups in order to analyze the data.

    WikiLeaks in particular came under fire. In addition to these questions, The Intercept leaked parts of a “Manhunting Timeline” that details where and how the US government is attempting to find, capture, or kill terrorists, drug traffickers, and others. This timeline apparently included information on Julian Assange, including attempts to pressure foreign governments into taking legal action against him and “the human network that supports WikiLeaks.” None of this comes as a surprise — the government’s attempts to get governments to put pressure on Assange is well known. Likewise, Anonymous has allegedly compromised government computers, and it’s not strange that the NSA wants to monitor it. The question of treating leaked document repositories as malicious foreign actors is thornier, playing into much larger debates over whether non-traditional journalism should be given the same protection as older outlets like The New York Times.

    “If you ‘guess’ foreign and it’s not, then it is a serious violation.”

    More generally, the document shows a complicated dance between minimizing US data collection and casting an expansive net over foreign surveillance. According to the FAQ, it’s legal to monitor foreign servers that Americans visit (The Pirate Bay is cited again) so long as agents attempt to filter out US information. The same goes for botnets that are operated from hacked US computers by a foreign source. As before, the document points to a fairly low standard for being certain that a target is foreign: 51 percent. A more complicated question is how agents are allowed to search traffic from US-based web giants like Gmail and Twitter. If an agency knows that a foreign potential threat is using one of these sites, it’s theoretically possible to look for traffic from it. But “if you ‘guess’ foreign and it’s not, then it is a serious violation.” In general, though, accidentally making queries a US person who was believed to be foreign was “nothing to worry about,” although it had to be logged for the Office of General Counsel.

    The revelations here are far less conclusive than many of the leaked documents published so far. One slide apparently from an expanded version of this GCHQ document shows an analytics page that seems to monitor visits to WikiLeaks, including which countries visitors came from and how they found the site. But it’s not clear whether this is an ongoing program or a proof of concept test, especially given how few visits appear to be logged. The results are also broadly similar to what someone would get from a basic analytics page, not detailed user information. This slideshow and the FAQ do, however, give us a look into how the NSA and other agencies view online spycraft, both inside and outside the US.

    By Adi Robertson on February 18, 2014 10:36 am

     

    Find this story at 18 February 2014

    © 2014 Vox Media,

    New Snowden docs show NSA, GCHQ spied on WikiLeaks, Pirate Bay users; GCHQ conducts broad surveillance of social media and watched WikiLeaks users.

    Squeaky Dolphin, GCHQ’s broad social media monitoring tool, is part of the agency’s campaign to “understand and shape the Human Terrain”—that is, regional public sentiment.

     

    Documents obtained by former NSA contractor Edward Snowden and published on The Intercept show that NSA analysts monitored content on The Pirate Bay and used the agency’s surveillance systems to track where it came from. The documents also show that the NSA’s British partners at the GCHQ used XKeyscore data as part of a surveillance program on sites that included WikiLeaks. That was part of a broader psychological profiling and targeting program to collect intelligence, influence individuals online, and disrupt groups like Anonymous that were considered threats.

    The new documents show that the GCHQ conducted “broad real-time monitoring of social media activities, processing data on activities like watching YouTube videos and Facebook Likes to profile, categorize, and target individuals for psychological operations.” The NSA documents in the latest disclosure refer to monitoring for content that could be considered “malicious foreign activity.” But it’s clear that the NSA also used its XKeyscore surveillance to dig through traffic to the torrent-sharing site, and it could very well have profiled foreign users of sites like WikiLeaks and monitored their access to that and other websites.

    However, the documents—one an internal NSA “frequently asked questions” Wiki page and the other a set of GCHQ slides on psychological operations—do not provide a picture of how much information about people accessing WikiLeaks was shared between the GCHQ and the NSA. And while the documents point to NSA monitoring of Pirate Bay, there’s no suggestion of how the information gathered was used or if it was used at all.

    A third, unpublished document shows that the Obama administration apparently encouraged foreign governments in 2010 (including the UK) to pursue charges against WikiLeaks for the publication of diplomatic “wires” provided by Chelsea Manning, formerly known as Bradley Manning.
    “Squeaky Dolphin,” “Airwolf,” and “AnticrisisGirl”

    The GCHQ slide deck, published in 2012, highlights two tools used to conduct social networking, Web monitoring, and profiling. The first, called “Squeaky Dolphin,” pulls online activities within Web traffic caught by the agency’s monitoring systems. The monitoring systems are called “Airwolf” in the slides, which may be a UK codeword for the GCHQ’s equivalent of XKeyscore. That data includes webmail, blogs visited, YouTube views, Facebook “likes” clicked on websites themselves, and other data culled from individual users’ captured activity.

    It runs those activities, captured in real-time, through IBM’s InfoSphere Streams processing software to create analytical feeds. Those feeds are then piped into a Splunk database and surfaced through a “dashboard” view that allows analysts to find trends in sentiment. As an example, the slides showed activity related to cricket matches in London and the surge in Facebook likes for Conservative member of Parliament Liam Fox. It can also be used to spot trends in traffic that might indicate upcoming events such as protests or other civil unrest.

    While Squeaky Dolphin tends to look at things with a wider view, “AnticrisisGirl” is a bit more targeted. It can be used to passively monitor specific websites—including traffic to WikiLeaks, as the slides demonstrate. The tool can be tuned to a specific set of Internet user signatures or keywords, and it provides analytics of their behavior in real time, capturing search terms or direct Web addresses used to get to the sites in question.
    “Nothing to worry about”

    The final document in the latest disclosure, from an NSA internal Wiki, is entitled “Discovery SIGINT Targeting Scenarios and Compliance.” Created in 2011, it provides guidance on what is and isn’t allowed in performing XKeyscore queries and using other analytics tools to capture and analyze data. The document explains when it’s allowed to query against US “selectors”—people or systems running within the United States.

    One of the entries is entitled “Unknowingly targeting a US person”:

    I screwed up…the selector had a strong indication of being foreign, but it turned out to be US…now what?

    NOC/OGC RESPONSE: With all querying, if you discover it actually is US, then it must be submitted and go in the [Office of General Counsel] quarterly report…’but it’s nothing to worry about.’ (Source #001)

    Several of the entries on the Wiki page relate to monitoring of PirateBay. One question posted asked whether it was OK to back-trace connections to thepiratebay.org “even if it hops through US based proxies.” The NSA’s Office of General Counsel responded that it was allowed only by use of metadata “chaining” in compliance with the Department of Defense’s Supplemental Procedures Governing Communications Metadata Analysis” (SPCMA). That order requires that analysts “enter a foreign intelligence (FI) justification for making a query or starting a chain”—in other words, analysts can’t just start a query of a post on The Pirate Bay without documenting their cause.

    Another question posted about The Pirate Bay asked if a password for an account associated with a US person was enough to rule out tracking the source. “If a list of .mil passwords were released to thepiratebay.org…can we go back into [XKeyscore data] (using a custom created fingerprint) to search for traffic containing that password in foreign traffic just before the release?” The official response was that while a password alone would not normally be considered to a “US person,” searching for the password data for military accounts would be allowed due to the NSA’s support role for the Defense Department. Such actions would be “consistent with the SIGINT Consensual Collection package signed by [the commander of] USCYBERCOM and [director of the NSA], appropriate to both of his hats”—referring to Gen. Keith Alexander’s dual role as head of both DOD’s cyber operations and the NSA.

    Ironically, the NSA’s privacy regulations do keep it from collecting one type of data—private information published by hackers. In a response to a question on whether it was legal to store data exposed by Anonymous or other groups for forensic purposes, the NSA general counsel said it was only legal to retain “.mil information.” It wasn’t clear whether it was legal to retain data from other government agencies.

    by Sean Gallagher – Feb 18 2014, 8:35pm +0100

     Find this story at 18 February 2014

    © 2014 Condé Nast.

    NSA, GCHQ targeted WikiLeaks network; U.K. and U.S. governments used surveillance and political pressure against publishers of government abuses

    The latest report from the Intercept based on Edward Snowden’s NSA leaks reveals how the NSA and its British counterpart GCHQ targeted WikiLeaks and its supporters. The report details how the U.S. and U.K. governments deployed surveillance tools against WikiLeaks networks and supporters, while pressuring international governments to persecute the organization’s founder, Julian Assange, over the publication of the Afghanistan war logs. The documents also show that the NSA considered ways to spy on Anonymous affiliates and hackers as well as users of file-sharing site Pirate Bay.

    The documents are some of the most significant to come to light yet in highlighting the government’s engagement in what Snowden’s attorney Jesselyn Raddack has long called a “war on information.” Publishers and activists have been specifically targeted for making public otherwise secrecy-shrouded instances of abuses of power by the government and the military. “This is a very troubling report,” said Jameel Jaffer, American Civil Liberties Union deputy legal director. “Publishers who disclose abuses of government power should not be subjected to invasive surveillance for having done so, and individuals should not be swept up into surveillance dragnets simply because they’ve visited websites that report on those abuses.”

    The efforts – detailed in documents provided previously by NSA whistleblower Edward Snowden – included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at what the U.S. government calls “the human network that supports WikiLeaks.” The documents also contain internal discussions about targeting the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous.

    One classified

    Tuesday, Feb 18, 2014 07:31 PM +0100
    Natasha Lennard

    Find this story at 18 February 2013

    © 2014 The Associated Press

    NSA, British spy agency targeted Assange & the WikiLeaks’ ‘human network’

    American and British spy agencies conducted a campaign against the WikiLeaks website and its surrounding “human network,” according to a new report.

    The article, appearing Tuesday in the online publication The Intercept, is based on new information found in documents previously released by Edward Snowden. He is the former National Security Agency (NSA) contractor who has made public — through WikiLeaks — a large cache of otherwise secret NSA materials.

    One classified document from the British spy agency Government Communications Headquarters (GCHQ) appears to be presenting a primer on passive monitoring of websites. But the Intercept story adds the factor that GCHQ’s monitoring system, called ANTICRISIS GIRL, secretly monitored visitors to WikiLeaks via a tap into Internet backbone cables, capturing in real time the IP addresses of site visitors.

    Also included is a 2011 document of an internal NSA wiki with a brief discussion about whether the classification “malicious foreign actor” can be applied to WikiLeaks:

    “Can we treat a foreign server who stores or potentially disseminates leaked or stolen data on its server as a ‘malicious foreign actor’ for the purpose of targeting with no defeats? Examples: WikiLeaks, thepiratebay.org, etc.”

    The response by an unnamed NSA employee says, “Let me get back to you.” The term “no defeats” is considered to mean “with no protections.” The inclusion of the Pirate Bay site, which has been cited for copyright violations, either indicates that classified material was thought to be part of its inventory, or the national security agency was expanding its scope to include copyright.

    There is no indication that WikiLeaks or Pirate Bay was actually classified as a “malicious foreign actor” by the NSA. But a 2008 U.S. Army report did identify WikiLeaks as an enemy.

    The “human network” also included, of course, WikiLeaks’ founder and editor-in-chief, Julian Assange. An August, 2010 unclassified document also unearthed by The Intercept indicates that the U.S. urged other countries fighting in Afghanistan to file criminal charges against Assange for the publication of more than 70,000 classified documents relating to the war, which had been provided by Army Private First Class Bradley Manning.

    The document said that this “appeal exemplifies the start of an international effort to focus the legal element of national power upon non-state actor Assange and the human network that supports WikiLeaks.”

    Last year, James Goodale, then the chief counsel of The New York Times, told the Columbia Journalism Review that “the biggest challenge to the press today is the threatened persecution of WikiLeaks, and it’s absolutely frightening.” The Times worked with WikiLeaks in publishing the content of some of the secret documents.

    February 18, 2014 1:00 PM
    Barry Levine

     Find this story at 18 February 2014

    © Copyright 2014 VentureBeat

    Visited WikiLeaks? NSA and GCHQ know about it

    Julian Assange in 2011 after losing appeals against extradition to Swedenacidpolly/Flickr/CC BY-NC-SA 2.0

    Efforts undertaken by the NSA and GCHQ to target groups including WikiLeaks, Anonymous and Pirate Bay using internet surveillance and prosecution have been detailed in an article published by The Intercept.

    The latest documents leaked by NSA contractor Edward Snowden reveal that the NSA went to great lengths to target individuals associated with WikiLeaks, including founder Julian Assange and “the human network that supports it”.

    One particular document revealed that GCHQ tapped into fibre-optic cables to monitor visitors to the site in real time by tracking their IP addresses. It also tracked the search terms that visitors were using to reach the site, all as part of an operation codenamed ANTICRISIS GIRL. This suggests that internet users from anywhere in the world who visited WikiLeaks regularly could potentially have become a target for the NSA.

    The documents also reveal that the NSA labelled WikiLeaks “a malicious foreign actor”. The US government encouraged foreign regimes to press charges against Assange over WikiLeaks’ publication of Afghanistan war logs.

    “WikiLeaks strongly condemns the reckless and unlawful behaviour of the National Security Agency,” said Julian Assange in a statement published on the WikiLeaks site. He called upon the Obama administration to conduct an investigation into the extent of the NSA’s activity regarding the media, including the WikiLeaks network. He also criticised the media-monitoring activities of GCHQ, saying it shows no respect for the rule of law.

    “No entity, including the NSA, should be permitted to act against journalists with impunity. We have instructed our General Counsel Judge Baltasar Garzón to prepare the appropriate response. The investigations into attempts to interfere with the work of WikiLeaks will go wherever they need to go. Make no mistake: those responsible will be held to account and brought to justice.”

    The Intercept — the new publication launched by ex-Guardian journalist Glenn Greenwald, who has headed up the reporting on the Snowden documents — points out that the WikiLeaks surveillance reveals just how far the NSA’s actions stray from its “self-proclaimed focus on terrorism”.

    “The documents call into question the Obama administration’s repeated insistence that US citizens are not being caught up in the sweeping surveillance dragnet being cast by the NSA. Under the broad rationale considered by the agency, for example, any communication with a group designated as a ‘malicious foreign actor,’ such as WikiLeaks and Anonymous, would be considered fair game for surveillance,” the site points out.

    The targeting of WikiLeaks, Anonymous and Pirate Bay follows earlier revelations that GCHQ used DDoS attacks to target hacker collectives Anonymous and LulzSec. These latest accusations do not reflect well on GCHQ, which maintains its stance that “all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight”. It’s hard to see how this would apply to the monitoring of citizens from the UK and abroad who might be doing nothing more than reading the WikiLeaks site.

    Politics / 19 February 14 / by Katie Collins

     

    Find this story at 19 February 2014

    © Condé Nast UK 2014

     

    Turning a Wedding Into a Funeral: U.S. Drone Strike in Yemen Killed as Many as 12 Civilians

    Human Rights Watch has revealed as many as 12 civilians were killed in December when a U.S. drone targeted vehicles that were part of a wedding procession going toward the groom’s village outside the central Yemeni city of Rad’a. According to HRW, “some, if not all those killed and wounded were civilians” and not members of the armed group al-Qaeda in the Arabian Peninsula as U.S. and Yemeni government officials initially claimed. The report concluded that the attack killed 12 men, between the ages of 20 and 65, and wounded 15 others. It cites accounts from survivors, relatives of the dead, local officials and news media reports. We speak to Human Rights Watch researcher Letta Tayler, who wrote the report, “A Wedding That Became a Funeral: US Drone Attack on Marriage Procession in Yemen,” and Jeremy Scahill, co-founder of the TheIntercept.org, a new digital magazine published by First Look Media. He is the producer and writer of the documentary film, “Dirty Wars: The World is a Battlefield,” which is nominated for an Academy Award.

    Transcript

    This is a rush transcript. Copy may not be in its final form.

    JUAN GONZÁLEZ: A new report has revealed that a U.S. drone strike that killed at least a dozen people in Yemen in December failed to comply with rules imposed by President Obama last year to protect civilians. The strike was carried out by the U.S. military’s Joint Special Operations Command and targeted vehicles that were part of a wedding procession going towards the groom’s village outside the central Yemeni city of Rad’a. According to the Human Rights Watch investigation, quote, “some, if not all those killed and wounded were civilians” and not members of the armed group al-Qaeda in the Arabian Peninsula as U.S. and Yemeni government officials initially claimed. The report concluded that the attack killed 12 men between the ages of 20 and 65 and wounded 15 others. It cites accounts from survivors, relatives of the dead, local officials and news media reports.

    One of the witnesses Human Rights Watch interviewed in Yemen was Abdullah Muhammad al-Tisi of Yakla. He described the scene on the day the wedding procession was attacked on December 12, 2013. His son, Ali Abdullah Muhammad al-Tisi, was killed in that drone strike.

    ABDULLAH MUHAMMAD AL-TISI: [translated] We were having a traditional marriage ceremony. According to our traditions, the whole tribe has to go to the bride’s tribe. We were in about 12 to 15 cars with 60 to 70 men on board. He had lunch at the bride’s village at Al Abu Saraimah. Then we left to head back to the groom’s village.

    A drone was hovering overhead all morning. There were one or two of them. One of the missiles hit the car. The car was totally burned. Four other cars were also struck. When we stopped, we heard the drone fire. Blood was everywhere, and the people killed and injured were scattered everywhere. The area was full of blood, dead bodies and injured people. I was injured. I saw the missile hit the vehicle behind the car my son was driving.

    INTERVIEWER: [translated] Was it your car?

    ABDULLAH MUHAMMAD AL-TISI: [translated] It was my own car. I went there to check on my son. I found his body thrown from the car. I turned him over, and he was dead. He was already dead.

    I didn’t see any al-Qaeda militants in the procession, and no one from the area is a member of al-Qaeda. The Yemeni government gave us 100 Kalashnikovs and 34 million Yemeni rials, nearly $159,000 U.S., according to tribal tradition. According to tribal tradition, this alone is an admission of guilt, and the money was an admission of guilt. The money was for the burial of the dead and the treatment of the injured. The U.S. government made a big mistake. They killed innocent people. This was a serious crime. They turned many kids into orphans, many wives into widows. Many were killed, and many others were injured, although everyone was innocent.

    AMY GOODMAN: That was Abdullah Muhammad al-Tisi talking about the U.S. drone strike in December that killed his son. All of this comes as the White House is reportedly considering using a drone to kill a U.S. citizen living in Pakistan who’s allegedly affiliated with al-Qaeda.

    For more, we’re joined right now by Letta Tayler, senior researcher on terrorism and counterterrorism at Human Rights Watch. She wrote the new report titled “A Wedding That Became a Funeral: US Drone Attack on Marriage Procession in Yemen.”

    We’re also joined by Democracy Now! video stream by Jeremy Scahill, co-founder of TheIntercept.org, as well as the producer of and the co-writer of the documentary that’s been nominated for an Oscar, Dirty Wars.

    We welcome you both to Democracy Now! Letta, you just recently came back from Yemen, came out with this report. Talk about its findings.

    LETTA TAYLER: Well, it’s a pleasure to be here.

    What we found is that this strike on a wedding convoy in Yemen killed 12 people, injured 15, including the bride, who received a superficial face wound. And we have serious concerns that the strike not only may have violated international law, but also flies in the face of President Obama’s policies on targeted killings. The president has said the U.S. does not strike unless it has near certainty that no civilians were killed, yet the evidence strongly suggests that at least some of those killed in this strike, and possibly all of them, were civilians.

    JUAN GONZÁLEZ: Now, could you talk to us about what your research involved in producing the report? And also, you seem to have found contradictions between what national Yemeni officials were saying and what local provincial or officials closer to the ground were saying.

    LETTA TAYLER: Yes, indeed, there are a mind-boggling array of on, off and on-the-record comments about this strike, which really underscores the urgent need for the United States to come clean on what exactly happened. I researched this strike in Yemen. This is my seventh or eighth trip to Yemen in recent years, many of those trips to look at this particular issue of targeted killings. I met with relatives and family members there, as well as government officials, academics, journalists and so forth. The most compelling testimony, of course, was from the family members—as you’ve seen in the video, men holding tattered ID cards of their loved ones, in some cases the only remaining item that they had of these people who died, and saying to me, “Explain to me, explain to me why did the U.S. kill my son, why did the U.S. kill my nephew.” Even the—even the son of the groom from a previous marriage was killed in this strike. And these Yemenis deserve answers from the United States as to what happened.

    AMY GOODMAN: What has the U.S. said?

    LETTA TAYLER: The U.S. has responded to my report in a fashion that I find disappointing and disconcerting. We are getting more of the same obfuscation. We’re getting more off-the-record comments to media that, yes, this strike did hit, that the targets of the strike were militants. But where is the evidence? Show us the proof. Show us the findings of your reports. If indeed militants were killed, let us judge the facts. Let us see if you’re complying with law and with your own policy.

    JUAN GONZÁLEZ: Now, the government did claim that there was a particular militant that they were looking to kill, but then his name did not appear in the list of the dead, right?

    LETTA TAYLER: Yes, Shawqi al-Badani. He was not among the 12 names that were given to me, the 12 bodies that were identified by relatives as well as other media in Yemen. And indeed, the relatives I spoke to said they never heard of this man.

    AMY GOODMAN: Jeremy Scahill, in Dirty Wars, you go to Yemen. You investigate a number of drone strikes. Talk about how this one fits in, the December attack that is now—we’re talking about, of the Human Rights Watch report.

    JEREMY SCAHILL: Well, first of all, I mean, what I think is really key here that Letta and the team at Human Rights Watch have really zeroed in on is that when there are—when there’s these strikes and civilians are killed, the Obama administration has stated that they do a review, that they do an investigation. And indeed, these anonymous officials have been saying to major media outlets that they did an internal investigation and that the Department of Defense determined that the individuals that were killed were in fact legitimate combatants. And yet, those reports are never made public.

    In the cases that I’ve investigated in Yemen, one of which was the al-Majalah bombing that you referenced, it was the first time that we know of that President Obama authorized a military-style attack inside of Yemen. And that wasn’t a drone attack; it was actually a cruise missile attack. And it killed three dozen—more than three dozen people, the overwhelming majority of whom were women and children. There supposedly was an internal investigation into that, and yet the White House won’t release it. The Pentagon will not release these investigations that they do. In the case of the drone bombings of Anwar Awlaki, an American citizen, and then his 16-year-old son two weeks later in a separate drone strike, again they said that there was an internal investigation into the killing of this boy. The findings of it are not released.

    And what we’re seeing right now, and we’ve talked about this a lot on the show, boils down to the Obama administration trying to wage what it perceives—what it believes is, you know, pre-emptive war or preventative strikes, where they’re killing people that they think may one day pose a threat, or they may have picked up chatter that they’ve been discussing some kind of a plot. And there’s no—not even a sort of vague idea that we should have any kind of a law enforcement approach to the crime of terrorism anymore. They’re just zapping people, you know, in acts of precrime. The idea of judicial process or legal process has been replaced by the National Security Agency tracking the metadata of individuals in various countries, building profiles of where—what telephones are in contact with other telephones, where particular SIM cards have been physically or geographically. And then you have a secret process in the White House on these so-called Terror Tuesday meetings where officials essentially condemn the users of these SIM cards or phones to death, and then President Obama signs off, and the drone serves as the executioner. That’s basically the judicial process that the U.S. now offers to people who are actually not even accused of the crime of terrorism, just perceived by the White House to be involved with it.

    JUAN GONZÁLEZ: Well, Jeremy, you’ve mentioned President Obama’s direct involvement in—of this. I want to turn to him speaking about drone strikes during the first major counterterrorism address of his second term. His comments came one day after Attorney General Eric Holder confirmed U.S. drone strikes had killed four American citizens in Yemen and Pakistan.

    PRESIDENT BARACK OBAMA: And before any strike is taken, there must be near certainty that no civilians will be killed or injured—the highest standard we can set. Yes, the conflict with al-Qaeda, like all armed conflict, invites tragedy. But by narrowly targeting our action against those who want to kill us, and not the people they hide among, we are choosing the course of action least likely to result in the loss of innocent life.

    JUAN GONZÁLEZ: That was President Obama. Letta?

    LETTA TAYLER: I wanted to point out one thing in this speech. He said, “We’re targeting those who want to get us, not those they hide among.” There is one theory about this December 12th strike on the wedding convoy, that members of AQAP, al-Qaeda in the Arabian Peninsula, the Yemen-based group, may have infiltrated the convoy. If this is true—and I have no idea that it is; we have no evidence one way or the other that AQAP was actually in this convoy, but let’s assume for the moment that this might be correct—that shielding—it’s called human shielding—for AQAP to go into the convoy, would not excuse or exonerate the—excuse the—would not give the United States the right to attack that convoy. The United States as an attacking force always has to distinguish between civilians and combatants. And by combatants, I mean lawful targets. We have a lot of questions as to whether many of the people being killed who the U.S. considers militants are actually lawful targets. So, even if AQAP was hiding among these forces, it wouldn’t necessarily mean that that strike was lawful.

    AMY GOODMAN: We’re talking to Letta Tayler, Human Rights Watch senior researcher at Human Rights Watch, who just came out with this report, “A Wedding That Became a Funeral: US Drone Attack on Marriage Procession in Yemen.” What are the implications of this report? And what has the U.S. said to you? Have other countries gotten in touch with you?

    LETTA TAYLER: Well, the implications of this report are first that we’re still operating in a vast accountability vacuum. The United States is saying, “Trust us,” yet they’re not giving us any information that would allow us to trust them. And this sets a very—not only does this mean that the U.S. may well be violating international law and President Obama’s own policy, but it sets a very dangerous precedent for countries around the world. I don’t find it surprising that journalists from Russia and China call us, frequently, when we come out with a report like this, because there are many leaders in many countries who are very happy to see the U.S. pave the way for taking out people without any justification, anytime, anywhere, and simply calling them terrorists or threats to national security.

    JUAN GONZÁLEZ: And, Jeremy, have we seen any movement at all on the part of the administration, given all of the—all of the publicity that has come out about these strikes now, or even in terms of Congress attempting to rein in the policies of the administration?

    JEREMY SCAHILL: Well, I mean, Congress is almost entirely asleep at the wheel when it comes to oversight or raising serious questions about the drone program or the assassination policy in general. I mean, the most vocal critics of this program, who have raised some of the essential questions, are people like Senator Rand Paul of Kentucky, who on many issues really sounds like a raving lunatic, but on this particular issue, when he filibustered the nomination of John Brennan, who really was the drone czar of the Obama administration’s first term, Rand Paul read into the congressional record human rights reports, media reports about civilians killed. It was the first time that there was discussion on the floor of the U.S. Senate of American citizens potentially being targeted for assassination in these drone strikes.

    But, you know, polls indicate that a solid percentage of self-identified liberal Democrats support the White House on this, and that’s in part due to the fact that President Obama has projected—and it really boils down to propaganda—that this is somehow a cleaner way of waging war. I think also, politically, many Democrats would be opposing these policies or raising serious questions if their guy wasn’t in the White House. If McCain or Mitt Romney had won those elections, I think we would see a more robust discussion in Congress on this.

    But President Obama said in his major address, and then his administration has released papers saying that among the standards is not just that mere certainty that civilians will not be killed, but also that the individuals that they’re targeting represent an imminent threat and that they—and that capture is not feasible. And I think that those two factors in this should also be investigated, because I don’t believe that the majority of the people that are killed in these drone strikes are engaged in an imminent plot that’s going to harm America’s national security or American interests, even as broadly as the Obama administration defines it.

    I mean, we really—this should be brought up at an international level, because the U.S., as Letta says, is setting a standard. There are some 80 countries in the world that have weaponized drone technology. It’s just a matter of time before a Russia or a China says, “You know what? America does this. We have the right to do it, too,” and they start doing drone attacks to take out dissidents or people that they perceive to be terrorists.

    Every nation around the world now claims that it’s in a war against terrorism. I was just in Egypt, where the U.S.-backed dictatorship of General Sisi is in power, and there are huge posters all over Egypt that talk about how the Egyptian government is in a war against terrorism. It’s really a cooptation of this Bush-Cheney idea, that Obama unfortunately has continued, that if you just label your enemies as terrorists, you can justify doing anything to them and justify denying them of any basic rights. You can’t surrender to a drone, and you can’t turn yourself in when you haven’t been charged with a crime. To what authority do you surrender?

    AMY GOODMAN: We want to thank you both for being with us. Jeremy Scahill, co-founder of TheIntercept.org, a new digital magazine published by First Look Media, also the producer and writer of the documentary Dirty Wars , which has been nominated for an Oscar. Congratulations, Jeremy, and good luck on your road to the Oscars, which will be on March 2nd. And Letta Tayler, senior researcher on terrorism and counterterrorism at Human Rights Watch. Her report, “A Wedding That Became a Funeral: US Drone Attack on Marriage Procession in Yemen,” we’ll link to at democracynow.org.

    This is the 18th birthday of Democracy Now!, and in our breaks, we are showing folks and encouraging people to go to our website at democracynow.org and submit pictures of yourself holding up signs that say, “I need Democracy Now! because…” and you fill in the rest or send us videos, as well. Stay with us.

    [break]

    AMY GOODMAN: That’s Patti Smith, “People Have the Power,” and I thank all the people from all over the world who are sending in pictures and videos letting us know what you think. Again, you can go to our website at democracynow.org. And I’m also thinking today about Julie Drizin, who was the first producer of Democracy Now!, and also our colleague Sharif Abdel Kouddous, who is in Cairo, in Egypt, and our colleagues Anjali Kamat and Nicole Salazar and so many others who make—helped make this program great, as well as Kris Abrams out there in Colorado. Well, I’m Amy Goodman, with Juan González. We’ve been with you for 18 years, as we turn to another story.

    Friday, February 21, 2014

    Find this story at 21 February 2014

     

    The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.

     

    Karim Khan, Anti-Drone Activist Who Lost Family Members to U.S. Strike, Goes Missing in Pakistan

    An anti-drone activist and journalist has gone missing in Pakistan just days before he was due to travel to Europe to speak with Parliament members about the impact of the U.S. drone wars. The legal charity Reprieve says Karim Khan was seized in the early hours of February 5 by up to 20 men, some wearing police uniforms. He has not been seen since. Khan’s brother and son were both killed in a drone strike. In addition to public activism, Khan was also engaged in legal proceedings against the Pakistani government for their failure to investigate the killings of his loved ones. We are joined by filmmaker Madiha Tahir, who interviewed Khan for her documentary, “Wounds of Waziristan.”

    “These are people seeking peaceful, legal routes for restitution for a great harm that been done to them,” Tahir says. Of drone victim’s families’ difficulty gaining legal traction, she says, “It speaks to the secretive nature of the American state.”
    Transcript

    This is a rush transcript. Copy may not be in its final form.

    NERMEEN SHAIKH: We begin today’s show in Pakistan, where an anti-drone activist and journalist has gone missing just days before he was due to travel to Europe to speak with Parliament members about the impact of the U.S. drone wars. The legal charity Reprieve says Karim Khan was seized in the early hours of February 5th by up to 20 men, some wearing police uniforms. He has not been seen since. Karim Khan’s brother and son were both killed in a drone strike. He told his story in the recent documentary Wounds of Waziristan.

    KARIM KHAN: [translated] In 2009, my home was attacked by a drone. My brother and son were martyred. My son’s name was Hafiz Zaenullah. My brother’s name was Asif Iqbal. There was a third person who was a stone mason. He was a Pakistani. His name was Khaliq Dad.

    Their coffins were lying next to each other in the house. Their bodies were covered with wounds. Later, I found some of their fingers in the rubble.

    As you know, my son had memorized the Qur’an. He was a security guard at the girls’ school, and he was studying for grade 10. My brother had a master’s degree in English. He was a government employee. He loved to debate, but he was so short, he didn’t reach the dais, so they wouldn’t give him many chances to make speeches.

    AMY GOODMAN: Karim Khan speaking in the film Wounds of Waziristan. Since his son and brother were killed in 2009, Karim became a prominent anti-drone activist. He’s been missing since last week. The executive director of Reprieve, Clare Algar, said in a statement, quote, “We are very worried about Mr Khan’s safety. He is a crucial witness to the dangers of the CIA’s covert drone programme, and has simply sought justice for the death of his son and brother through peaceful, legal routes,” she said.

    Well, for more, we’re joined by Madiha Tahir. She made the film Wounds of Waziristan. She is a freelance journalist whose work has appeared in Foreign Affairs, Vice, BBC, PRI’s The World, Global Post and other outlets, co-editor of the anthology Dispatches from Pakistan.

    Madiha Tahir, thanks so much for being here. We broadcast Wounds of Waziristan and got tremendous response to it. Now one of the key figures who you interview in it, Karim Khan, is gone, at least for the moment. Explain who he is, his significance.

    MADIHA TAHIR: Karim Khan is actually one of the first people to bring a case in the Pakistani courts on—about drone attacks. So he’s the one who started to bring cases forward, and he has been working with a lawyer, Shahzad Akbar, who has been fighting on behalf of drone survivors and families of the dead. And Karim was working with Shahzad to help, you know, not only in his own case, but also to help and assist in other cases that were being brought forward in Pakistani courts to demand restitution and demand transparency for—you know, for these attacks.

    NERMEEN SHAIKH: Madiha, can you give us a sense of how many such cases have been filed and whether other anti-drone activists in Pakistan have been targeted in any way or in fact picked up in the way that he was, Karim Khan?

    MADIHA TAHIR: So, Karim is the first, that I know of, that has been picked up who is an anti-drone activist, but disappearances in Pakistan are very common. It’s a common state tactic. It has been happening in Balochistan, where there is a separatist movement, for a long time now. And, in fact, three are families protesting. There were mass graves found in Balochistan of missing people quite recently, only a few weeks ago. So this is a very common tactic by the state, and now, clearly, the Pakistani establishment, which is to say the intelligence agencies and the Pakistani army, want to send a message to the anti-drone movement to tell us to—you know, to tell the movement to shut up, basically.

    AMY GOODMAN: I want to go back to your film, Wounds of Waziristan. In this clip, Karim speaks to you, Madiha Tahir.

    KARIM KHAN: [translated] You asked me a question about terrorism. Can I ask you one? What is the definition of “terrorism” or “terrorist”?

    MADIHA TAHIR: [translated] I don’t know. What do you think it is?

    KARIM KHAN: [translated] I think there is no bigger terrorist than Obama or Bush, those who have weaponry like drones, who drop bombs on us while we are in our homes. There are no greater terrorists than them.

    AMY GOODMAN: There again, Karim Khan, who went missing last week. And the people who took him, how many people saw this go down?

    MADIHA TAHIR: His family was at home. His wife and his children were at home when it happened, so they saw it, and there are other eyewitnesses who saw it. He was picked up by 15 to 20 people. It seems to be people who were dressed in plainclothes, as well as police officers, who picked him up and disappeared him. His whereabouts are unknown. His family has not been able to find out where he’s being kept. Shahzad Akbar, the lawyer, did file something on his behalf in the Lahore court, and the court has ordered the intelligence agencies now to produce him by February 20th before the court. So we have to wait for that date and see what happens. But the best scenario would be that he is released before then.

    NERMEEN SHAIKH: And Karim Khan moved from Waziristan to Rawalpindi. Can you talk about the significance of the area from which he was picked up and whether it’s significant that—or whether it ’ widely believed that the people who were responsible for picking him up were the ISI, the intelligence services, or the military, or a combination?

    MADIHA TAHIR: I mean, I think it is significant. It speaks to the nature of—again, it speaks to the nature of state violence in Pakistan. I think the news media both in the United States and in Pakistan has been—and, you know, rightly so—discussing the attacks by militants that have happened in Pakistan, and those acts, you know, have been reprehensible. Just two days ago, there was a bomb blast in a Peshawar cinema that killed anywhere between 11 to 13 people. But it’s important to realize that that violence happens in a context, and that context is state violence, which has been brutal, in the sense of it’s very quiet, there are disappearances like this. In this case, it’s a high-profile activist, but there are many people who we don’t even know have been picked up and disappeared by the state. So it is—you know, there’s a cyclical pattern between state violence and the non-state violence that is happening in Pakistan.

    AMY GOODMAN: Madiha, talk about what he would say if he did get out. Where was he going in Europe? Who was he going to be addressing?

    MADIHA TAHIR: Karim Khan was actually slated to speak to several European parliaments next week, and he was going to talk about the drone attack that killed his son and his brother on New Year’s Eve in 2009. And he would have talked about the cost of these attacks on the people in the tribal areas in Pakistan, who are some of the most marginalized communities in Pakistan. For simply for wanting to speak out about what happened to him and what is happening and continues to happen in that area, he has been disappeared by the Pakistani state. And certainly, I think, you know, we shouldn’t forget that the United States has backed and funded the Pakistani military, and this is happening, so, in conjunction with these states working together, both Pakistan and the United States.

    NERMEEN SHAIKH: Madiha, you also spoke about the increasing cycle of violence in Pakistan, both state violence and anti-state violence. Could you draw the links between what you think is the correlation, or if there is any, between the increasing number of drone strikes and really the unprecedented number of suicide bombs that occur now in Pakistan, a place which never knew suicide bombs 10 years—you know, 10 years ago?

    MADIHA TAHIR: Yes. I mean, I think it’s—we have to be wary of drawing simple causes. So it’s not that, you know, suicide bombings are happening because. You know, it’s not a straightforward cause; however, there is a linkage. And you’re right, there is a correlation. The suicide attacks have increased in the last decade as Pakistan has been attacked by drones and has participated in the war on terror. The violence in Pakistan has gotten so much worse, not just suicide bombings, but all sorts of blasts happening. So, certainly, the war on terror, if it was meant to protect Pakistanis, is not working at all. It has actually had an adverse effect. By some estimates, you know, anywhere—you know, something like 30,000 Pakistanis have been killed in attacks by non-state actors. So, the war on terror is something that is something that the U.S. and the Pakistani government have been sort of working on together, but it’s certainly not had—it’s certainly not been to the—on behalf of Pakistanis.

    AMY GOODMAN: Madiha, I want to go back to your film, Wounds of Waziristan, where you speak with Karim Khan’s lawyer, the man you just mentioned, Shahzad Akbar.

    MADIHA TAHIR: This is Shahzad Akbar. He’s Karim’s lawyer. They’ve filed a case against drone attacks in Pakistani courts. He told me why it’s difficult to narrate his clients’ lives for the court and the media.

    SHAHZAD AKBAR: For example, you know, when I have a client and we want—OK, this was a person who was killed, so we’d like to construct his life on photographs. You know, you have family photos and—of when he was young, when he was in school, when he was in teens and when he grew up—in all those photos. They’re missing. They’re not there, because, you know, you don’t have the culture of taking pictures for that matter.

    AMY GOODMAN: In 2012, Democracy Now! spoke to Shahzad Akbar, the co-founder of the Foundation for Fundamental Rights, an organization that represents victims of drone strikes in Pakistani courts. Again, he is Karim Khan’s lawyer. And Akbar explained why he decided to visit the United States at that time.

    SHAHZAD AKBAR: I, on behalf of the victims in Pakistan, wanted to reach out to Americans so that they can make an informed judgment on drones. Their opinion matter, and it’s going to matter in next elections, as well. So they need to know what drones are doing to humans in Pakistan, many of them who are civilians. And it has been said by independent groups and journalists, as well, a bigger—higher number of civilian victims. And that has to be reported to the American public so they can make an informed judgment on drones, that if American government should let be killing people overseas in their names.

    AMY GOODMAN: Now, this is Shahzad Akbar, who you’ve just watched and listened to. He was in the United States in 2012. But this past year, when some of his clients came to the United States, drone victims—the Rafiq Rehman family, little girl, little boy, both injured when their grandmother was blown up in a drone strike—he was not granted a visa to come to the United States. The significance of this, Madiha Tahir? Of course, it made it much more difficult. They didn’t speak English. He would have been as much their navigator and their comfort. They were in a strange land, in fact a land where the drone came from that killed their grandmother.

    MADIHA TAHIR: I mean, these are people that are seeking peaceful, legal routes for restitution for something—for a great harm that has been done to them and for a loss they will suffer for the rest of their lives. And so, to not allow their lawyer is to say that the U.S. doesn’t care about legal—about the rule of law and about the legal process at all, to not allow their representatives to come to the United States and to speak, you know, to stand by his clients and to speak alongside them. I think it’s highly problematic, but I think it speaks to the secretive nature of the American state.

    NERMEEN SHAIKH: And, Madiha, can you give us a sense of how many victims or families of victims of drone strikes have attempted to bring their cases to the courts, either in Pakistan or indeed in the U.S.?

    MADIHA TAHIR: I’m not sure exactly what the figures are at this point, because the cases are at different levels. Some of them are still—they’re—Shahzad and others are actually still in the process of gathering information in order to, you know, get the cases out there. So the most significant cases right now are—you know, there’s been the Karim Khan’s case and also Noor Khan, who is the son of the tribal—the mullah who was killed on March 17th in a drone attack on a jirga, a gathering, that killed upwards of 40, 50 people.

    AMY GOODMAN: The Obama administration is facing criticism over reports it’s debating whether to kill a U.S. citizen living in Pakistan who’s allegedly plotting terror attacks. On Monday, I spoke with journalist Glenn Greenwald, who recently launched TheIntercept.org with Jimmy Scahill and Laura Poitras. I asked Glenn about the initial Associated Press article that broke the story. And folks can go to our website at democracynow.org to hear what Glenn responded. I think, actually, we have it for you right now.

    GLENN GREENWALD: The very idea that the U.S. government suspects an American citizen, not of having already engaged in crimes, but of planning to do so, as Jeremy said, it’s like a pre-crime framework, where the U.S. government tries to guess at who will engage in crimes in the future and then treat them as a criminal—but then, not just treat them as a criminal, but declare them guilty in secret proceedings, not involving any court, but by the decree of the president of the United States to literally, A, declare the person guilty, B, impose the death penalty, and then, C, go out and carry out the execution—just like they did with Anwar Awlaki and Samir Khan. And now they are obviously viewing it as a regular practice. I mean, no American, no matter your political affiliation or ideology, should accept the idea that the president of the United States has the power to order American citizens killed, not on a battlefield or anywhere else that is in a war zone, but simply on the suspicion that they intend to engage in future criminal behavior. To describe that power is to describe the most extremist and out-of-control government you can get.

    AMY GOODMAN: That is Glenn Greenwald of The Intercept. Mahiha?

    MADIHA TAHIR: Yes, I mean, I agree with Glenn Greenwald. It is—you know, it is a kind of pre-crime for which this American citizen is now going to be possibly attacked for by the United States. I think it’s important to remember that most of the people who are being attacked in exactly a similar way are not Americans, they are Pakistanis, Yemenis, Somali, etc. In Pakistan, as you know, there has been the tactic of what are called signature strikes, which are strikes that aren’t actually targeting a specific, named, high-value target or anything of that nature, but rather people whose behavioral patterns, for one reason or another, appear to trigger a suspicion in the U.S. intelligence apparatus that they may or may not be militants. We don’t actually know. But simply on that basis, on very faulty intelligence, much of which is happening through cellphone—unreliable cellphone data, you know, a lot of these attacks are carried out, and why we have the figures that we have of the numbers of people killed.

    Wednesday, February 12, 2014

    Find this story at 12 February 2014

    The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.

    WikiLeaks Volunteer Was a Paid Informant for the FBI

    On an August workday in 2011, a cherubic 18-year-old Icelandic man named Sigurdur “Siggi” Thordarson walked through the stately doors of the U.S. embassy in Reykjavík, his jacket pocket concealing his calling card: a crumpled photocopy of an Australian passport. The passport photo showed a man with a unruly shock of platinum blonde hair and the name Julian Paul Assange.

    Thordarson was long time volunteer for WikiLeaks with direct access to Assange and a key position as an organizer in the group. With his cold war-style embassy walk-in, he became something else: the first known FBI informant inside WikiLeaks. For the next three months, Thordarson served two masters, working for the secret-spilling website and simultaneously spilling its secrets to the U.S. government in exchange, he says, for a total of about $5,000. The FBI flew him internationally four times for debriefings, including one trip to Washington D.C., and on the last meeting obtained from Thordarson eight hard drives packed with chat logs, video and other data from WikiLeaks.

    The relationship provides a rare window into the U.S. law enforcement investigation into WikiLeaks, the transparency group newly thrust back into international prominence with its assistance to NSA whistleblower Edward Snowden. Thordarson’s double-life illustrates the lengths to which the government was willing to go in its pursuit of Julian Assange, approaching WikiLeaks with the tactics honed during the FBI’s work against organized crime and computer hacking — or, more darkly, the bureau’s Hoover-era infiltration of civil rights groups.

    “It’s a sign that the FBI views WikiLeaks as a suspected criminal organization rather than a news organization,” says Stephen Aftergood of the Federation of American Scientists’ Project on Government Secrecy. “WikiLeaks was something new, so I think the FBI had to make a choice at some point as to how to evaluate it: Is this The New York Times, or is this something else? And they clearly decided it was something else.”

    The FBI declined comment.

    Thordarson was 17 years old and still in high school when he joined WikiLeaks in February 2010. He was one of a large contingent of Icelandic volunteers that flocked to Assange’s cause after WikiLeaks published internal bank documents pertaining to that country’s financial crisis.

    When a staff revolt in September 2010 left the organization short-handed, Assange put Thordarson in charge of the WikiLeaks chat room, making Thordarson the first point of contact for new volunteers, journalists, potential sources, and outside groups clamoring to get in with WikiLeaks at the peak of its notoriety.

    In that role, Thordarson was a middle man in the negotiations with the Bradley Manning Defense Fund that led to WikiLeaks donating $15,000 to the defense of its prime source. He greeted and handled a new volunteer who had begun downloading and organizing a vast trove of 1970s-era diplomatic cables from the National Archives and Record Administration, for what became WikiLeaks’ “Kissinger cables” collection last April. And he wrangled scores of volunteers and supporters who did everything from redesign WikiLeaks’ websites to shooting video homages to Assange.

    He accumulated thousands of pages of chat logs from his time in WikiLeaks, which, he says, are now in the hands of the FBI.

    Thordarson’s betrayal of WikiLeaks also was a personal betrayal of its founder, Julian Assange, who, former colleagues say, took Thordarson under his wing, and kept him around in the face of criticism and legal controversy.

    “When Julian met him for the first or second time, I was there,” says Birgitta Jonsdottir, a member of Icelandic Parliament who worked with WikiLeaks on Collateral Murder, the Wikileaks release of footage of a US helicopter attack in Iraq. “And I warned Julian from day one, there’s something not right about this guy… I asked not to have him as part of the Collateral Murder team.”

    In January 2011, Thordarson was implicated in a bizarre political scandal in which a mysterious “spy computer” laptop was found running unattended in an empty office in the parliament building. “If you did [it], don’t tell me,” Assange told Thordarson, according to unauthenticated chat logs provided by Thordarson.

    “I will defend you against all accusations, ring [sic] and wrong, and stick by you, as I have done,” Assange told him in another chat the next month. “But I expect total loyalty in return.”

    Instead, Thordarson used his proximity to Assange for his own purposes. The most consequential act came in June 2011, on his third visit to Ellingham Hall — the English mansion where Assange was then under house arrest while fighting extradition to Sweden.

    For reasons that remain murky, Thordarson decided to approach members of the Lulzsec hacking gang and solicit them to hack Islandic government systems as a service to WikiLeaks. To establish his bona fides as a WikiLeaks representative, he shot and uploaded a 40-second cell phone video that opens on the IRC screen with the chat in progress, and then floats across the room to capture Asssange at work with an associate. (This exchange was first reported by Parmy Olson in her book on Anonymous).

     

    Unfortunately for Thordarson, the FBI had busted Lulzsec’s leader, Hector Xavier Monsegur, AKA Sabu, a week earlier, and secured his cooperation as an informant. On June 20, the FBI warned the Icelandic government. “A huge team of FBI came to Iceland and asked the Icelandic authorities to help them,” says Jonsdottir. “They thought there was an imminent Lulzsec attack on Iceland.”

    The FBI may not have known at this point who Thordarson was beyond his screen names. The bureau and law enforcement agencies in the UK and Australia went on to round up alleged Lulzsec members on unrelated charges.

    Having dodged that bullet, it’s not clear what prompted Thordarson to approach the FBI two months later. When I asked him directly last week, he answered, “I guess I cooperated because I didn’t want to participate in having Anonymous and Lulzsec hack for Wikileaks, since then you’re definitely breaking quite a lot of laws.”

    That answer doesn’t make a lot of sense, since it was Thordarson, not Assange, who asked Lulzsec to hack Iceland. There’s no evidence of any other WikiLeaks staffer being involved. He offered a second reason that he admits is more truthful: “The second reason was the adventure.”

    Thordarson’s equivocation highlights a hurdle in reporting on him: He is prone to lying. Jonsdottir calls him “pathological.” He admits he has lied to me in the past. For this story, Thordarson backed his account by providing emails that appear to be between him and his FBI handlers, flight records for some of his travels, and an FBI receipt indicating that he gave them eight hard drives. The Icelandic Ministry of the Interior has previously confirmed that the FBI flew to Iceland to interview Thordarson. Thordarson also testified to much of this account in a session of the Icelandic Parliament, with Jonsdottir in attendance.

    Finally, he has given me a substantial subset of the chat logs he says he passed to the FBI, amounting to about 2,000 pages, which, at the very least, proves that he kept logs and is willing to turn them over to a reporter disliked by Julian Assange.

    Thordarson’s “adventure” began on August 23, 2011, when he sent an email to the general delivery box for the U.S. embassy in Reykjavík “Regarding an Ongoing Criminal investigation in the United States.”

    “The nature of the intel that can be brought to light in that investigation will not be spoken over email conversation,” he wrote cryptically.

    An embassy security officer called him the same day. “He said, ‘What investigation?’ I said the Wikileaks,” says Thordarson. “He denied there was such an investigation, so I just said we both know there is.”

    Thordarson was invited to the embassy, where he presented a copy of Assange’s passport, the passport for Assange’s number two, Kristinn Hrafnsson, and a snippet of a private chat between Thordarson and Assange. The embassy official was noncommittal. He told Thordarson they might be in touch, but it would take at least a week.

    It happened much faster.

     

    Photo: Courtesy Sigurdur Thordarson

    FBI agents and two federal prosecutors landed in a private Gulfstream on the next day, on August 24, and Thordarson was summoned back to the embassy.

    He was met by the same embassy official who took his keys and his cell phone, then walked with him on a circuitous route through the streets of downtown Reykjavík, ending up at the Hotel Reykjavik Centrum, Thordarson says. There, Thordarson spent two hours in a hotel conference room talking to two FBI agents. Then they accompanied back to the embassy so he could put money in his parking meter, and back to the hotel for more debriefing.

    The agents asked him about his Lulzsec interactions, but were primarily interested in what he could give them on WikiLeaks. One of them asked him if he could wear a recording device on his next visit to London and get Assange to say something incriminating, or talk about Bradley Manning.

    “They asked what I use daily, have always on,” he says. “I said, my watch. So they said they could change that out for some recording watch.”

    Thordarson says he declined. “I like Assange, even considered him a friend,” he says. “I just didn’t want to go that way.”

    In all, Thordarson spent 20 hours with the agents over about five days. Then the Icelandic government ordered the FBI to pack up and go home.

    It turns out the FBI had misled the local authorities about its purpose in the country. According to a timeline (.pdf) later released by the National Commissioner of the Icelandic Police, the FBI contacted Icelandic law enforcement to report Thordarson’s embassy walk-in, and ask for permission to fly into the country to follow up. But the bureau had presented the request as an extension of its earlier investigation into Lulzsec, and failed to mention that its real target was WikiLeaks.

    WikiLeaks is well regarded in Iceland, and the incident errupted into a hot political topic when it surfaced there this year, with conservatives arguing that Iceland should have cooperated with the FBI, and liberals complaining about the agents being allowed into the country to begin with. “It became a massive controversy,” says Jonsdottir. “And then none of them knew what sort of person Siggi is.”

    Politics aside, the FBI was not done with Thordarson.

    The agents persuaded Thordarson to fly to Copenhagen with them, he says, for another day of interviews. In October, he made a second trip to Denmark for another debriefing. Between meetings, Thordarson kept in touch with his handlers through disposable email accounts.

    In November 2011, Thordarson was fired from WikiLeaks. The organization had discovered he had set up an online WikiLeaks tee shirt store and arranged for the proceeds to go into his own bank account. WikiLeaks has said the embezzlement amounted to about $50,000.

    Thordarson told the FBI about it in a terse email on November 8. “No longer with WikiLeaks — so not sure how I can help you more.”

    “We’d still like to talk with you in person,” one of his handlers replied. “I can think of a couple of easy ways for you to help.”

    “Can you guys help me with cash?” Thordarson shot back.
    Image: Courtesy Sigurdur Thordarson

    For the next few months, Thordarson begged the FBI for money, while the FBI alternately ignored him and courted him for more assistance. In the end, Thordarson says, the FBI agreed to compensate him for the work he missed while meeting with agents (he says he worked at a bodyguard-training school), totaling about $5,000.

    With the money settled, the FBI began preparing him for a trip to the U.S. “I wanted to talk to you about future things we can do,” his handler wrote in February. The FBI wanted him to reestablish contact with some of his former WikiLeaks associates. “We’ll talk about specific goals of the chats, but you can get a head start before our meet by just getting in touch and catching up with them. If you need to know who specifically, we can discuss on the phone.”

    The three-day D.C. trip took place in February of last year. Thordarson says he flew on Iceland Air flight 631 to Logan International Airport on February 22, and transferred in Boston to JetBlue flight 686 to Dulles International Aiport, where he was greeted by a U.S. Customs official “and then escorted out the Dulles terminal into the arms of the FBI.”

    He stayed at a hotel in Arlington, Virginia, where the Justice Department’s investigation into WikiLeaks is centered, and met there with his two usual FBI contacts, and three or four other men in suits who did not identify themselves.

     

    “At the last day we went to a steak house and ate, all of us,” he says. “Where they served Coca Cola in glass bottles from Mexico.”

    On March 18, 2012, he had one more meeting with the FBI in Denmark. On this trip, he brought along eight of his personal hard drives, containing the information he’d compiled while at WikiLeaks, including his chat logs, photos and videos he shot at Ellingham Hall. The FBI gave him a signed receipt for the hardware.

    Then they cut him off.

    Today, Thordarson, now 20, has new problems. He’s facing criminal charges in Iceland for unrelated financial and tax crimes. In addition, WikiLeaks filed a police report for the tee-shirt shop embezzlement.

    The legacy of his cooperation with the FBI is unclear. A court filing revealed last week shows that in the months following Thordarson ’s last debriefing, Justice Department officials in Arlington, Virginia, began obtaining court orders targeting two of Thordarson ’s former WikiLeaks colleagues in Iceland: Smari McCarthy and Herbert Snorrason.

    Snorrason, who ran the WikiLeaks chat room in 2010, before Thordarson took it over, had the entire contents of his Gmail account handed over to the government, under a secret search warrant issued in October 2011.

    The evidence used to obtain the warrant remains under seal. “I do wonder,” says Thordarson, “whether I’m somewhere in there.”

    By Kevin Poulsen06.27.136:30 AM

     Find this story at 27 June 2013

    WIRED.com © 2014 Condé Nast.

     

    The WikiLeaks Mole; How a teenage misfit became the keeper of Julian Assange’s deepest secrets – only to betray him

    On a recent frigid night near Reykjavik, Iceland, Sigurdur “Siggi” Thordarson slips into a bubbling geothermal pool at a suburban swim club. The cherubic, blond 21-year-old, who has been called everything in the press from “attention seeker” to “traitor” to “psychopath,” ends many of his days here, where, like most places around the city, he’s notorious. But even at a spa, he can find only the briefest moment of relaxation. Soon, the local prosecutor who is trying him for leaking financial records joins him in the tub, and Siggi quickly has to flee to another pool. “How does it feel to be the most dangerous man in Iceland?” a bather shouts across the steam.

    Julian Assange: The Rolling Stone Interview

    In person, Siggi’s doughy shape and boyish smile make him seem less than menacing – unless you’re another one of the world’s most dangerous men, Julian Assange. Four years ago, just as WikiLeaks was winning international notoriety, the then-17-year-old hacking prodigy became Assange’s youngest and most trusted sidekick. “It was like Batman and Robin,” says Birgitta Jónsdóttir, a former WikiLeaks volunteer and member of the Icelandic parliament. But as Assange became more embattled and besieged, the protégé turned on his mentor in the most shocking of ways: becoming the first FBI informant inside the group.

    Siggi’s story of international espionage and teenage high-roller antics plays like James Bond meets Superbad, starring a confounding mash-up of awkward man-child and balls-out tech savant. And his tale reveals not only the paranoia and strife within WikiLeaks, but just how far the feds were willing to go to get Assange.

    Siggi still lives with his parents in a nondescript high-rise, sitting at his computer in a bedroom lined with stuffed animals, including an orangutan-size Garfield he bought for $2,000. But his jet-black Mercedes ML350 is parked outside, which, along with his recent conviction for sexual misconduct against a 17-year-old boy (he says the relationship was consensual), speaks to his bizarre double life.

    The Trials of Bradley Manning

    The revelation of Siggi’s role as an FBI snitch has polarized WikiLeaks insiders. When I met with WikiLeaks spokesman Kristinn Hrafnsson (Assange declined to talk for this story), he grew red in the face, dismissing Siggi as “a pathological liar,” a party line echoed by the WikiLeaks faithful. “It all sounds rather absurd,” Hrafnsson says, “to go and to spend all this time analyzing the absolute bullshit that is flowing out of this young man, who is so troubled that he should be hospitalized.”

    While other WikiLeaks insiders also question Siggi’s credibility, they insist that his story can’t be discounted, and there’s more to it than the organization is letting on. Tangerine Bolen, founder of the whistle-blowing advocacy organization RevolutionTruth, which used to work closely with WikiLeaks, is among those who say the group’s efforts to discredit Siggi are “patently false. They’re scared. The fact is Siggi played a key role in the organization and was very close to Julian.”

    The truth, it seems, may be held in the leaks. Siggi has provided Rolling Stone with more than a terabyte of secret files he claims to have taken from WikiLeaks before he left in November 2011 and gave to the FBI: thousands of pages of chat logs, videos, tapped phone calls, government documents and more than a few bombshells from the organization’s most heated years. They’re either the real thing, or the most elaborate lie of the digital age.

    Jacob Applebaum: The American WikiLeaks Hacker

    Assange himself validated the importance of Siggi’s documents when he filed an affidavit late this past summer asserting that “the FBI illegally acquired stolen organisational and personal data belonging to WikiLeaks, me and other third parties in Denmark in March 2012” and that the FBI “was attempting to entrap me through Sigurdur Thordarson.”

    Whatever their origins, the SiggiLeaks are a deep and revealing portal into one of the most guarded and influential organizations of the 21st century – and the extreme measures its embattled leader is willing to take. Of all Assange’s allies who’ve come and gone, few served him as faithfully as Siggi, or betrayed him so utterly. “One thing is sure,” Siggi tells me in his thick Icelandic accent, as the vapors from the thermal pool rise around him. “I have not lived a life like a teenager.”

    L
    ike Assange and so many gifted hackers, Siggi had an isolated childhood. The son of a hairdresser and a paint-company sales manager, he grew up with his little sister in a middleclass suburb of Reykjavik. Though puckish and bright, he was bored by school, alienated from his classmates and dreamed of a life beyond bourgeois Nordic comfort. “When I was, like, 12 years old, I wished for a couple of things,” he tells me as we drive one afternoon past some lava fields outside the capital. “I wished to be rich; I wished to be a famous guy; I wished to live an adventureful life.”

    He found the excitement he craved in computers, and at age 12 he says he hacked into his first website, a local union’s home page, which he replaced with a picture of “a big fluffy monkey.” The experience empowered him. “When you do something like that, you feel invincible,” he says, “and if you can do that, what else can you do?”

    He found out two years later, when, on a plane back from a family vacation, he fixed a laptop for a businessman sitting next to him. The executive was so impressed by his skills that he offered him a job at the Icelandic financial firm Milestone: scrubbing computers of sensitive documents. Siggi figures the company trusted him with such data because he was only 14 and must have thought, as he says, “I wouldn’t understand what I was supposed to delete.” Plus, the pay dwarfed that of his paper route.

    WikiLeaks’ Greatest Hits

    Curious about the files he was erasing, he’d copy them and study them at night. What he eventually discovered astonished him: Employees of Milestone seemed guilty of large-scale corruption in collusion with local politicians. At this time, in 2009, Iceland was reeling from the worldwide financial crisis, and Siggi believed the people deserved to know the role of Milestone and their dirty politicians – even if that meant leaking the files. “Someone has to do it,” he thought, “and why not me?”

    In the fall, Siggi says he brought more than 600 gigabytes of Milestone data to the Icelandic newspaper Dagbladid Vísir, making front-page news and leading to investigations against the politicians and businessmen he exposed. Siggi believed in the importance of exposing the corruption he describes as “illegal as it gets.” With his identity still secret, he kept on leaking to other media outlets until, for reasons he never learned, his childhood friend outed him, a betrayal that changed him. “I literally just stopped believing in humanity,” he says. “Since then, I just basically stopped having feelings.”

    But after being arrested and splashed across the news, he found a powerful connection in Kristinn Hrafnsson. A well-known TV reporter in Reykjavik at the time, Hrafnsson considered Siggi’s leaks to be “quite significant” and worthy of an introduction to another up-and-coming whistle-blower, Julian Assange, who was speaking at the University of Iceland. Though WikiLeaks had already exposed death squads in Kenya and financial malfeasance in the Swiss bank Julius Baer, the group was still largely unknown. But at the panel, Siggi found, to his surprise, that Assange was well aware of his work – he even chastised the reporter who revealed Siggi’s name in the Milestone leak. “He was basically just condemning the guy, sayingouting whistleblowers is wrong,” recalls Siggi, who reveled in the support.

    The bond between the two was immediate. Assange too had been arrested for hacking when he was a young man in Australia. He also had a son, Daniel, who was roughly Siggi’s age, whom he had little contact. “I think Julian saw himself in Siggi,” says Jónsdóttir. “Julian felt an immediate sympathy toward the kid.”

    After the panel, Siggi says he took Assange to Sea Bar, a small, rustic restaurant on the water. Over lobster soup and whale steak, they spoke about politics, hacking and their shared sense of purpose in exposing the secrets of the elite. Assange struck Siggi as someone with the courage to take on anyone. “He’s the kind of activist that does the thing that has to be done,” Siggi tells me. After talking for a few hours, Assange took out a small metal box. “Have you ever seen this before?” he said.

    Assange cracked open the container and revealed three phones inside. “These are encrypted cellphones,” he said. “I’m going to give you one. Just keep it on at all times so I can communicate with you, day and night.”
    W
    ithin just a few weeks, Siggi was inside Assange’s small inner circle, a complex place where decisions centered on the mercurial leader. “There’s a video I want to show you,” Siggi recalls Assange telling him as they sat inside Jónsdóttir’s small house in Reykjavik one wintry night soon after they met in February 2010.

    “Are you sure you want to show this to him?” said Jónsdóttir. She was concerned about Siggi’s involvement in the project and didn’t entirely trust him, but nevertheless felt protective of the boy. “He was just a lonely kid that had been bullied,” she recalls, “and I felt sort of motherly towards him in the beginning.” Before Assange cued up the clip, she warned Siggi, “This is a disgusting video.”

    The grainy footage showed an Apache helicopter firing upon men in the streets of Baghdad. “This can cause a World War III,” Assange said. Though Siggi was new, he didn’t hesitate to express his concerns. “We have to be careful about what we publish,” he said. When Assange wanted to call the video “Collateral Murder,” Siggi told him he thought that was too dramatic. Assange seemed to value the bluntness of his new recruit. “I considered him a friend, and I believe he considered me a friend as well,” Siggi recalls. “If I was against something he said, I told him so, and that was something he liked.”

    That spring, when the group was riding an international wave of attention after the video’s release, Siggi, whom Assange gave the handle PenguinX (he was later known as Q), became his dependable errand boy and confidant: talking regularly, looking for equipment, making encrypted calls to contacts on Assange’s behalf. After Bradley Manning was arrested for the “Collateral Murder” leak in May 2010, Assange wrote Siggi that it “might help if people think he’s gay. . . . [The] gay lobby in U.S. is very big, and the whole ‘gays in the military’ thing is very contentious.” When Assange eclipsed pop stars in Time’s person-of-the-year poll, he giddily messaged Siggi, “We beat Gaga!” But the pressure was getting to Assange. In a chat on July 7th, 2010, Siggi asked Assange how he was doing amid all the controversy. Assange replied, “Stressed.”

    “Anything i can do to loose some stress?” Siggi typed.

    “Find me a pretty girl with lots of warm olive oil;)” Assange replied. But women, too, soon became part of Assange’s worries. One night in August, Siggi’s cryptophone rang with a call from Assange. “Can I trust you?” he said.

    “Definitely,” Siggi replied.

    “Interpol is most likely going to issue an arrest warrant for me.”

    Two women in Sweden alleged he had committed rape and sexual harassment, which Assange denied, saying sex with each was consensual. “The best solution to all this mess might just be going to Sweden and finishing the interrogation,” Siggi told him. But Assange pushed back, saying the U.S. would try to extradite him. “If you get arrested, I’ll just have a backup plan of stealing you from the police,” Siggi said in all seriousness.

    But by fall, Assange had other problems: the defection of his closest supporters. His controlling nature had grown overbearing. Hacktivist Daniel DomscheitBerg, Jónsdóttir, journalist Herbert Snorrason and others in the small group of insiders battled with Assange over his reluctance to redact the Afghan war logs, which, they feared, would put lives at risk. Jónsdóttir spoke out to the media, calling for Assange to step aside and “let other people carry the torch.”

    And Assange’s confounding closeness with Siggi, which bordered on a paternal relationship, was also an issue. “The perception was that Siggi basically got to a level where Julian trusted him in a matter of days,” says Snorrason. The core volunteers considered Siggi a dangerous liability, prone to youthful indiscretions and lies. But, as Domscheit-Berg recalls, the rumors were being stoked by Assange himself. “Julian told us we shouldn’t speak to Siggi because he couldn’t be trusted,” he says. “He told me Siggi was a notorious liar, but then again Julian told people I was a notorious liar probably because he’s a notorious liar. I think it’s psychological. We knew Julian was dealing with Siggi all the time – it all implied Julian was using him. These are all kinds of games children get into.”

    Jónsdóttir was among those caught in Assange and Siggi’s web. “I told Julian, ‘There’s something weird, I can’t explain it, but I have this feeling,'” Jónsdóttir recalls. “‘You just be very careful with this guy.’ But he didn’t believe me.” Though she continuously tried to get Siggi removed from projects, Assange stood by the boy. “He might have trusted him with something that he didn’t want him to expose,” she says.

    For Siggi, there was a simple reason he rose in Assange’s eyes: the old guard’s weakness. “To be blunt, they were just cowards,” he says. “I stayed with Julian through this entire shit. I didn’t leave, so that’s probably why he started to trust me more – I showed him loyalty.”

    According to the chat logs, Assange commanded Siggi to insinuate himself with Jónsdóttir, in light of her calls for his resignation, and report back. “But be careful,” Assange warned Siggi. “She is good at smelling lies that are intellectual, though not so good at smelling emotional lies.” Days later, after Siggi returned with updates on Jónsdóttir, Assange wrote to him, “Good work on B.” Siggi suggested Assange confront her in person, to which Assange replied, “I will, but I need to let my anger cool, or it would be with a gun.”

    Worried that logs of him discussing the rape allegations could be released by Snorrason, Assange told Siggi to hack into the journalist’s computer and remove them. “The log, get rid of it,” Assange wrote. “His pc must be taken over, and that deleted.”

    “How can we delete it from his computer?” Siggi replied. “We would need physical access to his computer.” Assange said he could be fooled into downloading a trojan, a kind of computer virus. Though they never hacked Snorrason, the schism within WikiLeaks was tearing the group apart. That fall, Domscheit-Berg, Jónsdóttir, Snorrason and others left. But Siggi remained, and he wanted to make sure that Assange understood his dedication. “What about me?” Siggi wrote him late one night in a chat. “Any trust issues at all?”

    “No. I know your difficulties and I accept them,” Assange replied. “Good intent and loyalty is more important to me.”

    B
    y October 2010, Assange had appointed Siggi to Snorrason’s old post of running the WikiLeaks chat room. It was an important position, vetting the faceless flood of potential allies and leakers, and passing along the cream to Assange. “Keep your eye open for people trying to befriend you or others in an attempt to infiltrate WikiLeaks,” Assange instructed him in a chat. “Lives depend on your diligence.”

    Assange was on the lookout for FBI agents, informants and betrayers. And there was one unlikely group of people whom he feared might be rallying against him: the Bradley Manning Support Network. In July, Assange had pledged to pay for a substantial amount of Manning’s defense, which was expected to cost more than $100,000, and the group was increasingly angry that, months later, no money had come through. According to Siggi, Assange had simply moved on.

    Throughout the fall, Siggi was getting word from BMSN co-founder David House that David Coombs, Manning’s attorney, was threatening to go public. “Coombs will go to the media very soon,” House warned Siggi in one chat. “I need someone in WL to do their job and actually start giving a shit about Manning’s defense.”

    But WikiLeaks went on the offensive instead. “Julian wanted to know everything they were doing,” says Siggi. On October 7th, Siggi hacked into a Skype conference call of the BMSN and sent the recording to Assange. In the wee hours of November 11th, with word of another Skype call that evening, he asked Assange if he should do it again. “Do you want me to record the BMSN conference?” Siggi wrote.

    “YES,” Assange replied.

    “Oki dok:)”

    The next night, Siggi reported back: Mission accomplished. “Yey the Recording was successful,” he typed in chat. “Want me to upload and send to you?”

    “Yes. But going to bed now,” Assange wrote. “Good work on the record.”

    “Ok:) Did you remember to brush your teeths:)”
    With still no funds by December, the BMSN did go public, resulting in unflattering headlines, like The Washington Post’s “WikiLeaks hasn’t fulfilled financial-aid pledge for suspect in leaks.” (Eventually, the group gave $15,000.)

    But by the end of 2010, Assange had sought refuge from the Swedish case by retreating to Ellingham Hall, a country mansion in England owned by dilettante investigative journalist Vaughan Smith. Assange deployed the now-18-year-old Siggi as one of his few trusted couriers for WikiLeaks’ most prized and explosive leaks of all – the quarter-million diplomatic cables from Manning – which they were delivering to news outlets around the world. “Do you have an EU passport?” Assange messaged Siggi one night.

    “Yes Why:)?”

    “Just thinking about various meetings.”

    W
    hen I met with WikiLeaks spokesman Hrafnsson, he insisted that apart from a trip to Ellingham Hall Siggi “was never traveling on behalf of WikiLeaks anywhere.” But several European journalists I spoke with confirmed their meetings with Siggi, and some insisted that both Assange and Hrafnsson were well aware. “Kristinn told me Siggi was the one to deal with,” says Leonie van Nierop, a reporter for a Netherlands daily paper, NRC Handelsblad, who met with Siggi in Amsterdam. “Siggi was constantly on the phone with Assange,” says Dan Sommer, the former head of security for the U.S. Embassy in Reykjavik and a local pastor, who traveled as Siggi’s bodyguard. “It was clear that Assange knew what Siggi was doing.”

    Assange had potential publishers vetted in person before giving them the files, and Siggi was among those tasked with the job, arriving in each city with an encrypted thumb drive containing excerpts from the cables. The twisted humor of the transactions – that the biggest leak in U.S. history was being delivered by a baby-faced 18-year-old – wasn’t lost on the reporters and editors with whom Siggi met. Dutch journalist Eelco Bosch van Rosenthal found him to be “an insecure guy who wanted to be something in the world.”

    After spending several days with Siggi, van Nierop took a liking to the boy. She had acted as a tour guide for a day, leading Siggi through the famed red-light district in Amsterdam, where she noticed that he didn’t seem very intrigued by the women offering themselves in windows. “He was more interested in the trains in the station than the hookers,” she recalls. She could tell, while listening to her colleague speak with Assange about Siggi after the trip, that the two were geeky pals. She says Assange teasingly said that since she “took Siggi to the red-light district, couldn’t you have bought a girl for him?” Van Nierop thought Siggi’s relationship with Assange also explained why the boy seemed isolated. “If Julian Assange is your best friend,” she says, “you must be a little lonely.”

    With media outlets often paying his way, Siggi says he was “having the time of my life.” When he told his parents he was traveling on missions for WikiLeaks, they balked; but as his father told me, “He was 18. There was nothing we could do.” In January 2011, he arrived in Honduras to meet with editors from the newspaper El Heraldo and was greeted by a team of armed bodyguards. When Siggi asked why he needed such heavy security, one of the goons told him, “because you’re white, and you could get stabbed or kidnapped.”

    But Sommer, his personal bodyguard on many of the trips, couldn’t get the boy to leave behind his childhood. At every city, Siggi insisted on taking time out to visit the local waterpark and eating McDonald’s. In Budapest, Siggi had Sommer take him to his first strip club. In New York, Siggi wanted to try out a pepper-spray pen his bodyguard bought at a local spy shop. Back at the hotel, a half hour before a meeting, he persuaded his bodyguard to shoot him with it to see how it felt – but vastly underestimated the burn. “It was horrible,” says Siggi, who had to douse himself with milk to relieve the pain. He showed up at his next meeting with bloodshot eyes and a rash. “We had to explain that I wasn’t stoned,” Siggi says.

    While in Washington, D.C., he had one mishap that was too close for comfort. His bodyguard was driving a Jeep the wrong way down a street by the Pentagon, when he saw a police car pull out nearby. With the diplomatic cables in the back seat, Siggi freaked. “Fuck me!” he said. “Oh, my God, we could get pulled over. We’re gonna go to Guantánamo Bay!” But as luck would have it, the police car passed him – missing the chance for the bust of a lifetime.

    D
    uring the half dozen times Siggi arrived at Ellingham Hall to visit Assange, he says he knew what to bring with him: a suitcase full of Malt Extrakt, Assange’s favorite Icelandic soda. “I saw it in his face,” Siggi says, “somebody actually thought about him. He was happy that I remembered.”

    Despite his circumstances, Assange was enjoying the comforts of mansion life and the companionship of his close-knit circle of supporters, including Siggi. They went swimming in the nearby lake, had long dinners in the regal dining hall. At Assange’s blowout 40th-birthday party, Siggi got drunk for the first time, on licorice schnapps, and drove his car into a ditch during a midnight junk-food run. “It was hilarious!” Siggi recalls.

    But in private moments, Assange told Siggi that the political and personal battles were wearing on him. “He said that he was really tired,” Siggi says. “I’d just like to give up,” Assange told him.
    As the increasingly besieged WikiLeaks leader’s profile grew, so did his paranoia. Assange asked his protégé to write up psychological profiles of WikiLeaks core members. Siggi, however, initiated more recon on his own. Late one night, he clandestinely cloned their hard drives, including the laptops of Hrafnsson and longtime associate Sarah Harrison, and he provided Assange with a report of their contents.

    Though Assange hadn’t asked him to do this, Siggi claims he read the findings and Assange allowed him to continue snooping during visits to Ellingham Hall. At one point, Siggi says, Assange asked him to search through the computers of Vaughan Smith, the journalist who owned the home, because he thought Smith was secretly videotaping him. Siggi sneaked into Smith’s office, rifling through his things until he found computer-memory cards and drives, which he promptly began wiping clean. I ask Siggi if he felt that spying on the volunteers and their host was wrong. “Privacy is just a myth, you know,” he replies. “It doesn’t really exist.”

    But Assange’s spy games grew worse. BMSN co-founder House told Wired that Assange asked him in January 2011 to swipe a copy of former insider Domscheit-Berg’s WikiLeaks exposé prior to publication. Around the same time, Siggi claims Assange asked him to set up hidden cameras to spy on guests inside Ellingham Hall. “Julian just had this idea that everybody was after him,” he says. “He wanted this to be done. It made him feel more secure.” Siggi bought coat-hook spy cams and affixed them on the back of doors throughout the house, including bedrooms. He says he also installed a spy cam in a room used for meetings with visitors like Eric Schmidt of Google and Steve Kroft of 60 Minutes.

    When I call Smith to ask him if he had ever seen any of these items in his house, he said he recalled finding a coat hook in a box and wondering why it was there. “I remember thinking, ‘That’s weird,'” he says. “‘Why would someone bring a coat hanger into my house?'”

    S
    iggi’s infiltrations soon spiraled well beyond Ellingham Hall. While WikiLeaks has always maintained that they are, as Hrafnsson puts it, “passive recipients” of leaks, Siggi spent much of 2011 conspiring with the most renowned hackers on the Net. The operation fulfilled what was now a common pattern: Siggi going rogue but with what he said was his boss’s tacit approval. “I understood what Julian wanted,” Siggi says.

    In the wake of the Manning cables, Assange wanted more newsmaking leaks, but the material coming in wasn’t meeting his insatiable appetite or ambitions. So Siggi reached out to Gnosis, a hacker group that made its name in December 2010 for compromising more than a million registered accounts on Gawker websites.

    Gnosis tipped Siggi off to a notorious 16-year-old female from Anonymous named Kayla who had just helped hack HBGary, an IT security firm that worked for the U.S. government. Gnosis claimed to have an unpublished copy of HBGary’s database, including its clients’ names and e-mails. “Don’t release it,” Siggi messaged back. “Allow us.”

    Anonymous, however, ended up leaking the files themselves, and Siggi told Gnosis that his boss was pissed. “You can’t really control Anonymous,” Gnosis replied. “You can kinda herd them in the right direction but other than that lol good luck.”

    But that didn’t stop Siggi from trying. In January 2011, Siggi got word that DataCell, the hosting service behind WikiLeaks, had valuable contracts pulled by an Icelandic power company called Landsnet, and he wanted revenge. “I have a funny request for you,” Siggi wrote Kayla in one chat. “www.landsnet.is is something ‘Anonymous’ should take down if it’s possible.” Two minutes later, Kayla replied that she’d just unleashed a botnet against the website, a form of a cyberattack that swamps the site with requests. Siggi tried logging on to the Landsnet site. “Haha request timed out,” he wrote.

    The attack didn’t stop there. When Siggi explained that the Icelandic government had made a deal to assume DataCell’s contracts, Kayla asked if he wanted her to take down one of its sites too. “Definitely,” Siggi replied. Minutes later, a ministry site was down. But as the sites fell, Siggi joked that Kayla might inadvertently knock Iceland’s power offline too. “If you see a button that says turn off electricity don’t press it please,” he wrote.

    With his connections to the Anonymous cell more secure, Siggi suggested that the group could be of even greater help – getting them more secret documents that WikiLeaks could release. “I don’t care where the information comes from,” Assange had told him, which Siggi took as carte blanche to solicit stolen material. So Siggi had Gnosis introduce him to one of the most infamous hackers of all: Sabu, leader of the Anonymous offshoot LulzSec. In the spring of 2011, LulzSec had taken down the sites of high-profile targets including Fox, the CIA and PBS, whose Web page they replaced with the title “FREE BRADLEY MANNING. FUCK FRONTLINE!” But Sabu wanted proof that Siggi was who he said he was by speaking with Assange directly. Siggi claims to have complied and arranged the Skype call.

    With Sabu convinced, Siggi put him on a job: to dig further into the Icelandic government’s computers to see if it had intel on the DataCell deal. Soon, Sabu delivered. Siggi says Assange told him to have LulzSec upload the files to a WikiLeaks FTP server, which they did. And Sabu soon had more secrets to offer. He told Siggi his crew had recently hacked Stratfor, a “global intelligence” agency and government contractor, and found more than 5 million confidential e-mails between Stratfor and companies such as Dow Chemical, Lockheed Martin and Northrop Grumman, as well as government agencies including the Department of Homeland Security and the U.S. Defense Intelligence Agency.

    But as the e-mails poured in, Siggi began to grow anxious and questioned the scale of the operation. Even though he was the one who initiated the relationship with the hackers, he worried that they were going too far. “Crossing this line by accepting stolen information and publishing this is literally just breaking the law,” he says he told Assange. “You’re going away from being a journalist organization and threatening national security.” But, once again, Assange told him he didn’t care how the information was obtained.

    Back at home in his bedroom, Siggi couldn’t sleep. He lay in bed imagining the FBI breaking down his door, storming into his house, past his giant Garfield doll, his sleeping parents and his little sister, and hauling him off to Gitmo for good. For months, he’d had insomnia, but now his mind and heart were racing like never before. When he did manage to fall asleep, he woke up screaming.

    J
    ust after 3 a.m. on August 23rd, 2011, the pressure Siggi felt finally broke him. Crawling from bed, he e-mailed the U.S. Embassy in Reykjavik and asked for a meeting. It wasn’t just the LulzSec association that concerned him. Assange seemed to have changed from the man he met the year before. While he was unwilling to donate the amount he’d promised to Manning’s defense, he was ready to blow large sums rehabilitating his ailing image. “I don’t care,” Assange told him. “We have a million bucks, and we can spend it on buying publicity.” For Siggi, it was a turning point. “I realized that this wasn’t the same ideology as before,” he says. But truth is, Siggi was also trying to save his own ass. Going to the FBI, he hoped, would inoculate him against prosecution. And, he admits, he thought being a spy for the feds would be a thrill. There was just one price to pay: “I would be betraying WikiLeaks, Julian, my friends,” he says.

    The next day, Siggi got called to the U.S. Embassy and was soon taken to a nearby hotel, where he was met by the FBI. They wanted to know WikiLeaks’ physical security, their technical security, locations of computer servers, how Assange lived, his daily routine, “literally, everything,” Siggi says. And he had plenty of data to share: several hard drives of WikiLeaks private files that he had amassed during his time with the organization – just in case he ever needed them.
    Signing a nondisclosure agreement, he spoke daily with the FBI, passing along the chats he was handling, the leaks that were in negotiation. And, as he told the FBI, there were big ones to be had, courtesy of Sabu. As they were getting the Stratfor files from LulzSec, Siggi had heard that Assange was trying to get Sabu to join the WikiLeaks team. “Did J say anything about recruiting you permanently?” Siggi asked Sabu in one chat.

    “Well he emailed me once but we didn’t get to talk,” Sabu replied. “Guess he’s been busy/careful or whatever but let him know we have intercepted 92GB of mails from .gov.sy so this can be one of the biggest leaks in history.” In November 2011, Sabu began passing excerpts of this data, later published by WikiLeaks as the “Syria Files,” to Siggi – 2 million internal e-mails, going back to 2006, from companies, politicians and ministries in Syria. According to Siggi, when he told Assange about the new information, “He said, ‘OK, cool,'” Siggi recalls. “‘They can upload it.'”

    But Siggi’s spy work was jeopardized that same month when he got an angry call from WikiLeaks’ spokesman Hrafnsson, accusing him of embezzling $50,000 in proceeds from selling WikiLeaks merchandise online. Siggi insists that he had run the money through his account with Assange’s permission, and that any extra cash went to cover his own expenses. With both sides warring, it isn’t clear whom to believe. But even if Siggi was guilty, the accusations raised more questions about why the boy, whom the group says had no role in the organization, had access to such funds in the first place. Hrafnsson threatened to report him to the police. Siggi e-mailed the FBI telling them the news. “No longer with WikiLeaks – so not sure how I can help you more. Sorry I couldn’t do more :(”

    To his surprise, the FBI still had more work for him. Shortly after WikiLeaks published the Stratfor files in February 2012, Siggi was flown to Washington, D.C., where he met with members of the CIA, the DOD and the FBI at a Marriott hotel. The questions became dizzying: They wanted to know about others besides Assange – Jónsdóttir, Hrafnsson and more.

    It didn’t take long for the hammer to fall. On March 5th, LulzSec hacker Jeremy Hammond was arrested for hacking the Stratfor files leaked to WikiLeaks (he’d later be sentenced to 10 years in prison). The next day, Kayla, the LulzSec hacker Siggi had conspired with, was indicted on conspiracy charges – and revealed to be a man, 25-year-old Ryan Ackroyd, from England. But the biggest shock came when Siggi read in the news that Sabu was an FBI informant, and had been since June 2011. It suddenly all made perfect sense. For months, he had been informing the FBI of his conversations with Sabu, and they hadn’t seemed to care. And since Sabu had been an informant during the time of the Stratfor and Syria files, that meant something incredible: The FBI had been well aware of the Stratfor and Syria hacks all along, and done nothing to intervene. Their target had always been Assange. The biggest and most famous hack in recent years was a carefully built plot by the FBI to snare a man it considered as an enemy of the state.

    “Ultimately, the FBI’s mission is to apprehend criminals and prevent the commission of serious crimes,” says Glenn Greenwald, the journalist whom Edward Snowden leaked NSA files to last year. “In this particular case, they purposely allowed the commission of serious crimes they could have easily stopped. To treat an American firm like Stratfor and the privacy of Syria as sacrificial lambs in a campaign to entrap Julian Assange into criminality is unbelievably radical – you can even say corrupt.”

    During a meeting in Denmark in March, the FBI had Siggi sign over eight hard drives containing his WikiLeaks files. When Siggi asked them about Sabu, the agents just smiled and gave him $5,000 to cover his cost of living, then sent him on his way. He never heard from them again.

    I
    n January 2013, Siggi watched TV in horror as Hrafnsson told a reporter how he had learned the previous summer that the FBI had come to Iceland to secretly interview someone about WikiLeaks – he just didn’t know who it was. But after meeting with Ögmundur Jónasson, who had just left the position of Iceland’s Minister of the Interior, he pieced together that Siggi was the one who had gone to the FBI.

    I met with Jónasson, who told me how, in June 2011, Iceland received a warning from U.S. authorities of “an imminent attack on Icelandic computer systems.” Two months later, Jónasson found out that a plane full of FBI agents had arrived in Iceland for another purpose: to investigate WikiLeaks. Because they didn’t have authorization for this, he turned them away – only to find out later that they had taken Siggi to Copenhagen. “I still have suspicion,” he says, “that this was part of an attempt to put a case against Julian Assange.”

    Hrafnsson remains just as outraged, though he tells me he and Assange weren’t shocked. “We have stopped being surprised about anything,” he says. When I ask if Assange feels betrayed by Siggi, Hrafnsson arches his brow. “Inherently in your question is the assumption that there was a very close relationship, which I never saw.”

    While Assange remains holed up in the Ecuadorian Embassy in London, Siggi faces the repercussions of coming clean. Among other things, for the first time in this story, he’s admitting to the Milestone leak. “It’s probably going to lead to my conviction,” he says. “But I just have to face that.” In the meantime, in addition to unrelated fraud charges, he’s appealing his sentence of eight months for sexual misconduct. Siggi claims the victim’s father pressed the charges after learning of Siggi’s relationship with his son; Siggi calls his homosexual tryst a “phase.”

    As for WikiLeaks, should he ever get asked one day to testify against Assange, Siggi isn’t sure whether he will comply. He knows that he betrayed his former mentor and friend. But he says he did it all for the very same reasons he believed in WikiLeaks and Assange: “The truth needs to come out.”

    This story is from the January 16th, 2014 issue of Rolling Stone.

    by David Kushner
    JANUARY 06, 2014

    Find this story at 6 January 2014

    ©2014 Rolling Stone

    WikiLeaks’ Teenage Benedict Arnold; How the FBI used a baby-faced WikiLeaks volunteer to spy on Julian Assange.

    When he met Julian Assange for the first time, Sigurdur Thordarson admired the WikiLeaks founder’s attitude and quickly signed up to the cause. But little more than a year later, Thordarson was working as an informant spying on WikiLeaks for the U.S. government—embroiling himself as a teenager in one of the most complicated international events in recent history.

    In a series of interviews with Slate, Thordarson has detailed the full story behind how, in an extraordinary sequence of events, he went from accompanying Assange to court hearings in London to secretly passing troves of data on WikiLeaks staff and affiliated activists to the FBI. The 20-year-old Icelandic citizen’s account is partly corroborated by authorities in Iceland, who have confirmed that he was at the center of a diplomatic row in 2011 when a handful of FBI agents flew in to the country to meet with him—but were subsequently asked to leave after a government minister suspected they were trying to “frame” Assange.

    Thordarson, who first outed himself as an informant in a Wired story in June, provided me with access to a pseudonymous email account that he says was created for him by the FBI. He also produced documents and travel records for trips to Denmark and the United States that he says were organized and paid for by the bureau.

    The FBI declined to comment on Thordarson’s role as an informant or the content of the emails its agents are alleged to have sent him. In a statement, it said that it was “not able to discuss investigative tools and techniques, nor comment on ongoing investigations.” But emails sent by alleged FBI agents to Thordarson, which left a digital trail leading back to computers located within the United States, appear to shine a light on the extent of the bureau’s efforts to aggressively investigate WikiLeaks following the whistle-blower website’s publication of classified U.S. military and State Department files in 2010.

    Late last month, Army intelligence analyst Bradley Manning was convicted on counts of espionage, theft, and computer fraud for passing the group the secrets. During the Manning trial, military prosecutors portrayed Assange as an “information anarchist,” and now it seems increasingly possible that the U.S. government may next go after the 42-year-old Australian for his role in obtaining and publishing the documents. For the past 14 months, Assange has been living in Ecuador’s London Embassy after being granted political asylum by the country over fears that, if he is sent to Sweden to face sexual offense allegations, he will be detained and subsequently extradited to the United States.

    Meanwhile, for more than two years, prosecutors have been quietly conducting a sweeping investigation into WikiLeaks that remains active today. The FBI’s files in the Manning case number more than 42,000 pages, according to statements made during the soldier’s pretrial hearings, and that stack of proverbial paper likely continues to grow. Thordarson’s story offers a unique insight into the politically-charged probe: Information he has provided appears to show that there was internal tension within the FBI over a controversial attempt to infiltrate and gather intelligence on the whistle-blower group. Thordarson gave the FBI a large amount of data on WikiLeaks, including private chat message logs, photographs, and contact details of volunteers, activists, and journalists affiliated with the organization. Thordarson alleges that the bureau even asked him to covertly record conversations with Assange in a bid to tie him to a criminal hacking conspiracy. The feds pulled back only after becoming concerned that the Australian was close to discovering the spy effort.

    It was 2010 when the saga began in Reykjavik, Iceland. Thordarson, then just 17, says that before his first encounter with Assange, he knew little about the man beyond a few YouTube videos he’d watched about WikiLeaks. But he went to hear Assange speak at a conference hosted by an Icelandic university, and the teenager was impressed. After the event, a journalist Thordarson knew introduced him to Assange, and the pair struck up a relationship that led to Thordarson doing some volunteer work for the organization. Before long, he was on the edges of WikiLeaks’ small, tight-knit inner circle.

    At that time, the group was sitting on the explosive files it had received from Manning that included a video showing a U.S. helicopter attack that resulted in the deaths of 12 civilians, among them two employees of the Reuters news agency.

    Thordarson, a blond-haired stocky figure with a baby face, was present while WikiLeaks staff and volunteers in Reykjavik were preparing the video for publication. When it was published by WikiLeaks in April 2010, under the name Collateral Murder, it catapulted the organization into the international spotlight and provoked an angry response from government officials in Washington.

    The then-teenager, known as “Siggi” to his friends, was around at the height of that backlash. He was given administrative privileges to moderate an Internet chat room run by WikiLeaks. And when Assange relocated from Iceland to England, Thordarson came to visit. He even accompanied the WikiLeaks founder to court appearances in London as he fought extradition to Sweden over allegations of sexual assault.

    Siggi and Assange in England in 2011. You can see that Assange is wearing his ankle monitor.

    Photo courtesy of Sigurdur “Siggi” Thordarson

    Thordarson looked up to Assange, viewing him as a friend. The WikiLeaks chief, he says, treated him well—helping him find a lawyer in 2010, not long after the pair had met, when he says he was wrongly accused by Icelandic police of breaking into a business premises. But signs that Thordarson had a proclivity for brushes with the law did not appear to trigger alarm bells early on at WikiLeaks—though perhaps they should have, because he was certainly not any ordinary volunteer. Unlike many drawn to WikiLeaks, Thordarson does not seem to have been principally motivated by a passion for the cause of transparency or by the desire to expose government wrongdoing. Instead, he was on the hunt for excitement and got a thrill out of being close to people publishing secret government documents.

    As a child, Thordarson led a fairly normal middle-class life in Reykjavik, enjoying social studies and chemistry at school. His father worked as a sales manager at a painting firm, and his mother ran a hair salon. But as he entered his teenage years, he says, he began to feel that he could not connect with others in his peer group. He went to college to study computer science and psychology—but claims he was suspended after hacking into a college computer system.

    By mid-2011, Thordarson’s thirst for adventure, combined with his interest in hacking, would irreversibly complicate his relationship with WikiLeaks. In June of that year, the Anonymous-linked hacker group LulzSec brought down the website of the CIA. Thordarson says that he and other WikiLeaks staff were amused by the incident, and he decided to reach out to the hackers to establish contact. Thordarson claims that, using the aliases “Q” and “Penguin X,” he set up a line of communication between WikiLeaks and LulzSec. During the series of exchanges that followed, Thordarson says he “suggested” that his group wanted assistance to find evidence of anti-WikiLeaks sentiment within the Icelandic government’s Ministry of Finance, which had thwarted an attempt by DataCell, a company that processes WikiLeaks donations, to purchase a large new data center in Reykjavik. (In early 2011, DataCell’s founder questioned whether the Icelandic government had deliberately prevented the deal because it was “afraid of letting WikiLeaks here into the country.”)

    “That was basically the first assignment WikiLeaks gave to LulzSec,” Thordarson alleges, “to breach the Icelandic government infrastructure.”

    Thordarson admits that he initiated the contact with the hackers, though he claims it was approved by Assange. It is unclear, however, whether WikiLeaks staff were fully aware of his correspondence with LulzSec and the “assignment” that he says he handed to them. WikiLeaks spokesman Kristinn Hrafnsson told me he believed that if Thordarson had any contact with LulzSec, it was as a rogue operative and that it was “highly unlikely” any other WikiLeaks staff, including Assange, knew what he was engaged in. Thordarson is a dishonest character, Hrafnsson said, who is trying to inflate the role he played as a volunteer.

    Either way, in this case, the exchange Thordarson describes does appear to have taken place. It has since been independently corroborated in part by authorities in Iceland and was first reported—from the perspective of the hackers—in a 2012 book by Parmy Olsen, We Are Anonymous. I have also seen chat logs and emails from 2011 that appear to back up Thordarson’s assertion that he was communicating with the hackers, which has significant ramifications. By claiming that he effectively solicited LulzSec to break into government computers, Thordarson has implicated himself in a potential international criminal conspiracy, leaving WikiLeaks open to the allegation that it, too, was somehow involved.

    But the full facts about the incident remain murky—not least because there is another dramatic twist to the tale.

    What Thordarson did not know at the time was that Sabu, the loudmouth figurehead of LulzSec and one of the hackers he was communicating with, was in fact working as an FBI informant—and the online chat about hacking Icelandic government infrastructure was apparently being monitored by the feds. About four days later, the FBI contacted Icelandic authorities to warn them about an “imminent” hacking attack, according to Iceland’s state prosecutor, and this prompted Icelandic police to travel to the United States to discuss the matter. (Sabu, it later turned out, was a then-28-year-old hacker from New York named Hector Monsegur. The FBI reportedly tracked him to his Lower East Side apartment in early June 2011 and managed to “flip” him, because he was the guardian of two young children and desperate to stay out of jail.)

    Thordarson says LulzSec never gave WikiLeaks any information about Icelandic government corruption, but hackers close to the group did hand over a confidential Icelandic state police document related to the security of the U.S. Embassy in Reykjavik. He also claims that hackers affiliated with LulzSec and Anonymous turned over documents from a bank in Mexico, files from BP, and emails hacked from the Syrian government and the security think tank Stratfor, among others. Between February 2012 and July 2012, a large cache of Syrian government and Stratfor emails were published by WikiLeaks under the names the “Syria Files” and the “Global Intelligence Files.” (As a matter of policy, WikiLeaks does not comment on how its releases are sourced.)

    Being at the center of the action had given Thordarson the adrenaline rush he was looking for. But the contact with LulzSec, which he had initiated, made him feel like he had gone too far. He was worried that in maintaining contact with the hackers, he was “breaking quite a lot of laws.” Meanwhile, news reports were saying that the U.S. government was already investigating WikiLeaks for its publication of classified documents, including the Collateral Murder video, diplomatic cables, and military war logs from Afghanistan and Iraq. And just as Thordarson was getting anxious about the high-stakes international affairs he had become entangled with, he also seems to have become bored with WikiLeaks—and he now admits he wanted to embark on a new adventure.

    It was then that, at about 3:30 a.m. on Aug. 23, 2011, Thordarson sat down at his computer at home in Kópavogur and typed out a message to the U.S. Embassy in Reykjavik. He decided he wanted to become an informant—and, unlike Sabu, he was ready to do so without any threats hanging over his head.

    From: [redacted]@live.com
    To: reykjavikdatt@state.gov
    Subject: Regarding an Ongoing Criminal investigation in the United States.
    Date: Tue, 23 Aug 2011 03:33:39 +0000

    After a quick search on the internet i have yet not been able to find a reliable contact form to establish a meeting with a person regarding an on going criminal investigation.

    The nature of the investigation is not something that i desire to speak over an email conversation.

    The nature of the intel that can be brought to light in that investigation will not be spoken over email conversation.

    I here by request a meeting at the U.S Embassy in Iceland, or any other place.

    I am an Icelandic citizen.

    I can be contacted via this email address

    Or Via Phone

    00xxx-xxxxxxx

    I request also that this email will be considered confidential.

    Later that day, Thordarson received a phone call. On the other end, he says, was the security chief at the U.S. Embassy in Reykjavik. The man asked what exactly the email was concerning, and Thordarson told him it was about the U.S. government’s ongoing investigation into WikiLeaks. He says the security chief denied the existence of any such investigation, but nevertheless asked Thordarson to come to the embassy to meet him. Thordarson agreed. And that afternoon, he turned up at the door of the Reykjavik embassy, explaining briefly that he wanted to share information about WikiLeaks. To prove he wasn’t bluffing, he showed staff a photocopy of Julian Assange’s passport that he had obtained.

    He says he was told not to expect any further contact for at least a week, if at all. But less than 24 hours later, Thordarson’s phone rang again. He was asked if he could come back to the embassy for another meeting. This time, it was serious. Unlike the more casual first meeting, he was told to hand over any electronic devices and take off his watch. He was then escorted by the embassy security chief on a walk around Reykjavik, circling the city center a number of times to ensure they were not being followed. Then he was ushered into a conference room in the four-star Hotel Reykjavik Centrum, where, he says, two men were waiting for him. They spoke with American accents and displayed FBI credentials. Iceland’s state prosecutor has acknowledged that this meeting took place, confirming in a document published earlier this year that a handful of FBI agents and federal prosecutors were authorized to jet into the country after an Icelandic citizen contacted the U.S. Embassy in Reykjavik. The U.S. Embassy did not respond to a request for comment.

    For a brief moment, Thordarson became nervous. “The only thing that went through my mind was: ‘What the fuck am I doing?’ ” he recalls. But the feeling of doubt didn’t last long, and soon he was embracing the whole experience—almost as if he believed he was starring in his own personal spy thriller.

    The FBI, he says, asked him a range of questions to “verify that I wasn’t full of bullshit.” At one point, he was asked what he knew about LulzSec, and he described the online conversations he had been having with Sabu. Thordarson did not know it at the time, but the FBI had presumably been monitoring those chats—as an informant, Sabu had been issued a government laptop, and his online activity was reportedly under surveillance 24/7. Indeed, the bureau had met with Icelandic authorities two months earlier to warn about a potential hacking attack on Icelandic infrastructure—just days after Thordarson says he gave LulzSec the “assignment” to hack Icelandic government computers.

    Thordarson’s detailed knowledge of the Sabu chats—and his participation in them—apparently convinced the agents. For about the next four consecutive days, they met with him, Thordarson says, each time at a different hotel in Reykjavik. They asked about people connected to WikiLeaks and quizzed him about what Assange was doing at Ellingham Hall, the remote residence in England’s countryside where the WikiLeaks founder was living at the time while on bail and fighting extradition to Sweden. Thordarson says the agents also wanted information about WikiLeaks’ technical and physical security and the locations of WikiLeaks’ servers; they asked him, too, for names of individuals linked to WikiLeaks who might be open to becoming informants if approached by the FBI.

    However, by Aug. 30, 2011, several days after the FBI entered Iceland, the Icelandic government had become unsettled about the presence of U.S. authorities. Then–Interior Minister Ögmundur Jónasson told me that Icelandic authorities initially believed the FBI agents had come to the country to continue their investigation into the impending LulzSec hacking attack on Icelandic government computers. But once it became clear that the FBI agents were in fact engaged in a broader swoop to gather intelligence on WikiLeaks, according to Jónasson, the agents were asked to immediately remove themselves from the country.

    “I think it was a question of trying to frame Julian Assange,” Jónasson says, recalling the debacle. “And they wanted Icelandic authorities to help them with that.”

    WikiLeaks ally DataCell had just months earlier accused the Icelandic government of working against the whistle-blower group, but by booting the FBI out of the country, the Interior Ministry had radically undermined that theory. Its decision, in fact, was a stark illustration of how WikiLeaks has continued to maintain a strong support base in Iceland since 2009, when it exposed controversial loan payments made by Kaupthing, the bank at the heart of the Icelandic financial crisis. As a result, the FBI could not meet with Thordarson in Iceland again. Instead, he says, the FBI held further meetings with him in Denmark (three times) and brought him to the United States (once) to continue discussions about WikiLeaks. Through this period, Thordarson says the bureau paid him about $5,000 in total to cover his expenses and to make up for loss of earnings.

    Thordarson maintained contact with WikiLeaks, but he was secretly sending information back to the FBI. Once, he says, he told the agents that he was planning a visit to see Assange at Ellingham Hall. Eager to take advantage of the trip, they asked him to wear a recording device and make copies of data stored on laptops used by WikiLeaks staff. He alleges that the FBI wanted him to get Assange to “say something incriminating about LulzSec.” But he declined to wear a recording device and told his handlers that covertly copying data from computers wouldn’t be feasible because “people literally sleep with their laptops at Ellingham.”

    Assange and Siggi in Paddington, London, in 2011.

    Photo courtesy of Sigurdur “Siggi” Thordarson

    Thordarson felt that wearing a wire in an attempt to secretly implicate Assange in LulzSec’s illegal hacking activities was a step too far, but he was happy to engage in equally dubious intelligence-gathering activities. He maintained contact with LulzSec and passed transcripts of his conversations with the hacker Sabu back to the FBI, his emails show. What Thordarson did not know at the time was that the FBI already knew about the chats—because, of course, it had recruited Sabu as an informant, too.

    In one notable online exchange in November 2011, Sabu told Thordarson that LulzSec had breached Syrian government computers. He showed off snippets of hacked emails to Thordarson, saying he wanted to pass a trove of data to WikiLeaks. Later in the same conversation, Thordarson quizzed Sabu about a plan to “recruit” him for WikiLeaks. Neither of the two men appear to have realized that they were both independently acting as informants for the FBI.

    “We ended up [inside] a certain government’s central mail server and got some fucking massive leaks coming out,” Sabu says in the chat. “You gents sure you’re not wanting to do anymore leaks?”

    “Did J say anything about recruiting you permanently?” Thordarson fires back a few minutes later, in reference to Assange.

    “Well he emailed me once but we didn’t get to talk,” Sabu says. “Guess he’s been busy/careful or whatever. But let him know we have intercepted 92GB of mails from .gov.sy [the Syrian government] so this can be one of the biggest leaks in history.”

    When Sabu was outed as an informant in an explosive Fox News story in March 2012, it made sense to Thordarson. He says he found it strange that the FBI never seemed interested in the information he told them he had about the hacker, who was a hugely prominent figure at the helm of a group that had claimed responsibility for attacking U.S. government websites and multinational corporations, including Sony and News International. What the FBI agents wanted from Thordarson, it seems clear, was information that they could not get from any other source—information about the inner workings of WikiLeaks.

    Before his penultimate meeting with U.S. authorities, in early February 2012, Thordarson says he was instructed to build relationships with people close to WikiLeaks in order to gather information for the feds. He received an email from his alleged handler—who used the alias “Roger Bossard”—in an account set up for him under the fake name “Ibrahim Mohammad.” The message encouraged Thordarson to “chat with those people we discussed on the phone” in order to “get a head start before our meet.” A few weeks later, he was flown out to Washington, D.C., and says he was put up in a Marriott hotel in Arlington, Va., near the location of a grand jury that has been collecting evidence about WikiLeaks since at least early 2011 as part of a criminal investigation into the whistle-blower organization. At meetings in a conference room of the hotel, he was asked about a host of individuals who had at one time volunteered or worked for WikiLeaks in some capacity, including Icelandic parliamentarian Birgitta Jónsdóttir; eminent computer security expert Jacob Appelbaum; and Guardian reporter James Ball, a former WikiLeaks staffer. “They wanted to know literally everything there was to know about these people,” Thordarson alleges.

    He says he “mostly gave them information that was general knowledge.” But he admits that he turned over some email addresses, details about instant messenger accounts, and phone numbers. This information is useful to the authorities because they can use it to order surveillance of targeted suspects’ phone or email accounts. Since 2010, several individuals connected to WikiLeaks have had emails and other communications monitored as part of the FBI’s investigation.

    By the end of the meeting in Washington, the U.S. government had already gleaned a large amount of information about WikiLeaks from Thordarson. Its biggest haul of intelligence, however, was yet to come.

    On March 18, 2012, Thordarson says he met with the FBI for what would be the final time, in Aarhus, Denmark. Prior to the meeting, he exchanged emails with his alleged handler, agreeing that he would come equipped with hard drives packed with chat logs, photographs, and other data related to WikiLeaks. According to a Justice Department receipt Thordarson says he was provided by the FBI, he turned over eight hard drives in total containing of about 1 terabyte of data, which is the equivalent of about 1,000 copies of the Encyclopedia Britannica. (The Ministry of Justice in Denmark refused to comment on whether it authorized FBI agents to enter the country to meet with Thordarson, saying that it could not discuss “specific cases.”)

    The Department of Justice receipt Thordarson says he was given for the delivery of eight hard drives to U.S. authorities.

    Courtesy of Sigurdur “Siggi” Thordarson

    Once the agents obtained the hard drives and received the passwords to access them, Thordarson’s emails suggest, they stopped responding regularly to his messages and rebuffed his attempts to set up another meeting. (Apparently, Thordarson’s thirst for adventure hadn’t yet been quenched.) They continued to encourage him to send data on WikiLeaks to a P.O. box at a UPS Store in Arlington, a short drive from Justice Department and FBI headquarters, but they pulled back, apparently concerned that their cover could soon be blown.

    The UPS Store in Arlington, Va., where Siggi was asked to send mail for the FBI.

    Photo by Torie Bosch

    “Understand J has your laptop,” an alleged agent wrote to Thordarson shortly after the final Denmark meeting, referencing Assange. “Is there anything on it about our relationship?”

    There were also signs that internal conflict was developing within the FBI over the infiltration of WikiLeaks, a controversial tactic not least because WikiLeaks is a publisher and press freedom groups have condemned from the outset the government’s investigation into Assange and his colleagues. In early 2012, after a period of not responding to Thordarson’s emails, his alleged FBI handler wrote that there had been “bureaucratic issues beyond my control that prevented me from maintaining contact,” adding that “our relationship has been problematic for some others. This is not an ordinary case. But those were not my issues and I have been diligently trying to work out those issues so we can continue our relationship.”

    Thordarson, too, was having problems. He had become embroiled in a serious dispute with WikiLeaks about money in late 2011, which created friction between him, Assange, and WikiLeaks, ultimately resulting in him being dismissed from his volunteer role and perhaps even fueling his desire to continue informing on the group. Thordarson was accused of embezzling about $50,000 from a merchandise store that he had helped set up to raise funds. He admits that he took some of the money but denies stealing it, saying he used the funds to cover expenses he was owed by WikiLeaks. The matter is currently being investigated by police in Iceland.

    In February, Iceland’s state prosecutor published a detailed timeline about the FBI’s visit to the country in 2011. The information shed light on the circumstances surrounding how U.S. authorities were asked to leave because of their attempt to gather intelligence on WikiLeaks. The same month, Thordarson was called to appear at a closed-door meeting with Icelandic parliamentarians to discuss the extent of his dealings with the FBI, which led to him being named in the Icelandic press as the person who had prompted the FBI to fly to the country in August 2011.

    It was at this point, Thordarson says, that he was forced to come clean to WikiLeaks. He says he told Assange about everything he had turned over to the FBI and forwarded to WikiLeaks all of his emails with the alleged FBI agents. Unsurprisingly, Assange “wasn’t happy,” he says. Hrafnsson, the WikiLeaks spokesman, told me he believed Thordarson was guilty of “pathological” behavior, adding that the FBI’s apparent recruitment of Thordarson had revealed the U.S. government’s “relentless persecution” of WikiLeaks.

    Thordarson, however, does not seem fazed by the controversy he has created. He now spends much of his time working for companies that offer security and bodyguard training in Iceland and Denmark, though does not believe his relationship with the FBI has “formally ended.” He claims that his handlers at the bureau told him that he might yet be asked to testify in court about WikiLeaks. The Justice Department declined to comment about Thordarson but confirmed that its investigation into WikiLeaks is ongoing.

    Eventually, the U.S. government may attempt to prosecute Assange, and there can be little doubt that he remains fixed firmly in the feds’ crosshairs. The WikiLeaks founder’s attorneys believe that a grand jury probe may already have produced an indictment against him that remains under seal—and so he remains sheltered in Ecuador’s London Embassy, fearing that if he sets foot outside the door he will subsequently be extradited to the United States and thrown in jail. But the prospect of this does not appear to be weighing heavily on Thordarson’s mind. Only once, when recounting the time he spent passing information on Assange to the FBI, does his voice tremble with a quiver of guilt.

    “If you come into Julian’s inner circle,” Thordarson says, “he really takes care of his friends.”

    This article arises from Future Tense, a collaboration among Arizona State University, the New America Foundation, and Slate. Future Tense explores the ways emerging technologies affect society, policy, and culture. To read more, visit the Future Tense blog and the Future Tense home page. You can also follow us on Twitter.

    Ryan Gallagher  Aug. 9 2013 5:37 AM

    Ryan Gallagher is a journalist who reports from the intersection of surveillance, national security, and privacy for Slate’s Future Tense blog. He is also a Future Tense fellow at the New America Foundation.

    Find this story at 9 August 2013

    © 2014 The Slate Group LLC.

     

    Here’s What It Looks Like When Two Hacker FBI Informants Try To Inform On Each Other

    WikiLeaks informant Sigurdur Thordarson, left, and LulzSec informant Hector Xavier Monsegur.

    The FBI has so many moles in the hacktivist community, it seems, that at times they’ve even ended up unwittingly doing their best to get each other arrested.

    For much of 2011, Icelandic then-teenager and self-described hacker Sigurdur Thordarson worked as both a WikiLeaks volunteer and an FBI informant. As Thordarson first told Wired, he claims to have given the FBI eight hard drives full of information potentially useful to the U.S. government’s ongoing investigation into WikiLeaks, which has come back into the spotlight due to the secret-spilling group’s role in helping NSA whistleblower Edward Snowden seek asylum.

    In an instant message conversation with Thordarson Thursday, I asked him what he might have given to the FBI that could be relevant to its investigation, and he responded immediately with a log of an instant message conversation between himself and the member of the LulzSec hacker group known as Sabu, which he says he gave to the FBI and which he claims shows “that information was passed on from LulzSec that later got published by WikiLeaks.” Thordarson told me he believes the log supports a “conspiracy” charge against Julian Assange or others in WikiLeaks.

    The log is likely less useful to the FBI than Thordarson thinks: It’s no surprise that WikiLeaks has published hacked files, or even that it publishes files hacked specifically by LulzSec, such as the millions of emails stolen from the private intelligence firm Stratfor by activist Jeremy Hammond, who pleaded guilty to computer fraud and abuse last month.

    More interesting, or at least more humorous, is the fact that the chat log represents a conversation between two FBI informants, both of whom seem to be trying to lure the other into providing evidence they can turn over to their law enforcement handlers–or even into a meeting that could lead to the other’s arrest. Sabu, also known as Hector Xavier Monsegur, had agreed to work as an FBI mole within LulzSec months before his conversation with Thordarson. Thordarson, for his part, tells me he thought he was helping to deliver a “notorious hacker” to the FBI, and didn’t know he was speaking to a fellow stool pigeon. Monsegur doesn’t show any signs of knowing either.

    Thordarson, it should be noted, is not a reliable source, and WikiLeaks has claimed that “at no time did he have access to sourcing or publishing systems.” But while he may have tampered with the chat logs he provided me, they would be nearly impossible to wholly fabricate, and include English colloqualisms from Monsegur that would be tough for a native Icelander like Thordarson to invent.

    At the beginning of this November 2011 conversation, in which Thordarson goes by the name “Dumbo12,” Monsegur offers WikiLeaks a a trove of hacked Syrian government emails, which sound like a portion of collection WikiLeaks would publish in 2012.

    Sabu: how you doing my brother?

    Dumbo12: all good on my and my friend

    Dumbo12: on my end my friend *

    Dumbo12: how’s life

    Sabu: everythings good over here

    Sabu: been busy

    Sabu: we ended up a certain governments central mail server

    Sabu: and got some fucking massive leaks coming out

    Sabu: you gents sure you’re not wanting to do anymore leaks?

    Dumbo12: Oh we will make more leaks

    Dumbo12: we are gathering material now’a days and getting more funds to keep hosting our data servers

    Dumbo12: anything else you can tell me about the comming out leaks?

    Sabu: well between us. we ended up owning syrian government central mail server. my teams working on translating from arabic to english. but we are seeing crazy shit

    Monsegur sends Thordarson some examples, and Thordarson responds with interest, and then asks Monsegur how WikiLeaks can help him. He responds asking for money:

    Sabu: this is real shit

    Dumb012: is this something WL could get there hands on and get real and good publicitiy?

    Sabu : my brother. I’ll give you url of email attachments right now as a sample

    Sabu : one minute

    Dumbo12: another question i was asked to ask you, Are you being monitered? are you safe? do you need any assistance from us?

    Sabu: nein but thanks for asking

    Sabu: the only assistance I need is money so I can stop living in poverty and being the brokest hacker on earth

    Sabu: hahaha

    Then Thordarson mentions recruiting Monsegur to become a member of WikiLeaks, but insists on meeting him in person.

    Dumbo12: Did J say anything about recruiting you permanately?

    Sabu: well he emailed me once but we didnt get to talk

    Sabu: guess hes been busy/careful or whatever

    Sabu: but let him know we have intercepted 92GB of mails from .gov.sy so this can be one of the biggest leaks in history

    Dumbo12: Just to point out one thing – If we are to recruit you – a meeting will have to take place we can’t be talking to a username forever

    Sabu: I don’t care about that. but if you meet me you better make sure you guys are secure

    Sabu: I refuse to go to jail for meeting anyone

    Dumbo12: we will be secure im more worried about you

    Sabu: especially me. they’re trying to get me really hard man

    Sabu: I think they’re builing a real ugly case against me

    Sabu: I believe in this cause and J inspired me to do what I’m doing

    Sabu: but it feels like they’re trying to turn me to a martyr

    Dumbo12: Believe me when i say, i personally and this organization will do everything we can to protect you from our end

    Sabu: thanks brother.

    Later Thordarson asks Monsegur to meet in Iceland, and Monsegur instead asks Thordarson to come to New York.

    Dumbo12: Do you feel comfortable traveling to Iceland?

    Dumbo12: or do you wan’t us to travel somwhere?

    Sabu: unfortunately I’m a grown ass man with kids, so I don’t have the luxory of traveling the world

    Sabu: but if you sneak yourself out to new york we’ll meet up at a bar on some random shit

    Dumbo12: haha new york?

    Sabu: haha yeah

    Dumbo12: you don’t ask for little my friend

    Sabu: take your time brother

    Sabu: but its easy to hide in this city

    Dumbo12: well worst case scenario i get stopped in NY customs – but i do not think that will happen

    Sabu: I can be in NY tomorrow but i won’t go there unless your 100%

    Sabu: I’m 100% but again my nigga I can’t risk going to jail now. I’ve been hiding for so long

    Sabu: so be private about every fucking thing

    Dumbo12: give me a date that suits you and i will try my outmost to be ther

    Dumbo12: e

    Dumbo12: if i get stopped in the US and they realize who i am then im going to jail so i ask you the same be not private but be very private about everything

    Dumbo12: and you need to know that if i travel there i will be traveling with a close protection unit

    Sabu: thats fine. im from the ghetto so I got people too 🙂

    Four months later, Monsegur was revealed as an FBI informant. His meeting with Thordarson at a New York bar seems to have never taken place. Which is a shame: The two had more in common than they realized.

    6/28/2013 @ 3:51PM |Andy Greenberg

    Find this story at 28 June 2013

    Copyright 2014 Forbes.com LLC™

     

    WikiLeaks volunteer was paid FBI informant

    A “cherubic” looking 18-year-old was part of an international investigation

    Wired reports that an Icelandic 18-year-old named Sigurdur “Siggi” Thordarson, who volunteered for WikiLeaks, was also informing for the FBI on the secretive group:

    Thordarson was long time volunteer for WikiLeaks with direct access to Assange and a key position as an organizer in the group. With his cold war-style embassy walk-in, he became something else: the first known FBI informant inside WikiLeaks. For the next three months, Thordarson served two masters, working for the secret-spilling website and simultaneously spilling its secrets to the U.S. government in exchange, he says, for a total of about $5,000. The FBI flew him internationally four times for debriefings, including one trip to Washington D.C., and on the last meeting obtained from Thordarson eight hard drives packed with chat logs, video and other data from WikiLeaks.

    The relationship provides a rare window into the U.S. law enforcement investigation into WikiLeaks, the transparency group newly thrust back into international prominence with its assistance to NSA whistleblower Edward Snowden. Thordarson’s double-life illustrates the lengths to which the government was willing to go in its pursuit of Julian Assange, approaching WikiLeaks with the tactics honed during the FBI’s work against organized crime and computer hacking — or, more darkly, the bureau’s Hoover-era infiltration of civil rights groups.

    Thursday, Jun 27, 2013 04:50 PM +0200
    Alex Halperin

    Find this story at 27 June 2013

    © 2014 Salon Media Group, Inc.

    WikiLeaks q: Sigurdur Thordarson

    Thordarson appears to be on Twitter: @singi201 and @singi201/wikileaks

    A sends in response to a Cryptome query about allegations against WikiLeaks member “q” cited in We Are Anonymous, by Parmy Olson:

    A friend has just alerted me to your liar-q-wl.pdf doc, and haven’t had the time to look through what else has been posted. If you want more information on Q, the psychopathic right-hand man of Julian Assange, I can give you more information, including his name and some of his other alleged criminal activity.
    Cryptome: Thanks for the offer. Parmy Olson notes that lower-case “q” is not the same as upper-case “Q.”

    _________

    I seem to recall q also going as Q in the WL chatrooms.

    q is Sigurdur Thordarson, who was 18 years old in 2010 and probably 17 when he joined WL. When Daniel Domscheit-Berg was still in WL, he knew Thordarson was trouble and made sure to keep him as far away from Julian Assange as possible. I believe Birgitta Jonsdottir may have done likewise; I do know that they knew each other, that she was extremely wary of him and did not like him. When Domscheit-Berg and Jonsdottir left, that barrier was removed and he quickly became Assange’s flunkie. In a better run organisation, an unintelligent, unskilled, and shady person like Thordarson would have never gotten anywhere near Assange, but because WL is run more like a textbook dictatorship, with its leader deriving his authority from a cult of personality based on an exaggerated and sometimes falsified life story, inefficiency and unintended irony abounded while meritocracy floundered. I have no doubt the current state of affairs within WL differs much from what I saw and experienced.

    Why was he considered trouble? In part, before joining WL, it was said he had an extensive and dishonourable criminal record. While I was with WL, it became clear that something was rotten in Iceland Denmark when a fellow volunteer notified me that Thordarson had bragged to him that he intended to fly to the USA on WL’s dime to sleep with a uni student who was desperate to work for WL but was clearly little more than an Assange fangirl, then email her once he’d returned home to say there was no place for her in the organisation.

    Thordarson disappeared in late 2010 from WL, with no one knowing where he’d gone. He resurfaced almost a week later, saying he’d been stopped by a police officer in his country while on the road, that his name had popped up on the police database, and as a result his laptop was taken. He never clarified why he’d been stopped and why he was on the database, but vaguely worded it in a way to make it out to be WL-related persecution, which is hard to believe.

    A contact of mine who professed to be investigating WL financial malfeasance as of 2011 looked into this incident and said there was no record of it; another Icelander clarified Thordarson could only have been stopped for driving while under the influence. I have no way to validate or invalidate either q’s story or this investigator’s alleged research. I have considered the possibility this so-called investigator was actually Thordarson or someone else in WL playing mind games with volunteers who had left WL to keep tabs on them. It is the sort of thing Assange and company would do. I lost contact with the investigator after s/he claimed that his contact within WL who was giving him information had stopped singing. The investigator was said to have been working alongside a French journalist to break this story. I was hoping to help break the story to the NYT.

    I am one of about a dozen who left in late 2010 because of WL’s abysmal lack of organisation and order, Julian Assange’s manipulative and exploitative personality, and Thordarson’s – for lack of a better term – psychopathy. Some of the volunteers in 2010 included some of the best and brightest computer programmers you can find, and Assange left Thordarson to dole out mostly meaningless tasks which we would never hear anything more of. The primary consequence of the WL chatroom was to cull people who genuinely wanted to volunteer for WL but who were of no use to WL under its modus operandi, and dupe them into thinking they were volunteers when they were really pissing into the wind. Many of us left for these ethical reasons, as well as common sense. The last I heard, almost everyone I worked with left WL and now dick-slap one another in public over one issue or another. No one knows most of us worked for WL, which is for the best, especially for those of us who want to vacation in the USA at some point in our lives.

    Though I cannot backup with hard evidence the claims that Thordarson stole $60,000 of WL money, I can believe it because the investigator, despite his/her reliability being uncertain, told a similar story, and the chat transcripts that exist of Thordarson talking of using WL money to travel internationally just to get laid. I can confirm that near the end of my time there, he tried to get one volunteer to do something illegal with the WL shop and its corresponding bank account. The volunteer realized what he was asking could land the person in prison, and Thordarson moved onto another volunteer to get them to do the same.

    Around the time we quit, it was made known that Thordarson was being prosecuted for bugging computers in the Icelandic parliament. That case actually exists and from what I was informed by a trusted source this week, it is still pending. Thordarson is said to have quit WL because the organisation stopped supporting him.

    He has the expected traits of the hacktivist equivalent to Baghdad Bob: he’s obese, he can’t pick up, he’s a post-pubescent male yet listens to Justin Bieber, and he eats at KFC a lot. I’d call him a useful idiot, but he wasn’t even useful. The most meaningful thing Thordarson ever did at WL, as far as I’m aware, was he once filmed Julian Assange walking down a street.

    I could tell you a lot more, including the US intelligence agency Assange once worked for and the malevolent little tricks he plays on hardworking WL volunteers.

    A WikiLeaks Whistleblower

    12 June 2012

    Find this story 12 June 2014

    FBI told to leave Iceland – Took a boy with them

    Mr. Kristinn Hrafnsson, Wikileaks spokesperson, said last week that representatives from the FBI came to Iceland in August 2011. The Icelandic Minister of the Interior confirmed this the same day and said that when he became aware of the FBI in Iceland he cancelled all cooperation with the FBI and told the representatives to leave.

    Mr. Hrafnsson said that the FBI came to Iceland to investigate Wikileaks. In an announcement from the Icelandic police it was stated that the FBI agents were here because of an imminent attack on the Ministry Offices in Iceland. The FBI agents interrogated one person regarding Wikileaks and the computer attacks. That person was interrogated at the US embassy in Iceland and then taken to Washington where he was interrogated for four more days. It was also mentioned in the announcement from the police that the person who was interrogated came willingly forward to the embassy.

    The FBI agents interrogated the man, who is twenty years old, for five days after the Ministry of the Interior declined to cooperate with the FBI.

    The interrogations took place in hotels around Reykjavik but never at the US embassy.

    On August 30th the FBI agents told the Chief of police in Iceland that the Ministry of the Interior had said that they did not want the boy interrogated any further in Iceland and that their stay here was unwanted. The agents then left the country.

    They however took the boy with them to Washington where he was interrogated for four more days. It is said that the boy went willingly. After the interrogations the boy was flown back to Iceland.

    Mr. Ossur Skarphedinsson, the Minister of Foreign Affairs, said to a local newspaper today that the FBI’s stay in Iceland was illegal. He said that the objective of the ministries had been to protect the boy, they thought that the boy did not realize the consequences of his actions. Mr. Skarphedinsson added:

    “Therefore, we at the Ministry of Foreign Affairs thought that these conversations should be prevented, to protect this Icelandic citizen, because the conversations took place at very unusual places and without authorization. We did not receive any request regarding authorization to interrogate this man.”

    An announcement from Mr. Ogmundur Jonasson, the Minister of the Interior, is expected soon.

    Tuesday, 05 February 2013 16:10 font size Print Email

    Find this story at 5 February 2014

    Copyright News of Iceland.

    Environmental Groups “Shocked” by Reports of NSA Spying of U.N. Climate Talks

    In one of the latest revelations based on the leaks of Edward Snowden, the National Security Agency spied on foreign governments before and during the 2009 U.N. climate summit in Copenhagen. An internal NSA document says its analysts and foreign partners briefed U.S. negotiators on other countries’ “preparations and goals,” saying, “signals intelligence will undoubtedly play a significant role in keeping our negotiators as well informed as possible throughout the two-week event.” We speak to Erich Pica, president of Friends of the Earth.
    Transcript

    This is a rush transcript. Copy may not be in its final form.

    AMY GOODMAN: This is Democracy Now!, democracynow.org, The War and Peace Report. I’m Amy Goodman. We’re still joined by Erich Pica of Friends of the Earth USA. Erich, I wanted to ask you about the recent reports that the National Security Agency spied on foreign governments before and during the 2009 U.N. climate summit in Copenhagen. An internal NSA document says its analysts and foreign partners briefed U.S. negotiators on other countries’ preparations and goals, saying, quote, “signals intelligence will undoubtedly play a significant role in keeping our negotiators as well informed as possible throughout the two-week event.” Your response?

    ERICH PICA: Shocking, but not surprised, as we hear more and more about what the National Security Agency has been doing. You know, the 2009 climate talks in Copenhagen was supposed to be this convening of the world leaders to take us into the future of climate negotiations and carbon pollution reductions. And, you know, the United States, throughout those negotiations, had a smug reality to their negotiating stance and was—can be blamed for the collapse of those talks. And kind of hearing through the Snowden documents that NSA was spying on the countries and the negotiators kind of explains many things about why those talks collapsed, because it seems that the United States wasn’t really interested in negotiating just like other countries should be. They were just interested in listening to what was going on.

    AMY GOODMAN: Explain the significance of those talks. I remember very well in Copenhagen when Friends of the Earth was kicked out.

    ERICH PICA: Yeah, no, we were—we were kicked out for protesting within the U.N. confines. And so, those talks, you know, those 2009 talks, were really about how does the world come together to solve this great issue, which is how to reduce our carbon pollution and save the planet and our society from global warming. And, you know, a lot of countries from around the world, and heads of state, more importantly, came to Copenhagen to try to hammer out an agreement that would have taken us into the future over the next 20 years. And unfortunately, the United States led the—you know, several countries, including Canada, who we were just talking about, in basically destroying the goodwill that these talks had created, to the point where we’ve been now in these negotiations over the last four years, which have really gone nowhere.

    AMY GOODMAN: What do you expect from the coming talks? We’ve just come out of Warsaw. Then they’re moving on to Lima, and the binding discussion is supposed to take place in Paris, France, in 2015.

    ERICH PICA: Yeah, in Paris. Yeah, well, it’s not a good sign when you’re trying to build trust with other negotiators, other countries, and it comes out that, you know, the United States was spying on those negotiations. There’s already been a level of mistrust and distrust between the United States and countries around the world, particularly those developing countries. And so, you know, where we’re going in Paris, who knows? The United States has not been forthcoming with their negotiating stances. They have not been—we have not been aggressive in reducing our climate change emissions and putting out an offer that the rest of the world can accept. And we haven’t been terribly generous with funding to help these less-developed, these poorer countries in adjusting to both adapting and mitigating the climate impacts that are already happening to them.

    AMY GOODMAN: Erich Pica—

    ERICH PICA: And so the United States has very little trust in these talks.

    AMY GOODMAN: I want to thank you for being with us, president of Friends of the Earth USA, as we turn right now to Michigan.

    ERICH PICA: Thank you.

    AMY GOODMAN: Thank you.

    Monday, February 3, 2014

    Find this story at 3 February 2014

    The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.

    New from Snowden: The NSA was spying on U.N. climate talks Leaked documents reveal that the U.S. government monitored communications to gain an advantage in negotiations

    The National Security Agency was spying on foreign governments’ communications before and during the 2009 United Nations conference on climate change in Copenhagen, Denmark, a new document released by whistle-blower Edward Snowden reveals.

    The Huffington Post, partnering with Danish newspaper Information, has the exclusive:

    The document, with portions marked “top secret,” indicates that the NSA was monitoring the communications of other countries ahead of the conference, and intended to continue doing so throughout the meeting. Posted on an internal NSA website on Dec. 7, 2009, the first day of the Copenhagen summit, it states that “analysts here at NSA, as well as our Second Party partners [the United Kingdom, Canada, Australia, and New Zealand, with which the U.S. has an intelligence-sharing relationship] will continue to provide policymakers with unique, timely, and valuable insights into key countries’ preparations and goals for the conference, as well as the deliberations within countries on climate change policies and negotiation strategies.”

    “[L]eaders and negotiating teams from around the world will undoubtedly be engaging in intense last-minute policy formulating; at the same time, they will be holding sidebar discussions with their counterparts — details of which are of great interest to our policymakers,” the document reads. The NSA’s plan, Information adds, was to get the scoop on those private discussions in order to brief U.S. officials and give them an advantage in negotiations of CO2 reductions, which had the potential to harm U.S. (and other nations’) economic interests:

    The general theme of the document is a set of risk assessments on various effects of climate change that the entire intelligence community was working on. However, the document suggests that the NSA’s actual focus in relation to climate change was spying on other countries to collect intelligence that would support American interests, rather than preventing future climate catastrophes. It describes the U.S. as being under pressure because of its role as the historically largest carbon emitter. A pressure to which the NSA spies were already responding:

    “SIGINT (Signals Intelligence, ed.) has already alerted policymakers to anticipate specific foreign pressure on the United States and has provided insights into planned actions on this issue by key nations and leaders.”
    advertisement

    A National Security Council spokeswoman declined to comment directly on the document, but said in an email that “the U.S. Government has made clear that the United States gathers foreign intelligence of the type gathered by all nations.”

    The ultimate outcome of the Copenhagen talks is mostly seen as a disappointment: an agreement to keep warming below 2 degrees C, but one that was non-binding and that allowed each nation to develop its own plans for doing so. While a number of factors undoubtedly contributed to this, these new revelations signal a bad turn for future efforts to reach an international accord on fighting climate change. As HuffPo puts it, in a bit of an understatement, “The revelation that the NSA was surveilling the communications of leaders during the Copenhagen talks is unlikely to help build the trust of negotiators from other nations in the future.”

    Lindsay Abrams is an assistant editor at Salon, focusing on all things sustainable. Follow her on Twitter @readingirl, email labrams@salon.com

    Thursday, Jan 30, 2014 03:38 PM +0100

    Find this story at 30 January 2014

    Copyright © 2014 Salon Media Group, Inc.

    Snowden Docs: U.S. Spied On Negotiators At 2009 Climate Summit

     

    WASHINGTON — The National Security Agency monitored the communications of other governments ahead of and during the 2009 United Nations climate negotiations in Copenhagen, Denmark, according to the latest document from whistleblower Edward Snowden.

    The document, with portions marked “top secret,” indicates that the NSA was monitoring the communications of other countries ahead of the conference, and intended to continue doing so throughout the meeting. Posted on an internal NSA website on Dec. 7, 2009, the first day of the Copenhagen summit, it states that “analysts here at NSA, as well as our Second Party partners, will continue to provide policymakers with unique, timely, and valuable insights into key countries’ preparations and goals for the conference, as well as the deliberations within countries on climate change policies and negotiation strategies.”

    “Second Party partners” refers to the intelligence agencies of the United Kingdom, Canada, Australia, and New Zealand, with which the U.S. has an intelligence-sharing relationship. “While the outcome of the Copenhagen Climate Change Conference remains uncertain, signals intelligence will undoubtedly play a significant role in keeping our negotiators as well informed as possible throughout the 2-week event,” the document says.

    The Huffington Post published the documents Wednesday night in coordination with the Danish daily newspaper Information, which worked with American journalist Laura Poitras.

    The December 2009 meeting in Copenhagen was the 15th Conference of the Parties to the United Nations Framework Convention on Climate Change, which brings together 195 countries to negotiate measures to address rising greenhouse gas emissions and their impact. The Copenhagen summit was the first big climate meeting after the election of President Barack Obama, and was widely expected to yield a significant breakthrough. Other major developed nations were already part of the 1997 Kyoto Protocol, which set emissions limits, while the United States — the world’s biggest emitter of greenhouse gases when the protocol went into effect in 2004 — had famously declined to join. The two-week meeting was supposed to produce a successor agreement that would include the U.S., as well as China, India and other countries with rapidly increasing emissions.

    The document indicates that the NSA planned to gather information as the leaders and negotiating teams of other countries held private discussions throughout the Copenhagen meeting. “[L]eaders and negotiating teams from around the world will undoubtedly be engaging in intense last-minute policy formulating; at the same time, they will be holding sidebar discussions with their counterparts — details of which are of great interest to our policymakers,” the document states. The information likely would be used to brief U.S. officials, such as Secretary of State Hillary Clinton and Obama, among others, according to the document.

    The document does not detail how the agency planned to continue gathering information during the summit, other than noting that it would be capturing signals intelligence such as calls and emails. Previous disclosures have indicated that the NSA has the ability to monitor the mobile phones of heads of state. Other documents that Snowden has released indicate that the U.K.’s intelligence service tapped into delegates’ email and telephone communications at the 2009 G-20 meetings in London. Other previous Snowden disclosures documented the surveillance of the G-8 and G-20 summits in Canada in 2010, and the U.N. climate change conference in Bali in 2007.

    The document also refers to some intelligence gathered ahead of the meeting, including a report that “detailed China’s efforts to coordinate its position with India and ensure that the two leaders of the developing world are working towards the same outcome.” It refers to another report that “provided advance details of the Danish proposal and their efforts to launch a ‘rescue plan’ to save COP-15.”

    The Danish proposal was a draft agreement that the country’s negotiators had drawn up in the months ahead of the summit in consultation with a small number key of countries. The text was leaked to The Guardian early in the conference, causing some disarray as countries that were not consulted balked that it promoted the interests of developed nations and undermined principles laid out in previous climate negotiations. As Information reports, Danish officials wanted to keep U.S. negotiators from seeing the text in the weeks ahead of the conference, worried that it may dim their ambitions in the negotiations for proposed cuts to greenhouse gas emissions.

    The Danes did share the text with the U.S. and other key nations ahead of the meeting. But the NSA document noting this as “advance details” indicates that the U.S. may have already intercepted it. The paragraph referring to the Danish text is marked “SI” in the Snowden document — which most likely means “signals intelligence,” indicating that it came from electronic information intercepted by the NSA, rather than being provided to the U.S. negotiators.

    That could be why U.S. negotiators took the positions they did going into the conference, a Danish official told Information. “They simply sat back, just as we had feared they would if they knew about our document,” the official said. “They made no constructive statements. Obviously, if they had known about our plans since the fall of 2009, it was in their interest to simply wait for our draft proposal to be brought to the table at the summit.”

    Members of the Danish delegation indicated in interviews with Information that they thought the American and Chinese negotiators seemed “peculiarly well-informed” about discussions that had taken place behind closed doors. “Particularly the Americans,” said one official. “I was often completely taken aback by what they knew.”

    Despite high hopes for an agreement at Copenhagen, the negotiations started slowly and there were few signs of progress. Obama and heads of state from more than 100 nations arrived late in the second week in hopes of achieving a breakthrough, but the final day wore on without an outcome. There were few promising signals until late Friday night, when Obama made a surprise announcement that he — along with leaders from China, India, Brazil and South Africa — had come up with the “Copenhagen Accord.”

    The three-page document set a goal of keeping the average rise in global temperature to less than 2 degrees Celsius, but allowed countries to write their own plans for cutting emissions — leaving out any legally binding targets or even a path to a formal treaty. Obama called the accord “an unprecedented breakthrough” in a press conference, then took off for home on Air Force One. But other countries balked, pointing out that the accord was merely a political agreement, drafted outside the U.N. process and of uncertain influence for future negotiations.

    The climate summits since then have advanced at a glacial pace; a legally binding treaty isn’t currently expected until 2015. And the U.S. Congress, despite assurances made in Copenhagen, never passed new laws cutting planet-warming emissions. (The Environmental Protection Agency is, however, moving forward with regulations on emissions from power plants, but a new law to addressing the issue had been widely considered as preferable.)

    The revelation that the NSA was surveilling the communications of leaders during the Copenhagen talks is unlikely to help build the trust of negotiators from other nations in the future.

    “It can’t help in the sense that if people think you’re trying to get an unfair advantage or manipulate the process, they’re not going to have much trust in you,” said Alden Meyer, director of strategy and policy for the Union of Concerned Scientists and a seasoned veteran of the U.N. climate negotiations. Meyer said he worried that the disclosure might cause the parties to “start becoming more cautious, more secretive, and less forthcoming” in the negotiations. “That’s not a good dynamic in a process where you’re trying to encourage collaboration, compromise, and working together, as opposed to trying to get a comparative advantage,” he said.

    Obama has defended the NSA’s work as important in fighting terrorism at home and abroad. But the latest Snowden document indicates that the agency plays a broader role in protecting U.S. interests internationally.

    National Security Council spokeswoman Caitlin Hayden declined to comment directly on the Snowden document in an email to The Huffington Post, but did say that “the U.S. Government has made clear that the United States gathers foreign intelligence of the type gathered by all nations.” She noted that Obama’s Jan. 17 speech on the NSA “laid out a series of concrete and substantial reforms the Administration will adopt or seek to codify with Congress” regarding surveillance.

    “In particular, he issued a new Presidential Directive that lays out new principles that govern how we conduct signals intelligence collection, and strengthen how we provide executive branch oversight of our signals intelligence activities,” Hayden said. “It will ensure that we take into account our security requirements, but also our alliances; our trade and investment relationships, including the concerns of our companies; and our commitment to privacy and basic liberties. And we will review decisions about intelligence priorities and sensitive targets on an annual basis, so that our actions are regularly scrutinized by the President’s senior national security team.”

    Posted: 01/29/2014 9:17 pm EST Updated: 01/30/2014 12:59 pm EST

    Find this story at 29 January 2014

    Read the document here

    Copyright © 2014 TheHuffingtonPost.com, Inc.

    “A Silent Coup”: Jeremy Scahill & Bob Herbert on Corporate, Military Interests Shaping Obama’s SOTU

    On issues from domestic inequality to foreign policy, President Obama delivered his fifth State of the Union with a vow to take action on his own should Congress stonewall progress on his agenda. But will Obama’s policies go far enough? We host a roundtable with three guests: Jeremy Scahill, producer and writer of the Oscar-nominated documentary “Dirty Wars: The World is a Battlefield” and senior investigative reporter at First Look Media, which will launch in the coming months; Bob Herbert, distinguished senior fellow with Demos; and Lorella Praeli, director of advocacy and policy at the United We Dream coalition.
    Transcript

    This is a rush transcript. Copy may not be in its final form.

    AMY GOODMAN: Our guests are Jeremy Scahill—his film, Dirty Wars, has just been nominated for an Oscar; Bob Herbert with us, former New York Times columnist, now with Demos; and Lorella Praeli with the United We Dream coalition. Nermeen?

    NERMEEN SHAIKH: We’re continuing our coverage of President Obama’s State of the Union address. During Tuesday’s speech, he announced an executive action to raise the minimum wage for some federal contract workers from $7.25 an hour to $10.10 an hour.

    PRESIDENT BARACK OBAMA: In the coming weeks, I will issue an executive order requiring federal contractors to pay their federally funded employees a fair wage of at least $10.10 an hour, because if you cook our troops’ meals or wash their dishes, you should not have to live in poverty.

    Of course, to reach millions more, Congress does need to get on board. Today, the federal minimum wage is worth about 20 percent less than it was when Ronald Reagan first stood here. And Tom Harkin and George Miller have a bill to fix that by lifting the minimum wage to $10.10. It’s easy to remember, 10-10. This will help families. It will give businesses customers with more money to spend. It does not involve any new bureaucratic program. So join the rest of the country. Say yes. Give America a raise.

    NERMEEN SHAIKH: Bob Herbert, can you respond to that, the significance of this raise for some federal workers?

    BOB HERBERT: Sure. I think it’s symbolically significant. So, it’s not going to take effect until new contracts come up, so federal contract workers will have to be paid at least a minimum of $10.10 an hour. The reason I think it’s symbolically significant is because it keeps a spotlight on the issue of the minimum wage, on the issue of employment going forward.

    You know, to Jeremy’s point about the State of the Union essentially being a propaganda speech, which is absolutely true, what you didn’t hear there was really what the state of the economy is for ordinary Americans, for working people in this country. You didn’t hear anything about poverty, for example. So, for years now, the American people have made it clear, in poll after poll and in other ways, that employment is their top priority. I mean, people need jobs. But neither party, presidents from either party and Congress, whether it’s in the control of the Republicans or the Democrats, have had a sustained, effective job creation program in this country. And the United States is never going to get out of its morass until it’s able to put people back to work.

    We now have nearly 50 million people who are officially poor in the United States, according to federal guidelines. Another 50 million people are just a notch or two above the official poverty rate. That’s nearly a third of the entire population that’s poor or near poor. One out of every three black children in the United States is poor. If you just walk a few blocks from this studio, every day you will see enormous lines wrapped around the corner for soup kitchens and that sort of thing. And that’s the case in places across this country. None of that was addressed. And none of the initiatives that the president has offered, and nothing that the Republicans have offered in years, would begin to address this state of distress among American working people and among the poor.

    NERMEEN SHAIKH: Just to give us an idea, Bob Herbert, how many employees does the federal government have through contractors?

    BOB HERBERT: Well, it’s interesting. It was actually Demos that—it was a Demos initiative that put the spotlight on this $10.10 initiative, because Demos was the first organization to point out that the federal government, through its contractors, employs nearly two million low-wage workers, which is more than Wal-Mart and McDonald’s combined. So, if you could get this initiative expanded to cover all of the workers who are contracted to work for the federal government, then you would help an enormous number of people.

    AMY GOODMAN: Mention of unions? I saw Richard Trumka in the audience.

    BOB HERBERT: You know, get me started on unions. One of the reasons American workers are in such a deep state of distress is because they have no clout in the workplace. They are not organized, and they are not represented, so they cannot fight for their own interests. Corporations are organized every which way from sundown, and they have tremendous amounts of money. They have a lot a political clout and that sort of thing.

    Workers go to work. You know, it’s just one man or one woman, you know, against an employer in a terrible job market. So you’re afraid to even ask for a raise, even if you deserve a raise, because you think the employer is going to say to you, “Take a hike.” And then you go out there in this terrible job market, and there’s no jobs to be had. If workers were organized, then they would be able to have clout. You’d be able to bring pressure not just on employers, not just on corporations, but also on the federal government to get legislation passed that would be beneficial to workers.

    And one of the most important things you could do is to just enforce the laws that are on the books that have to do with labor organizing. I mean, so, if you’re in an organization, a corporation, a plant, that sort of thing, where workers are not organized, do not belong to a labor union, they want to organize—the majority of the workers want to organize—the corporations fight you every step of the way. And they use a tremendous number—amount of unfair tactics. That’s illegal, but the federal government has not enforced the laws.

    AMY GOODMAN: Let’s talk about international trade policy and how that relates. In his State of the Union, President Obama also sought fast-track authority to give lawmakers an up-or-down vote on the trade deals such as TPP, the Trans-Pacific Partnership.

    PRESIDENT BARACK OBAMA: When 98 percent of our exporters are small businesses, new trade partnerships with Europe and the Asia-Pacific will help them create even more jobs. We need to work together on tools like bipartisan trade promotion authority to protect our workers, protect our environment, and open new markets to new goods stamped “Made in the U.S.A.” Listen, China and Europe aren’t standing on the sidelines. And neither should we.

    AMY GOODMAN: That was President Obama in his fifth State of the Union address. We just returned from Japan, Bob Herbert. There, there’s a huge discussion about the Trans-Pacific Partnership. Here, most people, if you asked them, they wouldn’t even know what it is.

    BOB HERBERT: Well, one of the things that’s a problem in this country is because the economic situation has been so stagnant for most people for so long and because the government has been—the government in Washington has been so dysfunctional, that Americans have really tuned out. And also, I don’t think that the press has done a good job at all on trade agreements, if you go all the way back to NAFTA in the 1990s. So people essentially don’t even understand these agreements. But what they do understand is that they have not been helpful to the vast majority of workers over all these years. So…

    JEREMY SCAHILL: Can I just make a comment?

    AMY GOODMAN: Jeremy Scahill.

    JEREMY SCAHILL: I mean, you know, what Obama was doing there—in his last major address that he gave, he—at the United Nations General Assembly, he laid out this sort of forceful defense of American empire, and even went so far as to say that the U.S. will use its military might to continue to secure energy resources. In this speech, it was a pretty forceful defense of a neoliberal economic agenda. And, you know, what Bob is saying about corporations resonates on a foreign policy level, as well.

    What is widely being considered to be the most moving part of last night was when this U.S. Army Ranger was addressed in the crowd and who was severely wounded and had done 10 tours. Think about that for a moment—10 tours in these war zones. You know, this young American spent his entire adult life in these combat zones. And, you know, the issue of how veterans are treated in this country is one thing, but at the end of the day, did he benefit from these wars? Does the average American benefit from the continuation of these wars? No. Who benefits? That’s the most important question we all have to ask. It’s corporations.

    BOB HERBERT: Exactly.

    JEREMY SCAHILL: War corporations, the Halliburtons of the world, the Boeings. John Kerry, yesterday it was announced, is giving these awards for corporate excellence around the world. He’s giving them to Citibank, to Apache, to Boeing, to Coca-Cola. And so you have this neoliberal economic agenda, which is sort of the hidden hand, in many ways, of the U.S. empire, and then you have this iron fist of U.S. militarism that is being sold to the American public, and increasingly to the world, as national security policy.

    And so, you know, when I see that Army Ranger who’s wounded like that, the first thing that just occurs to me is: Who has benefited from all of this? When corporations control our political process in this country through a legalized form of corruption that’s called campaign finance, what does that say about the state of our democracy? In a way, there already has been a coup in this country, but it’s been a silent coup. And it reminds me of that famous line from the great movie The Usual Suspects. At the end of it, Kevin Spacey’s character says the greatest trick the devil ever pulled was convincing the world he didn’t exist. In many ways, a coup has happened, and the brilliance of it is that it’s not sparking major uprisings because we’ve been pacified and taught to just accept this as how things work. We have two parties in this country, the minimum wage is going to be the minimum wage, and corporations are in control, and these wars are fought in our name, but without our consent.

    BOB HERBERT: And the flipside of who benefits is the suffering that is so tremendous out there among the warriors who have been sent over to fight these wars since late 2001. And so, you just have hundreds of thousands of people who have—men and women, who have come back from the combat zones, who have terrible, disabling injuries, who are going to have to be cared for—we have an obligation to care for them—in many cases, for the rest of their lives. We have to pay, as a society, to care for these folks. You know, it’s probably—Joe Stiglitz has estimated that now these wars are probably going cost cumulatively $4 trillion or more. None of this has been really explored clearly or properly explained to the American public.

    JEREMY SCAHILL: You know, just a small sort of side point on this, you know, when we talk about the U.S. withdrawing from Iraq and Afghanistan, the conventional military, a story that very seldom gets attention is the connection between a paramilitarization of law enforcement inside of the United States and increasing use of what they call counterterrorism tactics on SWAT-style operations in the U.S. The military is donating a lot of its equipment to local police agencies and other so-called law enforcement agencies, and the communities that are most at risk here are communities of color and poor communities. Everything is about war—the war on drugs, the war on crime.

    BOB HERBERT: Right.

    JEREMY SCAHILL: And war requires some kind of a militarized response. And that’s what we’re seeing. This is deeply connected to the wars abroad, the wars at home, as well.

    BOB HERBERT: And this is actually going into our public schools, where you have that type of militarized behavior going on actually in public schools. That’s how you get the school-to-prison pipeline that people are talking about.

    AMY GOODMAN: On Afghanistan, President Obama said, “If the Afghan government signs a security agreement that we have negotiated, a small force of Americans could remain in Afghanistan with NATO allies.” But the latest news says the Pentagon has proposed up to 10,000 troops remaining behind, Jeremy.

    JEREMY SCAHILL: Yeah, and if you look at what sort of various senior anonymous military officials have been saying for several years now, they’ve known that the withdrawal is not really going to be a withdrawal. Yes, we’re going to see the Marines pull out. We’re going to have this thing where journalists can ride on the tanks, like they did out of Iraq. But at the end of the day, this is an Afghanization of a U.S. policy. So, what’s going to happen is that you’re going to have these advise-and-assist squads of highly trained U.S. special ops and CIA personnel accompanying Afghan units, and they’re going to try to have the Afghans do the fighting and dying and killing on behalf of U.S. policy. But what I think should be of greater concern to the American public is that you are going to have these strike forces in place. It’s taken as conventional wisdom now that the U.S. is out of Iraq. Actually, the U.S. has a massive paramilitary presence inside of Iraq and is going to continue to have one inside of Afghanistan. So, these wars are going to continue on for at least another generation, albeit on a sort of covert, hidden-hand manner of doing it.

    NERMEEN SHAIKH: But what’s the justification, Jeremy, for keeping troops in Afghanistan?

    JEREMY SCAHILL: I mean, there is no counterterrorism mission in Afghanistan anymore. I mean, no one wants to talk about this, because you’re going to be accused of being sympathetic to the Taliban. The Taliban is not a terrorist organization with global aspirations. The Taliban has a constituency, has a greater constituency than the U.S., arguably than Hamid Karzai, who the U.S. recognizes as the president. And I think the Taliban is a morally reprehensible group of individuals, but they do have indigenous support. And the reason that they’re fighting right now is because the U.S. and NATO are in their country. And so, to sort of imply that what we’re doing there is countering terrorists, when in the first months of the Obama administration his own national security adviser said there are less than a hundred al-Qaeda operatives in Afghanistan, we should be asking that question that John Kerry asked in 1971: Who wants to be the last to die for this failed war? What do they tell the families of the soldiers who die from here until they pull out the conventional military?

    AMY GOODMAN: Now, the significance of that, for people who don’t remember, John Kerry, who is the secretary of state and formerly senator, was—fought in Vietnam, and when he came home, he was strongly opposed to the war in Vietnam, and he testified before Congress asking that question.

    JEREMY SCAHILL: Yeah, I’d love to see 1971 John Kerry questioning, you know, 2014 John Kerry at a hearing about all these policies that he’s having to sell as secretary of state around the world.

    Find this story at 29 January 2014

    The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.

     

    The US & the Falklands War (2): the CIA

    Bit by bit, with deep and understandable reluctance, the CIA has been opening its archives. Only fragments of its view of the Falklands War are currently available, but they are still worth close study.

    Intelligence material often plays a large part in the formulation of foreign policy, sometimes a decisive one, but it is almost always held back far longer than other government information, creating a structural weakness in our understanding of the recent past.
    the cia’s declassified files: the crest database

    CIA Director’s angry memo to almost everyone re: the leaks that caused Argentina to change its cypher, 9 Jun 1982

    Around 40 CIA documents on the war have been released through the agency’s “CIA Records Search Tool” database (CREST). These are items more than 25 years old that the agency has been obliged to release by a Clinton-era Executive Order (EO 12958/13256), rather than responses to Freedom of Information Act requests, which probably gives this mini-collection a little more coherence and completeness than it might otherwise have. One of the great problems with relying on FOI to produce historical information is that the selection of things released is dependent on the interests of the persons or organisations who made the original request, and their interests probably won’t be the same as yours, indeed are likely to be different – and might be completely crazy. You generally won’t know why one document has been released and not another, since the terms of the original requests are not themselves released alongside each document.

    Even so, there is much about this CIA collection that is obscure. While you can sometimes work out in Presidential Library files what part of the whole has been released and what not, and roughly why, in the case of these CIA documents that is all but impossible. What we are looking at here might be a fifth of the whole, or a fiftieth. It might contain much of what they knew about the Falklands, or the merest fraction. It might be representative, it might be completely the reverse. One obvious element is definitely missing: there is no signals intelligence here. But we know that the US had broken Argentinian military codes, until leaks in the US press caused the Argentinians to change their cypher, of and it would be a surprise if it wasn’t reading diplomatic traffic as well.

    Some of the CREST documents are so heavily redacted that they resemble a kind of two-dimensional Swiss cheese. Redacting becomes so compulsive an activity that even unclassified documents get redacted sometimes. Generally though the Falklands documents have been released without too much of this kind of semi-shredding. Unhelpfully, you need to visit in person to use this database, which is stored at National Archives II in College Park, Maryland, and print out what you find. They give you free paper at least. The team at margaretthatcher.org has done the work and now uploaded the Falklands material. There is more useful information available in the library section of the CIA’s excellent website, including a number of additional Falklands documents, and we have added in a handful also from the official-sounding but resolutely independent “National Security Archive”, based at George Washington University in Washington D.C.

    This CIA material includes twice-daily situation reports at the very beginning of the war, some satellite image interpretations, as well as high-level internal papers updating the Director and Deputy Director. It includes too a number of the “National Intelligence Daily” (NID) intelligence summaries circulated only to senior officials in the White House and Cabinet Members, the CIA’s ‘newspaper’, printed in tabloid form and some “Monthly Warning Assessments” (MWA).

    Given the fragmentary picture these documents provide of the agency’s knowledge and outlook, conclusions are best presented as a series of points rather than a connected story, with suitable warning that they are incomplete and that possession of the full record would require them to be amended.

    The earliest document is a memo from CIA Director William Casey to Secretary of State Al Haig, copied to the White House, providing a “Quick Intelligence Assessment on Falkland Affairs (April 2, 1982)”. This helpfully reminds one how useless intelligence reports can sometimes be. Forced to make snap judgments without much hard information, the interpretation inevitably tended towards the bland. The British, Casey solemnly suggested, would be hoping to use the UN Security Council “to put Argentina in the dock as an ‘aggressor'”. He explained that “British economic options are limited” and suspected that the Argentinians would be likely reinforce the islands before the British Task Force arrived. And so on: there are pages of this. Any averagely well-informed reader would have been tempted to skip large chunks of it in the hope of finding something seriously useful further on. More interesting was the point that many of the ships in the Argentinian fleet were 40 years old – i.e, dated from WW2 – and would need to be withdrawn as soon as possible from the wintry southern seas. “We also do not believe they would fare well in a full-scale naval engagement with the British”. How Argentina’s actions had been received in Latin America is nowhere touched on in the document, but must surely be in the redacted sections. The memo wraps up with Cold War aspects – Cuba likely to make trouble if it thought Argentina might win, though only rhetorically, the Soviets likely to supply surveillance information on the British Task Force to the Argentinians as part of a general strategy of ingratiating themselves with Buenos Aires, but no more. Almost the most telling point in the memo is the reminder that the post-Afghanistan US grain embargo on the Soviet Union, 1980-81, had created a big new trade between Argentina and the USSR, the former supplying no less than 10 per cent of the latter’s imports, though this was hardly classified information. The CIA was wrong, however, in thinking that Moscow would work with Argentina to block British attempts to persuade the UN Security Council to condemn the invasion by Resolution, “threatening to veto it”. This might have seemed a safe bet, but in fact there was no Soviet veto, to Argentinian disappointment and general surprise, UNSCR 502 passing easily on 5 April. This early success anchored the British diplomatic position from the beginning of the conflict, because almost no one could be found to defend Argentina’s first use of force.

    The Argentinians understood, of course, the centrality of the Cold War to US perceptions and were themselves playing the Soviet card with Washington from the beginning of the war – warning the US that the Soviets were watching and waiting (CIA sitrep, 3 Apr). Later they threatened to turn to them for arms supplies (MWA, 28 May). Of course, this was a familiar move in third world diplomacy. It is not clear how seriously the CIA took it in early April, but by the time the junta faced defeat – indeed “military humiliation”, in the agency’s eyes (MWA, 26 May) – they were watching closely. On 28 May Deputy Director for Intelligence Robert Gates told the CIA Director, William Casey, that a special memo had been prepared for the White House on Cuban assistance to Argentina and Casey himself was specially briefed on Soviet responses prior to a meeting with Haig. The movement of the Soviet ELINT satellite into orbit above the South Atlantic is noted in the 30 Apr 1982 NSC meeting on the previous page. But anxieties settled after the war. An Interagency survey of the “Prospects for Soviet Arms Deliveries to Argentina” in July 1983 concluded that: “Only as a last resort would the Argentines move to major purchases that would involve a long time arms relationship with the Soviets”.

    The CIA debated the possibility that the Galtieri junta might be replaced by a “highly nationalistic military regime” (MWA, 30 Apr) – as if it wasn’t one, or not much of one. One has the sense that Galtieri was their preferred strongman, a caudillo in the making maybe, and that change was thought unlikely to be an improvement from a US perspective.
    apr – jun 1982: the military campaign

    The agency saw major difficulties for a British assault on the islands and thought at one point we were underestimating Argentine forces (NID 19 May), but consistently, and from early on, it believed a British victory was ‘likely’ (eg, MWA 30 Apr). Several times they revert to Casey’s initial point that much of the Argentine navy was clapped out.

    British attacks on the mainland of Argentina were thought a real possibility, though one that diminished significantly once troops were landed safely on the islands (which happened on 21 May). It was believed that British submarines might attack the Argentine navy, particularly its carrier (the former HMS Venerable), even within the country’s coastal waters (ie, 12 mile limit), if there were big losses during landing of forces. If the troopship Canberra was hit, the agency believed landings would have to be aborted.

    After the landings the agency judged (NID 24 May) the British were planning a speedy campaign and were willing to tolerate high casualties to wrap things up quickly, warning that “serious reverses” would create big political pressures at home and perhaps open the way to a Pym government. If on the other hand the campaign was quickly successful, “chances would increase dramatically for an election as early as next spring, with a major Tory victory likely”. That Goose Green would be attacked ahead of Port Stanley, rather than bypassed, was correctly predicted.

    There were believed to be 17 US citizens on the Falklands at the outbreak of the war. Efforts were made through the Argentine occupying forces to persuade them to leave before the Total Exclusion Zone was declared (29 Apr – TEZ was the following day).

    Judging from the junta’s efforts to acquire new equipment and supplies even as its forces faced defeat on the Falklands, the CIA thought it was planning to fight a campaign of long-term resistance (MWA 28 May) and that the Argentine government regarded its Falklands garrison as ‘expendable’ (Watch Committee 26 May).

    There is limited military analysis in the CREST documents and there is a dearth of material from the Department of Defense on the Falklands War. The CIA predicted an outright British assault on Port Stanley led by Scorpion light tanks, but of course the Argentinians surrendered following a series of small battles in high ground outside the town so no assault on the town itself was needed. The analysts noted the effectiveness of Argentine air force attacks after the landing at San Carlos, but were unaware apparently of the failure of some of their bombs to explode. They doubted the Argentines could keep up their rate of air attacks, and questioned also whether Britain was being truthful about the number of Harriers it had lost (NID 29 May). The role of EXOCET missiles was discussed, but a redaction obtrudes, perhaps touching on Argentine efforts to buy more of these effective missiles.

    The CIA Director, William Casey, sent a sharp memorandum to Cabinet Officers and a wide range of agency heads (but not the White House) regarding “Unauthorized Disclosures on the Falklands Situation” (9 Jun). He warned of the “seriousness of leaks compromising sensitive collection sources and methods” and urged investigations to determine whether leaks should be referred to the Attorney-General – i.e., considered for criminal prosecution. The 30 Apr meeting above noted that press stories had caused the Argentines to realise the US was reading their military codes and to change their cipher, locking the US out (for a time at least). ABC Nightline had broken the story on 14 Apr, but the 15 Apr New York Times article mentioned on the previous page pops up in the CREST database when you search for ‘Falklands’: plainly, it drew the agency’s special attention.

    The US had no satellite over the South Atlantic at the outbreak of the war and took some time to reposition one. Observation conditions were less than perfect, with the southern hemisphere moving into winter, so the CIA analyses of 28 May of images over Port Stanley and southern Argentina may be the earliest they got. Even then they note problems with cloud cover. These photographs showed increased defensive preparations around Port Stanley, while a series of images of mainland military installations in north and south of the country showed the Argentine navy safely tied up in port, aircraft carrier, submarines and all. Given that signals intelligence was available, apparently in some abundance, it is unlikely on this showing that satellite intelligence played anything like as significant a role in the war. Many, of course, thought otherwise at the time. A State Department telegram of 4 May shows that the Embassy in Buenos Aires was unable to kill the story that a US satellite had given the British the position of the General Belgrano, whereas the British Official History of the Falklands War, by Lawrence Freedman (vol.2, p285) credibly explains that it was an intercepted and decrypted signal from Admiral Lombardo late on 1 May that showed the British that the Argentine navy was planning a coordinated strike against the Task Force the following day, information that led directly to the decision to sink the ship, which had first been found when the British nuclear submarine south of the islands got a sonar trace of the Argentine tanker sent to refuel it. One cannot safely assume that the signals intelligence came from the US side to the British either: we had our own formidable listening and decrypting capability, and it was only the day before the crucial signal that Inman was telling his colleagures that the US had been locked out.

    News of the Argentine surrender was circulated as a “CIA late item” in the National Intelligence Daily deriving the information straight from MT’s office (NID 15 Jun).
    jun 1982 – jul 1983: after effects – damage to U.S. Interests in south america judged ‘manageable’

    Almost immediately the war was over Casey requested briefing on the impact of the war on global high technology transfers (Gates memo, 18 Jun).

    The agency pointed out internal divisions in the Argentinian army resulting from recriminations over the war and saw in them a potent threat to the successor regime of General Reynaldo Bignone (NID 29 Jul). Returning soldiers from the garrison were expected to have unhappy stories to tell, with possibly radicalising results.

    Long-term fallout from the war in the form of anti-US sentiment in Latin America was a genuine concern for the US, but swiftly diminished. This was apparent even at the most difficult moment, days after the Argentine surrender on 14 June.
    The CIA prepared a lengthy intelligence appreciation for the President and other senior figures on 18 June, “Short-Term Prospects for Central America”. This commented: “The circumstances of the Falklands war will doubtless reduce the readiness of some Latin American states to support US initiatives concerning Central America. The direct adverse impact in Central America, however, is not likely to be substantial”.
    The State Department took a longer look later in the year, as part of an inter-agency review of “US Policy Towards South America in the Wake of the Falklands Crisis”. This study concluded: “Aside from Argentina, crisis-induced damage to U.S.-Latin American relations has varied widely from country to country and appears manageable on most matters”. Actions to “restore and assert US influence in South America” included a resumption of arms sales to Argentina (and Chile) by end 1982 – much upsetting MT, but the President was firm – and a decision to maintain “its diplomatic position on the fundamental Falklands issues as it was before the crisis: U.S. neutrality on the question of sovereignty over the islands and support for negotiations or other peaceful efforts to resolve this dispute”. An important distinction was drawn between US opposition to Argentine first use of force, “which was widely accepted in Latin America”, a region of many territorial disputes and small countries scared of bigger ones, and US support for the British military campaign “which was just as widely resented”. “Fortunately for us, Argentina’s reputation for arrogance, and the collapse of its forces on the ground, helped to cushion reactions”. Argentina’s nuclear weapons programme was the region’s most sophisticated and attracted a wary intelligence eye.
    Amongst the handful of Pentagon documents on the war is a characteristically clear-eyed assessment of the “Military Lessons from the Falklands” from Caspar Weinberger, written for the President on 19 July. “In the final analysis, the battle for the Falklands appears to have been a closer call than many of us would believe. The British won primarily because their forces, inferior in numbers at first, were superior in training, leadership and equipment”. “But luck also played a significant part”. Unlike the CIA he was well-aware that Argentinian bombs had failed to explode.
    Assessment of the war was an early task at the NSC for Marine Colonel Oliver North, who served there from 1981-86. This role perhaps explains an event a few years later, on the eve of MT’s visit to Camp David in December 1984, when the then National Security Adviser, Bud McFarlane, suggested to the President that he sound her out on “steps they could take to assist the Nicaraguan resistance. Through intermediaries we have been advised that the Chilean government is prepared to provide up to 48 BLOWPIPE surface-to-air missiles to the freedom fighters”. These British missiles had been “staged in Chile during the Falklands War”.
    The probability of a long-term Argentinian tilt towards Moscow was judged low, as already noted above from the Interagency Study of 1 July 1983.

     

    Find this story at January 2014

    Copyright © Margaret Thatcher Foundation 2014

    Thatcher received warning about CIA’s activities in UK, secret file reveals

    Paddy Ashdown raised fears in 1984 about clandestine approaches made by US agents but allegations were dismissed

    Margaret Thatcher told Paddy Ashdown there was no need for an inquiry and no evidence of improper activity. Photograph: Barbra Walton/Associated Press

    Margaret Thatcher was warned that the CIA did not always give sufficient advance notice when it carried out operations in Britain, a secret file released on Friday shows.

    Paddy Ashdown, a Liberal MP, complained to Thatcher about the US intelligence organisation’s activities in the UK in November 1984.

    Ashdown was worried about clandestine approaches made by US agents to British computer firms in this country and abroad to prevent eastern bloc countries obtaining western computer secrets by stealth.

    “My subsequent investigations have led me to conclude that the CIA got the information on the UK companies in the course of an operation which, it seems, is still continuing,” he told Thatcher.

    The prime minister sent back a letter dismissing his allegations. “There is no evidence of improper activity by the CIA or that the law has been broken,” she wrote. “As you are aware, there is close co-operation between the British and American authorities on the enforcement of multilateraly agreed exports controls, which is in the national interest.” She said there was no need for an inquiry, but would expect police to investigate if there were any evidence of the law being broken.

    The files now make clear that this was not the whole picture. The Foreign Office subsequently asked MI5 to investigate Ashdown’s complaints. Their report back to Downing Street said: “The security service are as confident as they can can be that the CIA are not involved in activities in the UK as alleged by Mr Ashdown.

    “There is an agreement between the British and American agencies that neither will undertake clandestine activies in the country of the other without specific agreement.”

    But, the FCO note, continued: “The security service have told us that there was a small number of isolated cases in 1983 when the CIA approached British individuals with a view to seeking information about cases in which hostile intelligence services were involved in attempts to acquire illegally western technology, without adequate consultation in advance with the British authorities.

    “These cases were brought to the attention of the CIA (and FBI) and the security service are satisfied that such cases are not recurring. They emphasise, however, that such incidents are not relevant to the allegations being made by Mr Ashdown which relate to pressure being put on British companies to divulge information about their trading activies.”

    MI5, the FCO added, “do not believe that the CIA are involved in clandestine activities in this field and have no cause for complaint”. But just to be sure, the last letter in the file notes, the CIA had given a specific assurance that they were not involved in in the UK as Ashdown had suggested.

    The documents do not make clear what the difference was between the small number of isolated cases identified in 1983 and Ashdown’s concerns.

    Owen Bowcott
    theguardian.com, Friday 3 January 2014 00.01 GMT

    Find this story at 3 January 2014

    © 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    The US & the Falklands War (1): the US ’tilt’ towards Britain (30 Apr 1982)

    On 2 Apr 1982 Argentina invaded the Falklands. This wholly unexpected event, the seizure by force of British people and territory, generated a crisis of great intensity in the UK, one almost existential in character.

    margaretthatcher.org has already published many documents relating to the war from a range of sources, particularly the US, and we continue that process with the most significant to date: the newly-released record of the National Security Council meeting on 30 Apr 1982 that terminated the ‘Haig shuttle’ – explicit US mediation between the two sides – and decided on a ’tilt’ in US policy towards the UK

    The key British files on the war are due for release at the end of 2012
    STUCK IN THE MIDDLE WITH YOU: THE U.S. RESPONSE TO THE ARGENTINE INVASION

    Minutes of 30 Apr 1982 NSC meeting

    The US Government was as surprised by the invasion as anyone else. But even though it had for years taken a position of neutrality on the question of Falklands sovereignty, it had neither the option nor the inclination to play the bystander.

    For one thing it had long-standing and exceptionally close military, intelligence and political ties to the UK, a front-line ally in the Cold War. On the other, the new Administation had cultivated good relations with the Galtieri junta in Argentina, hoping it might prove an important friend in the battle against Soviet influence in central America – a major concern for the new administration from the very first – and fearing that its fall might bring the return of a left-wing, Peronist government. The US also had significant interests in Argentina, financial and personal. As much as one fifth of US banking capital was exposed if Argentina defaulted on its debt and there were as many as 16,000 Americans resident in the country. And there was considerable US sensitivity to Latin American charges of “Yankee imperialism”, on right as well as left. Indeed during Ronald Reagan’s first meeting with MT as President he had talked of pursuing “a new approach to bring the [North and South American] continents together” and of fixing the southern perception of the US as “the Colossus of the north”. This stress seems to have surprised his visitors. The British Ambassador, Nico Henderson, professed not to understand what he meant and for once even MT was a little under-prepared: when it became apparent the President wanted to talk in detail about El Salvador more briefing had to be sent her. At this stage US policy in the region must have seemed rather remote from British interests.

    On the flip side, US Embassy telegrams from London, available on this site, show no great understanding of the depth of the crisis the invasion had provoked in Britain. Symbolically enough the US Ambassador to Britain, J.J. Louis, was on a golfing holiday in Florida at the time of the invasion and saw no reason to return early. Preliminary analysis from the State Department assumed Britain’s imperial legacy lay at the heart of the issue. Although Secretary of State Al Haig swiftly grasped that the British saw the self-determination of the islanders as a make-or-break principle, he was quietly sceptical that this really applied in the case of the Falklands. In a closed session briefing to Congressmen, he said that while the principle was “very laudable and supportable, they [the British] have created conditions on the Islands which make free choice by the population less than balanced”. The Falklands were a ‘cocoon’, he said, because “the Argentinians cannot get in”, leaving the islands perpetually “the land of the Brits”. And he made a nasty joke about the islanders, which drew a laugh from his audience, but was particularly tasteless in the circumstances. (It is along the lines of, “too few women, too many sheep”.) It is hard to believe he felt much sympathy for their plight.

    Many in Britain at the time and since have argued that there was a significant pro-Argentinian bias on the part of some in the Administration. The evidence does not really bear this out. Despite the above, such a charge can hardly be made against Haig, who was understandably exasperated by the junta and concluded that they were incapable of reaching a decision on any of the peace plans he put to them. His purpose throughout the Falklands crisis seems to have been to avoid an unnecessary war, as he saw it, and also to demonstrate his effectiveness as Secretary of State, something increasingly questioned, not least by the White House. In truth, his time was almost played out: less than a fortnight after the Argentinian defeat he had resigned and George Shultz had taken his place.

    The charge of bias could be made with far greater justice against Mrs Kirkpatrick, the US Ambassador to the UN and a Cabinet Member, but the salient point is that she was an isolated figure within the Administration. It is true that she was close to the President, who rated her highly and several times thought of her as a possible National Security Adviser. But she was blocked decisively by his powerful kitchen cabinet, who distrusted her influence and pegged her down; for that reason it is not quite clear how much she had the President’s ear, in the sense of ready access. Over the Falklands she was completely at odds with the Secretary of Defense, Caspar Weinberger, and scarcely less so with the CIA. And her relationship with the State Department was very poor. Although her name is often linked to that Tom Enders, the Assistant Secretary of State, as if they constituted a kind of Argentinian faction in the Administration, this is far from convincing. Enders was responsible for “Inter-American Affairs” and to that degree shared her concerns, but the two fell well short of a shared outlook. Indeed, Kirkpatrick’s relationship was Enders was so bad that he was summarily dismissed by the President the following year for undermining her on a visit to Central America. The State Department’s complaint against her was one of amateurism as much as anything else. During the war itself Al Haig seems to have demanded that she be fired for making public statements at odds with declared policy, raising the issue again in his final interview with the President when he resigned on 25 June. Perhaps the most notorious of her off-beam statements was made on CBS’s Face the Nation when she appeared to question that the Argentine invasion constituted “armed aggression”:

    The Argentines, of course, have claimed for two hundred years that they own these islands. Now, if the Argentines own the islands, then moving troops into them is not armed aggression.

    Although the President refused Haig’s demand that Kirkpatrick should go, it is entirely plain that he did not share her views on this point, which bordered on the bizarre and might almost be called definitively un-Reaganite. He knew armed aggression when he saw it, publicly and unequivocally describing the invasion in those terms himself, most notably on 30 April:

    we must remember that the aggression was on the part of Argentina in this dispute over the sovereignty of that little ice-cold bunch of land down there, and they finally just resorted to armed aggression, and there was bloodshed. And I think the principle that all of us must abide by is, armed aggression of that kind must not be allowed to succeed.

    It is perhaps a measure of heightened British sensitivities at the time that this statement is remembered in the UK for the “little ice-cold bunch of land” reference – unfairly treated as an attempt to belittle the issue – rather than the point of substance, which could hardly have been more forcefully or helpfully put by the President.

    That said, it mattered that anyone in the Administration spoke as Mrs Kirkpatrick did, particularly in Argentine eyes. A key question here is how Buenos Aires analysed the US position in advance of the war. It is certainly plausible that US neutrality as to sovereignty, along with who-knows-what friendly remarks in private from Mrs Kirkpatrick and lesser figures, led the junta to think a swift military takeover of the islands would not trouble Washington too much. At the very beginning of the crisis, on the eve of the invasion, the President wrote to MT saying that he had had no success in persuading Galtieri to hold off. Comfortingly he continued: “While we have a policy of neutrality on the sovereignty issue, we will not be neutral on the issue involving Argentine use of military force”.

    But there was a problem: the Argentinians seem not to have got that message. Wishful thinkers can be hard of hearing. Would there have been an invasion if Washington had spoken louder, or at least with a single voice?
    7-29 Apr 1982: the haig shuttle & its failure

    The Administration decided at a hurried White House meeting on 7 April that Haig would make an attempt at mediation between the two sides. The “Haig shuttle” occupied the diplomatic space for the following three weeks while the British Task Force sailed south, in which respect if nothing else it was probably helpful from the British point of view, since far less attractive mediators would surely have emerged if the US had not already been in the frame. But in almost every other way London found it an uncomfortable experience.

    Haig’s proposals went through many variations, but essentially focussed on three things:
    arrangements for Argentine withdrawal and a winding down of the military presence, British included
    the creation of some form of international “interim administration” for the islands following Argentine withdrawal, to operate while
    long-term sovereignty was negotiated.

    The inner nature of the proposals was always obscure, deliberately so. Who would end up owning the islands? The British side contended that self-determination should apply. The Argentinians of course rejected it. Haig and his people crafted clever and complicated bridging formulas, designed to save honour and face.

    Haig diligently shuttled back and forth between London, Buenos Aires and Washington, selling his scheme in best Kissinger-style, but never achieved a solid commitment from the Argentinian side to any part of it, the junta developing a habit of withdrawing concessions at the last moment and generally operating in a chaotic way. Haig put it neatly himself: “A charade … a f***ing charade, these guys are diddling me”. Even second level commanders had an effective veto, it seemed, meaning as many as 40 or 50 senior officers needed to be squared.

    Had the Argentinians been prepared to accept Haig’s proposals in some form, Britain would have been under huge pressure from the US and others to do so as well, no matter how large the concessions required of us. One of the messages Haig sent to President Reagan during his long shuttle referred to a “possible personal intervention by you with Mrs Thatcher”, as if it had been agreed between them in advance that Haig could trigger one if he felt the need. That would surely have been the mechanism.

    Such an event was a great threat to MT’s political survival: had the concessions been large enough, she might well have resigned rather than put her name to them. Some more tractable figure would perhaps have emerged as Prime Minister to do the deed. But that point never came. The junta wouldn’t – probably couldn’t – agree to anything.
    30 APR 1982: THE NSC MEETING

    Haig’s mission was finally terminated on 29 April. The President wrote to MT:

    I am sure you agree that it is essential now to make clear to the world that every effort was made to achieve a fair and peaceful solution, and that the Argentine Government was offered a choice between such a solution and further hostilities. We will therefore make public a general account of the efforts we have made. While we will describe the US proposal in broad terms, we will not release it because of the difficulty that might cause you. I recognize that while you see fundamental difficulties in the proposal, you have not rejected it. We will leave no doubt that Her Majesty’s Government worked with us in good faith and was left with no choice but to proceed with military action based on the right of self-defence.

    He had been privately doubtful about the shuttle for some time. In his diary for 19 April, after noting that the junta couldn’t make up its collective mind on Haig’s proposals, he wrote: “I don’t think Margaret Thatcher should be asked to concede any more”.

    A meeting of the NSC was called for 30 April to hear a report from Haig and to make decisions based on a paper from the State Department, “Next Steps on Falklands”, which we publish alongside the minutes. The paper set out a range of possible actions the US might take to sanction Argentina, all designed to “make clear our support for the UK”, but also (pointing the other way) to “preserve our ability to mediate”, “provide for the security of official and private Americans in Argentina” and “minimize adverse impact on our interests in Latin America”. It was acknowledged that none of the proposed steps – the main one was a suspension of arms sales – would have “significant material effect on Argentina”. In truth the most tangible element was the public declaration of a US ’tilt’, to be blamed on Argentinian intransigence. Some “high cost, high risk options” were also included – serious economic sanctions, movement of naval forces into the area – but plainly for form’s sake only.

    The meeting itself was opened by the deputy National Security Adviser, Bud McFarlane, the President always preferring to listen and observe debate among his principals, intervening to elucidate when needed and then to announce his decision. On McFarlane’s invitation the deputy director of the CIA, Admiral Bobby Inman, opened with a review of the military position, correctly predicting early action by the British in an attempt to close the runway at Port Stanley. Inman had sparred with Kirkpatrick at the earlier meeting on 7 April that authorised the Haig mediation: he was out of sympathy with the whole approach and thought ties of language, alliance, tradition, and strategic interest should side the US overwhelmingly with the UK. But on this occasion he was not in contentious mode. Policy was going his way. He drily described US intelligence that the Soviets had moved a spy satellite into an orbit which gave them the capacity tracking the Task Force, supplementing TU-95 reconnaissance aircraft based in Angola. The Cold War was never entirely out of the picture in the Reagan White House and hovered at the edge of the Falklands, potentially a decisive consideration if it obtruded significantly. There are some handwritten notes of the meeting alongside the typed minute in the file. In these Inman concludes his downbeat assessment with the words: “no happy news”.

    Haig then told the story of his mission. This was a meeting designed to tilt US policy towards the British, but he opened with an analogy that implied equivalence between Britain and Argentina – an equivalence in futulity – which anticipates Borges’s later remark that the Falklands War was like “a fight between two bald men over a comb”. It would have appalled the British had they heard it:

    He began by describing the situation as tragic with both sides, similar to a demented man on a ledge ready to jump, reaching for help but unable to grab our hand.

    Haig went on to explain the plan he had evolved in terms he could never have used in public or in the hearing of the British. If the Argentinians had accepted it, their flag would now be flying on the Malvinas. It is as simple as that:

    He then described the elements of the American plan which in effect would give ultimate sovereignty to Argentina but under evolutionary conditions which the Islanders could ultimately accept. Unfortunately, the Argentine government which is, in fact, made up of many moving and conflicting parts could not agree to the plan.

    How the islanders would be brought to accept such a transfer is not explained, but presumably because they had no alternative. We have seen already that he had no real use for the notion of Falklands self-determination. Haig characterises his plan even more frankly a little later:

    Our proposals, in fact, are a camouflaged transfer of sovereignty, and the Argentine foreign minister knows this, but the junta will not accept it.

    Here, of course, one comes up against a big problem. How could a “camouflaged transfer of sovereignty” be consistent with the President’s principled response to the invasion: “armed aggression of that kind must not be allowed to succeed?” Wouldn’t the transfer of sovereignty have been a success for aggression, a big success, camouflaged or not? Some in the room certainly felt that way, but there is no trace of an angry post mortem on the Haig proposals, very likely because from the critics’ point of view the outcome was the one they wanted. Haig, and the junta, had been given every chance.

    The disfunctionality and irrationality of the Argentine government shines through at this point (if such things can be said to shine). It was a government too divided and disorganized to recognize or accept what it was being given – almost, but not quite, its own worst enemy.

    Haig concluded:

    Argentina is the opposite of a pluralistic, democratic government where the lowest common denominator is consensus; in the Argentine case the lowest common denominator is extremism. The Navy holds the veto and is even more intransigent after losing South Georgia, whose Argentine garrison surrendered without firing a shot – a fact known to the Argentine government, but not to the Argentine people.

    Discussion then turned to the possibility that US nationals would need to be evacuated from Argentina. This might seem a far-fetched contingency, but in the aftermath of the Tehran embassy seizure it was taken seriously. Defense Secretary Weinberger took the lead role here. No one in the Administration was more favourable to the British than him, the President included. This was a man who had tried to join the RAF in 1940 when recruiters quietly turned up at a San Francisco hotel, only to be told he lacked depth perception. He attended Margaret Thatcher’s 80th birthday party in London in a wheelchair. Like Inman, he was content to let the meeting reach its preordained conclusion. Asked about British requests for military aid, he replied in low-key style: he thought “nothing was pending, but believed more fuel would be requested at Ascension”, surely an understatement. Later accounts of the war – for example by Nico Henderson – laid heavy stress on the helpfulness of the Pentagon. Interestingly the State Department likewise played down the British need for assistance in their covering paper for the meeting.

    The President made a contribution on this topic. He “interjected that he had no objection to giving materiel support but wondered it that would not significantly undercut any future role for the U.S. as a mediator”. In the typed minute Haig responds: “the Argentines have been told what we would do if they refused this offer”. In the handwritten notes a frustrated tone comes through: “Argentines have been told & told & told”.

    Inman had a further intervention to make. These newly-published minutes confirm something suspected since the war itself: the US had broken Argentine codes and was reading their military traffic. The press had leaked the fact, with inevitable results:

    Admiral Inman emphasized that one sour note had come out of recent developments, namely, press leaks about the US ability to read Argentine military communications, which in turn have led to a changing of the Argentine cipher. Admiral Inman hoped we would soon be able to regain our capability in that area, but the leaks had been damaging.

    Without admitting that the US had broken Argentine codes, Haig’s memoirs mention an unhelpful item on ABC Nightline which he had tried to stop (Caveat, p285) when Carl Bernstein had reported. A declassified CIA document points a finger in another direction: it includes an article from the New York Times from 15 April: “US Providing British a Wide Range of Intelligence”.

    Kirkpatrick also spoke, sketching the situation at the UN, to which diplomatic attention would now turn, and hazarding a characteristically out-of-step opinion as to the ultimate outcome. There would be no fighting she thought, a fix of some sort would undoubtedly be found. “The Argentines will find a way to avoid war through a face-saving device in some forum perhaps by the weekend”. Haig immediately contradicted her: “Unless Argentina softens on sovereignty, the British will go ahead and do some damage”. He proved the better judge. Thousands of miles to the south the Argentine cruiser, General Belgrano – in earlier years the USS Phoenix, a veteran of Pearl Harbor – was already in the sights of the British nuclear submarine, HMS Conqueror. Quite possibly Inman and Weinberger knew it.

    And with that the President wrapped up the meeting, approving the measures proposed and making a wry comment: “it would be nice if, after all these years, the U.N. could do accomplish something as constructive as averting war between the U.K. and Argentina”. His firm words on the subject of Argentinian armed aggression against the Falklands were delivered at a prescheduled event in the State Dining Room a couple of hours later.

    Find this story at January 2014

    Copyright © Margaret Thatcher Foundation 2014

    From COINTELPRO to Snowden, the FBI Burglars Speak Out After 43 Years of Silence (Part 2)

    Watch Part 2 of our extended discussion with three of the antiwar activists who broke into an FBI office in 1971 in Media, Pennsylvania. The burglars, John Raines, Bonnie Raines and Keith Forsyth, are speaking out this week for the first time following the publication of Betty Medsger’s book, The Burglary: The Discovery of J. Edgar Hoover’s Secret FBI.

    Click here to watch Part 1 of this interview.

    AMY GOODMAN: This is Democracy Now!, democracynow.org, The War and Peace Report. I’m Amy Goodman, with Nermeen Shaikh, as we bring you part two of this fascinating discussion, the solving of a mystery during the Vietnam War era that wasn’t solved ’til this week. Nermeen?

    NERMEEN SHAIKH: So we continue our discussion looking at how activists broke into an FBI office in Media, Pennsylvania, in 1971 and disclosed secrets about the FBI’s COINTELPRO program—that is, Counterintelligence Program.

    AMY GOODMAN: Until this week, their identities were not known. Joining us are two of the people who broke into the FBI’s offices, John and Bonnie Raines. John and Bonnie hosted many of the planning meetings for the burglaries at their home, where they were raising three children. Bonnie worked as a daycare director. She helped case the FBI office by posing as a college student interested in becoming an FBI agent. John Raines was a veteran of the Freedom Rides movement, a professor at Temple University. He used a Xerox machine at the school to photocopy many of the stolen documents.

    We’re also joined by Betty Medsger. She is author of the new book, The Burglary: The Discovery of J. Edgar Hoover’s Secret FBI. She first reported on the stolen documents while working at The Washington Post. The activists mailed the documents to her. She was the first to reveal them; The Washington Post, the first paper to agree to publish the information in these documents. She uncovered the identities of most of the burglars in her new book. So, 40 years ago, she broke the story, and now she’s breaking the story of the identities.

    And we’re joined by David Kairys, who has worked as an attorney for the activists for over four decades, a civil rights attorney and law professor at Temple University, as well.

    In the first part of our discussion, we talked about how March 8th, 1971, went down, the night of the Joe Frazier-Muhammad Ali fight, using that as a cover because it would be a lot of noise and the belief that the guards would be watching this in the Media offices. But there was criticism leveled—or you feared there would be, John and Bonnie Raines—of why you did this, because you could have gone to jail for many, many years. You had three kids under 10. Professor John Raines, what was your thinking process leading up to this?

    JOHN RAINES: Sure, that’s a great question. We were the only ones, out of the eight, who were not only husband and wife, but father and mother of three children under 10. And we were not into the being a martyr. We were not into jeopardizing the future of our children. We were pretty sure—if we weren’t pretty sure, we wouldn’t have, in fact, gone into that office and taken out those files. So we were pretty sure we could get away with it.

    But the second thing that’s important to know is that we routinely ask, as a society, mothers and fathers to take on as part of their work highly dangerous kinds of activities. We ask that of all policemen. We ask that of everybody that works for the fire department. We ask that of mothers and fathers who are stationed overseas, sent overseas to defend our freedoms in the Army and Navy. We routinely ask of people to take on jobs that risk their families. Now, we were faced back in 1971 with nobody in Washington was going to do what had to be done if we were going to reveal what J. Edgar Hoover was doing with his FBI. We were the last line of defense. So, as citizens, we stepped forward and did what we had to do because nobody in Washington would do what they should have done. Then, after we did what we did, people in Washington, with the help of Betty’s revealing stories in the Post, then they began, finally, to oversee J. Edgar Hoover’s FBI, and things changed.

    NERMEEN SHAIKH: And you spoke to family members. In the event that you were caught and imprisoned, you spoke to some of your family members and asked them to care for your children. What exactly did you tell them you were about to do?

    BONNIE RAINES: Well, we didn’t tell them exactly what we had planned. We did have to let them know the high level of jeopardy and that we were doing this after much careful thought and involved with other people who we thought were responsible and careful. And we asked them, if the worst happened and we were convicted and sent to prison, if they would care for our children. So we had that conversation with John’s older brother Bob and with my mother and father.

    AMY GOODMAN: When did you tell your children?

    BONNIE RAINES: It was later, when they were old enough, as teenagers, to put it in perspective. We’ve always been a political family and involved our children in political activities of various kinds. But we needed to wait until it could fit into what I describe as kind of the family lore. And it was very easy and very natural to tell them about it. And they were a little bit shocked, but also quite proud, I have to say.

    AMY GOODMAN: How did you tell them? Can you describe the scene? Did you actually sit them down together?

    BONNIE RAINES: Can you remember that?

    JOHN RAINES: I’m not sure. Do you remember it? We waited until they were, I think, teenagers, so that they could understand kind of the larger political context.

    AMY GOODMAN: But this makes it even more amazing that this secret has been kept for so long.

    BONNIE RAINES: Mm-hmm, mm-hmm.

    JOHN RAINES: Mm-hmm.

    AMY GOODMAN: You had four children—

    BONNIE RAINES: By that time.

    AMY GOODMAN: —that you told.

    BONNIE RAINES: Mm-hmm.

    AMY GOODMAN: And you’re just two of the eight. There was also a ninth person. And if you could tell us about him, because he pulled out before the action took place, and you had further interactions with him.

    JOHN RAINES: I did. He—I won’t name him, but he showed up on our front door, the door of our house in the Germantown section of Philadelphia. And he said, “I need to talk with you, John.” I said, “Well, come on in.” And we went in, and he looked me in the eye, and he said, “I think I’m going to have to turn you in.”

    AMY GOODMAN: When was this?

    JOHN RAINES: Oh, it was the two or three weeks after, after the break-in. So, I, you know—and he knew all the names. I mean, if he had turned us in, we were going to jail.

    AMY GOODMAN: He was in on all the planning meetings.

    JOHN RAINES: He was.

    AMY GOODMAN: He had pulled out just at the last second.

    JOHN RAINES: That’s right. That’s right.

    AMY GOODMAN: And what did he say when he pulled out, by the way?

    JOHN RAINES: Well, he said, “I’ve been told by my girlfriend that there are files that you still have that are highly dangerous files in terms of threatening national security, that name various missile sites, anti-missile sites, around Philadelphia and so on.” And I said, “No, no, no, there’s nothing like that in these files.” Then I said to him, “Well, why did you think there was?” And he said, “Well, my girlfriend,” and so on. I said, “Have you ever thought that maybe your girlfriend works for the FBI?” And, you know, his face went like that. And then he—he left. And he kept the secret to himself.

    AMY GOODMAN: And that’s because then it’s not only him; it’s also his girlfriend who knew. We’re talking about 40 years of keeping this secret.

    JOHN RAINES: Yeah.

    BONNIE RAINES: Mm-hmm.

    JOHN RAINES: His girlfriend, I think, didn’t know who we were. I don’t think he said that. I think he simply—she gave him the information that was false information. It was fed, I think, by the FBI to him that there were these very dangerous files.

    AMY GOODMAN: J. Edgar Hoover was desperate to get you.

    JOHN RAINES: Oh—

    AMY GOODMAN: He had over a hundred agents.

    JOHN RAINES: Two hundred.

    BONNIE RAINES: Two hundred agents.

    AMY GOODMAN: Two hundred agents. It was your Xerox machine—

    JOHN RAINES: Yes.

    AMY GOODMAN: —that they were—well, tell us about the Xerox machine at Temple University that you used to make Xerox—sounds a little like Dan Ellsberg and the Pentagon Papers, when he xeroxed the Pentagon Papers.

    JOHN RAINES: Well, back then, nobody knew—or not many people knew—that every Xerox machine leaves its own fingerprint from the drum. Every drum on every Xerox machine has its own separate fingerprint. And therefore, anything that is xeroxed on that machine can be traced back exactly to that machine. Now, when we found that out, I very quickly, you know, phoned David—phoned—

    BONNIE RAINES: Bill.

    JOHN RAINES: Bill Davidon.

    AMY GOODMAN: Now, Bill Davidon, meanwhile, is being tapped, for other reasons, or—

    JOHN RAINES: He’s being tapped.

    AMY GOODMAN: —for very similar reasons.

    JOHN RAINES: But he’s also using the Xerox machine at Haverford College. And I said, “Hey, hey, hey, Bill.” So he went and he scratched the surface of the drum at Haverford. And—

    DAVID KAIRYS: You know, the main reason—

    AMY GOODMAN: David Kairys.

    DAVID KAIRYS: —they didn’t get caught—I mean, you’re right. There’s all these possibilities. Life is so contingent, and things could be so different than they turn out to be. But the main thing is the FBI used a typical American law enforcement approach. It was, instead of looking for who did it and investigating a range of people, the glommed onto one person, who they were sure, for whatever reasons, did it. And he was a leader of the Catholic Left, John Peter Grady. He had raided a lot of draft boards. They were sure he did it.

    AMY GOODMAN: He was Camden, New Jersey.

    DAVID KAIRYS: He also did Camden.

    BETTY MEDSGER: He was a lot of things.

    DAVID KAIRYS: Yeah, he did a lot of these.

    AMY GOODMAN: From Camden.

    DAVID KAIRYS: Yeah. And they thought that he did it, so they had 200 agents, but they’re all looking for the wrong thing. You see, they’re all misdirected and not—they thought there was a locksmith, so they investigated all the locksmiths in the Philadelphia area. They didn’t know all you needed was Keith.

    AMY GOODMAN: We’re going to bring Keith Forsyth back in a minute.

    DAVID KAIRYS: Yeah.

    AMY GOODMAN: But he just learned it in a course on—I can’t say online—

    JOHN RAINES: Yeah.

    DAVID KAIRYS: Yeah.

    AMY GOODMAN: —because you didn’t have the Internet at the time, right?

    BONNIE RAINES: Correspondence.

    BETTY MEDSGER: Yes, library.

    AMY GOODMAN: Correspondence course.

    DAVID KAIRYS: And he made his own tools rather than go to a store and buy them, which would be a record of that. So, see, they were extremely careful. And the FBI just let itself be completely misdirected.

    BETTY MEDSGER: I’d also like to add that in addition—

    AMY GOODMAN: Betty Medsger.

    BETTY MEDSGER: In addition to focusing on John Peter Grady, they also focused on the ninth burglar. And they put him under 24-hour surveillance within 24 hours of the burglary and continued to monitor him for weeks.

    AMY GOODMAN: The one who didn’t do it.

    DAVID KAIRYS: Right.

    BETTY MEDSGER: The one who didn’t do it.

    DAVID KAIRYS: Who John just spoke of.

    BETTY MEDSGER: Yes, yes. There were three main people that they targeted immediately: John Peter Grady—they thought he was the leader of the group—

    AMY GOODMAN: And just very quickly, explain who he is. His children are well-known as activists today, especially—

    DAVID KAIRYS: Yes.

    BETTY MEDSGER: That’s right. That’s right.

    AMY GOODMAN: —upstate New York, taking on issues of drones.

    BETTY MEDSGER: That’s right. Well, he was a—he was a leader, very prominent within the Catholic peace movement. He was the person in the Catholic peace movement who moved it from the Catonsville 9 method of going in in broad daylight and walking out and waiting for arrest.

    AMY GOODMAN: That was the Catonsville 9 in Catonsville, Maryland, led by Dan—Fathers Dan and Phil Berrigan, who burned draft records, using napalm, that they had pulled out of the Catonsville draft office.

    BETTY MEDSGER: Right. And John Grady was the leader of the part of the Catholic peace movement that then took things to another level, which was: Do these actions, but do them in order to actually do damage to the ability of the draft boards, so that they can’t operate and bring people into the service, and get away with it so you can go on and raid more draft boards. He was the key person in the Catholic peace movement who believed that that was needed, that things needed to be done that way. So, the FBI had not been successful in arresting many of the people. There were, you know, 350 draft board raids and hundreds of people involved in them. And they had not been very successful at finding these people. And he was somebody that they assumed was involved in many of them, and they immediately, for that reason, I think, assumed that he had led this group. So they focused on him, they focused on the ninth burglar, and they also focused on Bonnie. But they never knew Bonnie’s name.

    DAVID KAIRYS: Never knew who she was.

    BETTY MEDSGER: They knew her face, and they had that image, that art sketch that had been drawn based on the memories of the men in the office who saw her.

    AMY GOODMAN: We touched on this in part one, but—of our discussion, but, Bonnie Raines, can you describe what you did before March 8th, the day that you all broke into the Media office? Talk about your experience.

    BONNIE RAINES: Well, many of the planning meetings and the scheduling of what we called casing the building at night took place from our house. So I was involved in much of that, but not really one of the prominent members of the group, until we realized that we needed to have someone get inside the offices to look at the possibility that there would be security measures, burglar alarms over the doors, whether the file cabinets were locked. So I was elected to do that. And I was to pose as a Swarthmore College student and disguise myself, as much as I possibly could, and make an appointment to go in and interview the head of the office about opportunities for women in the FBI. And they were very cordial. They spent enough time with me to allow me to really look around to see everything, to gather all the information.

    JOHN RAINES: They didn’t notice that you kept your gloves on.

    BONNIE RAINES: I kept my gloves on the whole time I was taking those—

    NERMEEN SHAIKH: And they never asked you your name, right?

    BONNIE RAINES: No.

    NERMEEN SHAIKH: You never gave a name.

    BONNIE RAINES: No. No, they never did. I think, in the course of conversation, I was asked where I was from. And I said, I think, “Hartford, Connecticut,” or something. But the good news was that I was able to get that last important piece of information about the inside of the office, and then that allowed us to make a decision to actually plan to go ahead with it on March 8th.

    AMY GOODMAN: So, they—it was from that that they got the description of you with these fake glasses and—

    BONNIE RAINES: Yes, yes, yes.

    AMY GOODMAN: —a hat on.

    BONNIE RAINES: I had long hair, and I tucked my hair all up inside—it was February, so I had a winter hat and looked a little shabby, like I might have been a student on a scholarship at Swarthmore. But I was very polite, and they were very cordial, and it went very, very well. And they never noticed that I never took my gloves off the whole time I was taking notes.

    NERMEEN SHAIKH: And the night of the burglary, what did you actually do on the night, March 8th?

    BONNIE RAINES: My role—we each had an assigned role, and my role was to be in a car on a side street at the building, so that if a police patrol came along on that street and would then turn around to be at the front of the building and might see our four fellow companions leaving the building, I was to pretend that my car had broken down and block the street so that they couldn’t come around to the front of the building. I didn’t have to do that, as it turned out.

    AMY GOODMAN: And the other people involved, Betty Medsger, some have decided to come forward, and some haven’t. Bill Davidon, who wanted to come forward, has just recently died. He had Parkinson’s. Talk—since you spoke with him a lot—and, of course, all of you knew him, a professor at Haverford—I was actually wondering if you can tell us the story of his meeting with Henry Kissinger. This is astounding. Five days—I was talking to his daughter last night, and she said he sort of had a to-do list. You know, meet with Henry Kissinger at the White House, break into the Media offices and steal the FBI documents—that was his to-do list for the week.

    JOHN RAINES: Yeah, that’s quite short.

    AMY GOODMAN: But how did he end up meeting with the national security adviser, Henry Kissinger?

    BETTY MEDSGER: Yeah, it’s an amazing thing to think about, that just two days before the burglary there’s the leader of the burglary in the Situation Room of the White House. Well, Bill never missed an opportunity to make the case against the war. And he really didn’t want to go to the White House that morning, particularly, but it’s—an interesting person had set it up. Brian McDonald was a young Quaker from Philadelphia who the previous—immediately after Nixon announced that we were invading Cambodia, at the end of April in 1970, Brian came to Washington and sat on the street—sidewalk in front of the White House and was fasting and—in protest of what Nixon had done. And he was there for quite some time. And during that time, I remember Shirley MacLaine came to know him, and some other people, and they quietly introduced Kissinger to Brian. And a strange combination, but they actually became real friends, a friendship that lasted until Brian died about a decade ago. But it was Brian who knew all parties involved, the three people who came to that meeting, including Bill and Kissinger. And so, he asked Kissinger to be willing to meet with them to talk about the war. And Kissinger said—because he liked Brian so much, agreed that he would.

    So, the three people were Bill and two other people, Tom Davidson and Sister Beverly Bell. All three of them were unindicted co-conspirators in an indictment that had just come down that January that involved J. Edgar Hoover. It was an indictment that charged Phil Berrigan, Elizabeth McAlister and a few other people. They were indicted, and then there was a series of people, including Bill Davidon, who were unindicted co-conspirators in a conspiracy to kidnap Henry Kissinger and to bomb tunnels under federal buildings in Washington.

    Now, the Hoover involvement comes the previous November, when Hoover, against the advice of his officials, who hardly ever spoke up to urge him to not do something, Hoover went before a committee of two people, and then—on the Hill, a congressional committee, and then immediately distributed his statement to as many press as they could get it to afterwards. And in that statement, he announced that these people were conducting this conspiracy. And it was his typical method of trying to convince members of Congress to give him more money, which always happened. But this was a very alarming thing, the idea that these people—priests and nuns and their colleagues—were—who were known for being nonviolent activists, were planning this violent thing. And the Justice Department and the FBI had investigated this, and the FBI people had decided that there was no plan, there was no real plan, and that the case should be abandoned. And Hoover knew that, but nevertheless made that public accusation. And that was enormous news at the time.

    And then, the Justice Department—again, knowing that there was no such plan—in order to save Hoover’s face, went forward with a grand jury and designed it in such a way, eventually, in a superseding indictment, that people could be found guilty if they had participated in plans not only to kidnap Kissinger or to bomb tunnels under Washington, but to raid draft boards—if they had done any one of those things. Well, they all had raided draft boards. But the impact of it all, of course, on the public was: They wanted to kidnap Kissinger or set off bombs. By the way, the case, two years later, failed, and there was no conviction. But at this time, when Bill goes to the White House with two of the other unindicted co-conspirators, they are sitting there with the person that they’re supposedly planning to kidnap. So that seemed—made it even more strange.

    And what they—they had a discussion for about an hour in the Situation Room, where many aspects of the Vietnam War had been planned, and something that they were quite aware of. And it was in the—ultimately, it was a frustrating meeting, where they felt that they were meeting with a—having a civil conversation with a friendly enemy, who at that time was responsible for more bombing. But—

    AMY GOODMAN: Interestingly, Kissinger felt he was being smeared, is that right?

    BETTY MEDSGER: Felt he was what?

    AMY GOODMAN: Being smeared in the academic community.

    BETTY MEDSGER: Oh, you mean not by them, but elsewhere.

    AMY GOODMAN: Right.

    BETTY MEDSGER: Yes, yes, that’s right.

    AMY GOODMAN: And part of why he wanted to meet with another professor, with Bill Davidon, to change the alienation he felt from the academic community that he valued.

    BETTY MEDSGER: Yes, I think that’s true, although I—reading from Kissinger’s biography, I think he looked at this primarily as meeting with religious people, as he spoke of their high ideals and being in a spiritual world, whereas he was in the real world, and that they couldn’t really do anything, but he had to do something, whereas in fact they did not think of it as a religious confrontation or issue with him. They, too, were very much of the real world and wanted to see negotiations taking place and to stop the war, rather than the direction that he was taking it.

    NERMEEN SHAIKH: And after the break-in on March 8th, 1971, Bill Davidon, whose idea it actually was, was in fact never questioned by the FBI, is that correct?

    BETTY MEDSGER: Yes, and that relates to the case that I was just talking about. The FBI was prepared to go after Bill Davidon very, very seriously. And the Justice—when the Justice Department found out about this, they put out an order that he should not be questioned—no questioning of Bill Davidon—which was quite amazing, given his situation and the fact that he was the leader of the group. And that went into effect. And for the entire length of the investigation, Bill was never questioned by the FBI.

    AMY GOODMAN: Why did they put this out?

    BETTY MEDSGER: Oh, I’m sorry, I meant to explain it. Because—they prohibited the FBI from questioning him because they were so intent on building a successful case in the Harrisburg indictment, and they didn’t want to bring any more confusion into the situation.

    AMY GOODMAN: And the Harrisburg indictment was?

    BETTY MEDSGER: And that—yes, the Harrisburg indictment was the case of the conspiracy—

    AMY GOODMAN: Of the—to kidnap Henry Kissinger.

    BETTY MEDSGER: —the alleged conspiracy to kidnap.

    DAVID KAIRYS: And it was a big national publicity. And Hoover was being criticized for indicting people for a conspiracy that was just ridiculous.

    BETTY MEDSGER: And this would have brought more attention that they did not want brought to that.

    AMY GOODMAN: Before we bring Keith Forsyth back in to join his other co-conspirators here at the table, I wanted to ask you, David Kairys, about the legality of all of this.

    DAVID KAIRYS: Sure.

    AMY GOODMAN: Well, of course, they had broken the law by breaking into the Media, Pennsylvania, FBI offices. Now, the statute of limitations is over. But can the authorities get around that, say, “New evidence has been presented: We now know their names”?

    DAVID KAIRYS: That wouldn’t—that wouldn’t be a legitimate ground. There are things they could try, that, given the way they’ve been interpreted in law, would just not work. There’s really nothing they could do. Now, they do have discretion and a lot of power to put people through criminal trials even though they’re not going to win—the government. So, they could—and this is something you have to weigh in a situation like this—they could bring charges and just make you get lawyers and prepare a defense and disrupt your life, try to hold you on bail. There’s all those things they could do. But—and we would be arguing that it’s not being done in good faith, because there’s—the statute of limitations has run. So, I think, ultimately, it would work out that they are not convicted of anything, because of the statute of limitations, but you can’t—you can’t be sure that the government might not make you go through—

    AMY GOODMAN: The FBI’s response today?

    DAVID KAIRYS: Yesterday’s statement, I thought, was very positive. I actually had anticipated that they would say something like, “We’re looking into it. We’ll have to get back to you.” Instead of that, they seemed—they almost claimed credit for it. It’s like: Things happened that caused reforms, and we like these reforms. So, they’re—you know, they’re just reformers.

    AMY GOODMAN: That could bode well for Edward Snowden.

    DAVID KAIRYS: You’re—instead of FBI informers, you’re FBI reformers.

    BETTY MEDSGER: They also said, I understand, to one reporter, “We didn’t have very good security.”

    AMY GOODMAN: This is amazing. I mean, the actual quote of Michael Kortan, FBI spokesperson, “A number of events during that era, including the burglary, contributed to changes in how the FBI identified and addressed domestic security threats, leading to reform of the FBI’s intelligence policies and practices, including the creation of investigative guidelines by the Department of Justice.” I mean, this is very significant for Edward Snowden, because it’s saying—

    DAVID KAIRYS: Oh, I think it is.

    AMY GOODMAN: —if what you did led to reforms, then the good outweighed what they would consider the bad of the burglary.

    DAVID KAIRYS: Yeah.

    AMY GOODMAN: What does this mean for Edward Snowden? The response has been enormous in terms of calls, not only in this country, but around the world, for reform.

    DAVID KAIRYS: Yeah.

    AMY GOODMAN: David, if you would like to weigh in on that—John, if you would like to weigh in on that, John Raines?

    JOHN RAINES: Well, yeah, I think that what we were trying to do back in 1971, Snowden is trying to do right now. And that is to give the information that citizens need to decide, as citizens, what their government should do and should not do. And I think that we faced an FBI with a director called J. Edgar Hoover that was furious at us, and thank goodness we got away with it. Snowden faces governments, especially CIA and NSA, who want to make decisions about this massive kind of surveillance that they have. They vacuum up all our personal information, all of our emails, all of our correspondence. They say that they’re not listening to the emails. Well, they’ve got the technology to listen. Are we supposed to believe that they’re not listening to—you know, reading what we’re saying on our emails? That’s a—anyway, Snowden is facing the same kind of retribution of people of power, and he doesn’t deserve that. I see him as a public servant who, as a public servant, did serve the public, giving us the information we have a right to know, so that we can instruct the people in Washington what we, the people, think they should do and not do.

    DAVID KAIRYS: The basic similarity in Snowden and the Media burglars, I think, for those of us who would have never had the courage to do such things, either one of them—and I include myself—they took this enormous risk, a really unbelievable personal risk, so that the rest of us could find out, in this case, what our FBI was doing or to expose wrongdoing. It’s the best American tradition. I mean, to go back to a group that’s got a different meaning these days, the original Tea Party was an illegal act. They didn’t stand there and say, “Arrest me for it.” They wanted to get away.

    BETTY MEDSGER: And the Underground Railroad.

    DAVID KAIRYS: Underground Railroad, the violations of the Fugitive Slave Acts. The Revolution itself, the American Revolution itself, was illegal under existing law. And I still—after 40 years of knowing these folks well, it still amazes me that they took the personal risk that they did. And this is something that, to me, should be praised.

    AMY GOODMAN: On that note, we’re going to reunite those who were involved in the burglary that night. Some might talk about the liberation of these documents; others, the stealing of these documents. David Kairys, thanks for joining us.

    DAVID KAIRYS: Sure.

    AMY GOODMAN: We’re going to be joined now by Keith Forsyth, in addition to John and Bonnie Raines, and Betty Medsger, the author of The Burglary: The Discovery of J. Edgar Hoover’s Secret FBI. She is revealing this week, in this book, the names, the identities, of most of those involved with the burglary that night, March 8th, 1971. They called themselves—they, with five others—the Citizens’ Commission to Investigate the FBI. And on March 8th, 1971, they broke into the offices of the FBI in Media, Pennsylvania, and got—how many documents, ultimately?

    JOHN RAINES: About a thousand.

    AMY GOODMAN: About a thousand documents. Did you go through them, John Raines, before you sent them off to Betty Medsger at The Washington Post and Tom Wicker—

    JOHN RAINES: Oh, yes. Oh, yes, we were very careful about that.

    AMY GOODMAN: —of The New York Times and Jack Nelson?

    JOHN RAINES: We separated the files into what were clearly legitimate files, from our point of view—that is, they involved crime. And we didn’t want to release those files, because it had names of witnesses and things like that. That was about 40 percent of those files. Sixty percent of the files were clearly political in intent, and those were the ones we began to sort through. And we began to find—even on the morning, early morning, of the night, we began to find documents that were quite exciting.

    AMY GOODMAN: Like?

    JOHN RAINES: Well, like the one that said, “Let’s increase the paranoia and have these folks be persuaded that there’s a FBI agent behind every mailbox.” I mean, that is—that’s not surveillance; that’s obviously intimidation. All right? Intimidation is a political act; it’s not an act of an investigative organization like the FBI.

    NERMEEN SHAIKH: And, Betty Medsger, when—one of the most damning programs that was revealed in these documents was COINTELPRO, but when you first received the documents, you had no idea what that program was. So how long after you got the documents did you find out what this program was and what it entailed?

    BETTY MEDSGER: Yeah, the document that had COINTELPRO on it was just a routing slip. “COINTELPRO–New Left” was a label at the top. We had no idea what it was. None of us who received it had any idea what it was. The FBI was watching to see if that would ever be released. And because I wrote about something that was in that document, they knew, as of that day, that it had been released, and went into high gear. Hoover said, “We’ll stop this program.” And what he meant was, as he explained to agents, was, “We no longer use that name.” The program continued, but without that name. We had no idea what it was until, thanks to Carl Stern, by the end—at the end of 1973—

    AMY GOODMAN: Of NBC.

    BETTY MEDSGER: Carl Stern was the NBC reporter who covered the Department of Justice at that time. And he was in an office of the Senate committee, and they said, “Have you ever seen this?” And Carl had not seen it. And he was intrigued by the fact that at the bottom of the cover—of this routing slip were instructions for FBI agents to give the attached article on the need for control of students on campuses who were protesting the war—there was a note asking FBI agents to write anonymous letters and deliver this or mail it to unfriendly administrators, or to just hand it to friendly administrators. And Carl thought, “This is very strange.” And so, within a matter of days, he asked the FBI to tell him what COINTELPRO was and provide documentation of what it was. And they turned him down.

    He went through attorney generals, various attorney generals at that time, because they were changing as a result of Watergate. And then, finally, he sued, under the Freedom of Information Act. Until then, Hoover had always instructed officials to ignore any applications under the Freedom of Information Act. But Carl pursued this through the courts and won, became the first person to succeed under the Freedom of Information Act in getting anything out of the FBI.

    And what he received were the documents that immediately became news and explained that these dirty tricks operations had been going on since 1956. They were harassment. They were kind of activities that would seem to have nothing to do with law enforcement or intelligence gathering. Instead, they were secret harassment, sometimes quite violent and destroying people’s reputation.

    AMY GOODMAN: Give us examples. And again, COINTELPRO means Counterintelligence Program.

    BETTY MEDSGER: Counterintel. One example is what they did to actress Jean Seberg.

    JOHN RAINES: Oh, yeah.

    BETTY MEDSGER: Jean Seberg, at that time, was a very popular actress. And she had made a contribution to the Black Panthers in Los Angeles, something that—and because the Panthers were under great surveillance, the FBI knew that. And she was pregnant. And a way COINTELPRO operated, agents were invited to submit proposals for these dirty tricks operations, and then the proposal would go back to Washington. And Hoover would read them and decide whether or not they should be carried out. And the proposal was to plant a rumor that the baby she was carrying, that the father of the baby was a Black Panther in Los Angeles. And Hoover was so happy with this proposal, and he wrote a response saying that he thought it was terrific. But he thought that they should wait until she was more noticeably pregnant, wait a few months, so that it would have a greater impact. The plan was to plant the rumor with a gossip columnist. And the people in Los Angeles were so eager to carry it forward that they didn’t wait until she was more noticeably pregnant. And what a freelance reporter, Allan Jallon, later revealed in the Los Angeles Times was that the FBI actually planted that rumor with editors of the Los Angeles Times, who then gave it to a gossip columnist.

    AMY GOODMAN: And they knew they were getting this from an FBI source.

    BETTY MEDSGER: They knew they were getting it from an FBI source. And they planted—they gave it to a gossip columnist. She wasn’t named, but the description was so obvious that people, especially in Los Angeles, knew, and she knew, that they would—I mean, Jean Seberg knew that it was she who everyone realized was the object of this. And the result was quite tragic. She was so upset when this was published in the Los Angeles Times that she gave birth very soon to a premature baby, who died very soon after birth, a white baby girl. And then, years later, on the anniversary of the birth of that dead child, Jean Seberg committed suicide. And at that time, Director Webster put out a statement that said, “We are out of this business forever. No more COINTELPRO.” But it is a dramatic illustration of how extreme many of the COINTELPRO operations were. And they were all kinds of people, not everyone well known.

    NERMEEN SHAIKH: I want to turn to Noam Chomsky, world-renowned political dissident, linguist and author. He’s Institute Professor Emeritus at Massachusetts Institute of Technology. In 2011, Chomsky spoke to Democracy Now! about COINTELPRO.

    NOAM CHOMSKY: COINTELPRO, which you mentioned, is actually the worst systematic and extended violation of basic civil rights by the federal government. It maybe compares with Wilson’s Red Scare. But COINTELPRO went on from the late ’50s right through all of the ’60s; it finally ended, at least theoretically ended, when the courts terminated it in the early ’70s. And it was serious.

    It started, as is everything, going after the Communist Party, then the Puerto Rican Independence Party. Then it extended—the women’s movement, the New Left, but particularly black nationalists. And it ended up—didn’t end up, but one of the events was a straight Gestapo-style assassination of two black organizers, Fred Hampton and Mark Clark, literally. I mean, the FBI set up the assassination. The Chicago police actually carried it out, broke into the apartment at 4:00 in the morning and murdered them. Fake information that came from the FBI about arms stores and so on. There was almost nothing about it. In fact, the information about this, remarkably, was released at about the same time as Watergate. I mean, as compared with this, Watergate was a tea party. There was nothing, you know?

    NERMEEN SHAIKH: That was Noam Chomsky, world-renowned political dissident, linguist and author, speaking to Democracy Now! Keith Forsyth, could you talk about the significance of what Professor Chomsky said? And also, Noam Chomsky was part of the group Resist, which was one of the groups to which those FBI documents had been sent by you.

    KEITH FORSYTH: Correct. So, at some point in the process after the initial mailing, Bill eventually hand-delivered all of the political documents that we had selected for distribution to the Resist office in Boston.

    AMY GOODMAN: This was Bill Davidon—

    KEITH FORSYTH: Bill Davidon, yes.

    AMY GOODMAN: —the Haverford professor and well-known antiwar activist.

    KEITH FORSYTH: Yes. And one of the examples that Mr. Chomsky cited was the assassination of Fred Hampton and Mark Clark, which we all knew about, but we didn’t know the extent of the FBI involvement. That came out later. As it turned out, the FBI had an informant in the Chicago Black Panther organization who provided a map of the apartment where the Panther leadership was staying, including a big X on the location where Fred Hampton slept.

    BETTY MEDSGER: Fred’s bed.

    KEITH FORSYTH: Fred’s bed, yeah, Fred’s bed. This map was provided to Hanrahan, the—I believe he was a district attorney in Chicago, and a—had a special unit of police whose focus was to target the Panthers. And Fred Hampton was drugged one night and was sleeping very soundly when the police broke in early in the morning. And they—they killed Mark Clark, and they shot and killed Fred Hampton—excuse me—in his bed, while he was sleeping.

    JOHN RAINES: He wasn’t dead.

    KEITH FORSYTH: Oh, right. That’s right.

    JOHN RAINES: He wasn’t dead.

    AMY GOODMAN: John Raines.

    JOHN RAINES: He was shot, he was wounded, but he wasn’t dead. And then his girlfriend, who was pregnant, was in the same room, in the bedroom. Two policemen came in—two Chicago policemen came in. And they said—and she heard them say, “Well, it looks like he’s going to make it.” And one of the guys took out his revolver, put the revolver on the back of Fred’s head and blew him away, and said, “Now he’s good and dead.”

    AMY GOODMAN: This was December 4th, 1969, a year and a few months before you raided the FBI offices—

    KEITH FORSYTH: That’s right.

    AMY GOODMAN: —in Media.

    KEITH FORSYTH: And later on—

    JOHN RAINES: That’s the kind of thing that J. Edgar Hoover’s FBI was involved in—I mean, radically unconstitutional, illegal. They—assassination, as Keith said.

    BONNIE RAINES: Horrifying, horrifying, horrifying.

    JOHN RAINES: Yeah.

    KEITH FORSYTH: Later on, there was an FBI document discussing, evaluating this raid. And I no longer recall the exact wording, but it was words to the effect of: “The result was very satisfactory. We got the result that we wanted.”

    AMY GOODMAN: You, Keith, had a wrench. You had tools to break in, and that’s what you used to get into the offices. Forty years later, Edward Snowden, you know, uses his digital skills in order to get these documents. Do you identify with him?

    KEITH FORSYTH: I do. His skills are far more difficult to master than mine.

    AMY GOODMAN: How did you learn?

    KEITH FORSYTH: I started with a correspondence course in locksmithing, which I took originally to assist in the draft board raid movement, to try to facilitate getting in and out of draft boards. And then—then, I also—I was actually working part-time as a locksmith on the side, in addition to driving a cab, so I got some practice there. And then we practiced—I practiced quite extensively at John and Bonnie’s house, made up a little sort of fake door with a whole—five or six locks in it, so you could, you know, work different ones, and just practiced fairly diligently to try to get the time down. So…

    NERMEEN SHAIKH: Betty Medsger, can you talk about FBI Agent Welch?

    BETTY MEDSGER: Yes. Neil Welch played a number of important roles at that time and was an agent quite different from most FBI agents. While the culture of the FBI was dominant—dominated by Hoover’s personality and many offices of the FBI were dominated also by COINTELPRO demands and actions similar to those kinds of operations, political spying and so forth, there were a few agents who didn’t like that culture. It was very hard to resist it. But Neil Welch was an agent, a special agent in charge at various places, and he was, I think, the only special agent in charge in the FBI who refused to carry out Hoover’s orders that COINTELPRO programs take place. He refused to let his agents participate in them, and at times was placed on probation because of this.

    A couple things about him later on. First of all, he happened to be the agent in charge of the Philadelphia office five years after the burglary, when the statute of limitations expired on the burglary. And it is he who signed the document closing the case. He claims—and I’m sure this is true—that it was a matter of routine; it was time to do that, since the burglars had not been found and there was no hope that they would be. I think he was also happy to do so, because he, years later, when I interviewed him, told me that although he doesn’t think that people should burglarize FBI offices, that he nevertheless thought that these people had done a heroic thing that was very important.

    And something else that he did that shows the change that took place in the years immediately afterwards, Clarence Kelley became the director of the FBI, the first full director after J. Edgar Hoover. It was a—he came in at a critical time, when people in the Justice Department and Congress were first starting to look at the FBI and raise questions. And he at first defended COINTELPRO, later apologized for it. But at one point, he finally—he ordered Welch to come to Washington to go into the domestic intelligence files and go through every single one of them and test whether or not they should be held open. Very few were held open. Most of them were closed by Welch. And that was not reported at the time. It was not known. But it really symbolizes the dramatic change that did take place.

    AMY GOODMAN: John Raines, can you—what did you teach at Temple University? And—

    JOHN RAINES: Well, I taught Christian social ethics.

    AMY GOODMAN: Can you talk about the influence of Dietrich Bonhoeffer, his significance, who he was?

    JOHN RAINES: Well, Dietrich Bonhoeffer was a Lutheran pastor and theologian. And he spent a year or two at Union Theological Seminary, which is where I would later get my theological training. The Second World War was on, just beginning, and he decided he had to go back to Germany. He would be safe in this country, but he had decided that he was not going to choose safety. He would go back to his country, where his people were. And Hitler was very much against, of course, this theologian, this marvelous man. And finally, they decided, a group within this kind of religious underground, that they should undertake the assassination of Hitler. And his name was associated with that effort, and he was killed after that assassination failed.

    AMY GOODMAN: And his influence on your decision to do what you did May 8th, 1971, with your wife Bonnie and the others?

    JOHN RAINES: Well, it was a—it was an example of, one, significant identity with his nation; two, taking on grave personal risks in order to save that nation from what was happening to Germany under Hitler. And he paid the ultimate price for that. Bonhoeffer paid the ultimate price for that. And that was a significant kind of inspiration for those of us, just like Martin Luther King was also, taking a risk for what you know to be right and following that risk, if you have to, all the way to the cross.

    AMY GOODMAN: And, Betty Medsger, his influence on Bill Davidon?

    BETTY MEDSGER: Well, I would just like to say something I learned about his—how both John and Bonhoeffer were influenced in their move toward resistance by African-American people. I didn’t realize, until I did the research for the book, that Bonhoeffer, after he returned to Germany and wrote about his move toward resistance, attributed his ability to decide to resist the government to what he learned here in Harlem from African Americans and about their struggle and their willingness to resist. And I found—when I discovered that, I mean, even his language in describing it was so similar to the way John described that working with African Americans, resisting with them in the South, was what gave John courage to resist.

    JOHN RAINES: Oh, yeah.

    AMY GOODMAN: John, I was wondering if you could read the statement you read the morning after the burglary to a Reuters reporter. Now, this was what? March 9th, 1971.

    BONNIE RAINES: About 5:30 in the morning.

    AMY GOODMAN: Describe it. Bonnie, what was going on? You were in the farmhouse?

    BONNIE RAINES: No, we were headed back to our home in our car, and it was early morning. We had decided that the statement that the group had written should be released the very same day, if possible. And so, we stopped in our car headed back into the city at a public phone, and John called a reporter from Reuters whom we’d—I think Bill Davidon had arranged that—called him, woke him up and read the statement to him over the phone.

    JOHN RAINES: OK, the statement is, that I read: “On the night of March 8, 1971, the Citizens’ Commission to Investigate the FBI removed files from the Media, Pennsylvania, office of the FBI. These files will now be studied to determine: one, the nature and extent of surveillance and intimidation carried on by this office of the FBI, particularly against groups and individuals working for a more just, humane and peaceful society; two, to determine how much of the FBI’s efforts are spent on relatively minor crimes by the poor and the powerless against whom they can get a more glamorous conviction rate, instead of investigating truly serious crimes by those with money and influence which cause great damage to the lives of many people—crimes such as war profiteering, monopolistic practices, institutional racism, organized crime, and the mass distribution of lethal drugs; finally, three, the extent of illegal practices by the FBI, such as eavesdropping, entrapment, and the use of provocateurs and informers.”

    It goes on: “As this study proceeds, the results obtained along with the FBI documents pertaining to them will be sent to people in public life who have demonstrated the integrity, courage and commitment to democratic values which are necessary to effectively challenge the repressive policies of the FBI.

    “As long as the United States government wages war against Indochina in defiance of the vast majority who want all troops and weapons withdrawn this year, and extends that war and suffering under the guise of reducing it, as long as great economic and political power remains concentrated in the hands of a small clique not subject to democratic scrutiny and control, then repression, intimidation, and entrapment are to be expected. We do not believe that this destruction of democracy and democratic society results simply from the evilness, egoism or senility of some leaders. Rather, this destruction is the result of certain undemocratic social, economic and political institutions.”

    NERMEEN SHAIKH: I want to turn to comments that Glenn Greenwald wrote on Tuesday about—Glenn Greenwald is the journalist who first broke the story about Edward Snowden and his NSA revelations. He wrote a piece yesterday, Tuesday, responding to the revelations about the 1971 FBI break-in. Greenwald writes, quote, “Just as is true of Daniel Ellsberg today, these activists will be widely hailed as heroic, noble, courageous, etc. That’s because it’s incredibly easy to praise people who challenge governments of the distant past, and much harder to do so for those who challenge those who wield actual power today.”

    So, Betty, I’d like to ask you: How were your reports received then? How did people writing in response to the documents, the articles that you wrote, respond to the fact that these activists had broken into the FBI, taken these documents, and that The Washington Post had made the decision to publish them?

    BETTY MEDSGER: Well, the letters to the editor were mixed. I think the majority were positive. People were shocked. They were also glad that evidence had been presented to them, that they had no idea of what existed. There were other—I mean, this was a time of Cold War attitudes still being very—so there were many people who accused us of being communist and trying to serve a communist purpose by making these documents public. There also was a very strong response among a few people in Congress that the adulation of Hoover in Congress needed to stop and questions needed to be asked for the first time—very strong effort to press for an investigation. Also, newspaper editorial writers at papers that had only written positive things about Hoover also called for investigations. I mean, that turned out to be a relatively long process, but those investigations did take place in 1975, when there was a buildup of additional revelations, including coming to understand what COINTELPRO was, and then Sy Hersh’s article in December 1974 that revealed that the CIA, in violation of its charter, was also engaged in massive domestic surveillance. That sort of was the tipping point. There was this string of things, and then Congress did. But this all started with the Media file release and the reaction.

    AMY GOODMAN: And you, really, in pushing for your piece to be published, you laid the groundwork—though Katharine Graham first didn’t want to and then ultimately did—for Watergate, because the same thing was taking place with Woodward and Bernstein, but now she had the experience of releasing—releasing your piece.

    BETTY MEDSGER: Yeah, I mean, I like to think that there was a buildup of—as she became more experienced with this through time. And certainly it was—she was making very tough decisions. I mean, it’s easy for those of us who are simply finding the stories and thinking, “Boy, this is a story there’s no way they could refuse to publish,” to realize that there were pressures. And in the instance of the press—I mean, of The Washington Post, the fact that they owned television stations and the Nixon administration could threaten them with loss of those licenses was a very real thing.

    AMY GOODMAN: John and Bonnie Raines, so your name is known; Keith Forsyth, your name is now known. What are your thoughts about people knowing who you are?

    BONNIE RAINES: Well, I can judge most immediately by the things that came in on my phone, my emails and responses from so many people who either read the Philadelphia story or The New York Times, overwhelmingly saying, “Wow! You did an amazing thing and never talked about it, never shared it all these years. And thank you very much for what you were able to accomplish.”

    AMY GOODMAN: These are your close friends.

    BONNIE RAINES: These are all colleagues, work colleagues. And I’m hopeful, too, that these are people who will want to see the film, as well, 1971, because it’s a wonderful documentary and very well done. But I just—it was a flood of responses that were overwhelmingly positive.

    AMY GOODMAN: And John?

    JOHN RAINES: Well, the same.

    BONNIE RAINES: Former students.

    JOHN RAINES: Former students, yes, and all of them saying, “You did a good job, Raines. Thank you for standing your watch.”

    AMY GOODMAN: And how will you deal with the glare of the media spotlight?

    JOHN RAINES: Oh, lights are a funny thing. They come on, and they go off. And knowing that that’s the way lights are, it helps you get ready when the lights go on, knowing that someday they’ll go off again. And that’s fine by me.

    AMY GOODMAN: And those who are not named, maybe you could address this, Betty. Someone who is named is Bob Williamson. Tell us what happened with him.

    BETTY MEDSGER: Bob Williamson was a defendant in the Camden trial after the Media burglary and then moved to New Mexico. And Bob has gone through many changes. He was eager to move away from total engagement with the movement, as he knew it, in Philadelphia and to get on with a new life. And he eventually did that. He was quite happy to recall his memories of what happened and what was a very important experience in his life. He’s become a Republican and stands in very different position from the rest of the burglars today, but he still looks back on that as a very important thing and regards it as something that caused positive change. And he came to New York yesterday to see the documentary and be with his fellow burglars and brought his adult daughter to share in the sense of celebration that they all felt.

    AMY GOODMAN: I mean, it was fascinating to see him, because now he became a Republican speech writer, among other things. And with his daughter in the audience, he said, “I wanted her to know who I was before I was her father.”

    BETTY MEDSGER: Right. He’s told her about some of the things that he did. I was fairly surprised to learn yesterday at lunch that he hadn’t told her about breaking into an FBI office until they were on the plane leaving Albuquerque on Tuesday.

    AMY GOODMAN: And Bill Davidon died in November. He knew that his name would become known, but he was not shy about his antiwar activism, and he was out there all the way. Why didn’t he speak out before? Was it part of the vow you all took together?

    JOHN RAINES: Yes.

    BETTY MEDSGER: Yeah.

    KEITH FORSYTH: Yes.

    JOHN RAINES: Yeah, sure.

    BONNIE RAINES: Yeah, it was. That was so, so important that we—we were going to trust each other to maintain a silence about it. And I think we knew that Bill would do everything possible to get the word out, but not as one of the burglars. He was—he was very anxious to continue to push for the changes that he thought were so important.

    BETTY MEDSGER: I’d like to say something about Bill and the keeping of secrets. Bill’s personality was—he was a very humble, modest person, while at the same time being a very strong leader. And to some extent, that’s a reflection of the qualities of the other members of the group, and one of the things that I think made it possible for them to keep the secret all these years. I’ve covered a lot of people and a lot of different kind of movements, and there tend to be some pretty dramatic egos in movements of all kinds, where I think for most people, once that five-year period passed, it would have been very tempting to want to get credit. And I was amazed when I met them and to find out that they did not have that kind of ego need.

    NERMEEN SHAIKH: Keith Forsyth, before we conclude, how is it—how is it for you now that your name is out, after all these decades of secrecy?

    KEITH FORSYTH: I’m the kind of person that’s not really comfortable talking about myself in public. And so, it’s been—it’s been a little difficult for me. But I was persuaded that, you know, by sharing our names, it helps give the story more weight, and it makes it more difficult for people who may not share our political views to dismiss it out of hand. You know, a book like this, with all unsubstantiated sources, unnamed sources, would be, I think, a different book, both as a historical record, which I think is important, and also in terms of the effect it can have to spark a political discussion. So, I’m not anxious to be even a little bit famous, but if it—if this will help spur the discussion that we need to have in this country, then I’m willing to do it.

    AMY GOODMAN: And finally, I mean, what is so astounding about this—and, Betty, you touched on this—is when the FBI set its sights on someone, as they did on John Grady, thinking he headed this plot, they’re blind to everything else—and maybe that woman they had a sketch of who ended up being Bonnie Raines. But as you show on page 150 of the book, The Burglary, there is a front-page headline, Delaware County Daily Times, a picture of Bill Davidon—this is five days after the break-in—with the headline, “Davidon Unveils Plot Against FBI.” Public remarks by William Davidon about the burglary reported in a front-page banner headline in a local newspaper four days, that is, after the burglary. “As guest speaker at a meeting of clergy in Swarthmore, he read the commission’s statement”—that’s your Commission to—Citizens’ Commission to Investigate the FBI—”explaining why they broke into an FBI office.” In those five years, he was never investigated for this.

    BETTY MEDSGER: No.

    AMY GOODMAN: Betty.

    BETTY MEDSGER: That amazing article sort of points to two things. First, the FBI was under orders at that point not to question him, his incredible immunity as a result of being investigated for Harrisburg.

    AMY GOODMAN: Which protected you all in many ways.

    JOHN RAINES: Oh, yeah, absolutely.

    BETTY MEDSGER: Right, right.

    BONNIE RAINES: Definitely.

    AMY GOODMAN: Except for the one who dropped out. That’ll teach him. He becomes the suspect.

    BETTY MEDSGER: But it also shows Bill, although I described him as this humble, unegotistical person, he also was so determined that this information become public. And the fact that the office had been burglarized wasn’t even getting attention. There were these tiny stories just saying, “Yes, not much was taken. Just a little burglary.” And he wanted it to be known that something had happened, and he was willing to go this far, but always standing back, never acknowledging that he was involved in it.

    AMY GOODMAN: I want to thank you all for being with us. Betty Medsger has written the book, The Burglary: The Discovery of J. Edgar Hoover’s Secret FBI. And the activists themselves—professors, taxi cab drivers, a director of daycare—who were involved with this break-in, John Raines, Bonnie Raines, Keith Forsyth, they called themselves the Citizens’ Commission to Investigate the FBI. I’m Amy Goodman, with Nermeen Shaikh.
    GUESTS

    John Raines, participated in the 1971 FBI break-in and helped photocopy many of the stolen documents. He and his wife Bonnie hosted many of the planning meetings for the burglary by the Citizens’ Commission to Investigate the FBI. He was a professor at Temple University.

    Bonnie Raines, participated in the 1971 FBI break-in and helped survey the office prior to the burglary. She and her husband John hosted many of the planning meetings for the burglary by the Citizens’ Commission to Investigate the FBI. She was a mother of three at the time and worked as a daycare director.

    Keith Forsyth, served as designated lock-picker in the 1971 FBI break-in by the Citizens’ Commission to Investigate the FBI. He was working as a cab driver at the time.

    Betty Medsger, author of the new book, The Burglary: The Discovery of J. Edgar Hoover’s Secret FBI. She is the former Washington Post reporter who received an anonymous package in 1971 that contained secret documents obtained by the Citizens’ Commission to Investigate the FBI. Her new book about the saga has just been published.

    David Kairys, civil rights attorney and a law professor at Temple University. He has represented the activists for more than four decades.

    Find this story at 8 January 2014

    Democracy needs whistleblowers. That’s why I broke into the FBI in 1971

    Like Snowden, we broke laws to reveal something that was more dangerous. We wanted to hold J Edgar Hoover accountable

    I vividly remember the eureka moment. It was the night we broke into an FBI office in Media, Pennsylvania, in March 1971 and removed about 1,000 documents from the filing cabinets. We had a hunch that there would be incriminating material there, as the FBI under J Edgar Hoover was so bureaucratic that we thought every single thing that went on under him would be recorded. But we could not be sure, and until we found it, we were on tenterhooks.

    A shout went up among the group of eight of us. One of us had stumbled on a document from FBI headquarters signed by Hoover himself. It instructed the bureau’s agents to set up interviews of anti-war activists as “it will enhance the paranoia endemic in these circles and will further serve to get the point across there is an FBI agent behind every mailbox.”

    That was the first piece of evidence to emerge. It was a vindication.

    Looking back on what we did, there are obvious parallels with what Edward Snowden has done in releasing National Security Agency documents that show the NSA’s blanket surveillance of Americans. I think Snowden’s a legitimate whistleblower, and I guess we could be called whistleblowers as well.
    A look back at what happened

    I was 29 when my husband John and I decided to join six other people to carry out the break-in. I was a mother of three children, aged eight, six and two, and I was working on a degree in education at Temple University, where John was a professor of religion.

    We had both been heavily involved in the civil rights movement. John had been a freedom rider, and in Philadelphia we participated in anti-war protests against Vientnam. Through that activity we knew that the FBI was actively trying to squelch dissent, illegally and secretly. We knew that they were sending informants into university classrooms, infiltrating meetings, and tapping phones. The problem was that though we knew all this, there was no way to prove it.

    A physics professor at Haverford College named Bill Davidon called a few of us together at his home. Bill, who died last November, floated the idea of doing something to obtain evidence. He just came out with it: “What do you think about breaking into an FBI office to remove the files?” If it hadn’t been for Bill, who was so smart and strategic, I’m not sure we would have taken it seriously. But we did.

    Bill articulated for all of us the frustration over the foment of those times, and the feeling that we all had of being compelled to do something as ordinary citizens because no one in Washington was holding Hoover accountable. We started looking into the feasibility of a break-in. Right away, we found out the main FBI office in Philadelphia was in a high-rise in the center of the city, and that it was impregnable. Then we learned there were other field offices in the suburbs, and that lead us to Media.

    John and I lived in a big old house in the Germantown area of Philadelphia, and we set aside a room in the third floor to be our base of operations. We lined the walls with maps of Media. We had to tell our elder children not to talk to anyone about the maps on the walls. Even though they knew nothing of our plans, we worried the detail might give something away.

    We cased the FBI office in Media for about three months. Two of us would go and watch activity in and around that building, record people going in and out and the patterns of police patrols.

    I was chosen to carry out the last piece of casing, which involved getting into the office during business hours to check out its security systems. I called and made an appointment to interview the head of the office, under the ruse that I was a Swarthmore College student researching opportunities for women in the FBI.

    I tried not to arouse suspicions, tucking up my long hippy hair in a hat, wearing glasses and gloves throughout the interview even though I was taking notes. Through that visit I learned there was no security, none at all, in the office – even the filing cabinets were left unlocked.

    I think it was Bill Davidon’s idea to choose 8 March 1971 as the operation’s date. It was the night of Muhammad Ali’s fight against Joe Frazier, and we thought people would be listening on their radios and that the police would perhaps be a little less vigilant.

    As the day approached, we both grew anxious. We had three children, there was a lot at jeopardy. We knew that if things went wrong and we were convicted, we could go to federal prison for a long time. We talked to my husband’s brother and to my parents, without telling them the details, and asked them to take care of our children if the worst happened.

    John wasn’t sleeping well. I was a little more bold and determined, a little gung-ho I guess. My association with good people in the movement gave me strength, and the idea that citizens have to take responsibility for when our rights are being abused.

    Four of us broke into the FBI office. Keith Forsyth had trouble picking the lock, which was daunting. My job that night was to distract any patrolling police cars by pretending my own vehicle had broken down. Luckily, no police drove by.

    We spent a week going through the documents and then mailing them out anonymously to congresspeople and some progressive journalists. All the journalists, including the New York Times, returned the documents to the FBI under pressure from the Nixon White House. Everyone was afraid of Hoover, except the Washington Post. After the Post published the documents, everyone else jumped on board.

    We were so happy that, finally, the right kind of information was getting out, and that it was accurate information that could stir things up. It had that effect, too – it really did stir things up. When the Church Committee, chaired by Senator Frank Church from Idaho, was set up to look into FBI and intelligence operations and policies, we felt our work was done.
    Democracy needs whistleblowers

    Democracy needs whistleblowers. Snowden was in a position to reveal things that nobody could dispute. He has performed a legitimate, necessary service. Unlike us, he revealed his own identity, and as a result, he’s sacrificed a lot.

    On our part, you could accuse us of being criminals – and Hoover did just that: he was apoplectic and sent 200 agents to try and find us in Philadelphia. “Find me that woman!” he screamed at them.

    But to us there didn’t seem to be an alternative at that point. No one was going to be hurt. We hoped for the outcomes that we wanted. We knew, of course, that we were breaking law, but I think that sometimes you have to break laws in order to reveal something dangerous, and to put a stop to it.

    For five years we lived under the threat of arrest. There was a sketch of me that the FBI circulated from when I impersonated a Swarthmore student, though I didn’t know it at the time. And the FBI interviewed John, luckily while I was out of the house. After five years, the statute of limitations fell for the burglary, and we were relieved. We didn’t celebrate on the fifth anniversary, though after that we were more relaxed. We now know they closed the case in 1976 for lack of any physical evidence.

    Eventually, we told the children, and the story became part of family lore. We wanted them to know about that chapter in our history, and besides, you can’t ask your children to act according to their conscience unless you show them what you have done in your life, too.

    I still worry a great deal about the state of our democracy. Back in 1971, the country was so divided, there was so much foment, but there was also much determination to change things, and people felt empowered to do so.

    Nowadays, the country is divided once again, but I don’t see much concern about the abuses that are happening today, like the surveillance of mosques in America, using agent provocateurs. I hear people say, “I don’t care,” the government can do what it needs to do as long as it protects me from terrorism …” To me, that’s giving the authorities blanket permission to cross the line again.

    Dissent and accountability are the lifeblood of democracy, yet people now think they just have to roll over in the name of “anti-terrorism”. Members of government thinks it can lie to us about it, and that they can lie to Congress. That concerns me for the future of my children and grandchildren, and that too makes me feel I can talk about, at my age, doing something as drastic as breaking-in to an FBI office in the search for truth.

    Bonnie Raines
    theguardian.com, Tuesday 7 January 2014 18.22 GMT

    Find this story at 7 January 2014

    © 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Remembering an earlier time when a theft unmasked government surveillance

    (Henry Burroughs/ AP ) – In his office in the Executive Office Building, President Richard Nixon meets with Attorney General John N. Mitchell, left, and FBI Director J. Edgar Hoover, in Washington on May 26, 1971.

    On March 24, 1971, I became the first reporter to inform readers that the FBI wanted the American people to think there was an “FBI agent behind every mailbox.” That rather alarming alert came from stolen FBI files I had found in my own mailbox at The Washington Post when I arrived at work the previous morning. ¶ It was the return address on the big tan envelope that prompted me to open it first: “Liberty Publications, Media, PA.” I had worked at the Evening Bulletin in Philadelphia before coming to The Post in January 1970, so I knew of Media, a small town southwest of Philadelphia. ¶ The letter inside the envelope informed me that on the night of March 8, 1971, my anonymous correspondents — they called themselves the Citizens Commission to Investigate the FBI — had broken into the Media FBI office and stolen every file. They did so, I learned later, in the dark and as the sounds of the first Muhammad Ali-Joe Frazier boxing match filled the streets.

    “Enclosed you will find,” the letter said, “copies of certain files from the Media, Pennsylvania, office of the FBI which were removed by our commission for public scrutiny. We are making these copies available to you and to several other persons in public life because we feel that you have shown concern and courage as regards issues which are, in part, documented in the enclosed materials.”

    I wasn’t aware of having shown any courage, but I was, to put it mildly, eager to read those files — 14, as it turned out, of 1,000 files that they had taken.

    For 43 years the people who sent those files to me then have remained unknown to the general public. This week, five of the Media FBI burglars — a group that pulled off an act that led to congressional investigations of all intelligence agencies, congressional oversight and significant reforms in the FBI — are coming forward for the first time.

    In a book I have written and in “1971,” a documentary film by Johanna Hamilton, the burglars tell their story — the ultimate result of a chance encounter I had at a dinner party in 1989 with acquaintances in Philadelphia, who told me they were involved in the Media burglary.

    There were eight of them. Seven have now explained why and how they broke into an FBI office, with five of them revealing their names: William C. Davidon, then a physics professor at Haverford College and the leader of the group, who died in November; John C. Raines, then and until recently a religion professor at Temple University; Bonnie Raines, a day-care center director then and since the director of organizations that advocate for children; Keith Forsyth, then a cabdriver and now an electrical engineer; Bob Williamson, then a social worker and now a life and business coach based in Albuquerque. The other surviving burglars who came forward live in Philadelphia.

    ‘Enhance the paranoia’

    When I first looked at the contents of that envelope from Liberty Publications, I had no idea who might have done such a thing.

    The first file I read grasped my attention. In it, FBI agents were encouraged to increase interviews with dissenters “for plenty of reasons, chief of which are it will enhance the paranoia endemic in these circles and will further serve to get the point across there is an FBI agent behind every mailbox.”

    If the FBI had paranoia as a goal of its intelligence operations, it was significant news.

    Every document told a story about FBI power that was unknown to anyone outside the FBI. One, signed by FBI Director J. Edgar Hoover on Nov. 4, 1970, had two subject headings — “Black Student Groups on College Campuses” and “Racial Matters.” It was the first of numerous FBI files I would receive from the anonymous burglars over the next two months that revealed Hoover’s programs targeting African Americans. The files revealed that African American citizens were watched by FBI informers everywhere they went — the corner store, classrooms, churches, bookstores, libraries, bars, restaurants. Every FBI agent was required to hire at least one informer to report to him regularly on the activities of black people. In the District, every agent was required to hire six informers for that purpose. On one campus in the Philadelphia area, Swarthmore College, every black student was under surveillance.

    In these documents, Hoover conveyed a sense of urgency about the need to monitor black students: “Initiate inquiries immediately. I cannot overemphasize the importance of expeditious, thorough, and discreet handling of these cases. . . . Increased campus disorders involving black students pose a definite threat to the Nation’s stability and security.”

    When I finished reading the files I received that day in March, I knew I held in my hands either a cruel hoax or information the American public needed to know about its most powerful law enforcement agency and the FBI director it had long adored.

    Within an hour, the FBI confirmed that the files were, indeed, copies of the ones stolen from the Media office.

    By late afternoon, when I submitted my article, I was surprised to learn that it might not make it into the paper. Attorney General John N. Mitchell, who would later serve time in prison for his role in the Watergate affair, had called two editors, executive editor Ben Bradlee and national managing editor Ben Bagdikian, multiple times that afternoon urging them not to publish.

    Two members of Congress — Sen. George S. McGovern (D-S.D.) and Rep. Parren J. Mitchell (D-Md.) — and the Washington bureaus of the New York Times and Los Angeles Times had also received the files. All four of those recipients immediately handed them over to the FBI.

    Late that afternoon, Mitchell called the publisher, Katharine Graham, and again demanded that The Post not publish an article. Finally, at 6:45 p.m., he released a statement urging “anyone with copies of the records to neither circulate them further nor publish them.” Disclosure of the files we possessed, he said, could endanger lives, disclose national defense information and give aid to foreign governments.

    Tough words, especially for an attorney general who, I discovered years later from the 33,698-page record of the FBI’s official investigation of the Pennsylvania burglary, had neither read nor been briefed on the files before he issued those dramatic claims.

    At first, Graham did not want to publish the article. The Post’s legal counsel, Tony Essaye, also opposed publication. After hours of heated discussion on the unprecedented question of whether to publicize secret government documents stolen by people outside the government, Graham approved publication at 10 p.m. The story was immediately released on The Post’s wire service and appeared the next day on the front pages of many papers, including The Post.

    The editors had convinced Graham that the responsibility to reveal this information far outweighed concern about how it became available to us. It was important for people to have access to the information — even if it were the fruit of a burglary — that the FBI engaged in practices that had never been reported, probably were unconstitutional, and were counter to the public’s understanding of Hoover and the FBI.

    The reaction to the story was swift and angry. Members of Congress who had never expressed anything but kind words for J. Edgar Hoover and the FBI now issued unprecedented calls for a congressional investigation of the bureau.

    Covering up COINTELPRO

    One of the most important Media files was a mere routing slip. On the top of it was the then-unknown term COINTELPRO. That program included clandestine efforts that the Rev. Martin Luther King Jr. and his closest associates interpreted at the time as a blackmail threat intended to persuade King to commit suicide. Hoover desperately wanted to keep the operation secret.

    Because I wrote about the document attached to the routing slip, Hoover and his top aides knew on April 6, when that article was published, that the term COINTELPRO was known outside the department. Hoover immediately wrote to the heads of all field offices conducting these top-secret counterintelligence operations and ordered them to stop submitting status letters, apparently in an effort to increase security. At the same time, he told them they must “continue aggressive and imaginative participation in the program.”

    Three weeks later, fear that the operations would one day become public convinced Hoover to take the more extreme step of eliminating the code name COINTELPRO. Officials were to say the program had been closed. Actually, it continued, but with no name.

    The nature of the program was first revealed in 1973 by NBC journalist Carl Stern, who successfully sued the FBI for documents that defined the purpose of COINTELPRO, which was initiated by Hoover in 1956. Numerous such operations were revealed during the 1975 hearings of the Senate select panel known as the Church Committee, the first congressional investigation of all intelligence agencies.

    A surprise at dinner

    Many years after the Media burglars opened the door to Hoover’s secret FBI, I accidentally found two of them, John and Bonnie Raines. On a trip to Philadelphia in 1989, I had dinner at their home one evening. I had known them as acquaintances when I worked in Philadelphia in the late 1960s and had not seen them for many years. Their youngest child joined us briefly. John turned to her and said, “Mary, we want you to know Betty because many years ago, when your dad and mother had information about the FBI we wanted the American public to know, we gave it to Betty.”

    That statement didn’t mean anything to Mary, but it almost knocked me off my chair. When she left the room, I asked the obvious question: “Are you saying you were the Media burglars?”

    They happily admitted they were. John Raines had not planned to tell me, he says. He just happened to blurt it out. Among the many things I learned that night was that the eight burglars had all agreed to take the secret to their graves. A few weeks later, I asked them if they would find the others and together consider breaking that vow so that this important gap in history could be filled. Shortly after that, on a part-time basis while I continued to teach journalism, I started my research about them, the investigation into the burglary and the impact of what they had done.

    As the Media burglars came forward this week, inevitably people have linked them to former NSA contractor Edward Snowden, who last year began releasing documents showing massive government surveillance.

    There are similarities in their stated motivations: They all sought to give important information to the public about overreaching intelligence agencies.

    Davidon, the leader of the Media group, thought that suppression of dissent was a crime against democracy. If documentary evidence was presented to Americans, he was confident they would take action to stop it. He was right. The burglars found the evidence and the public acted.

    In the case of the Snowden files, it is not clear what action the public might demand that Congress take.

    It is clear, though, that twice in the past half-century, Americans have had to rely on burglars — not official oversight by Congress, the Justice Department or the White House — for crucial information about their intelligence agencies’ operations.

    Betty Medsger, a former Washington Post reporter, is the author of “The Burglary: the Discovery of J. Edgar Hoover’s Secret FBI.”

    By Betty Medsger, Published: January 11 E-mail the writer

    Find this story at 11 January 2014

    © 1996-2014 The Washington Post

    NBC reporter recounts breaking FBI spying story

    On the Dec. 6, 1973 “Nightly News,” Carl Stern becomes the first reporter to expose COINTELPRO, a now-notorious FBI program that infiltrated and disrupted civil rights, anti-war and other political dissident groups.

    The files stolen from an FBI office outside Philadelphia in 1971 were stunning, describing secret efforts to spy on student protestors and infiltrate civil rights groups.

    But one document proved especially interesting to the NBC News correspondent who would later break the news of the FBI’s most notorious secret program of nationwide domestic surveillance. It discussed a proposal from bureau headquarters that agents send letters “anonymously” to college professors who had “shown a reluctance to take decisive action” against left-wing protestors. And it included a cryptic acronym he’d never seen before: “COINTELPRO.”

    “The first question that popped in my mind was, ‘By what authority do FBI agents write anonymous letters?’” recalls Carl Stern, who covered the Justice Department for NBC News for nearly 30 years. He also wanted to know what “COINTELPRO” stood for. But when he pressed those questions with top DOJ officials, “nobody would talk to me about it.”

    Stern recalled his efforts to learn more about the document—and the mysterious reference to “COINTELPRO” — on Tuesday after the confession by three former peace activists that they had committed the unsolved burglary of the Media, Pa. office in order to document what they were convinced was “massive illegal surveillance” by J. Edgar Hoover’s FBI. The identities of the burglars are revealed in a new book, “The Burglary,” by former Washington Post reporter Betty Medsger, and were reported Tuesday on the “Today” show.

    Read the NBC News report on the burglars who came forward.

    In the bombshell book, “The Burglary,” journalist Betty Medzger exposes the robbers behind the momentous theft from an FBI office outside Philadelphia over 40 years ago. The perpetrators have come forward in an interview with NBC News.

    The burglars cracked open the door to exposing illicit FBI snooping by stealing the files and sending them to select journalists, but it was Stern who opened it all the way. Using a then-novel tool called the Freedom of Information Act to obtain documents from the government, Stern uncovered the long-running surveillance program known as COINTELPRO, a now-infamous effort at political intimidation and disruption that may have been Hoover’s biggest secret.

    As Stern recalled it, when his initial inquiries about COINTELPRO were rebuffed, he refused to take no for an answer and sought an explanation over lunch with L. Patrick Gray, who had become acting director of the FBI after Hoover died in 1972. He got back a terse letter in Sept. 1972. “This matter involved a highly sensitive operation,” it read. “It has now been discontinued” and any further disclosures “would definitely be harmful to the Bureau’s operations and to the national security.”

    So Stern filed a lawsuit under the Freedom of Information Act. And with the help of a sympathetic judge, the late Barrington Parker, he finally got the first documents describing what COINTELPRO was, and broke the story on NBC’s “Nightly News” on Dec. 6, 1973. “Secret FBI memos made public today show the late J. Edgar Hoover ordered a nationwide campaign to disrupt the activities of the New Left,” said John Chancellor that night introducing Stern’s report. “He ordered his agents not only to expose New Left groups, but to take action against them to neutralize them.”

    Those documents opened the floodgates to hundreds more over the years as Congressional investigations followed. They showed that Hoover had started COINTELPRO in 1956, first targeting the Communist Party and then expanding the program over the years to include the Socialist Workers Party, black nationalists, New Left groups and the Ku Klux Klan. Agents were directed to harass and intimidate leaders, plant false stories and write anonymous letters aimed at discrediting them. In one case, the bureau planted a false story that film star Jean Seberg, known to have financially supported the Black Panther Party, had been impregnated by one of its leaders. In another, it sent a tape to Coretta Scott King, wife of the civil rights leader Martin Luther King, Jr. containing secretly made audio recordings of her husband’s extramarital affairs.

    “It was a very abusive program, it had no law enforcement purpose,” said Athan Theoharis, a leading scholar of the FBI’s history and a professor emeritus at Marquette University. “Clearly, what the bureau was doing was trying to contain organizations whose politics the FBI viewed as abhorrent.”

    Stern agrees. “They made a decision about which individuals and organizations were doing things that they regarded as un-American and harmful,” he said, “and that’ s not the bureau’s job.”

    Ironically, Hoover quietly terminated COINTELPRO shortly after the Media, Pa. break-in, afraid details of the program would come to light. Within a few years, prodded by the bad publicity and the findings of a Senate committee headed by the late Sen. Frank Church of Idaho, the Justice Department issued new guidelines prohibiting the bureau from engaging in any such activities and barring investigations based on First Amendment-protected political activity.

    By then, a later FBI director, Clarence Kelley, would do something Hoover is not known to have ever contemplated. He formally apologized for COINTELPRO. “We are truly sorry we were responsible for instances which are now subject to such criticism,” Kelley said in a 1976 speech at Westminster College in Missouri. “Some of those activities were clearly wrong and quite indefensible.”

    Theoharis said those changes might never have taken place if the Media burglars had not stolen the FBI’s secret files — and Stern had not followed up on what they did.

    Wednesday Jan 8, 2014 2:00 AM
    By Michael Isikoff, NBC News National Investigative Correspondent

    Find this story at 8 January 2014

    © NBCNews.com

    How to Burglarise the FBI The Citizens’ Commission to Investigate the FBI did it back in 1971

    For most of US history, spies didn’t have rules – even when they were targeting US citizens. The spymasters and their agents did whatever was necessary: blackbag break-ins, illegal phone taps, telegram and mail intercepts, plus the usual lying, stealing and killing. But in late 1970, a collection of ordinary citizens became so outraged by illegal government spying that they began to meticulously plan a daring mission: they would raid an FBI office.

    On the 8th of March, 1971, a group of activists calling themselves the Citizens’ Commission to Investigate the FBI broke into an office outside of Philadelphia, stole nearly all the FBI’s own documents and mailed them to Washington Post reporter Betty Medsger. This leak led to massive reforms of the rules of surveillance. Any limits on NSA and FBI actions inside the United States are thanks in part to these daring citizen burglars. They kept their story a secret for 43 years. Meet the men and women who burgled the FBI.

    Their secret planning began with a spaghetti dinner. A pair of college professors, several university students, a social worker, a daycare worker and a taxi driver gathered around a homey dinner table, children underfoot at a three-story stone townhouse in Philadelphia. Some of the guests were on edge, while others laughed like old friends. Their leader, William “Bill” Davidon, a physics professor at nearby Haverford College, was the oldest at 43. He leaned back, quietly observing the crew that ranged in age down to 20. Several of the members had been arrested in earlier actions. But this operation was on a different scale of danger. Even sitting at the table slurping spaghetti and discussing plans was enough for conspiracy charges, perhaps up to ten years in federal prison. If the FBI catches you in the act, a friendly lawyer warned, you might be shot.

    John and Bonnie Raines’s wedding photo, 1962

    As they ate, Davidon outlined his plan. We are going to break into an FBI office, steal every document, mail the internal FBI files to the press and expose the FBI’s crimes to the nation. He was neither loud nor flashy. His was a leadership that came with the spark of conviction, the sensibilities of a lifelong educator.

    But to attack the FBI meant directly confronting J Edgar Hoover, one of the most powerful men in America. For nearly five decades, Hoover had shaped the FBI to his liking, personally deciding who was a true American and who was an enemy of the state. “When Hoover was director, there were no guidelines. He was the guideline and he told agents what they can do and they can’t do,” said former FBI Special Agent Wes Swearingen, who was active from 1951 to 1977. “He did not ask any president or any attorney general what he could do. In fact, he kept it secret. That gave him a lot of power because everything was so secretive.”

    Hoover used FBI agents to draw up a list of tens of thousands of “subversive” Americans to be rounded up and arrested in the event of a national emergency. He organised nationwide programmes to harass and disrupt political activists. “We used to set up Black Bag Jobs which were actually illegal searches because we did not have search warrants… and I did or knew about approximately 500 [of these] in the Chicago area alone,” Swearingen told me. “Hoover was very abusive because we were talking about innocent people being put in jail and people being assassinated, like Fred Hampton and Mark Clark [leaders of the Black Panther Party] in Chicago. That was a definite arrangement by the FBI for the Chicago Police to go in and kill all the members. And I was told personally by an agent that I used to work with, that that’s what happened.”

    Despite his reign of abuse, no one in Washington dared challenge the man who knew too much. “Somebody had to do it. And those of us who referred to ourselves as the ‘Citizens’ Commission to Investigate the FBI’ took that task as our task in the early months of 1971,” says John Raines, a professor of religion at Temple University and, along with his wife Bonnie, a former member of the Citizens’ Commission. “If we did not do it, it would not get done. And J Edgar Hoover would have continued to turn his FBI into a kind of proto-Gestapo.”

    It had been Davidon’s idea that burglering the FBI would show how the venerated bureau was out of control, running illegal operations, ignoring the US Constitution and disrupting fundamental democratic rights. Secrecy was a must. They each knew that if even one of them talked, slipped up or got caught, the entire group was going down.

    The FBI office was located on the second floor of the County Court Apartments in Media, Pennsylvania. (Photo by Betty Medsger)

    An FBI office in the small town of Media, Pennsylvania caught Davidon’s attention. Media was just outside of Philly, and when he drove by the offices, Davidon was convinced that the three-story brick office building was vulnerable. These smaller FBI offices, known as “Resident Agencies”, often housed less than a half-dozen agents and had less sophisticated security measures. The Citizens’ Commission now had their target.

    Throughout January and February of 1971, the Raines’s third floor attic morphed into a command centre. Sheetrock was hung on one wall and quickly filled with handwritten notes and operational details. Escape routes were planned. A large map of Media was hung on the wall and a diagram of the FBI office slowly took shape. Brainstorming sessions led to a chart with questions: How long does it take the courthouse guard to make rounds? Is it predictable? Are there regular police patrols?

    Davidon wanted no detail left unstudied. He assigned each team member a specific set of tasks. John Raines was chosen to drive the getaway car – the family station wagon. He would wait in a parking lot miles from the operation, ready to receive the stolen goods. Once the documents were squirrelled away in a safe house, it would be John and Davidon who would write up the analysis. They were both in their early 40s, long-term strategic thinkers, men who had joined the Civil Rights Movement long before it was hip and risked their life by travelling to rural Mississippi in the early 1960s as part of a movement known as “The Freedom Riders”.

    Keith Forsyth, part-time cabbie and lock picker

    Forsyth was the one-man entry crew. While the others sat around a table up in the attic, Forsyth installed a board with multiple locks lined up like a hardware store collection. While the others debated entry strategies, escape routes and how to avoid being arrested, Forsyth picked locks. “Every lock is an individual, they all behave differently so I would go up and down practicing. I would do all [the locks] clockwise, rotating and going up and then back counterclockwise. Every so often I would either swap out a lock or I would take a lock out, take it apart and put a new combination in it. When I was really good, I probably could do most locks in about 30 seconds.”

    As the burglary plan took shape, Forsyth was given another task: he would help with surveillance. The burglars began night operations, staking out the Media FBI office in pairs. They developed a formal routine. Every weeknight from 7PM to midnight the crew spied, took notes and honed the details of the operation.

    “It was boring. You’re watching out the door, constantly waiting for a cop car to go by. A cop car goes [by] and then you wait another hour before you see the next one,” said Forsyth. “You have two people sitting in the back of a van with curtains over the windows in the dark, for hours at a time. It would be pretty hard to explain that if a cop actually saw your eye move behind the curtain.”

    The activists were clear that the raid had to take place at night, after the agents had left but not so late as to raise suspicions. They found an ideal date. On the 8th of March, 1971, Joe Frazier was scheduled to fight Muhammad Ali. Millions would be watching and listening. While Ali and Frazier fought inside Madison Square Garden, the burglars could use the noise of the radio and TV broadcasts as cover.

    After two full months of casing the FBI by night, the team understood well the outside routines. But what was happening inside the FBI offices? The Citizens’ Commission agreed that someone needed to spend some time undercover in the offices.

    Bonnie Raines with her daughter, Lindsley, in 1971, the year of the robbery

    Bonnie Raines volunteered. She looked younger than her 29 years, had a bubbly Midwestern charm and was extremely attractive. In late February, she disguised her long hair by carefully tucking it inside a woollen hat. She wore oversized glasses that were not part of her normal getup. A pair of leather gloves allowed her to take notes without leaving fingerprints. Under the guise of investigating work opportunities for women at the FBI, Bonnie set up an appointment to interview an agent inside the office. While Bonnie kept the conversation on track, she made a handful of mental notes. The filing cabinets did not appear to have sophisticated locks, and there was no visible alarm. There was also a second entryway, a door barricaded by huge filing cabinets. Loaded with information, Bonnie left the office surer than ever that the operation was possible.

    As plans began to solidify, Jonathan Flaherty, one of the burglars, got cold feet. With little explanation, Flaherty left the group, hardly explaining his fears or motivations. The group was stunned. Flaherty could sink them all with a single phone call. Davidon pushed on. He tried to ignore the possibilities of the defector. He’d already hurdled dozens of challenges.

    ***

    At 7PM, on the 8th of March, the burglars gathered at a Holiday Inn several miles from the FBI office. They arrived in separate cars and waited. Forsyth was sent to pick the locks. He had already scouted the premises, found a pair of locks he could pick, and figured his well-practiced routine would take approximately 30 seconds. He approached the office in a Brooks Brothers suit and tie, clean-shaven and confident, but when he saw the door, he panicked. A second, far more sophisticated lock had recently been added, one that would be impossible for him to pick. “I was very upset, because immediately my plan had been to go up there, open those two locks, make sure there was no alarms and leave. I planned to be out of there in five minutes or less. And so my immediate instinctive reaction was that this whole thing was down the tubes.”

    Forsyth returned to the Holiday Inn, “I can’t do it,” he bluntly told the gathered crew. Davidon marshalled the frustration and began to think aloud. What other ways might work? Do we have a second door? During her casing mission, Bonnie had seen another door, but it was barricaded by a huge filing cabinet. Davidon thought it would work, while also warning that knocking over the file cabinet meant near-sure arrest. They decided to go for it and headed back to the office.

    Now Forsyth’s bragging rights were tested. He found the barricaded door, which had just one lock. He picked that in his standard 30 seconds. Then using a crowbar and part of a car jack he painstakingly inched the massive file cabinet away from the door. Instead of a quick 30-second entry, it was closer to an hour of painstaking work. “My feet are braced up against the wall and I am pulling the jack very, very slowly trying to feel what is happening on the other side. Trying to feel whether this thing is slipping or tipping or not,” said Forsyth. “I was trying to stay calm but, you know, what are you going to say if somebody walks up and says, ‘By the way, young man, why are you laying on the floor with a four-foot steel bar in your hands stuck inside the FBI’s door?’”

    While he strained, Forsyth silently thanked Ali as sounds of the heavyweight fight echoed throughout the building. Then he panicked. “I heard this sort of banging, a bang sound from inside, and of course I froze instantly. It was an old building. Was this the steam heat? Or was it an FBI agent who tripped over something? I had no way of knowing. “

    Forsyth finally wedged the door open far enough to slip his skinny frame into the FBI offices. “I had this little moment where I thought, ‘Well, if they’re in there I’m going to find our right now.’ I squeezed through and tried to be as calm as I could. I looked around and there was nobody there.”

    Next, a two-man, two-woman team entered the FBI offices carrying empty suitcases. They worked stealthily in the dark. A flashlight dimmed with tape was used sparingly. The “inside crew” methodically wrenched open desk drawers and file cabinets. Careful not to make noise or leave the slightest evidence, they quietly filled up their oversized suitcases with documents. They also grabbed an autographed photo of J Edgar Hoover as a trophy. The well-dressed burglars then strolled out to waiting cars in front of the offices, loaded up two vehicles with suitcases and were driven off.

    The Quaker farmhouse 40 miles outside of Philadelphia, where the burglars reconvened after the robbery to examine the stolen documents. (Photo by Betty Medsger)

    Davidon had long before decided that the documents should be kept at a central location, preferably rural. He didn’t want to risk an FBI raid in Philadelphia, so he quietly asked a friend to lend him the farmhouse at Friendship Farm, a Quaker retreat. Once the burglars reconvened at the farmhouse they immediately opened the suitcases and began sorting documents. From the onset they had agreed to destroy any legitimate criminal records – alerting bank robbery suspects that the FBI was after them was not part of the plan. They wanted evidence the FBI was harassing political activists. As Davidon had repeatedly stated to the group, if Hoover was trying to squash dissent in the United States, the documents would prove it.

    The group spread the documents across the kitchen table, counters, a dining room table and even atop chairs as they began sorting. Within an hour they found evidence. In an internal FBI document, agents were taught that harassing and infiltrating legitimate political organisations was a particularly effective technique. It might help, the document suggested, to “enhance the paranoia… get across the point there is an FBI agent behind every mailbox”.

    Another document was a routing slip with the word COINTELPRO – short for Counter Intelligence Programme – a top secret programme little known outside the FBI, which was at the heart of the Bureau’s dirty tricks and harassment campaigns versus political activists.

    “We discovered very quickly that we had not acted in vain. Now we had documentation that proved our suspicions to be accurate,” said John Raines. “And then, with those documents, we were able to get the proof on what J Edgar Hoover was making his agents do.”

    The burglary had literally turned the FBI inside out. The masters of covert entry and burglaries had themselves been targeted. “I don’t think anyone [at the FBI] ever thought anyone would have guts enough to try to break into the FBI,” said Swearingen, the former agent. “The frame of mind in the FBI was ‘Nobody’s going to break into an FBI office. They’ve got to be crazy.’ But hey, people break into banks all the time.”

    Hoover’s paranoia flourished. Was Media the first of many attacks? Would all his secrets be revealed? Already weakened by age and losing his grip on power, he panicked. He ordered armed agents to sleep inside FBI offices nationwide. “I would go to the Santa Barbara [FBI] office and lock the door at night and I would sleep in there overnight. We had old army cots…and that was nationwide,” said former FBI agent Swearingen. “They spent millions of dollars putting in a security system for all these different resident agencies around the country. It’s like they locked up the barn after the horse was stolen.”

    The next hit on Hoover, however, came not from the burglars but from The Washington Post. The Citizens’ Commission sent the Post a packet of 14 government documents. Attorney General John Mitchell got wind and pressured executive editor Ben Bradlee to keep the information secret. Bradlee refused, citing the public interest in the FBI’s activities. It was clear to Bradlee and young reporter Betty Medsger that the original documents mailed to the Post were the tip of a far larger scandal. Medsger poured her energy into the story – the documents had been addressed to her, and she quickly figured that her previous job writing about anti-war activists for Philadelphia’s Evening Bulletin was directly connected to the burglars choosing her.

    The Burglary, by Betty Medsger, published through Alfred A Knopf

    The Post supported her work with front-page exclusives and a harsh editorial condemning the FBI. For Medsger, it would be the story of her life. In her recently released book The Burglary, Medsger weaves together the tales of the burglars and the long history of Hoover’s disdain for democracy.

    For Hoover, the lack of investigative leads in the burglary was infuriating. Particularly galling to the FBI director was the lack of arrests. Despite a six-year investigation and a file that stretched to 33,000 pages, no member of the Citizens’ Commission was ever charged. The case was eventually closed, but the FBI was never the same. “It brought the FBI to its senses. Up until that time, they were just kind of free-ruling and doing whatever they felt they might want to do or maybe should do,” said Swearingen, the former agent. “But [the Media break-in] brought that to a screeching halt.”

    RetroReport just put out a short documentary on the Citizen’s Commission. Watch it right here.

    Jonathan Franklin is an independent reporter who writes often for the Guardian. He can be followed @Franklinblog. Email inquiries, news tips and secret documents can be sent to chilefranklin2000@yahoo.com.

    By Jonathan Franklin

    Find this story at 9 January 2014

    © 2014 Vice Media Inc.

    Burglars Who Took On F.B.I. Abandon Shadows; Stealing J. Edgar Hoover’s Secrets

    One night in 1971, files were stolen from an F.B.I. office near Philadelphia. They proved that the bureau was spying on thousands of Americans. The case was unsolved, until now.

    PHILADELPHIA — The perfect crime is far easier to pull off when nobody is watching.

    So on a night nearly 43 years ago, while Muhammad Ali and Joe Frazier bludgeoned each other over 15 rounds in a televised title bout viewed by millions around the world, burglars took a lock pick and a crowbar and broke into a Federal Bureau of Investigation office in a suburb of Philadelphia, making off with nearly every document inside.

    They were never caught, and the stolen documents that they mailed anonymously to newspaper reporters were the first trickle of what would become a flood of revelations about extensive spying and dirty-tricks operations by the F.B.I. against dissident groups.

    “Heroes. And a reminder to those who naively believe that the government can be trusted with the power to run a surveillance state. How quickly we forget Hoover and Nixon.”

    The burglary in Media, Pa., on March 8, 1971, is a historical echo today, as disclosures by the former National Security Agency contractor Edward J. Snowden have cast another unflattering light on government spying and opened a national debate about the proper limits of government surveillance. The burglars had, until now, maintained a vow of silence about their roles in the operation. They were content in knowing that their actions had dealt the first significant blow to an institution that had amassed enormous power and prestige during J. Edgar Hoover’s lengthy tenure as director.

    Launch media viewer
    John and Bonnie Raines, two of the burglars, at home in Philadelphia with their grandchildren. Mark Makela for The New York Times

    “When you talked to people outside the movement about what the F.B.I. was doing, nobody wanted to believe it,” said one of the burglars, Keith Forsyth, who is finally going public about his involvement. “There was only one way to convince people that it was true, and that was to get it in their handwriting.”

    Mr. Forsyth, now 63, and other members of the group can no longer be prosecuted for what happened that night, and they agreed to be interviewed before the release this week of a book written by one of the first journalists to receive the stolen documents. The author, Betty Medsger, a former reporter for The Washington Post, spent years sifting through the F.B.I.’s voluminous case file on the episode and persuaded five of the eight men and women who participated in the break-in to end their silence.

    Unlike Mr. Snowden, who downloaded hundreds of thousands of digital N.S.A. files onto computer hard drives, the Media burglars did their work the 20th-century way: they cased the F.B.I. office for months, wore gloves as they packed the papers into suitcases, and loaded the suitcases into getaway cars. When the operation was over, they dispersed. Some remained committed to antiwar causes, while others, like John and Bonnie Raines, decided that the risky burglary would be their final act of protest against the Vietnam War and other government actions before they moved on with their lives.

    “We didn’t need attention, because we had done what needed to be done,” said Mr. Raines, 80, who had, with his wife, arranged for family members to raise the couple’s three children if they were sent to prison. “The ’60s were over. We didn’t have to hold on to what we did back then.”

    A Meticulous Plan
    Launch media viewer
    Keith Forsyth, in the early 1970s, was the designated lock-picker among the eight burglars. When he found that he could not pick the lock on the front door of the F.B.I. office, he broke in through a side entrance.

    The burglary was the idea of William C. Davidon, a professor of physics at Haverford College and a fixture of antiwar protests in Philadelphia, a city that by the early 1970s had become a white-hot center of the peace movement. Mr. Davidon was frustrated that years of organized demonstrations seemed to have had little impact.

    In the summer of 1970, months after President Richard M. Nixon announced the United States’ invasion of Cambodia, Mr. Davidon began assembling a team from a group of activists whose commitment and discretion he had come to trust.

    The group — originally nine, before one member dropped out — concluded that it would be too risky to try to break into the F.B.I. office in downtown Philadelphia, where security was tight. They soon settled on the bureau’s satellite office in Media, in an apartment building across the street from the county courthouse.

    That decision carried its own risks: Nobody could be certain whether the satellite office would have any documents about the F.B.I.’s surveillance of war protesters, or whether a security alarm would trip as soon as the burglars opened the door.

    The group spent months casing the building, driving past it at all times of the night and memorizing the routines of its residents.
    Launch media viewer
    Mr. Forsyth today. Mark Makela for The New York Times

    “We knew when people came home from work, when their lights went out, when they went to bed, when they woke up in the morning,” said Mr. Raines, who was a professor of religion at Temple University at the time. “We were quite certain that we understood the nightly activities in and around that building.”

    But it wasn’t until Ms. Raines got inside the office that the group grew confident that it did not have a security system. Weeks before the burglary, she visited the office posing as a Swarthmore College student researching job opportunities for women at the F.B.I.

    The burglary itself went off largely without a hitch, except for when Mr. Forsyth, the designated lock-picker, had to break into a different entrance than planned when he discovered that the F.B.I. had installed a lock on the main door that he could not pick. He used a crowbar to break the second lock, a deadbolt above the doorknob.

    After packing the documents into suitcases, the burglars piled into getaway cars and rendezvoused at a farmhouse to sort through what they had stolen. To their relief, they soon discovered that the bulk of it was hard evidence of the F.B.I.’s spying on political groups. Identifying themselves as the Citizens’ Commission to Investigate the F.B.I., the burglars sent select documents to several newspaper reporters. Two weeks after the burglary, Ms. Medsger wrote the first article based on the files, after the Nixon administration tried unsuccessfully to get The Post to return the documents.

    Other news organizations that had received the documents, including The New York Times, followed with their own reports.
    Launch media viewer
    At The Washington Post, Betty Medsger was the first to report on the contents of the stolen F.B.I. files. Now, she has written a book about the episode. Robert Caplin for The New York Times

    Ms. Medsger’s article cited what was perhaps the most damning document from the cache, a 1970 memorandum that offered a glimpse into Hoover’s obsession with snuffing out dissent. The document urged agents to step up their interviews of antiwar activists and members of dissident student groups.

    “It will enhance the paranoia endemic in these circles and will further serve to get the point across there is an F.B.I. agent behind every mailbox,” the message from F.B.I. headquarters said. Another document, signed by Hoover himself, revealed widespread F.B.I. surveillance of black student groups on college campuses.

    But the document that would have the biggest impact on reining in the F.B.I.’s domestic spying activities was an internal routing slip, dated 1968, bearing a mysterious word: Cointelpro.

    Neither the Media burglars nor the reporters who received the documents understood the meaning of the term, and it was not until several years later, when the NBC News reporter Carl Stern obtained more files from the F.B.I. under the Freedom of Information Act, that the contours of Cointelpro — shorthand for Counterintelligence Program — were revealed.

    Since 1956, the F.B.I. had carried out an expansive campaign to spy on civil rights leaders, political organizers and suspected Communists, and had tried to sow distrust among protest groups. Among the grim litany of revelations was a blackmail letter F.B.I. agents had sent anonymously to the Rev. Dr. Martin Luther King Jr., threatening to expose his extramarital affairs if he did not commit suicide.
    Launch media viewer
    The F.B.I. field office in Media, Pa., from which the burglars stole files that showed the extent of the bureau’s surveillance of political groups. Betty Medsger
    Recent Comments
    silentbear 28 days ago

    In celebration of these folks actions, I’d like to share this song:http://youtu.be/4JIbCZen1Tg
    Pat Shea 28 days ago

    People in the movement knew they were getting spied on anyway. At UW – Madison, the COINTELPRO photographers would lurk in the alleys along…
    Paul Lerch 28 days ago

    Two thumbs up to the Rainses’, Keith Forsyth and the five others who had the courage to really put themselves at risk in order to take an…
    See All Comments

    “It wasn’t just spying on Americans,” said Loch K. Johnson, a professor of public and international affairs at the University of Georgia who was an aide to Senator Frank Church, Democrat of Idaho. “The intent of Cointelpro was to destroy lives and ruin reputations.”

    Senator Church’s investigation in the mid-1970s revealed still more about the extent of decades of F.B.I. abuses, and led to greater congressional oversight of the F.B.I. and other American intelligence agencies. The Church Committee’s final report about the domestic surveillance was blunt. “Too many people have been spied upon by too many government agencies, and too much information has been collected,” it read.

    By the time the committee released its report, Hoover was dead and the empire he had built at the F.B.I. was being steadily dismantled. The roughly 200 agents he had assigned to investigate the Media burglary came back empty-handed, and the F.B.I. closed the case on March 11, 1976 — three days after the statute of limitations for burglary charges had expired.

    Michael P. Kortan, a spokesman for the F.B.I., said that “a number of events during that era, including the Media burglary, contributed to changes to how the F.B.I. identified and addressed domestic security threats, leading to reform of the F.B.I.’s intelligence policies and practices and the creation of investigative guidelines by the Department of Justice.”

    According to Ms. Medsger’s book, “The Burglary: The Discovery of J. Edgar Hoover’s Secret F.B.I.,” only one of the burglars was on the F.B.I.’s final list of possible suspects before the case was closed.
    Launch media viewer
    Afterward, they fled to a farmhouse, near Pottstown, Pa., where they spent 10 days sorting through the documents. Betty Medsger

    A Retreat Into Silence

    The eight burglars rarely spoke to one another while the F.B.I. investigation was proceeding and never again met as a group.

    Mr. Davidon died late last year from complications of Parkinson’s disease. He had planned to speak publicly about his role in the break-in, but three of the burglars have chosen to remain anonymous.

    Among those who have come forward — Mr. Forsyth, the Raineses and a man named Bob Williamson — there is some wariness of how their decision will be viewed.

    The passage of years has worn some of the edges off the once radical political views of John and Bonnie Raines. But they said they felt a kinship toward Mr. Snowden, whose revelations about N.S.A. spying they see as a bookend to their own disclosures so long ago.

    They know some people will criticize them for having taken part in something that, if they had been caught and convicted, might have separated them from their children for years. But they insist they would never have joined the team of burglars had they not been convinced they would get away with it.

    “It looks like we’re terribly reckless people,” Mr. Raines said. “But there was absolutely no one in Washington — senators, congressmen, even the president — who dared hold J. Edgar Hoover to accountability.”

    “It became pretty obvious to us,” he said, “that if we don’t do it, nobody will.”

    The Retro Report video with this article is the 24th in a documentary series presented by The New York Times. The video project was started with a grant from Christopher Buck. Retro Report has a staff of 13 journalists and 10 contributors led by Kyra Darnton, a former “60 Minutes” producer. It is a nonprofit video news organization that aims to provide a thoughtful counterweight to today’s 24/7 news cycle.

    A version of this article appears in print on January 7, 2014, on page A1 of the New York edition with the headline: Burglars Who Took On F.B.I. Abandon Shadows. Order Reprints|Today’s Paper|Subscribe

    By MARK MAZZETTIJAN. 7, 2014

    Find this story at 7 January 2014

    © 2014 The New York Times Company

    “It Was Time to Do More Than Protest”: Activists Admit to 1971 FBI Burglary That Exposed COINTELPRO

    One of the great mysteries of the Vietnam War era has been solved. On March 8, 1971, a group of activists — including a cabdriver, a day care director and two professors — broke into an FBI office in Media, Pennsylvania. They stole every document they found and then leaked many to the press, including details about FBI abuses and the then-secret counter-intelligence program to infiltrate, monitor and disrupt social and political movements, nicknamed COINTELPRO. They called themselves the Citizens’ Commission to Investigate the FBI. No one was ever caught for the break-in. The burglars’ identities remained a secret until this week when they finally came forward to take credit for the caper that changed history. Today we are joined by three of them — John Raines, Bonnie Raines and Keith Forsyth; their attorney, David Kairys; and Betty Medsger, the former Washington Post reporter who first broke the story of the stolen FBI documents in 1971 and has now revealed the burglars’ identities in her new book, “The Burglary: The Discovery of J. Edgar Hoover’s Secret FBI.”

    Click here to watch the one-hour Part 2 of this interview.
    Transcript

    This is a rush transcript. Copy may not be in its final form.

    NERMEEN SHAIKH: Today, we will spend the rest of the hour unraveling one of the great mysteries of the Vietnam War era. On March 8th, 1971, a group of eight activists, including a cab driver, a daycare director and two professors, broke into an FBI office in Media, Pennsylvania, and stole every document they found. The activists, calling themselves the Citizens’ Commission to Investigate the FBI, soon began leaking shocking details about FBI abuses to the media. Among the documents was one that bore the mysterious word “COINTELPRO.”

    AMY GOODMAN: No one involved in the break-in was ever caught. Their identities remained a secret until this week. Today, three of the FBI burglars will join us on the show, but first I want to turn to a new short film produced by the nonprofit news organization Retro Report for The New York Times. It’s titled Stealing J. Edgar Hoover’s Secrets.

    NARRATOR: It’s the greatest heist you’ve never heard of and one of the most important.

    HARRY REASONER: Last March, someone broke into the FBI offices in Media, Pennsylvania, stole some records and mailed copies of them around to the several newspapers.

    NARRATOR: Those records would help bring an end to J. Edgar Hoover’s secret activities within the Federal Bureau of Investigation.

    JOHN CHANCELLOR: He ordered his agents not only to expose New Left groups, but to take action against them to neutralize them.

    UNIDENTIFIED: Many Americans were tapped and bugged, had their mail opened by the CIA and the FBI.

    NARRATOR: The burglars were never caught, and the details have remained a mystery until now. A new book, The Burglary, reveals for the first time who did it and how they used a crowbar to pry open one of the best-kept and darkest secrets in American history.

    JOHN RAINES: We were early whistleblowers before whistleblowers were known as such.

    NARRATOR: The burglars are stepping out of the shadows just as new revelations about secret intelligence operations have many people asking, “How much is too much when personal privacy is at stake?”

    In the spring of 1970, the war in Vietnam was raging.

    JOHN CHANCELLOR: American battle deaths in Vietnam now number 40,142.

    NARRATOR: And at home, antiwar protesters and law enforcement officers were violently clashing.

    BONNIE RAINES: It felt like a nightmare was unfolding. I took what was outrage and horror about what was going on, and I realized that I had to take it somewhere.

    NARRATOR: Bonnie Raines worked at a daycare center in Philadelphia. Her husband John taught religion at Temple University. They were the very picture of a golden couple.

    BONNIE RAINES: We had an eight-year-old, a six-year-old and a two-year-old. We were family folks who also wanted to keep another track active in our lives, which was political activism.

    NARRATOR: That activism attracted the attention of the FBI. Its director, the powerful and feared J. Edgar Hoover, perceived the antiwar movement, which ranged from radical revolutionaries to peaceful protesters, as a threat to national security.

    BONNIE RAINES: At one rally, I had one of my children on my back, and not only did they take my picture, but they took her picture.

    NARRATOR: Protesters like the Raines became increasingly convinced the FBI was conducting a covert campaign against them, tapping their phones and infiltrating antiwar groups.

    JOHN RAINES: We knew the FBI was systematically trying to squash dissent. And dissent is the lifeblood of democracy.

    NARRATOR: Determined to get proof, the FBI was crossing the line, fellow activist and Haverford physics professor William Davidon hatched a plan. He reached out to the Raines and six others, including a social worker, a graduate student and a taxi driver named Keith Forsyth.

    KEITH FORSYTH: We agreed to meet someplace where we could talk. And he says, “What would you think about the idea of breaking into an FBI office?” And I look at him, and I’m like, “You’re serious, aren’t you?” I was pretty vehement in my opposition to the war, and I felt like marching up and down the street with a sign was not cutting it anymore. And it was like, OK, time to—time to kick it up a notch.

    NARRATOR: The crew decided to break into a small FBI field office in Media, Pennsylvania.

    KEITH FORSYTH: Once I got over the shock of thinking that this was the nuttiest thing I’d ever heard in my life, I’m like, this is a great idea, because we’re not going to make any allegations; we’re going to take their own paperwork, signed by their own people, including J. Edgar Hoover, and give it to the newspapers. So, let’s see you argue with that.

    NARRATOR: In the Raines’ third-floor attic, the team divvied up responsibilities and assigned tasks. They hung maps to learn about the neighborhood, planned escape routes, and they took extensive notes on the comings and goings in the building.

    KEITH FORSYTH: I signed up for a correspondence course in locksmithing. That was my job, to get us in the door. Practiced several times a week. After a month, you get pretty good.

    NARRATOR: Bonnie was assigned the job of going inside and casing the office.

    BONNIE RAINES: I was to call the office and make an appointment as a Swarthmore student doing research on opportunities for women in the FBI. So they gave me an appointment. I tried to disguise myself as best I could, and I went to say goodbye, and I acted confused about where the door was, and that gave me a chance then to check out both rooms and know where the file cabinets were.

    NARRATOR: Bonnie discovered there was no alarm system and no security guards. She also found a second door leading inside.

    JOHN RAINES: When she came back with that news, we became convinced, yes, I think we can get this done. We had more to lose than anybody else in the group, because we had these kids.

    BONNIE RAINES: We faced the reality of, if we were arrested and on trial, we would be in prison for very many years. He had to make some plans for that.

    NARRATOR: With a solid understanding of how they would conduct the break-in, they now needed to figure out when.

    JOHN RAINES: March 8th, 1971, Frazier and Ali were fighting for the championship of the world. And we had the feeling that maybe the cops might be a little bit distracted.

    NARRATOR: While the crew waited at a nearby hotel, Forsyth arrived at the office alone.

    KEITH FORSYTH: Pull up, walk up to the door, and one of the locks is a cylinder tumbler lock, not a pin tumbler lock. And I just about had a heart attack. Bottom line is, I could not pick that lock.

    NARRATOR: They almost called it off. But that second door that Bonnie noticed gave them another chance.

    KEITH FORSYTH: At that point, you know that you’re going to have to wing it. Knelt down on the floor, picked the lock in like 20 seconds. There was a deadbolt on the other side. I had a pry bar with me, a short crowbar. I put the bar in there and yanked that sucker. At one point, I heard a noise inside the office. And I’m like, “Are they in there waiting for me?” Basically said to myself, “There’s only one way to find out: I’m going in.”

    NARRATOR: Next, the inside crew walked into an empty office wearing business suits and carrying several suitcases. They cleaned out file cabinets and then made their way downstairs to the getaway car and drove off unnoticed. The group reconvened at a farmhouse an hour’s drive away and started unpacking.

    KEITH FORSYTH: We were like, “Oh, man, I can’t believe this worked.” We knew there was going to be some gold in there somewhere.

    JOHN RAINES: Each of the eight of us were sorting files, and all of a sudden you’d hear one of them, “Oh, look! Look at this one! Look!”

    NARRATOR: After several long nights digging for documents that looked the most revealing, the burglars sent copies to journalists, including Washington Post reporter Betty Medsger.

    BETTY MEDSGER: And the cover letter was from the Citizens’ Commission to Investigate the FBI, and the first file that I read was about a group of FBI agents who were told to enhance the paranoia in the antiwar movement and to create an atmosphere that there’s an FBI agent behind every mailbox.

    NARRATOR: Attorney General John Mitchell asked the Post not to write about the stolen documents, saying it could endanger lives.

    BETTY MEDSGER: The attorney general called two key editors and tried to convince them not to publish.

    NARRATOR: But the Post did publish the story, on the front page. It was the first of several reports and told how agents turned local police, letter carriers and switchboard operators into informants.

    BETTY MEDSGER: There were very strong editorials calling for an investigation of the FBI.

    NARRATOR: Another stolen document would prove even more explosive: a routing slip marked with a mysterious word, “COINTELPRO.” While reporters tried to uncover its meaning, the FBI was desperate to find the burglars. The bureau put nearly 200 agents on the investigation. Hoover’s best lead was the college girl who had visited their office.

    BONNIE RAINES: His command was “Find me that woman!”

    NARRATOR: Agents actively searched for Bonnie, but there were many antiwar activists who fit her description.

    JOHN RAINES: We could hide within, you know, thousands of people. There were so many of us who were active.

    NARRATOR: Two years later, NBC reporter Carl Stern figured out the meaning of that word, COINTELPRO.

    JOHN CHANCELLOR: Secret FBI memos made public today show that the late J. Edgar Hoover ordered a nationwide campaign to disrupt the activities of the New Left without telling any of his superiors about it.

    CARL STERN: Many of the techniques were clearly illegal. Burglaries, forged blackmail letters and threats of violence were used.

    NARRATOR: The FBI initially defended its actions.

    CLARENCE KELLEY: The government would have been derelict in its duty, had it not taken measures to protect the fabric of our society.

    NARRATOR: But the bureau’s techniques were worse and the targets more far-reaching than the burglars ever imagined.

    DAVID BRINKLEY: Diplomats, government employees, sports figures, socially prominent persons, senators and congressmen.

    WALTER CRONKITE: The FBI at one time sought to blackmail the late Martin Luther King into committing suicide.

    UNIDENTIFIED: Marriages were destroyed. Violence was encouraged. Many Americans were tapped and bugged, had their mail opened by the CIA and the FBI, and their tax returns used illegally.

    AMY GOODMAN: An extended excerpt from Stealing J. Edgar Hoover’s Secrets, a short film produced by Retro Report for The New York Times. To watch the full video, visit RetroReport.org.

    When we come back, three of the activists join us in studio—Keith Forsyth, Bonnie and John Raines—as well as the former Washington Post reporter Betty Medsger, who first broke the story of the stolen FBI documents in 1971. This week, she revealed the identities of the burglars in her new book, The Burglary: The Discovery of J. Edgar Hoover’s Secret FBI. We’ll go back in time and talk about today, as well. This is Democracy Now! Back in a moment.

    [break]

    NERMEEN SHAIKH: Joining us now in our studio are three of the activists who broke into the FBI office in Media, Pennsylvania, on March 8th, 1971. The break-in led to revelations about the FBI’s secret COINTELPRO program that targeted activists across the country.

    None of the burglars were ever caught. On Tuesday, their identities were revealed for the very first time. Keith Forsyth, Bonnie Raines and John Raines all lived in Philadelphia in 1971. Forsyth was working as a cab driver. He was chosen to pick the lock at the FBI office. Bonnie and John Raines hosted many of the planning meetings for the burglary at their home, where they were raising three children. Bonnie, who worked as a daycare director, helped case the FBI office by posing as a college student interested in becoming an FBI agent. John Raines was a veteran of the Freedom Rides movement and a professor at Temple University. He used a Xerox machine at the school to photocopy many of the stolen documents.

    AMY GOODMAN: We’re also joined by Betty Medsger, author of the new book, The Burglary: The Discovery of J. Edgar Hoover’s Secret FBI. Medsger first reported on the stolen documents while working at The Washington Post. She uncovered the identities of most of the burglars in her new book.

    And we welcome you all to Democracy Now! Keith, I want to begin with you. Talk about the time and how you ended up going into the FBI office. What spurred you on?

    KEITH FORSYTH: So, at that time, we had just, within a few years, gone through the sort of peak of the civil rights movement, and many of the laws, like the Voting Rights Act, had been passed some years before, but the reality of racial justice was still far from complete. There were—the war in Vietnam was raging at that point in time. And so, there were many, many people who were working for change in those areas, in particular.

    My main focus at that time was the antiwar movement. I was, you know, spending as much time as I could with organizing against the war, but I had become very frustrated with legal protest—didn’t seem to be getting us anywhere. The government wasn’t listening. The war was escalating and not de-escalating. And I think what really pushed me over the edge was, shortly after the invasion of Cambodia, there were four students killed at Kent State and two more killed at—at Jackson State. And—I’m sorry, I’d think I’d have this down after all these years. And that really pushed me over the edge, that it was time to do more than just—than just protest and just march with a sign. And I joined the so-called Catholic Left, which is where I met John and Bonnie and also Bill Davidon. And from there, the next step was the Media action.

    NERMEEN SHAIKH: Keith, could you also talk about how you were invited to join this plan to break into—by William Davidon?

    KEITH FORSYTH: If memory serves, he called me on the phone and asked—

    AMY GOODMAN: And explain who William Davidon was.

    KEITH FORSYTH: Oh, I’m sorry. Bill Davidon, at that time, was a professor of physics at Haverford College, and I knew him mainly as a fellow activist in the peace movement. He was very prominent in Philadelphia in both the legal and the illegal peace movements. And he called me on the phone one day and asked me if I wanted to come to a party, which was code for an action. And I believe I said, “Sure, I’m always up for a party.” You can check the FBI transcript, because they were tapping his phone at the time. And so, we met at an outdoor location, where we couldn’t be bugged, and he presented the idea to me then.

    AMY GOODMAN: And, Bonnie Raines, talk about your involvement. What motivated you? You were a young mother of three.

    BONNIE RAINES: Mm-hmm.

    AMY GOODMAN: How old were your children?

    BONNIE RAINES: They were eight, six and two at that time. We’ve since had a fourth child. I became involved, as Keith said, beginning with the civil rights movement and when we lived in New York and were students. Then we moved to Philadelphia, very much opposed to the war in Vietnam, and found a whole community of activists in Philadelphia. We became acquainted with the—what was called the Catholic Left at that time. And the Berrigan brothers, Bill and Dan, were the leaders in that. And we participated with that group, called the East Coast Conspiracy to Save Lives, in a draft board raid. We went into a draft board in the middle of the night as part of the draft resistance movement.

    AMY GOODMAN: Where was that?

    BONNIE RAINES: In North Philadelphia, a draft board in North Philadelphia. We targeted that draft board because it was in one of the poorest sections of the city, where they were bringing many, many, many young, poor young men into the armed forces to be sent as cannon fodder to Vietnam. Our government was lying to us about the casualties, both civilian and military casualties. So I participated, along with John, in going into a draft board and removing files and destroying those files so those young men could not be drafted.

    AMY GOODMAN: And you mentioned the Berrigan brothers, the priests.

    BONNIE RAINES: Yes, yes.

    AMY GOODMAN: Phil, the late Phil Berrigan—

    BONNIE RAINES: Mm-hmm.

    AMY GOODMAN: —and Father Dan Berrigan—

    BONNIE RAINES: Yes.

    AMY GOODMAN: —who’s still alive. Catonsville, how significant in 1969 was this for you? I wanted to go to a clip right now—

    BONNIE RAINES: Mm-hmm.

    AMY GOODMAN: —of the Catonsville action. That was Catonsville, Maryland, where a group of activists, led by Fathers Dan and Phil Berrigan, burned draft cards with napalm. They stole hundreds of draft records and torched them. They were sentenced to three years in prison, their action helping ignite a wave of direct actions against the draft in the Vietnam War.

    FATHER DANIEL BERRIGAN: We do not believe that nonviolence is dead, and that we don’t believe in interposing one form of violence for another, and that we believe that an action like this will still speak to our fellow Americans and bring home to them that a decent society is still possible, but it’s totally impossible if these files, and what they represent, are preserved and honored, and even defended, as those poor women tried to.

    AMY GOODMAN: That was Father Dan Berrigan, as they stood around in a circle and burned, with napalm—napalm being used in Vietnam—draft records.

    BONNIE RAINES: Yes, mm-hmm. That was a very dramatic moment for all of us, I believe. It took civil disobedience to another level and really brought us, clearly, to another level of protest against the war in Vietnam. And we followed their lead in targeting the draft as one of the real evil systems of that war. And that’s how we became involved in covert actions with draft boards in Philadelphia.

    NERMEEN SHAIKH: And, John Raines, can you talk about your sense that the antiwar movement itself had been infiltrated by FBI informants?

    JOHN RAINES: Oh, sure. I mean, that was obvious, for any of us who were involved in the civil rights movement, because it happened in the civil rights movement. J. Edgar Hoover’s FBI was all over the civil rights movement with infiltrators and surveillance, intense surveillance, and people that would report back on meetings and so on. And, of course, we’d all know that J. Edgar Hoover and his FBI went after Martin Luther King, tried to discredit him—indeed, even sent him a note suggesting that because of his activities with other women besides his wife, he now had no option but to commit suicide. That note was sent to Dr. King, suggesting—and it was from the FBI, suggesting that Dr. King commit suicide. So that we knew, from the civil rights actions, that J. Edgar Hoover and his FBI were very much against anything that promised significant social change. We brought that information, that knowledge, north with us when we came to the antiwar movement. And it became clear that the tactics he used to disrupt and destroy—try to destroy the protest movement in the South, he was using once again against the protesters against the war in Vietnam.

    The problem was, J. Edgar Hoover was untouchable. He was a national icon. I mean, he had presidents who were afraid of him. The people that we elected to oversee J. Edgar Hoover’s FBI were either enamored of him or terrified of him. Nobody was holding him accountable. And that meant that somebody had to get objective evidence of what his FBI was doing. And that led us to the idea that Bill Davidon suggested to us: Let’s break into an FBI office, get their files and get what they’re doing in their own handwriting.

    AMY GOODMAN: You and Bill Davidon were professors.

    JOHN RAINES: Yes.

    AMY GOODMAN: He a professor at Haverford, you a professor at Temple University.

    JOHN RAINES: Yes.

    AMY GOODMAN: What did you feel about the risk that you were taking? Were you concerned about getting caught?

    JOHN RAINES: Well, Bonnie and I were parents, and we had three kids under 10, and that was a very serious consideration. We had to be persuaded that we could get away with this. And we had learned nice burglar skills from priests and nuns. And we had cased the FBI office in Media very carefully.

    AMY GOODMAN: You had thought about Philadelphia, but thought it was too secure?

    JOHN RAINES: Oh, yes, it was a big building downtown, as—you couldn’t touch that. But Media, you could. And we felt quite confident that if we could get in there and get out without leaving any physical evidence behind, that we could then disappear into the very, very large antiwar movement, thousands of people in the Philadelphia area.

    AMY GOODMAN: You had prepared, in case you were caught, to have your children taken care of?

    BONNIE RAINES: We had. We had. We knew the risks. We knew the jeopardy. We weren’t going to be reckless. We weren’t going to move ahead with our involvement except with the leadership of Bill Davidon, who we all had so much admiration and respect for. But we did feel that it was necessary to speak to John’s older brother and his wife and to my mother and father about caring for our children if—should the worst happen and we would be convicted and sent to federal prison.

    AMY GOODMAN: Keith Forsyth, you chose the night of the Muhammad Ali-Joe Frazier fight—

    KEITH FORSYTH: Mm-hmm.

    AMY GOODMAN: —to break in. Why? Why was this so significant, March 8th, 1971?

    KEITH FORSYTH: Well, it was just—you know, there were many steps that we took to try to avoid getting caught, and this was one of them, because whoever suggested it—and I have no idea who it was—thought that it would add to the distraction, not only of the police, but of just people in general. The building in which the office was located had a live-in supervisor, and his apartment was directly below the FBI office. So, he was going to be on the next floor down while we were inside walking around opening cabinets. So, anything that could keep his mind off of the ambient sounds sounded like a good idea.

    NERMEEN SHAIKH: How did you know that you would find what documents you would find, or did you know?

    KEITH FORSYTH: We didn’t know. We were—we were pretty sure. You know, bureaucracies are the same everywhere. They love to keep records. But we really—we were taking a shot. So, in that sense, we got lucky that they did keep records.

    AMY GOODMAN: This brings Betty Medsger into the story, whose book this week, The Burglary, reveals the identities of the activists involved in this burglary. Looks like J. Edgar Hoover found his match in this group of people. Talk about receiving in the mail the documents. You were a reporter at the time for The Washington Post.

    BETTY MEDSGER: OK. I’d just like to say something about Bill Davidon, if I might, first, that the idea was Bill’s. And Bill participated in preparations for the book and the documentary that’s been made, 1971. And we should note that we’re all very sorry that Bill’s not with us. Bill died in November. But he was sort of a genius in coming up with this idea, because although many people in the various movements at that time thought that there was—there were FBI informers in their organizations, there was no evidence of that, and the public didn’t know. And Bill had this deep commitment that if the public could be presented with evidence, they would be very upset. Even though there—Hoover was an iconic figure, that if they knew that there was massive surveillance of the—political surveillance, that they would care and do something. And that’s what happened.

    I was a reporter. And one day this envelope appeared in my mailbox. And it said it was from Liberty Publications—that was the return address—Media, Pennsylvania. That didn’t mean anything to me. But when I opened it, there was a cover letter, said it was from Citizens’ Commission to Investigate the FBI. That was a new organization to me. And there was—the letter explained that a group of eight people had burglarized an FBI office on the night of March 8th, and that enclosed were some of the files that they had removed from the office.

    And some of those files were very shocking. I think the one—and you showed the excerpt from this on the Retro Report—the first shock—and this also resonated very much with the public when it was published and discussed—was the one that instructed agents to enhance the paranoia and then also make people think that there’s an FBI agent behind every mailbox. And that was a pretty stunning statement and said so much. And the burglars were—themselves, were shocked, I understand, when they found that the first—saw that document the first night after the burglary. So that stunned me.

    And I guess the other files—there were many about individuals, and they were all serious, but the—one of the things that I remember most from those files was the truly blanket surveillance of African-American people that was described. It was in Philadelphia, but it also prescribed national programs. And it was quite stunning. First, it described the surveillance. It took place in every place where people would gather—churches, classrooms, stores down the street, just everything. But it also specifically prescribed that every FBI agent was supposed to have an informer, just for the purpose of coming back every two weeks and talking to them about what they had observed about black Americans. And in Washington, D.C., at the time, that was six informers for every FBI agent informing on black Americans. The surveillance was so enormous that it led various people, rather sedate people in editorial offices and in Congress, to compare it to the Stasi, the dreaded secret police of East Germany.

    NERMEEN SHAIKH: Could you talk about how the editors at The Washington Post responded when you showed them these documents?

    BETTY MEDSGER: The editors responded very positively to them. I should point out that—two things. First, this was the first time that a journalist had ever received secret government documents from a source who had—from the outside, an outside source who had stolen the documents. So that tended to pose a different kind of consideration as to what you would do—in their minds, as to what you’d do with the documents. But it was a particularly tough decision for Katharine Graham, who until this time had never faced anything like this.

    AMY GOODMAN: The publisher.

    BETTY MEDSGER: The publisher, Katharine Graham, the publisher of The Washington Post, because it was the first time that she had been faced with a demand from the Nixon administration that she suppress a story. And she did not want to publish. And the in-house counsel, the lawyers, also did not want to publish. But two editors, from the beginning, realized it was a very important story and pushed it—Ben Bradlee and Ben Bagdikian. I was just back there innocently writing my story, talking—I had been a reporter in Philadelphia and was talking to sources from the past, confirming information. Didn’t know until 6:00 that there was a question as to whether or not they would publish. By 10:00 that night, she decided to publish.

    AMY GOODMAN: And talk about the reaction, and the reporters who did not get to publish the story, because you weren’t the only person that these activists sent the documents to.

    BETTY MEDSGER: They sent them to five people. These are the first files that they released. They sent them to Senator George McGovern and Representative Parren Mitchell from Baltimore. And they immediately returned the files to the FBI when they received them and didn’t make them public. They sent them to three journalists. In addition to sending them to me, they sent them to Jack Nelson at the Washington Bureau of the Los Angeles Times —

    AMY GOODMAN: The great crusading reporter who wrote Terror in the Night about the Klan in the South.

    BETTY MEDSGER: Right, and Tom Wicker, columnist then at The New York Times. Now, it’s also important to keep in mind, in addition to the fact that we didn’t really know—the public didn’t know what was happening inside the FBI, that very few journalists ever wrote investigative work or critical comment about the FBI. And Jack Nelson and Tom Wicker were two of about three or four who had, up until that point. At the L.A. Times, Jack never received the envelope, even though it was addressed to him, and it was delivered to the FBI immediately. I didn’t know this until years later, when I read the investigative report on the FBI’s investigation. It’s a little less clear what happened at the Times as to whether Tom Wicker received, and what they did do was the same thing: They immediately gave the files to the FBI. And—but they apparently kept them and copied them, unlike the L.A. Times, because the day after we broke the story, then they wrote stories on the same files.

    AMY GOODMAN: Keith, before we go to break, can you talk about parallels to today? It is hard to look at—and for a moment, I want to turn to the Church Committee hearings that took place a few years later. Senator Frank Church of Idaho led this investigation. The Senate’s Church Committee investigated the CIA and FBI’s misuse of power at home and abroad. The multi-year investigation in the mid-’70s followed the exposure of COINTELPRO, which stands for Counterintelligence Program—and it was the first time people had seen that word, was in the documents you released—examining the FBI and CIA’s efforts to infiltrate and disrupt leftist organizations, the CIA’s attempts to assassinate foreign leaders, and much more. This is Senator Frank Church speaking during one of the committee’s hearings.

    SEN. FRANK CHURCH: We have seen today the dark side of those activities, where many Americans, who were not even suspected of crime, were not only spied upon, but they were harassed, they were discredited, and, at times, endangered.

    AMY GOODMAN: That was Senator Frank Church. The Church Committee hearings led to major changes in what the FBI could do, and also dealing with the press, as well. You listen to Frank Church, you could be hearing possible hearings today, though they haven’t started, to do with Edward Snowden.

    KEITH FORSYTH: Right.

    AMY GOODMAN: What are your thoughts on Edward Snowden today?

    KEITH FORSYTH: I think there are some parallels. It’s not an exact parallel. But, to me, one of the most significant ones is that not long before Edward Snowden released these documents, James Clapper went in front of Congress and the American public and was asked a direct question whether the NSA was engaged in this kind of surveillance, and he said no, which was obviously a lie. And I think if he had said, “Oh, we can’t talk about that because that’s national security,” I might have had some respect for that answer. But to come out and lie to the public about it—and, of course, not suffer any punishment as a result—so, to me, Edward Snowden—I’ve seen no evidence, personally, that Edward Snowden has released anything that was actually harmful to our national security. You know, certainly has been embarrassing, but, to me, the young man is definitely a whistleblower and has performed a great service by enabling us to have the conversation. You know, we couldn’t—we couldn’t have the conversation about whether this is right or wrong before, because we were not told about it. So he’s made that conversation possible, and I think—I think we owe him something, a debt for that.

    AMY GOODMAN: We’re going to break and come back to this conversation. Our guests are Keith Forsyth and Bonnie and John Raines. They were part of the—what they called themselves, the Citizens’ Commission to Investigate the FBI, activists during the Vietnam War era who broke into an FBI office in Media, Pennsylvania, and took the documents they got and sent them to The Washington Post and other publications to let people know what the FBI was doing. We’re also joined by the woman who has revealed the names of these activists—and we’ll talk about why they decided to come forward—Betty Medsger, former Washington Post reporter, author of The Burglary: The Discovery of J. Edgar Hoover’s Secret FBI. Stay with us.

    [break]

    AMY GOODMAN: This is Democracy Now!, democracynow.org, The War and Peace Report. I’m Amy Goodman, with Nermeen Shaikh, as we continue our discussion looking at how activists broke into an FBI office in Media, Pennsylvania, in 1971 and disclosed secrets about the FBI’s COINTELPRO program—that’s Counterintelligence Program—first came to public attention with the release of these documents. We are joined, as well as Bonnie and John Raines, who were among those who broke into the FBI office that day, March 8th, 1971, by the reporter who broke the story then and now, released the names of those involved with this break-in, Betty Medsger. She wrote The Burglary: The Discovery of J. Edgar Hoover’s Secret FBI. We’re also joined by David Kairys, who has represented this group until this day for what, more than 40 years?

    DAVID KAIRYS: Forty-three years.

    AMY GOODMAN: Forty-three years. But, John Raines, why have you decided to come forward 43 years—what, 42 years later?

    JOHN RAINES: Well, the simple answer is: A book came out. And, of course, that’s not accidental. We decided years ago that we would trust Betty with this story. And she’s done a wonderful job, spending years of research writing a very substantial book. It tells a very interesting story.

    We decided that it was time to, once again, come forward with the question of government surveillance, government intimidation, and the right of citizens to vocally dissent. I think that the gasoline of democracy is the right to dissent, because wherever there’s power, wherever there’s privilege, power and privilege are going to try to remove, insofar as they can, from public discourse anything they want to do. That leaves the citizens’ right to dissent as the last line of defense for freedom. Now, that’s what we were faced with back in 1970s. I think that’s what we’re faced with once again today. It should not surprise us. I mean, it should not surprise us that those in power in Washington want to make the decisions that really count off stage, out of sight from the rest of us. But democracy depends upon the rights of citizens to have the information they need in order for them, the citizens—who are the sovereigns—for them to decide what the government should be doing and should not be doing. They must have that information so that they can make up their minds.

    AMY GOODMAN: Explain that moment that night when Betty Medsger came over and you revealed who you were. What year was it?

    JOHN RAINES: I think that was in 1988. We had known Betty when she was a reporter there in Philadelphia.

    AMY GOODMAN: That was more than 20 years ago.

    JOHN RAINES: Oh, more than 20 was ago. And Betty was then living in San Francisco, but she was on a trip to the East Coast. And we invited her for supper, and Betty was nice enough to say, “Sure, I’ll come.” And I think it was—we had had supper, and finally, our youngest daughter, Mary, came down. She was, I think, 12 or 13, something like that. And without thinking about it, I just said, “Mary, come on in. We want you to meet Betty Medsger, because she was the one that we sent those FBI files to.” And Betty’s chin dropped down to her chest, and it was out of the bag. That’s how it started.

    NERMEEN SHAIKH: David Kairys, as the attorney who has worked on this case for so long, could you talk about the significance of the statute of limitations on the case, as well as what you saw as the illegality—what was indeed the illegality of what these documents exposed about what the FBI was doing?

    DAVID KAIRYS: Well, sure. The statute of limitations, by any fair reading, is five years. The FBI themselves closed the file in 1976, because five years had elapsed and there was no charges. Excuse me. There are arguments one can make, but there’s really no legitimate or good-faith basis to bring any legal—any legal charges at this point.

    As for the illegality of the FBI, they’re supposed to enforce the law. Here they are interposing themselves as almost a political counterforce to stop certain movements. And it had a direction to it: They were stopping left-liberal movements. And they were using techniques that we usually associate with state police in countries and systems that we usually think of as alien.

    NERMEEN SHAIKH: And how did you come to become involved in the case?

    DAVID KAIRYS: Well, I was regularly doing civil rights work, and I was—I would represent demonstrators of all kinds. And so, two of them checked with me before, what’s my home number. And they—Keith kids me that he’s still got my phone number from back then on his arm. And so, that was the beginning. I didn’t know then exactly what they were going to do, but then two of them got arrested in the Camden 28 case, where I was lead counsel.

    AMY GOODMAN: And, in fact, remarkably, five days before this break-in, Bill Davidon met with Henry Kissinger at the White House, the national security adviser for Richard Nixon.

    DAVID KAIRYS: Yeah.

    AMY GOODMAN: We don’t have time for the story, but we’re going to talk about it in our post-show interview, and we’ll post it online at democracynow.org. How was this secret kept for so many decades? It’s not just the two of you, John and Bonnie Raines; there were nine of you. One person dropped out. There were eight of you. This is decades later. How did you keep this secret?

    BONNIE RAINES: Well, we—

    AMY GOODMAN: A hundred FBI agents looking for you. And, Bonnie, you had gone into the FBI office in Media to case it out and pretend you were a young woman looking for an FBI job and sat with the official there.

    BONNIE RAINES: Mm-hmm, and did not know, following that, that there was a sketch that was then circulated of me by the FBI. It was—we knew—

    AMY GOODMAN: We have 30 seconds.

    BONNIE RAINES: We knew that we had to pull the curtain down, not meet after we did our work, and just not talk about it with anybody at all, because our work was done at that point, and we were not looking for anything more than for the general public and Congress to follow suit in a way that we hoped they would.

    AMY GOODMAN: Do you feel it accomplished what you wanted?

    BONNIE RAINES: I think, in certain ways. In certain ways, it did. We were encouraged when there was a Church Committee that was—that was taking their task seriously, and there were reforms that did take place.

    AMY GOODMAN: I want to thank you so much for all being with us, and also thank Johanna Hamilton. Her film, 1971, on the same subject, is just coming out. We’ll be interviewing her. The book is The Burglary. Thanks so much, all, for joining us.

    Find this story at 8 January 2014

    The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.

    Exclusive: U.S. Fingers Iranian Commandos for Kidnapping Raid Inside Iraq (2013)

    U.S. intelligence officials believe that Iranian commandos took part in a deadly attack on a compound of dissidents inside Iraq and then spirited seven members of the group back to Iran, highlighting Tehran’s increasingly free hand inside Iraq in the wake of the U.S withdrawal from the country.

    The Sept. 1 attack on a base called Camp Ashraf killed at least 50 members of the Mujahedeen-e Khalq, or MEK, which had disarmed at the request of the U.S. military after the American invasion of Iraq and received explicit promises of protection from senior commanders. Instead, gory videos released by the group showed that many of its members had been shot with their hands tied behind their backs or in one of the camp’s makeshift hospitals. MEK leaders, backed by an array of U.S. lawmakers, said Iraqi security forces carried out the attack.

    Baghdad has long denied the charge, and U.S. officials have now concluded that a small number of Iranian paramilitaries from its feared Islamic Revolution Guards Corps helped plan and direct the assault on the camp. Three officials, speaking to Foreign Policy for the first time, said gunmen from two of Tehran’s Iraqi-based proxies, Kitab Hezbollah and Asaib Ahl al-Haq, then carried out the actual attack. The Iranian involvement in the Ashraf massacre hasn’t been reported before.

    “Iraqi soldiers didn’t get in the way of what was happening at Ashraf, but they didn’t do the shooting,” a U.S. official briefed on the intelligence community’s assessment of the attack said in an interview. The official spoke on the condition of anonymity to discuss classified information.

    U.S. officials say that Iran’s role in the attack didn’t end with the killings of the MEK members at Ashraf. Instead, officials believe that Iranian commandos and fighters from the country’s Iraqi proxies also abducted seven MEK members and smuggled them back to Iran. The missing MEK supporters haven’t been seen or heard from since the attack.

    Direct Iranian involvement in the Ashraf assault is one of the clearest signs yet of Tehran’s growing power within Iraq, a dynamic of deep concern to American policymakers. Iraqi Prime Minister Nouri al-Maliki’s Shiite government has long maintained close ties with top Iranian leaders, and U.S. officials believe that Tehran prodded Maliki to refuse to sign a bilateral security pact in the fall of 2010 that would have kept some U.S. troops in the country. Perhaps under Iran’s influence, Maliki has alienated Iraq’s sizable Sunni and Kurdish minorities by centralizing power in Baghdad and refusing to share power or fairly divvy up the country’s oil revenues.

    The timing of the attack also raises questions about whether Iran’s security services are as committed to finding a rapprochement with Washington as its civilian government appears to be. The assault took place in September, several months after negotiators from the two governments had begun secret nuclear talks in Oman that ultimately led to last month’s landmark nuclear pact between the Obama administration and the government of Iranian President Hasan Rouhani. The deadly attack on a U.S.-allied group inside Iraq suggests that at least some elements within Tehran are willing to take steps that risk upsetting that fragile equilibrium.

    MEK leaders in Washington strongly disagree with the U.S. conclusions about the Ashraf attack. They point out that the facility is guarded by fences, checkpoints and more than 1,200 Iraqi troops, making it extremely difficult for gunmen to reach the camp without, at a minimum, the active cooperation of Iraqi forces. They also note that survivors said the masked gunmen spoke Arabic and argue that the group’s own operatives within Iran would know if the seven missing members had been brought into the country. They believe that Tehran ordered the attack, but say that it was carried out by Iraqi soldiers loyal to Maliki.

    “The repeated statements by U.S. officials that Iraq has had no role in the September 1 massacre at Ashraf are only designed to exonerate the Iraqi prime minister and his senior officials from any responsibility in this manifest case of crime against humanity and to help him elude justice,” Shahin Gobadi, a spokesman for the National Council of Iran Resistance, said in a written statement.

    U.S. officials, for their part, say that the Iranian commandos could have used Arabic to mask their identities or stayed just outside the camp while the Iraqi gunmen carried out the assault. They also say at the missing MEK members might have been executed shortly after being brought into Iran or imprisoned in secret facilities for interrogation.

    The Obama administration has largely declined to publicly address Iranian involvement in the Ashraf attack. During a contentious hearing of the House Committee on Foreign Affairs earlier this month, Secretary of State John Kerry said he couldn’t respond to a question about the missing MEK members in an open, unclassified session.

    Still, other senior officials have provided hints about their whereabouts. At a sparsely-attended congressional hearing in mid-November, Brett McGurk, the deputy assistant secretary of state for Iraq and Iran, told lawmakers that the seven MEK members “are not in Iraq.”

    McGurk told the lawmakers that the remaining 2,900 MEK members in Iraq wouldn’t be safe until they could be brought out of the country and resettled elsewhere.

    “The Iraqi government needs to do everything possible to keep those people safe, but they will never be safe until they’re out of Iraq,” McGurk said at the time. “And we all need to work together — the MEK, us, the committee, everybody, the international community — to find a place for them to go.”

    Tehran’s antipathy towards the MEK isn’t surprising. The group has spent years publicly decrying the Iranian government and telling lawmakers that it has broad support within Iran and could help turn the country into a democracy. It has also revealed key details about the country’s nuclear program. In response, Iranian-backed forces inside Iraq have frequently targeted the group. In February, six of its members were killed and dozens were wounded when mortar shells landed at an MEK refugee camp on the grounds of a former U.S. base called Camp Liberty. A Hezbollah affiliate claimed responsibility.

    Outgunned in Iraq, the MEK has tried to score points in the Washington influence game. It has enlisted former members of the military and both the Bush and Obama administrations as public advocates and unofficial lobbyists. The State Department designated it as a “foreign terrorist organization” in 1997, but removed the listing in September 2012 after strong pressure from MEK supporters like retired Marine Gen. Jim Jones, Obama’s first national security advisor, and former Attorney General Mike Mukasey. Most of the MEK’s most prominent backers are paid for making public appearances on the group’s behalf, but they also do pro bono work for the organization and say they genuinely believe in its cause.

    The group also enjoys strong support on Capitol Hill. In the weeks after the Ashraf assault, New Jersey Democrat Bob Menendez, the chairman of the Senate Foreign Relations Committee and a staunch MEK supporter, told Wendy Sherman, the No. 3 official at the State Department, that he would suspend U.S. weapons sales to Iraq until Maliki’s government did more to protect the MEK members still in the country.

    The Obama administration, for its part, says the MEK’s members will only be safe once they’ve left Iraq. It’s not clear, however, if or when other countries will step forward and announce a willingness to accept them.

    BY Yochi Dreazen DECEMBER 17, 2013 – 06:11 PM

    Find this story at 17 December 2013

    Copyright foreignpolicy.com

    US-Protected Iran Exile Group in Line for Huge Cash Windfall (2009)

    The MEK can use some of that cash to pay legal settlements with former members that
    they tortured, as well as the families of Iranians they killed when they fought on the side of
    Saddam against Iran.

    The controversial Iranian exile organization MEK, which the United States calls a terrorist
    group, could soon see a windfall of tens of millions of dollars as the result of the European
    Union’s decision Monday to take it off its list of terrorist organizations.
    If so, it will mark dramatic turnaround the group’s fortunes.

    The MEK, shorthand for the Mujahedin-e Khalq, and also known as the People’s
    Mujahideen Organisation of Iran, looked like it was on the ropes only days ago, when Iraqi
    Prime Minister Nouri al-Maliki said he wanted its U.S.-protected military base near the
    Iranian border closed within two months.

    But the E.U.’s Jan. 26 decision not only unlocks untold millions of dollars frozen in
    European banks, it allows the militant anti-Iran organization to go public with appeals for
    millions more, perhaps catapulting it into a leading role in the Iranian opposition abroad.
    The MEK could claim $9 million held in France alone, along with “tens of millions of
    dollars” worth of assets locked away in other EU countries, its spokesman told Radio Free
    Europe/Radio Liberty.

    What will it do with the windfall?

    “Set off car bombs around Iran,” jibed former CIA operative Robert Baer, whose pursuit
    was dramatized by George Clooney in the 2005 movie “Syriana.”
    The group says it has renounced violence, but the MEK has carried out dozens of terrorist
    attacks and assassinations against Iranian targets both inside and outside of the country.
    Some of those were launched from its base in Saddam Hussein’s Iraq, before the 2003
    U.S. invasion.

    MEK leader Maryam Rajavi said the unfrozen millions “will be used to increase our political
    activities … including to further disclose the mullah regime’s secret nuclear weapons sites.”
    Since Hussein’s overthrow, the 3,000 MEK fighters in Camp Ashraf, as it’s called, have
    been under the “protection” of U.S. troops, even though they’re still officially labeled
    terrorists by the State Department.

    The seeming anomaly can be at least party explained by frequent reports that the MEK
    has been secretly helping the CIA run operations against the Islamic regime from its base
    in southeastern Iraq.

    Its terrorist label was earned before the 1979 Iranian Islamic revolution, when the group,
    which bills itself as Marxist-Islamist, targeted Americans working in Iran. Indeed, 30 years
    ago this month the group helped overthrow the U.S.-backed shah and take 52 American
    hostages.

    But eventually it turned against the religious regime. In 2001 its sustained opposition to
    Iran, its supposed renunciation of violence, and its portrayal of itself as a “progressive”
    political force won it admirers in the Bush administration and pro-democracy groups in
    Europe. Of no small note, it has also played a major role in exposing Iran’s nuclear
    activities.

    Walid Phares, a scholar on terrorism and American of Lebanese descent, called the
    closing of Camp Ashraf “a significant Iranian victory.”
    “Ashraf was the only base for the MEK against Iran’s regime,” he said by e-mail. “If it is
    shut down, they will lose the only base they have.”
    “More than a military base of the opposition against Tehran,” he added, “Ashraf was a
    political base for broadcast and political outreach to the opposition in the inside.”
    On the other hand, the E.U.’s decision will conceivably allow MEK fighters entry into
    Europe, at least temporarily solving the problem of what to do with them once Ashraf is
    closed.

    That, and the new money, can only add to the MEK’s political clout, which was put on
    display last year when the group drew 85,000 people to an anti-Iran protest outside Paris.
    To date, exile communities have been divided over the MEK because of its attacks on
    Iranian troops from Iraqi soil during the two nations’ 10-year war. Some call the
    organization a puritanistic “cult,” because of its iron-fist leadership by a husband and wife
    team who have been accused of violating the human rights of their own followers.
    But the E.U.’s decision could give the MEK a big boost over its rivals, Phares suggests.
    “Once they are decertified [as a terrorist group] they will act as an international NGO [nongovernmental organization] and will most likely receive even more donations from Iranian
    exiles,” said Phares, a senior fellow at the hawkish Foundation for the Defense of
    Democracies in Washington.

    “De-certification by itself will strengthen the group within the Iranian diaspora,” he
    continued. “Will they access to frozen funds in EU banks? This is another issue and will
    have to be negotiated. But certainly they will have a legal base. They will spend it to widen
    their base, and on strategic communications regarding Iran.”
    All things considered, it’s not hard to suspect a hidden American hand in the E.U. decision,
    or at least acquiescence in it, since it so neatly finesses the eviction notice served on
    Camp Ashraf by Prime Minister Maliki.

    In any event, it keeps MEK alive — and more — despite the threatened closing of its
    longtime base in Iraq.

    The Iranian regime reacted sharply to the E.U. move, accusing the union of a “double
    standard” on terrorism. It also said it was drafting a plan to put MEK members on trial,
    “either in the Islamic Republic or outside the country,” according to Press TV, an Iranian
    news service.

    By Jeff Stein | January 28, 2009

    Find this story at 28 January 2009

    Copyright Jeff Stein

    Iranian dissidents killed in Iraq camp, U.N. demands inquiry (2013)

    (Reuters) – At least 47 people were reported killed at an Iranian dissident camp in Iraq on Sunday, the United Nations said, urging Baghdad to investigate the “tragic events” at a site north of the capital.

    The violence took place hours after a mortar bomb attack on the camp which the dissent group Mujahadin-e-Khalq (MEK) blamed on the Iraqi army.

    Two Iraqi security sources said that army and special forces had opened fire on residents who had stormed a post at the entrance to Camp Ashraf, a site that Iraq’s government wants closed down. They said at least 19 were killed, 52 wounded and 38 arrested and that they believed residents were not armed.

    However, the U.N. statement had a figure closer to the toll given by MEK, which said 52 of its roughly 100 members at the camp had been killed.

    An advisor to Iraqi Prime Minister Nuri al-Maliki said reports that security forces had opened fire on the residents were baseless and said that Maliki had ordered an investigation into what had happened.

    “We want to know the truth,” advisor Ali al-Moussawi said. He said it was unclear what had caused the blast in the morning. Residents could have been killed in the explosion or through infighting at the camp, he said. He gave no casualty figures.

    In a statement, U.N. Secretary General Ban Ki-moon appealed for the urgent restoration of security in the camp.

    “The United Nations deplores the tragic events at Camp Ashraf today that have reportedly left 47 killed,” he said. Baghdad should “promptly investigate the incident and disclose the findings.”

    MEK, which the U.S. State Department removed from its list of terrorist organizations last year, said some residents were machine-gunned with their hands tied behind their backs.

    The U.S. embassy in Iraq condemned “the terrible events that took place in Camp Ashraf” and the UN said it would send in a team from its Iraq office to carry out its own probe.

    “We further call on Iraqi authorities to act with urgency to immediately ensure medical assistance to the wounded and to secure the camp against any further violence or harm to the residents,” the U.S. embassy statement said, calling for a full, independent investigation.

    MALIKI ORDERS PROBE

    MEK emailed photos of people it said had been shot in the head during the clashes. Men and women were shown lying on blood-covered floors. It was not possible for Reuters independently to verify the images.

    “The Iraqi government stresses the need for help to deport elements of the Mujahadin-e-Khalq who are on Iraqi soil illegally but at the same time confirms its commitment to the safety of souls on its territory,” Maliki’s office said in a statement referring to “events” at Camp Ashraf.

    It gave no further details.

    MEK wants Iran’s clerical leaders overthrown and fought with former Iraqi Sunni Muslim leader Saddam Hussein’s forces in the 1980s Iran-Iraq war.

    It has been seeking to recast itself as an Iranian opposition force but is no longer welcome in Iraq under the Shi’ite Muslim-led government that came to power after U.S.-led forces toppled Saddam in 2003. Iraq’s current government is close to Iranian authorities.

    Mortar bomb attacks on a newer MEK camp in a former military compound in western Baghdad, where authorities had relocated most Camp Ashraf MEK members, took place in February and June. At the time, MEK blamed Iran’s Quds force – an elite unit of the Revolutionary Guards with a special focus on foreign operations.

    MEK, also known as the People’s Mujahideen Organisation of Iran, led a guerrilla campaign against the U.S.-backed Iranian Shah during the 1970s that included attacks on U.S. targets.

    (Additional reporting by Ahmed Rasheed and a Reuters reporter in Diyala, Iraq; Writing by Sylvia Westall; Editing by Jon Boyle)

    By Kareem Raheem and Sylvia Westall
    BAGHDAD Sun Sep 1, 2013 4:47pm EDT

    Find this story at 1 September 2013

    Copyright Thomson Reuters

    EU Takes Iranian Group Off Terror List, But Status Still Disputed (2009)

    Iraq has threatened to send MKO members at Camp Ashraf back to Iran, where many fear imprisonment or death.

    At its monthly meeting of foreign ministers, the European Union has decided to remove the Mujahedin-e Khalq Organization (MKO) from its list of terrorist organizations.

    The decision marks the first time the EU has “de-listed” an organization from its terrorist index, and could free the MKO, also known as the People’s Mujahedin Organization of Iran, to expand its activities in Europe. It is also likely to further strain Tehran’s already damaged relations with the West.

    Formed in the 1960s to fight the shah’s regime, the Islamic-socialist MKO joined the 1979 Islamic revolution that overthrew him, but later fell out with the new clerical regime and fought with Saddam Hussein during Iraq’s 1980-88 war with Iran. Major attacks by the MKO against Tehran ceased by the early 1990s and the group renounced violence in 2001, but Tehran continues to seek MKO members’ extradition.

    Maryam Rajavi, the France-based leader of the National Council of Resistance of Iran (NCRI), the political branch of the MKO that has been active in Europe in recent years, characterized the EU move as a “stinging defeat for Europe’s policy of appeasement” of Tehran.

    And Said Mahmudi, a professor of international law at the University of Stockholm, says it will end the MKO’s difficulties in raising funds in Europe.

    “Even though they had the possibility to contact different political organizations, there were some groups and bodies — particularly some individuals — who, because of the terrorist branding of the group, avoided it and didn’t give it public backing,” Mahmudi says.

    “Now that the MKO has been removed from the EU terror list, all the groups that are sympathetic to the MKO will be able to support them publicly and help them without any problem,” he adds.

    Shahin Gobadi, a spokesman for the group, says that $9 million had been frozen in France alone, with “tens of millions of dollars” worth of assets also locked away in other EU countries.

    History Of Opposition

    The development marks a striking turnaround for an organization that remains on the United States’ terrorism list, while remaining a fierce enemy of Tehran.

    After its founding in 1965, members of the group took up arms against the Iranian shah and were involved in the killings of several U.S. citizens working in Iran in the 1970s. The group initially supported the 1979 revolution, but then went underground when an uprising against the newly established Islamic regime went awry.

    Iranian protesting the decision outside the French Embassy in Tehran
    Within years of the revolution, many MKO members were jailed, some were executed, and others fled Iran and went into exile.

    The MKO later helped orchestrate a number of attacks against Iran’s leaders, including a 1981 bombing in which Iran’s prime minister and president were killed. In 1986, in the midst of the Iran-Iraq War, the organization’s leaders and members relocated to Iraq, where Saddam Hussein granted them refuge.

    The MKO’s support for Iraq in the 1980-88 war is today seen by observers as the main reason for its limited support among Iranians. It is also accused by critics of collaborating with Saddam during his bloody campaign against the Kurds, charges that the MKO denies.

    But the militant group renounced violence in 2001 and has not kept arms since 2003. It has also long sought to be removed from the EU and U.S. terror lists as Tehran continued its efforts to oust the group from Iraq.

    Renouncing Violence

    Iran’s largest opposition group in exile, the MKO follows an ideology that combines Islam and Marxism and says it is the best hope for establishing democracy in Iran. In 2002, the MKO exposed Iran’s covert nuclear activities.

    But critics cast doubt on its effectiveness in opposing the Iranian regime, while organizations such as Human Rights Watch (in a 2005 report) have accused it of subjecting dissident members to torture and prolonged solitary confinement.

    Massoud Khodabandeh, a former MKO member who currently works as an analyst with the French Center for the Study of Terrorism and an adviser to Iraq’s government, describes the MKO as a personality cult obsessed with celibacy.

    “I witnessed forced divorces amid cries and shouts. I witnessed how 150 children under the age of 7 — the youngest was only two months old — were separated from their mothers and sent to other countries because the MKO leader had said [the children] are disrupting my relations with you,” Khodabandeh says.

    MKO leaders have in the past rejected similar charges, but the reputation that precedes the group has opened questions about whether Brussels’s move fits with its efforts to promote human rights and to fight terrorism.

    “If a group makes a pronouncement that it is abandoning violence, then I think we should be able to give them the chance to prove the case, so I think that’s what the European policy on these matters should be,” says professor John Wilkinson, chairman of the Center for the Study of Terrorism and Political Violence at the University of St. Andrews.

    “Let us find political pathways away from violence where we can,” he continues. “If a group proves that it has not lived up to its claim to abandon violence then, of course, we must revert to using the instruments of criminal justice and law enforcement to deal with it.”

    Future Of The People’s Mujahedin

    Some 3,000 MKO members are currently based at Camp Ashraf in Iraq. Their presence there has led to increased concern over their fate since the Iraqi government took over responsibility for the camp from U.S. forces earlier this month.

    Washington, while keeping the MKO on its list of terrorist organizations, has given members of the group who stay at Ashraf the status of “protected persons” under the Geneva Conventions.

    Iraqi officials have made it clear that the group “is not wanted” on Iraqi territory, and have called on MKO members to leave voluntarily. This, in turn, led supporters and rights groups to warn that they could face torture or death if they returned to Iran.

    Khodabandeh believes that the EU decision could mean a way out for those MKO members who are willing to leave Ashraf, including a number of his “friends.”

    “I hope that the removal of MKO from the EU terror list will enable some of those individuals to be saved from the situation they’re facing in Iraq,” he says. “About 1,000 of them were based in [Europe] before; they should be given the right to return to their families.”

    It’s not clear whether the EU decision will have an impact on Washington’s designation of the group as a foreign terrorist organization. The NCRI’s Rajavi, for one, urges the United States to follow the EU’s example.

    The former U.S. administration reaffirmed its designation of the MKO as a foreign terrorist organization on January 7.

    But Iran, which has said that nothing has changed “in the terrorist nature” of the group, can be expected to take some sort of action against the EU ruling.

    In a possible hint at what might come, the head of the National Security Committee of the Iranian parliament on January 25 warned the EU against making a “mistake.”

    “There is no reason for Iran to continue tens of billions of euros in economic and trade ties with the EU in this case,” Alaeddin Borujerdi said, adding that Iran has “many options” for new partners.

    The Iranian parliament is expected on January 27 to discuss a draft bill “to authorize the government and the judiciary to bring those MKO members who have committed crimes to justice.”

    By Golnaz Esfandiari

    January 26, 2009

    Find this story at 29 January 2009

    Radio Free Europe/Radio Liberty © 2014 RFE/RL, Inc.

    U.S. protects Iranian opposition group in Iraq (2007)

    BAGHDAD, Iraq (CNN) — An Iranian opposition group based in Iraq, labeled a terrorist organization by the United States, gets protection from the U.S. military despite Iraqi pressure to leave the country.

    The U.S. considers the Mujahedeen-e-Khalq, or MEK, a source of valuable intelligence on Iran.

    The group also is credited with helping expose Iran’s secret nuclear program through spying on Tehran for decades.

    Iranian officials tied the MEK to an explosion in February at a girls school in Zahedan, Iran. (Full story)

    The U.S. State Department considers the MEK a terrorist organization — meaning no American can deal with it; U.S. banks must freeze its assets; and any American giving support to its members is committing a crime.

    The U.S. military, though, regularly escorts MEK supply runs between Baghdad and its base, Camp Ashraf.

    “The trips for procurement of logistical needs also take place under the control and protection of the MPs,” said Mojgan Parsaii, vice president of MEK and leader of Camp Ashraf.

    That’s because, according to U.S. documents, coalition forces regard MEK as protected people under the Geneva Conventions.

    “The coalition remains deeply committed to the security and rights of the protected people of Ashraf,” U.S. Maj. Gen. John D. Gardner wrote in March 2006.

    The group also enjoys the protection of the International Committee of the Red Cross.

    “The ICRC has made clear that the residents of Camp Ashraf must not be deported, expelled or repatriated,” according to an ICRC letter.

    Despite repeated requests, neither Iran’s ambassador in Baghdad nor the U.S. military would comment on MEK, also known as Mojahedin Khalq Organization, or MKO.

    The State Department said Friday the Geneva Conventions protections apply only to MEK residents of Camp Ashraf, and the organization as a whole and its members elsewhere are subject to prosecution for terrorist or criminal acts.

    “We still regard them as a terrorist organization,” former U.S. Ambassador Zalmay Khalilzad said.

    When the U.S. invaded Iraq in 2003, Green Berets arrived at Camp Ashraf to find gardens and monuments, along with more than 2,000 well-maintained tanks, armored personnel carriers, artillery, anti-aircraft guns and vehicles.

    All 3,800 camp residents were questioned by Americans. No arrests were made, and the camp quickly surrendered under a cease-fire agreement — an agreement that also guaranteed its safety.

    “Everyone’s entry to the camp and his departure are controlled by the U.S. military police force,” Parsaii said.

    The MEK denies it is a terrorist group. Both Iran and the Iraqi government, however, accuse the group of ongoing terrorist attacks, and the Shiite-dominated Iraqi government wants it out.

    “We gave this organization a six-month deadline to leave Iraq, and we informed the Red Cross,” said Shirwan al-Wa’eli, Iraq’s national security minister. “And presumably, our friends the Americans will respect our decision and they will not stay on Iraqi land.”

    For now, however, the United States continues to protect MEK.

    “There are counter-pressures, too,” Khalilzad said. “There are people who say, ‘No, they should be allowed to stay here.’ And as you know, around the world there are people with different views toward them.”

    POSTED: 1553 GMT (2353 HKT), April 6, 2007

    Find this story at 6 April 2007

    © 2007 Cable News Network.

    Deadly violence hits Iran exiles’ Camp Ashraf in Iraq

    Camp Ashraf once housed more than 3,000 exiles, but most have moved to another camp (file photo)

    Violence has erupted at a camp in Iraq for dissident Iranians, who say dozens of residents have lost their lives.

    The Mujahideen-e Khalq group accused Iraqi forces of attacking Camp Ashraf north-east of Baghdad, killing at least 52 of its members – some shot in the head at close range.

    However Iraqi officials said no soldiers entered the camp.

    UN representatives have condemned the bloodshed and urged Iraq swiftly to establish the facts.

    A statement from the UN mission in Iraq also called on Iraqi officials to ensure security for residents at the camp and urged an end to the violence so medical help could reach the wounded.

    “The only thing we can confirm is there are a lot of casualties,” Eliana Nabaa, a spokeswoman for the UN mission to Iraq was quoted as saying.

    The population of Camp Ashraf, once home to more than 3,000 members of the Mujahideen-e Khalq (MEK), was believed to have dwindled to about 100 before the violence.

    In recent years, Iraqi authorities have been trying to dismantle the camp and eject the group, which has been based in Iraq since the 1980s.
    Mortars

    Accounts of the violence given by MEK spokesmen and different local officials vary.

    MEK officials said Iraqi forces attacked Camp Ashraf early on Sunday, firing mortar rounds.

    Some Iraqi reports confirmed that mortar rounds had been fired without identifying their origin, but said the deaths came during subsequent clashes. Others said the blasts heard at the camp were caused by oil and gas canisters exploding.

    Another source said there had been a raid on the camp overnight, but put the death toll at 19.

    One source said Iraqi security forces opened fire after a crowd stormed a post at the camp entrance, wounding about 50 people, Reuters reported.

    Local hospitals reported that three Iraqi soldiers were killed and four wounded in the violence, AFP said.

    MEK officials sent out photographs and a video of people said to have been shot in the head during the clashes, but the images have not been independently verified.

    A spokesman for the Iraqi prime minister confirmed there had been deaths among camp residents, but said initial investigations suggested they had resulted from infighting, AP reported.

    Prime Minister Nouri Maliki has ordered an investigation, Reuters said.

    Camp Ashraf was set up in the late 1980s to launch raids on Iran. It was welcomed by Iraq’s then president, Saddam Hussein, who was fighting a war against Iran.

    Most members of the MEK – also known as the People’s Mujahedin Organisation of Iran (PMOI) – were moved to a new camp last year.

    Iran considers the MEK a terrorist group

    The group was removed from the US State Department’s list of terrorist organisations last year.

    1 September 2013 Last updated at 19:57 ET

    Find this story at 1 September 2013

    BBC © 2014

    Covert action in Colombia; U.S. intelligence, GPS bomb kits help Latin American nation cripple rebel forces

    The 50-year-old Revolutionary Armed Forces of Colombia (FARC), once considered the best-funded insurgency in the world, is at its smallest and most vulnerable state in decades, due in part to a CIA covert action program that has helped Colombian forces kill at least two dozen rebel leaders, according to interviews with more than 30 former and current U.S. and Colombian officials.

    The secret assistance, which also includes substantial eavesdropping help from the National Security Agency, is funded through a multibillion-dollar black budget. It is not a part of the public $9 billion package of mostly U.S. military aid called Plan Colombia, which began in 2000.

    Above: A Colombian Air Force member cleans an A-29 Super Tucano, a turboprop aircraft typically involved in strikes on FARC targets. (Raul Arboleda/AFP via Getty Images)

    The previously undisclosed CIA program was authorized by President George W. Bush in the early 2000s and has continued under President Obama, according to U.S. military, intelligence and diplomatic officials. Most of those interviewed spoke on the condition of anonymity because the program is classified and ongoing.

    The covert program in Colombia provides two essential services to the nation’s battle against the FARC and a smaller insurgent group, the National Liberation Army (ELN): Real-time intelligence that allows Colombian forces to hunt down individual FARC leaders and, beginning in 2006, one particularly effective tool with which to kill them.

    That weapon is a $30,000 GPS guidance kit that transforms a less-than-accurate 500-pound gravity bomb into a highly accurate smart bomb. Smart bombs, also called precision-guided munitions or PGMs, are capable of killing an individual in triple-canopy jungle if his exact location can be determined and geo-coordinates are programmed into the bomb’s small computer brain.

    In March 2008, according to nine U.S. and Colombian officials, the Colombian Air Force, with tacit U.S. approval, launched U.S.-made smart bombs across the border into Ecuador to kill a senior FARC leader, Raul Reyes. The indirect U.S. role in that attack has not been previously disclosed.

    The covert action program in Colombia is one of a handful of enhanced intelligence initiatives that has escaped public notice since the Sept. 11, 2001, attacks. Most of these other programs, small but growing, are located in countries where violent drug cartels have caused instability.

    Sources: U.S. State Department, Pais Libre, Colombian Defense Ministry and the Air Force. Research and data compiled by Elyssa Pachico. Graphic by Cristina Rivero. Map by Gene Thorp.

    The roster is headed by Mexico, where U.S. intelligence assistance is larger than anywhere outside Afghanistan, as The Washington Post reported in April. It also includes Central America and West Africa, where trafficking routes have moved in response to U.S. pressure against cartels elsewhere.

    Asked to comment on U.S. intelligence assistance, President Juan Manuel Santos told The Post during a recent trip to Washington that he did not wish to speak about it in detail, given the sensitivities involved. “It’s been of help,” he said. “Part of the expertise and the efficiency of our operations and our special operations have been the product of better training and knowledge we have acquired from many countries, among them the United States.”

    A spokesman for the CIA declined to comment.

    Colombia and the FARC have been in peace negotiations in Havana for a year. They have agreed so far on frameworks for land reform, rural development and for allowing insurgents to participate in the political process once the war ends. The two sides are currently discussing a new approach to fighting drug trafficking.

    Police outside El Nogal nightclub after the FARC destroyed it with a car bomb in February 2003. More than 20 people were killed. The bombing further united Colombia against the insurgents. (Javier Galeano/AP)
    Instability in Colombia

    Over the past decade, many indicators of insecurity have improved . . .

    . . . as terrorist group strength has weakened and extraditions to the United States for criminal trials have increased.

    2004, 2005 and 2010 not available.

    *Includes FARC-related kidnappings and killings.

    Sources: U.S. State Department, Pais Libre, Colombia Defense Ministry, Colombian Air Force, compiled by Elyssa Pachico
    On the verge of collapse

    Today, a comparison between Colombia, with its vibrant economy and swanky Bogota social scene, and Afghanistan might seem absurd. But a little more than a decade ago, Colombia had the highest murder rate in the world. Random bombings and strong-arm military tactics pervaded daily life. Some 3,000 people were kidnapped in one year. Professors, human rights activists and journalists suspected of being FARC sympathizers routinely turned up dead.

    The combustible mix of the FARC, cartels, paramilitaries and corrupt security forces created a cauldron of violence unprecedented in modern-day Latin America. Nearly a quarter-million people have died during the long war, and many thousands have disappeared.

    The FARC was founded in 1964 as a Marxist peasant movement seeking land and justice for the poor. By 1998, Colombia’s president at the time, Andres Pastrana, gave the FARC a Switzerland-sized demilitarized zone to encourage peace negotiations, but its violent attacks only grew, as did its links with the narcotics trade.

    By 2000, the emboldened insurgency of 18,000 took aim at Colombia’s political leaders. It assassinated local elected officials. It kidnapped a presidential candidate and attempted to kill a presidential front-runner, hard-liner Alvaro Uribe, whose father the FARC had killed in 1983.

    Fearing Colombia would become a failed state with an even greater role in drug trafficking into the United States, the Bush administration and Congress ramped up assistance to the Colombian military through Plan Colombia.

    By 2003, U.S. involvement in Colombia encompassed 40 U.S. agencies and 4,500 people, including contractors, all working out of the U.S. Embassy in Bogota, then the largest U.S. embassy in the world. It stayed that way until mid-2004, when it was surpassed by Afghanistan.

    “There is no country, including Afghanistan, where we had more going on,” said William Wood, who was U.S. ambassador to Colombia from 2003 to 2007 before holding the same post in war-torn Afghanistan for two years after that.

    When Bush became president, two presidential findings were already on the books authorizing covert action worldwide. One allowed CIA operations against international terrorist organizations. The other, signed in the mid-1980s by President Ronald Reagan, authorized action against international narcotics traffickers.

    A presidential finding is required for the CIA to do things other than collect and analyze overseas intelligence. Giving spy equipment to a partner, supporting foreign political parties, planting propaganda, and participating in lethal training or operations all require a finding and a notification to congressional intelligence committees.

    The counternarcotics finding had permitted the CIA and a technical unit of the clandestine Joint Special Operations Command (JSOC) to provide support to the years-long hunt for Colombian drug lord Pablo Escobar, killed by Colombian forces 20 years ago this month. It also made possible CIA-supported operations against traffickers and terrorists in Bolivia and Peru years ago.

    Under the Colombian program, the CIA is not allowed to participate directly in operations. The same restrictions apply to military involvement in Plan Colombia. Such activity has been constrained by members of Congress who had lived through the scandal of America’s secret role in Central America’s wars in the 1980s. Congress refused to allow U.S. military involvement in Colombia to escalate as it had in Nicaragua, El Salvador, Honduras and Panama.

    In February 2003, the FARC took three U.S. contractors hostage after their single-engine Cessna, above, crashed in the jungle near La Esperanza. A covert CIA program was launched to find them. (El Tiempo via AP)
    The FARC miscalculates

    The new covert push against the FARC unofficially began on Feb. 13, 2003. That day a single-engine Cessna 208 crashed in rebel-held jungle. Nearby guerrillas executed the Colombian officer on board and one of four American contractors who were working on coca eradication. The three others were taken hostage.

    The United States had already declared the FARC a terrorist organization for its indiscriminate killings and drug trafficking. Although the CIA had its hands full with Iraq and Afghanistan, Bush “leaned on [CIA director George] Tenet” to help find the three hostages, according to one former senior intelligence official involved in the discussions.

    The FARC’s terrorist designation made it easier to fund a black budget. “We got money from a lot of different pots,” said one senior diplomat.

    One of the CIA officers Tenet dispatched to Bogota was an operator in his forties whose name The Washington Post is withholding because he remains undercover. He created the U.S. Embassy Intelligence Fusion Cell, dubbed “the Bunker.”

    It was a cramped, 30-by-30-foot room with a low ceiling and three rows of computers. Eight people sat at each row of consoles. Some scoured satellite maps of the jungle; others searched for underground FARC hiding places. Some monitored imagery or the movement of vehicles tagged with tracking devices. Voice intercepts from radio and cellphone communications were decrypted and translated by the National Security Agency.

    Bunker analysts fused tips from informants and technically obtained information. Analysts sought to link individuals to the insurgency’s flow of drugs, weapons and money. For the most part, they left the violent paramilitary groups alone.

    The Bunker’s technical experts and contractors built the Colombians their own nationwide intelligence computer system. They also later helped create regional fusion centers to push tactical intelligence to local commanders. The agency also paid for encrypted communications gear.

    “We were very interested in getting the FARC, and it wasn’t so much a question of capability, as it was intelligence,” said Wood, “specifically the ability to locate them in the time frame of an operation.”

    Outside the Bunker, CIA case officers and contractors taught the art of recruiting informants to Colombian units that had been vetted and polygraphed. They gave money to people with information about the hostages.

    Meanwhile, the other secret U.S. agency that had been at the forefront of locating and killing al-Qaeda arrived on the scene. Elite commandos from JSOC began periodic annual training sessions and small-unit reconnaissance missions to try to find the hostages.

    Despite all the effort, the hostages’ location proved elusive. Looking for something else to do with the new intelligence equipment and personnel, the Bunker manager and his military deputy from the U.S. Special Operations Command gave their people a second mission: Target the FARC leadership. This was exactly what the CIA and JSOC had been doing against al-Qaeda on the other side of the world. The methodology was familiar.

    “There was cross-pollination both ways,” said one senior official with access to the Bunker at the time. “We didn’t need to invent a new wheel.”

    At the urging of President George W. Bush and Colombian President Alvaro Uribe, left, the CIA program to find the U.S. hostages began targeting FARC leaders with U.S.-provided intelligence and smart bombs. (Charles Dharapak/AP)
    A request from Colombia’s president

    Locating FARC leaders proved easier than capturing or killing them. Some 60 times, Colombian forces had obtained or been given reliable information but failed to capture or kill anyone senior, according to two U.S. officials and a retired Colombian senior officer. The story was always the same. U.S.-provided Black Hawk helicopters would ferry Colombian troops into the jungle about six kilometers away from a camp. The men would creep through the dense foliage, but the camps were always empty by the time they arrived. Later they learned that the FARC had an early-warning system: rings of security miles from the camps.

    By 2006, the dismal record attracted the attention of the U.S. Air Force’s newly arrived mission chief. The colonel was perplexed. Why had the third-largest recipient of U.S. military assistance [behind Egypt and Israel] made so little progress?

    “I’m thinking, ‘What are we killing the FARC with?’ ” the colonel, who spoke on the condition of anonymity, said in an interview.

    The colonel, a cargo plane expert, said he “started Googling bombs and fighters” looking for ideas. Eventually he landed on the Enhanced Paveway II, a relatively inexpensive guidance kit that could be strapped on a 500-pound, Mark-82 gravity bomb.

    The colonel said he told then-defense minister Santos about his idea and wrote a one-page paper on it for him to deliver to Uribe. Santos took the idea to U.S. Defense Secretary Donald Rumsfeld. In June 2006, Uribe visited Bush at the White House. He mentioned the recent killing of al-Qaeda’s chief in Iraq, Abu Musab al-Zarqawi. An F-16 had sent two 500-pound smart bombs into his hideout and killed him. He pressed for the same capability.

    “Clearly this was very important” to Uribe, said retired Air Force Gen. Michael V. Hayden, who had taken over as CIA director just months earlier.

    First, there was the matter of fitting the smart bombs onto a Colombian aircraft. Colombia did not have F-16s. Raytheon, the kit manufacturer, sent engineers to figure out how to mount the equipment on a plane. First they tried mounting it on a Brazilian-made Embraer A-29 Super Tucano, a turboprop aircraft designed for low-flying counterinsurgency missions. But affixing the cable that ran from the bomb’s computer brain to the cockpit meant drilling too close to the fuel cell. Instead, they jerry-rigged it to an older Cessna A-37 Dragonfly, a light attack aircraft first developed by the U.S. Special Operations air force for Vietnam and later used in the Salvadoran civil war.

    Then the engineers and Colombian pilots tested the first of three PGMs in a remote airfield near the Venezuelan border. The target was a 2-by-4 stuck in the ground. The plane launched the bomb from 20,000 feet. “It landed about a foot from it,” the colonel said. The results were so good, he thought, “why waste two more kits?” The smart bombs were ready for use.

    But White House lawyers, along with their colleagues from the CIA and the departments of Justice, Defense and State, had their own questions to work through. It was one thing to use a PGM to defeat an enemy on the battlefield — the U.S. Air Force had been doing that for years. It was another to use it to target an individual FARC leader. Would that constitute an assassination, which is prohibited by U.S. law? And, “could we be accused of engaging in an assassination, even if it is not ourselves doing it?” said one lawyer involved.

    The White House’s Office of Legal Counsel and others finally decided that the same legal analysis they had applied to al-Qaeda could be applied to the FARC. Killing a FARC leader would not be an assassination because the organization posed an ongoing threat to Colombia. Also, none of the FARC commanders could be expected to surrender.

    And, as a drug-trafficking organization, the FARC’s status as a threat to U.S. national security had been settled years earlier with Reagan’s counternarcotics finding. At the time, the crack cocaine epidemic was at its height, and the government decided that organizations that brought drugs to America’s streets were a threat to national security.

    There was another concern. Some senior officials worried that Colombian forces might use the PGMs to kill their perceived political enemies. “The concerns were huge given their human rights problems,” said a former senior military officer.

    To assure themselves that the Colombians would not misuse the bombs, U.S. officials came up with a novel solution. The CIA would maintain control over the encryption key inserted into the bomb, which unscrambled communications with GPS satellites so they can be read by the bomb’s computers. The bomb could not hit its target without the key. The Colombians would have to ask for approval for some targets, and if they misused the bombs, the CIA could deny GPS reception for future use.

    “We wanted a sign-off,” said one senior official involved in the deliberations.

    To cut through the initial red tape, the first 20 smart bomb kits — without the encryption keys — came through the CIA. The bill was less than $1 million. After that, Colombia was allowed to purchase them through the Foreign Military Sales program.
    Secretly assisting Colombia against rebels
    Bomb
    Guidance
    Air Foil
    Warhead
    Next

    Raytheon’s Enhanced Paveway II is a laser-guided bomb upgraded with a GPS-guided capability, which works better against targets in the thick jungle. An encryption key inserted into the guidance system allows the bomb’s computer to receive military-grade GPS data used to guide a bomb to its target.

    Anatomy of Lethal Air Operations in Colombia

    First strike: In a typical mission, several Cessna A-37 Dragonflys, a light attack aircraft first developed by the U.S. Special Operations for Vietnam, fly at 20,000 feet carrying smart bombs. They can be launched once the planes get within three miles of the target. The bombs communicate with GPS satellites to know where they are at all times and to hit the target.

    Bombardment: Several Brazilian-made Embraer A-29 Super Tucanos, a turboprop aircraft flown at a much lower altitude, follow the A-37s. They drop conventional gravity bombs in a pattern near the smart bombs to flatten the jungle and kill other insurgents in the FARC camp.

    Gunship strike: Low-flying Vietnam era AC-47 gunships, nicknamed Puff the Magic Dragon, strafe the area with machine guns, shooting the survivors, according to one of several officials who described the scenario.

    Ground units Finally, if the camp is far into the jungle, Colombian army troops are usually ferried in by U.S.-provided Black Hawk troop-carrying helicopters. Troops would collect the remains of the killed FARC leader if possible, round up survivors and gather electronic equipment like cellphones and computers that could yield valuable information about FARC operations.
    A first strike

    Tomas Medina Caracas, also known as Negro Acacio, the FARC’s chief drug trafficker and commander of its 16th Front, was the first man the U.S. Embassy Intelligence Fusion Cell queued up for a PGM strike.

    At about 4:30 a.m. on Sept. 1, 2007, pilots wearing night vision goggles unleashed several Enhanced Paveway II smart bombs into his camp in eastern Colombia as officials in both capitals waited. Troops recovered only a leg. It appeared by its dark complexion to belong to Acacio, one of the few black FARC leaders. DNA tests confirmed his death.

    “There was a great deal of excitement,” recalled William Scoggins, counternarcotics program manager at the U.S. military’s Southern Command. “We didn’t know the impact it would have, but we thought this was a game changer.”

    Six weeks later, smart bombs killed Gustavo Rueda Díaz, alias Martin Caballero, leader of the 37th Front, while he was talking on his cellphone. Acacio’s and Caballero’s deaths caused the 16th and 37th fronts to collapse. They also triggered mass desertions, according to a secret State Department cable dated March 6, 2008, and released by the anti-secrecy group WikiLeaks in 2010. This was just the beginning of the FARC’s disintegration.

    To hide the use of the PGMs from public discovery, and to ensure maximum damage to a FARC’s leaders’ camp, the air force and U.S. advisers developed new strike tactics. In a typical mission, several A-37 Dragonflys flying at 20,000 feet carried smart bombs. As soon as the planes came within a three-mile “basket” of the target, a bomb’s GPS software would automatically turn on.

    The Dragonflys were followed by several A-29 Super Tucanos, flying at a much lower altitude. They would drop a series of dumb bombs in a pattern nearby. Their blast pressure would kill anyone close in and also flatten the dense jungle and obscure the use of the smart bombs.

    Then, low-flying, Vietnam-era AC-47 gunships, nicknamed Puff the Magic Dragon, would strafe the area with mounted machine guns, “shooting the wounded trying to go for cover,” according to one of several military officials who described the same scenario.

    Only then would Colombian ground forces arrive to round up prisoners, collecting the dead, as well as cellphones, computers and hard drives. The CIA also spent three years training Colombian close air support teams on using lasers to clandestinely guide pilots and laser-guided smart bombs to their targets.

    Most every operation relied heavily on NSA signal intercepts, which fed intelligence to troops on the ground or pilots before and during an operation. “Intercepts . . . were a game changer,” said Scoggins, of U.S. Southern Command.

    The round-the-clock nature of the NSA’s work was captured in a secret State Department cable released by WikiLeaks. In the spring of 2009, the target was drug trafficker Daniel Rendon Herrera, known as Don Mario, then Colombia’s most wanted man and responsible for 3,000 assassinations over an 18-month period.

    “For seven days, using signal and human intelligence,” NSA assets “worked day and night” to reposition 250 U.S.-trained and equipped airborne commandos near Herrera as he tried to flee, according to an April 2009 cable and a senior government official who confirmed the NSA’s role in the mission.

    The CIA also trained Colombian interrogators to more effectively question thousands of FARC deserters, without the use of the “enhanced interrogation” techniques approved for use on al-Qaeda and later repudiated by Congress as abusive. The agency also created databases to keep track of the debriefings so they could be searched and cross-referenced to build a more complete picture of the organization.

    The Colombian government paid deserters and allowed them to reintegrate into civil society. Some, in turn, offered valuable information about the FARC’s chain of command, standard travel routes, camps, supply lines, drug and money sources. They helped make sense of the NSA’s voice intercepts, which often used code words. Deserters also sometimes were used to infiltrate FARC camps to plant listening devices or beacons that emitted a GPS coordinate for smart bombs.

    “We learned from the CIA,” a top Colombian national security official said of the debriefing program. “Before, we didn’t pay much attention to details.”

    FARC commander Raul Reyes in 2002 in Los Pozos, Colombia. In 2008, Colombia, with tacit U.S. approval, launched U.S.-made smart bombs into Ecuador, killing Reyes, considered to be the group’s No. 2 leader. (Scott Dalton/AP)
    Ecuador and the not-forgotten hostages

    In February 2008, the U.S.-Colombian team got its first sighting of the three U.S. hostages. Having waited five years, the reaction was swift at U.S. Special Operations Command headquarters in Tampa, which began sending JSOC commandos down, said a senior U.S. official who was in Colombia when they arrived.

    The JSOC team was headed by a Navy SEAL Team Six commander. Small units set up three operational areas near the hostages and conducted long-range reconnaissance, the senior official said. The NSA increased its monitoring. All eyes were on the remote jungle location. But as initial preparations were underway, operations were heating up elsewhere.

    Just across the Putumayo River, one mile inside Ecuador, U.S. intelligence and a Colombian informant confirmed the hideout of Luis Edgar Devia Silva, also known as Raul Reyes and considered to be the No. 2 in the seven-member FARC secretariat.

    It was an awkward discovery for Colombia and the United States. To conduct an airstrike meant a Colombian pilot flying a Colombian plane would hit the camp using a U.S.-made bomb with a CIA-controlled brain.

    The Air Force colonel had a succinct message for the Colombian air operations commander in charge of the mission. “I said, ‘Look man, we all know where this guy is. Just don’t f— it up.’ ”

    U.S. national security lawyers viewed the operation as an act of self-defense. In the wake of 9/11, they had come up with a new interpretation of the permissible use of force against non-state actors like al-Qaeda and the FARC. It went like this: If a terrorist group operated from a country that was unable or unwilling to stop it, then the country under attack — in this case, Colombia — had the right to defend itself with force, even if that meant crossing into another sovereign country.

    This was the legal justification for CIA drone strikes and other lethal operations in Pakistan, Yemen, Somalia and, much later, for the raid into Pakistan that killed Osama bin Laden.

    So minutes after midnight on March 1, three A-37 Dragonflys took off from Colombia, followed by five Super Tucanos. The smart bombs’ guidance system turned on once the planes reached within three miles of Reyes’s location.

    As instructed, the Colombian pilots stayed in Colombian airspace. The bombs landed as programmed, obliterating the camp and killing Reyes, who, according to Colombian news reports, was asleep in pajamas.

    Above: The 2008 bombing of Raul Reyes’s camp in Ecuador sparked a diplomatic dispute. Ecuador moved troops to border towns such as Puerto Nuevo. (Rodrigo Buendia/AFP via Getty Images; Dolores Ochoa/AP)

    Colombian forces rushed across the border into Ecuador to retrieve Reyes’s remains and also scooped up a large treasure trove of computer equipment that would turn out to be the most valuable FARC intelligence find ever.

    The bombing set off a serious diplomatic crisis. Venezuelan leader Hugo Chávez called Colombia “a terrorist state” and moved troops to the border, as did Ecuador. Nicaragua broke off relations. Uribe, under pressure, apologized to Ecuador.

    The apology, while soothing relationships in Latin America, angered the small circle of U.S. officials who knew the back story, one of them said. “I remember thinking, ‘I can’t believe they’re saying this,’ ” he said. “For them to be giving up an important legal position was crazy.”

    But the flap did not damage the deep ties between U.S. and Colombian forces or deter the mission to rescue the hostages. In fact, the number of JSOC troops continued to mount to more than 1,000, said the senior official then in Colombia. Officials thought for sure they would be spotted, but they never were. A U.S.-Colombian military exercise provided sufficient cover when the International Committee of the Red Cross showed up at isolated bases and stumbled upon some burly Americans, said two U.S. officials.

    After six weeks of waiting to find the hostages, most of the JSOC troops left the country for pressing missions elsewhere. One unit remained. On July 2, 2008, it had the role of unused understudy in the dramatic and well-documented Operation Checkmate, in which Colombian forces pretending to be members of a humanitarian group tricked the FARC into handing over the three U.S. hostages and 12 others without a shot fired. The JSOC team, and a fleet of U.S. aircraft, was positioned as Plan B, in case the Colombian operation went awry.

    A Colombian pilot boards a Super Tucano in Bogota in 2006. Recently, Colombia has fitted smart bombs onto some of its Super Tucanos, which have been largely used to drop dumb bombs during airstrikes. (Jose Miguel Gomez/Reuters)
    Santos continues the smart-bomb war

    As a sign of trust, in early 2010 the U.S. government gave Colombia control over the GPS encryption key. There had been no reports of misuse, misfires or collateral damage from the smart bombs. The transfer was preceded by quick negotiations over the rules of engagement for smart-bomb use. Among the rules was that they would be launched only against isolated jungle camps.

    President Santos, who was defense minister under Uribe, has greatly increased the pace of operations against the FARC. Almost three times as many FARC leaders — 47 vs. 16 — have been killed under Santos as under Uribe. Interviews and analysis of government Web sites and press reporting show that at least 23 of the attacks under Santos were air operations. Smart bombs were used only against the most important FARC leaders, Colombian officials said in response to questions. Gravity bombs were used in the other cases.

    President Juan Manuel Santos, who was Colombia’s defense minister when the CIA covert program ramped up, has increased efforts to weaken the FARC. (Jose Cendon/Bloomberg)

    Colombia continues to upgrade its air capabilities. In 2013, the air force upgraded its fleet of Israeli-made Kfir fighter jets, fitting them with Israeli-made Griffin laser-guided bombs. It has also fitted smart bombs onto some of its Super Tucanos.

    Having decimated the top FARC leadership and many of the front commanders, the military, with continued help from the CIA and other intelligence agencies, appears to be working its way through the mid-level ranks, including mobile company commanders, the most battle-hardened and experienced remaining cadre. One-third of them have been killed or captured, according to Colombian officials.

    The Santos administration has also targeted the financial and weapons networks supporting the FARC. Some critics think the government has been too focused on killing leaders and not enough on using the army and police to occupy and control rebel territory.

    Killing an individual has never been a measure of success in war, say counterinsurgency experts. It’s the chaos and dysfunction that killing the leadership causes to the organization that matters. The air operations against the FARC leadership “has turned the organization upside down,” said a senior Pentagon official who has studied the classified U.S. history of Colombia’s war.

    Some have fled to Venezuela. One member of the secretariat hides out intermittently in Ecuador, according to senior Colombia officials, breaking the important psychological bond with ground troops and handicapping recruitment.

    For fear of being located and targeted, units no longer sleep in the same place two days in a row, so camps must be sparser. “They know the government has so much information on them now, and real-time intelligence,” said German Espejo, security and defense counselor at the Colombian Embassy. Worried about spies in their midst, executions are common.

    The FARC still mounts attacks — a car bombing of a rural police station Dec. 7 killed six police officers and two civilians — but it no longer travels in large groups, and it limits most units to less than 20. No longer able to mount large-scale assaults, the group has reverted to hit-and-run tactics using snipers and explosives.

    The weariness of 50 years of transient jungle life has taken its toll on the FARC negotiating team, too. Those who have lived in exile seem more willing to continue the fight than those who have been doing the fighting, said Colombian officials. The negotiations, Santos said in the interview, are the result of the successful military campaign, “the cherry on the cake.”

    On Dec. 15, the FARC said it would begin a 30-day unilateral cease-fire as a sign of good will during the holiday season. The Santos administration rebuffed the gesture and vowed to continue its military campaign. Later that day, security forces killed a FARC guerrilla implicated in a bomb attack on a former minister. Three days later, the army killed another five.

    Elyssa Pachico and Julie Tate contributed to this report.

    Find this story at 21 December 2013

    © 1996-2014 The Washington Post

    NSA program stopped no terror attacks, says White House panel member

    A member of the White House review panel on NSA surveillance said he was “absolutely” surprised when he discovered the agency’s lack of evidence that the bulk collection of telephone call records had thwarted any terrorist attacks.

    “It was, ‘Huh, hello? What are we doing here?’” said Geoffrey Stone, a University of Chicago law professor, in an interview with NBC News. “The results were very thin.”

    While Stone said the mass collection of telephone call records was a “logical program” from the NSA’s perspective, one question the White House panel was seeking to answer was whether it had actually stopped “any [terror attacks] that might have been really big.”

    “We found none,” said Stone.

    Under the NSA program, first revealed by ex-contractor Edward Snowden, the agency collects in bulk the records of the time and duration of phone calls made by persons inside the United States.

    Stone was one of five members of the White House review panel – and the only one without any intelligence community experience – that this week produced a sweeping report recommending that the NSA’s collection of phone call records be terminated to protect Americans’ privacy rights.

    The panel made that recommendation after concluding that the program was “not essential in preventing attacks.”

    “That was stunning. That was the ballgame,” said one congressional intelligence official, who asked not to be publicly identified. “It flies in the face of everything that they have tossed at us.”

    Despite the panel’s conclusions, Stone strongly rejected the idea they justified Snowden’s actions in leaking the NSA documents about the phone collection. “Suppose someone decides we need gun control and they go out and kill 15 kids and then a state enacts gun control?” Stone said, using an analogy he acknowledged was “somewhat inflammatory.” What Snowden did, Stone said, was put the country “at risk.”

    “My emphatic view,” he said, “is that a person who has access to classified information — the revelation of which could damage national security — should never take it upon himself to reveal that information.”

    Stone added, however, that he would not necessarily reject granting an amnesty to Snowden in exchange for the return of all his documents, as was recently suggested by a top NSA official. “It’s a hostage situation,” said Stone. Deciding whether to negotiate with him to get all his documents back was a “pragmatic judgment. I see no principled reason not to do that.”

    The conclusions of the panel’s reports were at direct odds with public statements by President Barack Obama and U.S. intelligence officials. “Lives have been saved,” Obama told reporters last June, referring to the bulk collection program and another program that intercepts communications overseas. “We know of at least 50 threats that have been averted because of this information.”

    White House Jay Carney is pressed Thursday over whether President Barack Obama believes that the NSA surveillance program saved lives.

    But in one little-noticed footnote in its report, the White House panel said the telephone records collection program – known as Section 215, based on the provision of the U.S. Patriot Act that provided the legal basis for it – had made “only a modest contribution to the nation’s security.” The report said that “there has been no instance in which NSA could say with confidence that the outcome [of a terror investigation] would have been any different” without the program.

    The panel’s findings echoed that of U.S. Judge Richard Leon, who in a ruling this week found the bulk collection program to be unconstitutional. Leon said that government officials were unable to cite “a single instance in which analysis of the NSA’s bulk collection metadata collection actually stopped an imminent attack, or otherwise aided the Government in achieving any objective that was time-sensitive in nature.”

    Stone declined to comment on the accuracy of public statements by U.S. intelligence officials about the telephone collection program, but said that when they referred to successes they seemed to be mixing the results of domestic metadata collection with the intelligence derived from the separate, and less controversial, NSA program, known as 702, to intercept communications overseas.

    The comparison between 702 overseas interceptions and 215 bulk metadata collection was “night and day,” said Stone. “With 702, the record is very impressive. It’s no doubt the nation is safer and spared potential attacks because of 702. There was nothing like that for 215. We asked the question and they [the NSA] gave us the data. They were very straight about it.”

    He also said one reason the telephone records program is not effective is because, contrary to the claims of critics, it actually does not collect a record of every American’s phone call. Although the NSA does collect metadata from major telecommunications carriers such as Verizon and AT&T, there are many smaller carriers from which it collects nothing. Asked if the NSA was collecting the records of 75 percent of phone calls, an estimate that has been used in briefings to Congress , Stone said the real number was classified but “not anything close to that” and far lower.

    The heads of top tech companies in the U.S. have ask President Obama to reform government’s surveillance laws and practices. NBC’s Steve Handelsman reports.

    When panel members asked NSA officials why they didn’t expand the program to include smaller carriers, the answer they gave was “money,” Stone said. “They were setting financial priorities,” said Stone, and that was “really revealing” about how useful the bulk collection of telephone calls really was.

    An NSA spokeswoman declined to comment on any aspect of the panel’s report, saying the agency was deferring to the White House. Asked Wednesday about the surveillance panel’s conclusions about telephone record collection, White House press secretary Jay Carney said that “the president does still believe and knows that this program is an important piece of the overall efforts that we engage in to combat threats against the lives of American citizens and threats to our overall national security.”

    By Michael Isikoff
    NBC News National Investigative Correspondent

    Find this story at 20 December 2013

    © 2013 NBCNews.com

    NSA surveillance played little role in foiling terror plots, experts say

    Obama administration says NSA data helped make arrests in two important cases – but critics say that simply isn’t true

    A new NSA data farm is set to open in the fall in Bluffdale, Utah. A former CIA agent said: ‘[Data-mining] played no role in the Headley case.’ Photograph: George Frey/Getty Images

    Lawyers and intelligence experts with direct knowledge of two intercepted terrorist plots that the Obama administration says confirm the value of the NSA’s vast data-mining activities have questioned whether the surveillance sweeps played a significant role, if any, in foiling the attacks.

    The defence of the controversial data collection operations, highlighted in a series of Guardian disclosures over the past week, has been led by Dianne Feinstein, chairwoman of the Senate intelligence committee, and her equivalent in the House, Mike Rogers. The two politicians have attempted to justify the NSA’s use of vast data sweeps such as Prism and Boundless Informant by pointing to the arrests and convictions of would-be New York subway bomber Najibullah Zazi in 2009 and David Headley, who is serving a 35-year prison sentence for his role in the 2008 Mumbai attacks.

    Rogers told ABC’s This Week that the NSA’s bulk monitoring of phone calls and internet contacts was central to intercepting the plotters. “I can tell you, in the Zazi case in New York, it’s exactly the programme that was used,” he said.

    A similar point was made in anonymous briefings by administration officials to the New York Times and Reuters.

    But court documents lodged in the US and UK, as well as interviews with involved parties, suggest that data-mining through Prism and other NSA programmes played a relatively minor role in the interception of the two plots. Conventional surveillance techniques, in both cases including old-fashioned tip-offs from intelligence services in Britain, appear to have initiated the investigations.

    In the case of Zazi, an Afghan American who planned to attack the New York subway, the breakthrough appears to have come from Operation Pathway, a British investigation into a suspected terrorism cell in the north-west of England in 2009. That investigation discovered that one of the members of the cell had been in contact with an al-Qaida associate in Pakistan via the email address sana_pakhtana@yahoo.com.

    British newspaper reports at the time of Zazi’s arrest said that UK intelligence passed on the email address to the US. The same email address, as Buzzfeed has pointed out, was cited in Zazi’s 2011 trial as a crucial piece of evidence. Zazi, the court heard, wrote to sana_pakhtana@yahoo.com asking in coded language for the precise quantities to use to make up a bomb.

    Eric Jurgenson, an FBI agent involved in investigating Zazi once the link to the Pakistani email address was made, told the court: “My office was in receipt – I was notified, I should say. My office was in receipt of several email messages, email communications. Those email communications, several of them resolved to an individual living in Colorado.”

    Michael Dowling, a Denver-based attorney who acted as Zazi’s defence counsel, said the full picture remained unclear as Zazi pleaded guilty before all details of the investigation were made public. But the lawyer said he was sceptical that mass data sweeps could explain what led law enforcement to Zazi.

    “The government says that it does not monitor content of these communications in its data collection. So I find it hard to believe that this would have uncovered Zazi’s contacts with a known terrorist in Pakistan,” Dowling said.

    Further scepticism has been expressed by David Davis, a former British foreign office minister who described the citing of the Zazi case as an example of the merits of data-mining as “misleading” and “an illusion”. Davis pointed out that Operation Pathway was prematurely aborted in April 2009 after Bob Quick, then the UK’s most senior counter-terrorism police officer, was pictured walking into Downing Street with top secret documents containing details of the operation in full view of cameras.

    The collapse of the operation, and arrests of suspects that hurriedly followed, came five months before Zazi was arrested in September 2009. “That was the operation that led to the initial data links to Zazi – they put the clues in the database which gave them the connections,” Davis said.

    Davis said that the discovery of the sana_pakhtana@yahoo.com email – and in turn the link to Zazi – had been made by traditional investigative work in the UK. He said the clue-driven nature of the inquiry was significant, as it was propelled by detectives operating on the basis of court-issued warrants.

    “You can’t make this grand sweeping [data collection] stuff subject to warrants. What judge would give you a warrant if you say you want to comb through vast quantities of data?”

    Legal documents lodged with a federal court in New York’s eastern district shortly after Zazi’s arrest show that US counter-intelligence officials had been keeping watch over him under targeted surveillance with the warranted approval of the special intelligence court. During the course of the prosecution, the US served notice that it would be offering evidence “obtained and derived from electronic surveillance and physical search conducted pursuant to the Foreign Intelligence Surveillance Act of 1978 (Fisa).”

    Feinstein and Rogers have also pointed to the case of David Headley, who in January was sentenced to 35 years in jail for having made multiple scouting missions to Mumbai ahead of the 2008 terrorist attacks that killed 168 people. Yet the evidence in his case also points towards a British tip-off as the inspiration behind the US interception of him.

    In July 2009, British intelligence began tracking Headley, a Pakistani American from Chicago, who was then plotting to attack Danish newspaper Jyllands-Posten in retaliation for its publication of cartoons of the prophet Mohammed. Information was passed to the FBI and he was thereafter, until his arrest that October, kept under targeted US surveillance.

    An intelligence expert and former CIA operative, who asked to remain anonymous because he had been directly involved in the Headley case, was derisive about the claim that data-mining sweeps by the NSA were key to the investigation. “That’s nonsense. It played no role at all in the Headley case. That’s not the way it happened at all,” he said.

    The intelligence expert said that it was a far more ordinary lead that ensnared Headley. British investigators spotted him when he contacted an informant.

    The Headley case is a peculiar choice for the administration to highlight as an example of the virtues of data-mining. The fact that the Mumbai attacks occurred, with such devastating effect, in itself suggests that the NSA’s secret programmes were limited in their value as he was captured only after the event.

    Headley was also subject to a plethora of more conventionally obtained intelligence that questions the central role claimed for the NSA’s data sweeps behind his arrest. In a long profile of Headley, the investigative website ProPublica pointed out that he had been an informant working for the Drug Enforcement Administration perhaps as recently as 2005. There are suggestions that he might have then worked in some capacity for the FBI or CIA.

    Headley was also, ProPublica found, the subject of several inquiries by agents of the FBI-led Joint Terrorism Task Force. A year before the Mumbai attacks his then wife, Faiza Outalha, reported on him to the US embassy Islamabad, saying he was on a secret mission in India and was a “drug dealer, terrorist and spy”.

    Ed Pilkington in New York and Nicholas Watt in London
    theguardian.com, Wednesday 12 June 2013 15.51 BST

    Find this story at 12 June 2013
    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    << oudere artikelen  nieuwere artikelen >>