Were the hackers who broke into the DNC’s email really Russian?5 april 2017
The question of whether political operative Roger Stone helped Russian hackers break into the email of Democratic politicians, to some people, invites another: Who says the hackers were Russian?
The FBI does, and so do several U.S. intelligence agencies, as they’ve declared repeatedly over the past five months. But among private-sector computer security companies, not everybody thinks the case is proven.
“I have no problem blaming Russia for what they do, which is a lot,” said Jeffrey Carr of the international cybersecurity company Taia Global Inc. “I just don’t want to blame them for things we don’t know that they did. It may turn out that they’re guilty, but we are very short on evidence here.”
As Carr notes, the FBI never examined the servers that were hacked at the Democratic National Committee. Instead, the DNC used the private computer security company CrowdStrike to detect and repair the penetrations.
“All the forensic work on those servers was done by CrowdStrike, and everyone else is relying on information they provided,” said Carr. “And CrowdStrike was the one to declare this the work of the Russians.”
The CrowdStrike argument relies heavily on the fact that remnants of a piece of malware known as AGENT-X were found in the DNC computers. AGENT-X collects and transmits hacked files to rogue computers.
“AGENT-X has been around for ages and ages, and its use has always been attributed to the Russian government, a theory that’s known in the industry as ‘exclusive use,’” Carr said. “The problem with exclusive use is that it’s completely false. Unlike a bomb or an artillery shell, malware doesn’t detonate on impact and destroy itself.
“You can recover it, reverse-engineer it, and reuse it. The U.S. government learned a lesson about that when it created the Stuxnet computer worm to destroy Iran’s nuclear program. Stuxnet survived and now other people have it.”
Carr said he is aware of at least two working copies of AGENT-X outside Russian hands. One is in the possession of a group of Ukrainian hackers he has spoken with, and the other is with an American cybersecurity company. “And if an American security company has it, you can be certain other people do, too,” he said.
There’s growing doubt in the computer security industry about CrowdStrike’s theories about AGENT-X and Russian hackers, Carr said, including some critical responses to a CrowdStrike report on Russian use of the malware to disable Ukrainian artillery.
“This is a close-knit community and criticizing a member to the outside world is kind of like talking out of turn,” Carr said. “I’ve been repeatedly criticized for speaking out in public about whether the hacking was really done by the Russians. But this has to be made public, has to be addressed, and has to be acknowledged by the House and Senate Intelligence Committees.”
MARCH 24, 2017 7:00 AM
BY GLENN GARVIN
Find this story at 24 March 2017
Copyright http://www.miamiherald.com/
Did the Russians Really Hack the DNC?5 april 2017
Russia, we are told, breached the servers of the Democratic National Committee (DNC), swiped emails and other documents, and released them to the public, to alter the outcome of the U.S. presidential election.
How substantial is the evidence backing these assertions?
Hired by the Democratic National Committee to investigate unusual network activity, the security firm Crowdstrike discovered two separate intrusions on DNC servers. Crowdstrike named the two intruders Cozy Bear and Fancy Bear, in an allusion to what it felt were Russian sources. According to Crowdstrike, “Their tradecraft is superb, operational security second to none,” and “both groups were constantly going back into the environment” to change code and methods and switch command and control channels.
On what basis did Crowdstrike attribute these breaches to Russian intelligence services? The security firm claims that the techniques used were similar to those deployed in past security hacking operations that have been attributed to the same actors, while the profile of previous victims “closely mirrors the strategic interests of the Russian government. Furthermore, it appeared that the intruders were unaware of each other’s presence in the DNC system. “While you would virtually never see Western intelligence agencies going after the same target without de-confliction for fear of compromising each other’s operations,” Crowdstrike reports, “in Russia this is not an uncommon scenario.” [1]
Those may be indicators of Russian government culpability. But then again, perhaps not. Regarding the point about separate intruders, each operating independently of the other, that would seem to more likely indicate that the sources have nothing in common.
Each of the two intrusions acted as an advanced persistent threat (APT), which is an attack that resides undetected on a network for a long time. The goal of an APT is to exfiltrate data from the infected system rather than inflict damage. Several names have been given to these two actors, and most commonly Fancy Bear is known as APT28, and Cozy Bear as APT29.
The fact that many of the techniques used in the hack resembled, in varying degrees, past attacks attributed to Russia may not necessarily carry as much significance as we are led to believe. Once malware is deployed, it tends to be picked up by cybercriminals and offered for sale or trade on Deep Web black markets, where anyone can purchase it. Exploit kits are especially popular sellers. Quite often, the code is modified for specific uses. Security specialist Josh Pitts demonstrated how easy that process can be, downloading and modifying nine samples of the OnionDuke malware, which is thought to have first originated with the Russian government. Pitts reports that this exercise demonstrates “how easy it is to repurpose nation-state code/malware.” [2]
In another example, when SentinalOne Research discovered the Gyges malware in 2014, it reported that it “exhibits similarities to Russian espionage malware,” and is “designed to target government organizations. It comes as no surprise to us that this type of intelligence agency-grade malware would eventually fall into cybercriminals’ hands.” The security firm explains that Gyges is an “example of how advanced techniques and code developed by governments for espionage are effectively being repurposed, modularized and coupled with other malware to commit cybercrime.” [3]
Attribution is hard, cybersecurity specialists often point out. “Once an APT is released into the wild, its spread isn’t controlled by the attacker,” writes Mark McArdle. “They can’t prevent someone from analyzing it and repurposing it for their own needs.” Adapting malware “is a well-known reality,” he continues. “Finding irrefutable evidence that links an attacker to an attack is virtually unattainable, so everything boils down to assumptions and judgment.” [4]
Security Alliance regards security firm FireEye’s analysis that tied APT28 to the Russian government as based “largely on circumstantial evidence.” FireEye’s report “explicitly disregards targets that do not seem to indicate sponsorship by a nation-state,” having excluded various targets because they are “not particularly indicative of a specific sponsor’s interests.” [5] FireEye reported that the APT28 “victim set is narrow,” which helped lead it to the conclusion that it is a Russian operation. Cybersecurity consultant Jeffrey Carr reacts with scorn: “The victim set is narrow because the report’s authors make it narrow! In fact, it wasn’t narrowly targeted at all if you take into account the targets mentioned by other cybersecurity companies, not to mention those that FireEye deliberately excluded for being ‘not particularly indicative of a specific sponsor’s interests’.” [6]
FireEye’s report from 2014, on which much of the DNC Russian attribution is based, found that 89 percent of the APT28 software samples it analyzed were compiled during regular working hours in St. Petersburg and Moscow. [7]
But compile times, like language settings, can be easily altered to mislead investigators. Mark McArdle wonders, “If we think about the very high level of design, engineering, and testing that would be required for such a sophisticated attack, is it reasonable to assume that the attacker would leave these kinds of breadcrumbs? It’s possible. But it’s also possible that these things can be used to misdirect attention to a different party. Potentially another adversary. Is this evidence the result of sloppiness or a careful misdirection?” [8]
“If the guys are really good,” says Chris Finan, CEO of Manifold Technology, “they’re not leaving much evidence or they’re leaving evidence to throw you off the scent entirely.” [9] How plausible is it that Russian intelligence services would fail even to attempt such a fundamental step?
James Scott of the Institute for Critical Infrastructure Technology points out that the very vulnerability of the DNC servers constitutes a muddied basis on which determine attribution. “Attribution is less exact in the case of the DNC breach because the mail servers compromised were not well-secured; the organization of a few hundred personnel did not practice proper cyber-hygiene; the DNC has a global reputation and is a valuable target to script kiddies, hacktivists, lone-wolf cyber-threat actors, cyber-criminals, cyber-jihadists, hail-mary threats, and nation-state sponsored advanced persistent threats; and because the malware discovered on DNC systems were well-known, publicly disclosed, and variants could be purchased on Deep Web markets and forums.” [10]
Someone, or some group, operating under the pseudonym of Guccifer 2.0, claimed to be a lone actor in hacking the DNC servers. It is unclear what relation – if any – Guccifer 2.0 has to either of the two APT attacks on the DNC. In a PDF file that Guccifer 2.0 sent to Gawker.com, metadata indicated that it was it was last saved by someone having a username in Cyrillic letters. During the conversion of the file from Microsoft Word to PDF, invalid hyperlink error messages were automatically generated in the Russian language. [11]
This would seem to present rather damning evidence. But who is Guccifer 2.0? A Russian government operation? A private group? Or a lone hacktivist? In the poorly secured DNC system, there were almost certainly many infiltrators of various stripes. Nor can it be ruled out that the metadata indicators were intentionally generated in the file to misdirect attribution. The two APT attacks have been noted for their sophistication, and these mistakes – if that is what they are – seem amateurish. To change the language setting on a computer can be done in a matter of seconds, and that would be standard procedure for advanced cyber-warriors. On the other hand, sloppiness on the part of developers is not entirely unknown. However, one would expect a nation-state to enforce strict software and document handling procedures and implement rigorous review processes.
At any rate, the documents posted to the Guccifer 2.0 blog do not necessarily originate from the same source as those published by WikiLeaks. Certainly, none of the documents posted to WikiLeaks possess the same metadata issues. And one hacking operation does not preclude another, let alone an insider leak.
APT28 relied on XTunnel, repurposed from open source code that is available to anyone, to open network ports and siphon data. The interesting thing about the software is its failure to match the level of sophistication claimed for APT28. The strings in the code quite transparently indicate its intent, with no attempt at obfuscation. [12] It seems an odd oversight for a nation-state operation, in which plausible deniability would be essential, to overlook that glaring point during software development.
Command-and-control servers remotely issue malicious commands to infected machines. Oddly, for such a key component of the operation, the command-and-control IP address in both attacks was hard-coded in the malware. This seems like another inexplicable choice, given that the point of an advanced persistent threat is to operate for an extended period without detection. A more suitable approach would be to use a Domain Name System (DNS) address, which is a decentralized computer naming system. That would provide a more covert means of identifying the command-and-control server. [13] Moreover, one would expect that address to be encrypted. Using a DNS address would also allow the command-and-control operation to easily move to another server if its location is detected, without the need to modify and reinstall the code.
One of the IP addresses is claimed to be a “well-known APT 28” command-and-control address, while the second is said to be linked to Russian military intelligence. [14] The first address points to a server located in San Jose, California, and is operated by a server hosting service. [15] The second server is situated in Paris, France, and owned by another server hosting service. [16] Clearly, these are servers that have been compromised by hackers. It is customary for hackers to route their attacks through vulnerable computers. The IP addresses of compromised computers are widely available on the Deep Web, and typically a hacked server will be used by multiple threat actors. These two particular servers may or may not have been regularly utilized by Russian Intelligence, but they were not uniquely so used. Almost certainly, many other hackers would have used the same machines, and it cannot be said that these IP addresses uniquely identify an infiltrator. Indeed, the second IP address is associated with the common Trojan viruses Agent-APPR and Shunnael. [17]
“Everyone is focused on attribution, but we may be missing the bigger truth,” says Joshua Croman, Director of the Cyber Statecraft Initiative at the Atlantic Council. “[T]he level of sophistication required to do this hack was so low that nearly anyone could do it.” [18]
In answer to critics, the Department of Homeland Security and the FBI issued a joint analysis report, which presented “technical details regarding the tools and infrastructure used” by Russian intelligence services “to compromise and exploit networks” associated with the U.S. election, U.S. government, political, and private sector entities. The report code-named these activities “Grizzly Steppe.” [19]
For a document that purports to offer strong evidence on behalf of U.S. government allegations of Russian culpability, it is striking how weak and sloppy the content is. Included in the report is a list of every threat group ever said to be associated with the Russian government, most of which are unrelated to the DNC hack. It appears that various governmental organizations were asked to send a list of Russian threats, and then an official lacking IT background compiled that information for the report, and the result is a mishmash of threat groups, software, and techniques. “PowerShell backdoor,” for instance, is a method used by many hackers, and in no way describes a Russian operation.
Indeed, one must take the list on faith, because nowhere in the document is any evidence provided to back up the claim of a Russian connection. Indeed, as the majority of items on the list are unrelated to the DNC hack, one wonders what the point is. But it bears repeating: even where software can be traced to Russian origination, it does not necessarily indicate exclusive usage. Jeffrey Carr explains: “Once malware is deployed, it is no longer under the control of the hacker who deployed it or the developer who created it. It can be reverse-engineered, copied, modified, shared and redeployed again and again by anyone.” Carr quotes security firm ESET in regard to the Sednit group, one of the items on the report’s list, and which is another name for APT28: “As security researchers, what we call ‘the Sednit group’ is merely a set of software and the related infrastructure, which we can hardly correlate with any specific organization.” Carr points out that X-Agent software, which is said to have been utilized in the DNC hack, was easily obtained by ESET for analysis. “If ESET could do it, so can others. It is both foolish and baseless to claim, as Crowdstrike does, that X-Agent is used solely by the Russian government when the source code is there for anyone to find and use at will.” [20]
The salient impression given by the government’s report is how devoid of evidence it is. For that matter, the majority of the content is taken up by what security specialist John Hinderaker describes as “pedestrian advice to IT professionals about computer security.” As for the report’s indicators of compromise (IoC), Hinderaker characterizes these as “tools that are freely available and IP addresses that are used by hackers around the world.” [21]
In conjunction with the report, the FBI and Department of Homeland Security provided a list of IP addresses it identified with Russian intelligence services. [22] Wordfence analyzed the IP addresses as well as a PHP malware script provided by the Department of Homeland Security. In analyzing the source code, Wordfence discovered that the software used was P.A.S., version 3.1.0. It then found that the website that manufactures the malware had a site country code indicating that it is Ukrainian. The current version of the P.A.S. software is 4.1.1, which is much newer than that used in the DNC hack, and the latest version has changed “quite substantially.” Wordfence notes that not only is the software “commonly available,” but also that it would be reasonable to expect “Russian intelligence operatives to develop their own tools or at least use current malicious tools from outside sources.” To put it plainly, Wordfence concludes that the malware sample “has no apparent relationship with Russian intelligence.” [23]
Wordfence also analyzed the government’s list of 876 IP addresses included as indicators of compromise. The sites are widely dispersed geographically, and of those with a known location, the United States has the largest number. A large number of the IP addresses belong to low-cost server hosting companies. “A common pattern that we see in the industry,” Wordfence states, “is that accounts at these hosts are compromised and those hacked sites are used to launch attacks around the web.” Fifteen percent of the IP addresses are currently Tor exit nodes. “These exit nodes are used by anyone who wants to be anonymous online, including malicious actors.” [24]
If one also takes into account the IP addresses that not only point to current Tor exits, but also those that once belonged to Tor exit nodes, then these comprise 42 percent of the government’s list. [25] “The fact that so many of the IPs are Tor addresses reveals the true sloppiness of the report,” concludes network security specialist Jerry Gamblin. [26]
Cybersecurity analyst Robert Graham was particularly blistering in his assessment of the government’s report, characterizing it as “full of garbage.” The report fails to tie the indicators of compromise to the Russian government. “It contains signatures of viruses that are publicly available, used by hackers around the world, not just Russia. It contains a long list of IP addresses from perfectly normal services, like Tor, Google, Dropbox, Yahoo, and so forth. Yes, hackers use Yahoo for phishing and maladvertising. It doesn’t mean every access of Yahoo is an ‘indicator of compromise’.” Graham compared the list of IP addresses against those accessed by his web browser, and found two matches. “No,” he continues. “This doesn’t mean I’ve been hacked. It means I just had a normal interaction with Yahoo. It means the Grizzly Steppe IoCs are garbage.” Graham goes on to point out that “what really happened” with the supposed Russian hack into the Vermont power grid “is that somebody just checked their Yahoo email, thereby accessing one of the same IP addresses I did. How they get from the facts (one person accessed Yahoo email) to the story (Russians hacked power grid)” is U.S. government “misinformation.” [27]
The indicators of compromise, in Graham’s assessment, were “published as a political tool, to prove they have evidence pointing to Russia.” As for the P.A.S. web shell, it is “used by hundreds if not thousands of hackers, mostly associated with Russia, but also throughout the rest of the world.” Relying on the government’s sample for attribution is problematic: “Just because you found P.A.S. in two different places doesn’t mean it’s the same hacker.” A web shell “is one of the most common things hackers use once they’ve broken into a server,” Graham observes. [28]
Although cybersecurity analyst Robert M. Lee is inclined to accept the government’s position on the DNC hack, he feels the joint analysis report “reads like a poorly done vendor intelligence report stringing together various aspects of attribution without evidence.” The report’s list “detracts from the confidence because of the interweaving of unrelated data.” The information presented is not sourced, he adds. “It’s a random collection of information and in that way, is mostly useless.” Indeed, the indicators of compromise have “a high rate of false positives for defenders that use them.” [29]
Among the government’s list of Russian actors are Energetic Bear and Crouching Yeti, two names for the same threat group. In its analysis, Kaspersky Lab found that most of the group’s victims “fall into the industrial/machinery building sector,” and it is “not currently possible to determine the country of origin.” Although listed in the government’s report, it is not suggested that the group played a part in the DNC hack. But it does serve as an example of the uncertainty surrounding government claims about Russian hacking operations in general. [30]
CosmicDuke is one of the software packages listed as tied to Russia. SecureList, however, finds that unlike the software’s predecessor, CosmicDuke targets those who traffic in “controlled substances, such as steroids and hormones.” One possibility is that CosmicDuke is used by law enforcement agencies, while another possibility “is that it’s simply available in the underground and purchased by various competitors in the pharmaceutical business to spy on each other.” In either case, whether or not the software is utilized by the Russian government, there is a broader base for its use. [31]
The intent of the joint analysis report was to provide evidence of Russian state responsibility for the DNC hack. But nowhere does it do so. Mere assertions are meant to persuade. How much evidence does the government have? The Democratic Party claims that the FBI never requested access to DNC servers. [32] The FBI, for its part, says it made “multiple requests” for access to the DNC servers and was repeatedly turned down. [33] Either way, it is a remarkable admission. In a case like this, the FBI would typically conduct its own investigation. Was the DNC afraid the FBI might come to a different conclusion than the DNC-hired security firm Crowdstrike? The FBI was left to rely on whatever evidence Crowdstrike chose to supply. During its analysis of DNC servers, Crowdstrike reports that it found evidence of APT28 and APT29 intrusions within two hours. Did it stop there, satisfied with what it had found? Or did it continue to explore whether additional intrusions by other actors had taken place?
In an attempt to further inflame the hysteria generated from accusations of Russian hacking, the Office of the Director of National Intelligence published a declassified version of a document briefed to U.S. officials. The information was supplied by the CIA, FBI, and National Security Agency, and was meant to cement the government’s case. Not surprisingly, the report received a warm welcome in the mainstream media, but what is notable is that it offers not a single piece of evidence to support its claim of “high confidence” in assessing that Russia hacked the DNC and released documents to WikiLeaks. Instead, the bulk of the report is an unhinged diatribe against Russian-owned RT media. The content is rife with inaccuracies and absurdities. Among the heinous actions RT is accused of are having run “anti-fracking programming, highlighting environmental issues and the impacts on health issues,” airing a documentary on Occupy Wall Street, and hosting third-party candidates during the 2012 election.[34]
The report would be laughable, were it not for the fact that it is being played up for propaganda effect, bypassing logic and appealing directly to unexamined emotion. The 2016 election should have been a wake-up call for the Democratic Party. Instead, predictably enough, no self-examination has taken place, as the party doubles down on the neoliberal policies that have impoverished tens of millions, and backing military interventions that have sown so much death and chaos. Instead of thoughtful analysis, the party is lashing out and blaming Russia for its loss to an opponent that even a merely weak candidate would have beaten handily.
Mainstream media start with the premise that the Russian government was responsible, despite a lack of convincing evidence. They then leap to the fallacious conclusion that because Russia hacked the DNC, only it could have leaked the documents.
So, did the Russian government hack the DNC and feed documents to WikiLeaks? There are really two questions here: who hacked the DNC, and who released the DNC documents? These are not necessarily the same. An earlier intrusion into German parliament servers was blamed on the Russians, yet the release of documents to WikiLeaks is thought to have originated from an insider. [35] Had the Russians hacked into the DNC, it may have been to gather intelligence, while another actor released the documents. But it is far from certain that Russian intelligence services had anything to do with the intrusions. Julian Assange says that he did not receive the DNC documents from a nation-state. It has been pointed out that Russia could have used a third party to pass along the material. Fair enough, but former UK diplomat Craig Murray asserts: “I know who the source is… It’s from a Washington insider. It’s not from Russia.” [36]
There are too many inconsistencies and holes in the official story. In all likelihood, there were multiple intrusions into DNC servers, not all of which have been identified. The public ought to be wary of quick claims of attribution. It requires a long and involved process to arrive at a plausible identification, and in many cases the source can never be determined. As Jeffrey Carr explains, “It’s important to know that the process of attributing an attack by a cybersecurity company has nothing to do with the scientific method. Claims of attribution aren’t testable or repeatable because the hypothesis is never proven right or wrong.” [37]
Russia-bashing is in full swing, and there does not appear to be any letup in sight. We are plunging headlong into a new Cold War, riding on a wave of propaganda-induced hysteria. The self-serving claims fueling this campaign need to be challenged every step of the way. Surrendering to evidence-free emotional appeals would only serve those who arrogantly advocate confrontation and geopolitical domination.
Notes.
[1] Dmitri Alperovitch, “Bears in the Midst: Intrusion into the Democratic National Committee,” Crowdstrike blog, June 15, 2016.
[2] Josh Pitts, “Repurposing OnionDuke: A Single Case Study Around Reusing Nation-state Malware,” Black Hat, July 21, 2015.
[3] Udi Shamir, “The Case of Gyges, the Invisible Malware,” SentinelOne, July 2014.
[4] Mark McArdle, “’Whodunnit?’ Why the Attribution of Hacks like the Recent DNC Hack is so Difficult,” Esentire, July 28, 2016.
[5] “The Usual Suspects: Faith-Based Attribution and its Effects on the Security Community,” October 21, 2016.
[6] Jeffrey Carr, “The DNC Breach and the Hijacking of Common Sense,” June 20, 2016.
[7] “APT28: A Window into Russia’s Cyber Espionage Operations?” FireEye, October 27, 2014.
[8] Mark McArdle, “’Whodunnit?’ Why the Attribution of Hacks like the Recent DNC Hack is so Difficult,” Esentire, July 28, 2016.
[9] Patrick Howell O’Neill, “Obama’s Former Cybersecurity Advisor Says Only ‘Idiots’ Want to Hack Russia Back for DNC Breach,” The Daily Dot, July 29, 2016.
[10] Janes Scott, Sr., “It’s the Russians! … or is it? Cold War Rhetoric in the Digital Age,” ICIT, December 13, 2016.
[11] Sam Biddle and Gabrielle Bluestone, “This Looks like the DNC’s Hacked Trump Oppo File,” Gawker, June 15, 2016.
Dan Goodin, “’Guccifer’ Leak of DNC Trump Research Has a Russian’s Fingerprints on It,” Ars Technica, June 16, 2016.
[12] Pat Belcher, “Tunnel of Gov: DNC Hack and the Russian XTunnel,” Invincea, July 28, 2016.
[13] Seth Bromberger, “DNS as a Covert Channel within Protected Networks,” National Electric Sector Cyber Security Organization, January 25, 2011.
[14] Thomas Rid, “All Signs Point to Russia Being Behind the DNC Hack,” Motherboard, July 25, 2016.
[15] https://www.threatminer.org/host.php?q=45.32.129.185
[16] https://www.threatminer.org/host.php?q=176.31.112.10
[17] https://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~Agent-APPR/detailed-analysis.aspx
https://www.symantec.com/security_response/earthlink_writeup.jsp?docid=2015-062518-5557-99
[18] Paul, “Security Pros Pan US Government Report on Russian Hacking,” The Security Ledger, December 30, 2016.
[19] “Grizzly Steppe – Russian Malicious Cyber Activity,” JAR-16-20296, National Cybersecurity & Communications Integration Center, Federal Bureau of Investigation, December 29, 2016.
[20] Jeffrey Carr, “FBI/DHS Joint Analysis Report: A Fatally Flawed Effort,” Jeffrey Carr/Medium, December 30, 2016.
[21] John Hinderaker, “Is “Grizzly Steppe’ Really a Russian Operation?” Powerline, December 31, 2016.
[22] https://www.us-cert.gov/sites/default/files/publications/JAR-16-20296A.csv
[23] Mark Maunder, “US Govt Data Shows Russia Used Outdated Ukrainian PHP Malware,” Wordfence, December 30, 2016.
[24] Mark Maunder, “US Govt Data Shows Russia Used Outdated Ukrainian PHP Malware,” Wordfence, December 30, 2016.
[25] Micah Lee, “The U.S. Government Thinks Thousands of Russian Hackers May be Reading my Blog. They Aren’t,” The Intercept, January 4, 2017.
[26] Jerry Gamblin, “Grizzly Steppe: Here’s My IP and Hash Analysis,” A New Domain, January 2, 2017.
[27] Robert Graham, “Dear Obama, from Infosec,” Errata Security, January 3, 2017.
[28] Robert Graham, “Some Notes on IoCs,” Errata Security, December 29, 2016.
[29] Robert M. Lee, “Critiques of the DHS/FBI’s Grizzly Steppe Report,” Robert M. Lee blog, December 30, 2016.
[30] “Energetic Bear – Crouching Yeti,” Kaspersky Lab Global Research and Analysis Team, July 31, 2014.
[31] “Miniduke is back: Nemesis Gemina and the Botgen Studio,” Securelist, July 3, 2014.
[32] Ali Watkins, “The FBI Never Asked for Access to Hacked Computer Servers,” Buzzfeed, January 4, 2017.
[33] “James Comey: DNC Denied FBI Direct Access to Servers During Russia Hacking Probe,” Washington Times, January 10, 2017.
[34] “Assessing Russian Activities and Intentions in Recent Activities and Intentions in Recent US Elections,” Office of the Director of National Intelligence, January 6, 2017.
[35] “Quelle für Enthüllungen im Bundestag Vermutet,” Frankfurter Allgemeine Zeitung, December 17, 2016.
[36] RT broadcast, January 7, 2017. https://www.youtube.com/watch?v=w3DvaVrRweY
[37] Jeffrey Carr, “Faith-based Attribution,” Jeffrey Carr/Medium, July 10, 2016.
Join the debate on Facebook
Gregory Elich is on the Board of Directors of the Jasenovac Research Institute and the Advisory Board of the Korea Policy Institute. He a member of the Solidarity Committee for Democracy and Peace in Korea, a columnist for Voice of the People, and one of the co-authors of Killing Democracy: CIA and Pentagon Operations in the Post-Soviet Period, published in the Russian language. He is also a member of the Task Force to Stop THAAD in Korea and Militarism in Asia and the Pacific. His website is https://gregoryelich.org
JANUARY 13, 2017
by GREGORY ELICH
Find this story at 13 January 2017
Copyright © CounterPunch
HERE’S THE PUBLIC EVIDENCE RUSSIA HACKED THE DNC — IT’S NOT ENOUGH5 april 2017
THERE ARE SOME good reasons to believe Russians had something to do with the breaches into email accounts belonging to members of the Democratic party, which proved varyingly embarrassing or disruptive for Hillary Clinton’s presidential campaign. But “good” doesn’t necessarily mean good enough to indict Russia’s head of state for sabotaging our democracy.
There’s a lot of evidence from the attack on the table, mostly detailing how the hack was perpetrated, and possibly the language of the perpetrators. It certainly remains plausible that Russians hacked the DNC, and remains possible that Russia itself ordered it. But the refrain of Russian attribution has been repeated so regularly and so emphatically that it’s become easy to forget that no one has ever truly proven the claim. There is strong evidence indicating that Democratic email accounts were breached via phishing messages, and that specific malware was spread across DNC computers. There’s even evidence that the attackers are the same group that’s been spotted attacking other targets in the past. But again: No one has actually proven that group is the Russian government (or works for it). This remains the enormous inductive leap that’s not been reckoned with, and Americans deserve better.
We should also bear in mind that private security firm CrowdStrike’s frequently cited findings of Russian responsibility were essentially paid for by the DNC, which contracted its services in June. It’s highly unusual for evidence of a crime to be assembled on the victim’s dime. If we’re going to blame the Russian government for disrupting our presidential election — easily construed as an act of war — we need to be damn sure of every single shred of evidence. Guesswork and assumption could be disastrous.
The gist of the Case Against Russia goes like this: The person or people who infiltrated the DNC’s email system and the account of John Podesta left behind clues of varying technical specificity indicating they have some connection to Russia, or at least speak Russian. Guccifer 2.0, the entity that originally distributed hacked materials from the Democratic party, is a deeply suspicious figure who has made statements and decisions that indicate some Russian connection. The website DCLeaks, which began publishing a great number of DNC emails, has some apparent ties to Guccifer and possibly Russia. And then there’s WikiLeaks, which after a long, sad slide into paranoia, conspiracy theorizing, and general internet toxicity has made no attempt to mask its affection for Vladimir Putin and its crazed contempt for Hillary Clinton. (Julian Assange has been stuck indoors for a very, very long time.) If you look at all of this and sort of squint, it looks quite strong indeed, an insurmountable heap of circumstantial evidence too great in volume to dismiss as just circumstantial or mere coincidence.
But look more closely at the above and you can’t help but notice all of the qualifying words: Possibly, appears, connects, indicates. It’s impossible (or at least dishonest) to present the evidence for Russian responsibility for hacking the Democrats without using language like this. The question, then, is this: Do we want to make major foreign policy decisions with a belligerent nuclear power based on suggestions alone, no matter how strong?
What We Know
So far, all of the evidence pointing to Russia’s involvement in the Democratic hacks (DNC, DCCC, Podesta, et al.) comes from either private security firms (like CrowdStrike or FireEye) who sell cyber-defense services to other companies, or independent researchers, some with university affiliations and serious credentials, and some who are basically just Guys on Twitter. Although some of these private firms groups had proprietary access to DNC computers or files from them, much of the evidence has been drawn from publicly available data like the hacked emails and documents.
Some of the malware found on DNC computers is believed to be the same as that used by two hacking groups believed to be Russian intelligence units, codenamed APT (Advanced Persistent Threat) 28/Fancy Bear and APT 29/Cozy Bear by industry researchers who track them.
The attacker or attackers registered a deliberately misspelled domain name used for email phishing attacks against DNC employees, connected to an IP address associated with APT 28/Fancy Bear.
Malware found on the DNC computers was programmed to communicate with an IP address associated with APT 28/Fancy Bear.
Metadata in a file leaked by “Guccifer 2.0″ shows it was modified by a user called, in cyrillic, “Felix Edmundovich,” a reference to the founder of a Soviet-era secret police force. Another document contained cyrillic metadata indicating it had been edited on a document with Russian language settings.
Peculiarities in a conversation with “Guccifer 2.0″ that Motherboard published in June suggests he is not Romanian, as he originally claimed.
The DCLeaks.com domain was registered by a person using the same email service as the person who registered a misspelled domain used to send phishing emails to DNC employees.
Some of the phishing emails were sent using Yandex, a Moscow-based webmail provider.
A bit.ly link believed to have been used by APT 28/Fancy Bear in the past was also used against Podesta.
Why That Isn’t Enough
Viewed as a whole, the above evidence looks strong, and maybe even damning. But view each piece on its own, and it’s hard to feel impressed.
For one, a lot of the so-called evidence above is no such thing. CrowdStrike, whose claims of Russian responsibility are perhaps most influential throughout the media, says APT 28/Fancy Bear “is known for its technique of registering domains that closely resemble domains of legitimate organizations they plan to target.” But this isn’t a Russian technique any more than using a computer is a Russian technique — misspelled domains are a cornerstone of phishing attacks all over the world. Is Yandex — the Russian equivalent of Google — some sort of giveaway? Anyone who claimed a hacker must be a CIA agent because they used a Gmail account would be laughed off the internet. We must also acknowledge that just because Guccifer 2.0 pretended to be Romanian, we can’t conclude he works for the Russian government — it just makes him a liar.
Next, consider the fact that CrowdStrike describes APT 28 and 29 like this:
Their tradecraft is superb, operational security second to none and the extensive usage of “living-off-the-land” techniques enables them to easily bypass many security solutions they encounter. In particular, we identified advanced methods consistent with nation-state level capabilities including deliberate targeting and “access management” tradecraft — both groups were constantly going back into the environment to change out their implants, modify persistent methods, move to new Command & Control channels and perform other tasks to try to stay ahead of being detected.
Compare that description to CrowdStrike’s claim it was able to finger APT 28 and 29, described above as digital spies par excellence, because they were so incredibly sloppy. Would a group whose “tradecraft is superb” with “operational security second to none” really leave behind the name of a Soviet spy chief imprinted on a document it sent to American journalists? Would these groups really be dumb enough to leave cyrillic comments on these documents? Would these groups that “constantly [go] back into the environment to change out their implants, modify persistent methods, move to new Command & Control channels” get caught because they precisely didn’t make sure not to use IP addresses they’d been associated before? It’s very hard to buy the argument that the Democrats were hacked by one of the most sophisticated, diabolical foreign intelligence services in history, and that we know this because they screwed up over and over again.
But how do we even know these oddly named groups are Russian? CrowdStrike co-founder Dmitri Alperovitch himself describes APT 28 as a “Russian-based threat actor” whose modus operandi “closely mirrors the strategic interests of the Russian government” and “may indicate affiliation [Russia’s] Main Intelligence Department or GRU, Russia’s premier military intelligence service.” Security firm SecureWorks issued a report blaming Russia with “moderate confidence.” What constitutes moderate confidence? SecureWorks said it adopted the “grading system published by the U.S. Office of the Director of National Intelligence to indicate confidence in their assessments. … Moderate confidence generally means that the information is credibly sourced and plausible but not of sufficient quality or corroborated sufficiently to warrant a higher level of confidence.” All of this amounts to a very educated guess, at best.
Even the claim that APT 28/Fancy Bear itself is a group working for the Kremlin is speculative, a fact that’s been completely erased from this year’s discourse. In its 2014 reveal of the group, the high-profile security firm FireEye couldn’t even blame Russia without a question mark in the headline: “APT28: A Window into Russia’s Cyber Espionage Operations?” The blog post itself is remarkably similar to arguments about the DNC hack: technical but still largely speculative, presenting evidence the company “[believes] indicate a government sponsor based in Moscow.” Believe! Indicate! We should know already this is no smoking gun. FireEye’s argument that the malware used by APT 28 is connected to the Russian government is based on the belief that its “developers are Russian language speakers operating during business hours that are consistent with the time zone of Russia’s major cities.”
As security researcher Jeffrey Carr pointed out in June, FireEye’s 2014 report on APT 28 is questionable from the start:
To my surprise, the report’s authors declared that they deliberately excluded evidence that didn’t support their judgment that the Russian government was responsible for APT28’s activities:
“APT28 has targeted a variety of organizations that fall outside of the three themes we highlighted above. However, we are not profiling all of APT28’s targets with the same detail because they are not particularly indicative of a specific sponsor’s interests.” (emphasis added)
That is the very definition of confirmation bias. Had FireEye published a detailed picture of APT28’s activities including all of their known targets, other theories regarding this group could have emerged; for example, that the malware developers and the operators of that malware were not the same or even necessarily affiliated.
The notion that APT 28 has a narrow focus on American political targets is undermined in another SecureWorks paper, which shows that the hackers have a wide variety of interests: 10 percent of their targets are NGOs, 22 percent are journalists, 4 percent are aerospace researchers, and 8 percent are “government supply chain.” SecureWorks says that only 8 percent of APT 28/Fancy Bear’s targets are “government personnel” of any nationality — hardly the focused agenda described by CrowdStrike.
Truly, the argument that “Guccifer 2.0″ is a Kremlin agent or that GRU breached John Podesta’s email only works if you presume that APT 28/Fancy Bear is a unit of the Russian government, a fact that has never been proven beyond any reasonable doubt. According to Carr, “it’s an old assumption going back years to when any attack against a non-financial target was attributed to a state actor.” Without that premise, all we can truly conclude is that some email accounts at the DNC et al. appear to have been broken into by someone, and perhaps they speak Russian. Left ignored is the mammoth difference between Russians and Russia.
Security researcher Claudio Guarnieri put it this way:
[Private security firms] can’t produce anything conclusive. What they produce is speculative attribution that is pretty common to make in the threat research field. I do that same speculative attribution myself, but it is just circumstantial. At the very best it can only prove that the actor that perpetrated the attack is very likely located in Russia. As for government involvement, it can only speculate that it is plausible because of context and political motivations, as well as technical connections with previous (or following attacks) that appear to be perpetrated by the same group and that corroborate the analysis that it is a Russian state-sponsored actor (for example, hacking of institutions of other countries Russia has some geopolitical interests in).
Finally, one can’t be reminded enough that all of this evidence comes from private companies with a direct financial interest in making the internet seem as scary as possible, just as Lysol depends on making you believe your kitchen is crawling with E. Coli.
What Does the Government Know?
In October, the Department of Homeland Security and the Office of the Director of National Intelligence released a joint statement blaming the Russian government for hacking the DNC. In it, they state their attribution plainly:
The U.S. Intelligence Community (USIC) is confident that the Russian Government directed the recent compromises of e-mails from US persons and institutions, including from US political organizations. The recent disclosures of alleged hacked e-mails on sites like DCLeaks.com and WikiLeaks and by the Guccifer 2.0 online persona are consistent with the methods and motivations of Russian-directed efforts. These thefts and disclosures are intended to interfere with the US election process.
What’s missing is any evidence at all. If this federal confidence is based on evidence that’s being withheld from the public for any reason, that’s one thing — secrecy is their game. But if the U.S. Intelligence Community is asking the American electorate to believe them, to accept as true their claim that our most important civic institution was compromised by a longtime geopolitical nemesis, we need them to show us why.
The same goes for the CIA, which is now squaring off directly against Trump, claiming (through leaks to the Washington Post and New York Times) that the Russian government conducted the hacks for the express purpose of helping defeat Clinton. Days later, Senator John McCain agreed with the assessment, deeming it “another form of warfare.” Again, it’s completely possible (and probable, really) that the CIA possesses hard evidence that could establish Russian attribution — it’s their job to have such evidence, and often to keep it secret.
But what we’re presented with isn’t just the idea that these hacks happened, and that someone is responsible, and, well, I guess it’s just a shame. Our lawmakers and intelligence agencies are asking us to react to an attack that is almost military in nature — this is, we’re being told, “warfare.” When a foreign government conducts (or supports) an act of warfare against another country, it’s entirely possible that there will be an equal response. What we’re looking at now is the distinct possibility that the United States will consider military retaliation (digital or otherwise) against Russia, based on nothing but private sector consultants and secret intelligence agency notes. If you care about the country enough to be angry at the prospect of election-meddling, you should be terrified of the prospect of military tensions with Russia based on hidden evidence. You need not look too far back in recent history to find an example of when wrongly blaming a foreign government for sponsoring an attack on the U.S. has tremendously backfired.
We Need the Real Evidence, Right Now
It must be stated plainly: The U.S. intelligence community must make its evidence against Russia public if they want us to believe their claims. The integrity of our presidential elections is vital to the country’s survival; blind trust in the CIA is not. A governmental disclosure like this is also not entirely without precedent: In 2014, the Department of Justice produced a 56-page indictment detailing their exact evidence against a team of Chinese hackers working for the People’s Liberation Army, accused of stealing American trade secrets; each member was accused by name. The 2014 trade secret theft was a crime of much lower magnitude than election meddling, but what the DOJ furnished is what we should demand today from our country’s spies.
If the CIA does show its hand, we should demand to see the evidence that matters (which, according to Edward Snowden, the government probably has, if it exists). I asked Jeffrey Carr what he would consider undeniable evidence of Russian governmental involvement: “Captured communications between a Russian government employee and the hackers,” adding that attribution “should solely be handled by government agencies because they have the legal authorization to do what it takes to get hard evidence.”
Claudio Guarnieri concurred:
All in all, technical circumstantial attribution is acceptable only so far as it is to explain an attack. It most definitely isn’t for the political repercussions that we’re observing now. For that, only documental evidence that is verifiable or intercepts of Russian officials would be convincing enough, I suspect.
Given that the U.S. routinely attempts to intercept the communications of heads of state around the world, it’s not impossible that the CIA or the NSA has exactly this kind of proof. Granted, these intelligence agencies will be loath to reveal any evidence that could compromise the method they used to gather it. But in times of extraordinary risk, with two enormous military powers placed in direct conflict over national sovereignty, we need an extraordinary disclosure. The stakes are simply too high to take anyone’s word for it.
Sam Biddle
December 14 2016, 5:30 p.m.
Find this story at 14 December 2016
Copyright https://theintercept.com/
Did Hizballah Beat the CIA at Its Own Techno-Surveillance Game? (2011)5 april 2017
The CIA found itself in some rough waters in the Middle East last week. On Thursday, an influential member of Iran’s parliament announced that the Islamic republic had arrested 12 “CIA agents” who had allegedly been targeting Iran’s military and its nuclear program. The lawmaker didn’t give the nationality of the agents, but the presumption is that they were Iranians recruited to spy for the CIA. The agency hasn’t yet commented, but from what I’ve heard it was a serious compromise, one which the CIA is still trying to get to the bottom of.
Even more curious was the flap in Lebanon. In June, Hizballah’s secretary-general Hassan Nasrallah announced that the movement had arrested two of its own members as CIA spies. But it wasn’t until last week that the story got traction in Washington. The CIA confirmed that operations in Beirut had been compromised but declined to offer details. As in the case of the alleged Iranian debacle, it’s no doubt still doing a “damage assessment” — a process that can take years. Even then, it will be difficult to determine exactly what happened.
From what I’ve been able to piece together, Hizballah aggressively went after the CIA in Lebanon using telephone “link analysis.” That’s a form of electronic intelligence gathering that uses software capable of combing through trillions of gigabytes of phone-call data in search of anomalies — prepaid cell phones calling each other, series of brief calls, analysis of a cell-phone company’s GPS tracking. Geeks who do this for a living understand how it works, and I’ll take their word for it.
But it’s not the technology that’s remarkable, as much as the idea that it’s being employed by Hizballah, a militant Islamic organization better known for acts of terror than for electronic counterespionage. That’s another reminder that Hizballah has effectively supplanted the Lebanese state, taking over police and security functions that in other countries are the exclusively the domain of sovereign authority. Indeed, since Nasrallah’s announcement of catching the CIA agents, no Lebanese authority has questioned why Hizballah, rather than Lebanese intelligence, would be responsible for catching alleged spies for foreign powers in Lebanon. Nobody bothers to ask what would be a pointless question; everyone knows that when it comes to military and security functions, Hizballah might as well be the state.
(Watch a video of Hizballah’s theme park.)
Since I served in Beirut during the ’80s, I’ve been struck by the slow but inexorable shift of sovereign power to Hizballah. Not only does the movement have the largest military, with nearly 50,000 rockets pointed at Israel; it has de facto control over Lebanon’s spies, both military and civilian. It green-lights senior appointments. Hizballah also is wired into all the databases, keeping track of who enters the country, who leaves, where they stay, whom they see and call. It’s capable of monitoring every server in the country. It can even tap into broadband communications like Skype. And, of course, it doesn’t bother with such legal niceties as warrants. If foreigners are going to be caught spy in Lebanon, it will be Hizballah that catches them.
I have a feeling last week’s events bodes ill for U.S. intelligence because it suggests that anyone capable from organized crime to terrorist groups can greatly enhance their counterintelligence capability by simply buying off-the-shelf equipment and the know-how to use it. Like a lot of people, I thought it would be easy coasting at the end of the Cold War after the KGB was defanged. Instead, globalization and the rapid spread of sophisticated technologies have opened an espionage Pandora’s box.
By Robert Baer Wednesday, Nov. 30, 2011
Find this story at 30 November 2011
© 2016 Time Inc.
Exclusive: CIA Spies Caught, Fear Execution in Middle East (2011)5 april 2017
In a significant failure for the United States in the Mideast, more than a dozen spies working for the CIA in Iran and Lebanon have been caught and the U.S. government fears they will be or have been executed, according to four current and former U.S. officials with connections to the intelligence community.
The spies were paid informants recruited by the CIA for two distinct espionage rings targeting Iran and the Beirut-based Hezbollah organization, considered by the U.S. to be a terror group backed by Iran.
“Espionage is a risky business,” a U.S. official briefed on the developments told ABC News, confirming the loss of the unspecified number of spies over the last six months.
“Many risks lead to wins, but some result in occasional setbacks,” the official said.
Robert Baer, a former senior CIA officer who worked against Hezbollah while stationed in Beirut in the 1980’s, said Hezbollah typically executes individuals suspected of or caught spying.
“If they were genuine spies, spying against Hezbollah, I don’t think we’ll ever see them again,” he said. “These guys are very, very vicious and unforgiving.”
Other current and former officials said the discovery of the two U.S. spy rings occurred separately, but amounted to a setback of significant proportions in efforts to track the activities of the Iranian nuclear program and the intentions of Hezbollah against Israel.
“Remember, this group was responsible for killing more Americans than any other terrorist group before 9/11,” said a U.S. official. Attacks on the U.S. embassy and Marine barracks in Beirut in 1983 killed more than 300 people, including almost 260 Americans.
The U.S. official, speaking for the record but without attribution, gave grudging credit to the efforts of Iran and Hezbollah to detect and expose U.S. and Israeli espionage.
“Collecting sensitive information on adversaries who are aggressively trying to uncover spies in their midst will always be fraught with risk,” said the U.S. official briefed on the spy ring bust.
But others inside the American intelligence community say sloppy “tradecraft” — the method of covert operations — by the CIA is also to blame for the disruption of the vital spy networks.
In Beirut, two Hezbollah double agents pretended to go to work for the CIA. Hezbollah then learned of the restaurant where multiple CIA officers were meeting with several agents, according to the four current and former officials briefed on the case. The CIA used the codeword “PIZZA” when discussing where to meet with the agents, according to U.S. officials. Two former officials describe the location as a Beirut Pizza Hut. A current US official denied that CIA officers met their agents at Pizza Hut.
From there, Hezbollah’s internal security arm identified at least a dozen informants, and the identities of several CIA case officers.
Hezbollah then began to “roll up” much of the CIA’s network against the terror group, the officials said.
One former senior intelligence official told ABC News that CIA officers ignored warnings that the operation could be compromised by using the same location for meetings with multiple assets.
“We were lazy and the CIA is now flying blind against Hezbollah,” the former official said.
CIA Spies Caught in Iran
At about the same time that Hezbollah was identifying the CIA network in Lebanon, Iranian intelligence agents discovered a secret internet communication method used by CIA-paid assets in Iran.
The CIA has yet to determine precisely how many of its assets were compromised in Iran, but the number could be in the dozens, according to one current and one former U.S. intelligence official.
The exposure of the two spy networks was first announced in widely ignored televised statements by Iranian and Hezbollah leaders. U.S. officials tell ABC News that much of what was broadcast was, in fact, true.
Hezbollah’s leader, Sayyed Hasan Nasrallah, announced in June of this year that two high-ranking members of Hezbollah had been exposed as CIA spies, leading U.S. officials to conclude that the entire network inside Hezbollah had been compromised.
In Iran, intelligence minister Heidar Moslehi announced in May that more than 30 U.S. and Israeli spies had been discovered and an Iranian television program, which acts as a front for Iran’s government, showed images of internet sites used by the U.S. for secret communication with the spies.
U.S. officials said the Iranian television program showed pictures of people who were not U.S. assets, but the program’s video of the websites used by the CIA was accurate.
Some former U.S. intelligence officials say the developments are the result of a lack of professionalism in the U.S. intelligence community.
“We’ve lost the tradition of espionage,” said one former official who still consults for the U.S. intelligence community. “Officers take short cuts and no one is held accountable,” he said.
But at the CIA, officials say such risks come with the territory.
“Hezbollah is an extremely complicated enemy,” said a U.S. official. “It’s a determined terrorist group, a powerful political player, a mighty military and an accomplished intelligence operation, formidable and ruthless. No one underestimates its capabilities.”
“If you lose an asset, one source, that’s normally a setback in espionage,” said Robert Baer, who was considered an expert on Hezbollah.
“But when you lose your entire station, either in Tehran or Beirut, that’s a catastrophe, that just shouldn’t be. And the only way that ever happens is when you’re mishandling sources.”
By MATTHEW COLEBRIAN ROSS Nov. 21, 2011
Find this story at 21 November 2011
COpyright http://abcnews.go.com/
SECRET DOCS REVEAL: PRESIDENT TRUMP HAS INHERITED AN FBI WITH VAST HIDDEN POWERS7 februari 2017
IN THE WAKE of President Donald Trump’s inauguration, the FBI assumes an importance and influence it has not wielded since J. Edgar Hoover’s death in 1972. That is what makes today’s batch of stories from The Intercept, The FBI’s Secret Rules, based on a trove of long-sought confidential FBI documents, so critical: It shines a bright light on the vast powers of this law enforcement agency, particularly when it comes to its ability to monitor dissent and carry out a domestic war on terror, at the beginning of an era highly likely to be marked by vociferous protest and reactionary state repression.
In order to understand how the FBI makes decisions about matters such as infiltrating religious or political organizations, civil liberties advocates have sued the government for access to crucial FBI manuals — but thanks to a federal judiciary highly subservient to government interests, those attempts have been largely unsuccessful. Because their disclosure is squarely in the public interest, The Intercept is publishing this series of reports along with annotated versions of the documents we obtained.
Trump values loyalty to himself above all other traits, so it is surely not lost on him that few entities were as devoted to his victory, or played as critical a role in helping to achieve it, as the FBI. One of the more unusual aspects of the 2016 election, perhaps the one that will prove to be most consequential, was the covert political war waged between the CIA and FBI. While the top echelon of the CIA community was vehemently pro-Clinton, certain factions within the FBI were aggressively supportive of Trump. Hillary Clinton herself blames James Comey and his election-week letter for her defeat. Elements within the powerful New York field office were furious that Comey refused to indict Clinton, and embittered agents reportedly shoveled anti-Clinton leaks to Rudy Giuliani. The FBI’s 35,000 employees across the country are therefore likely to be protected and empowered. Trump’s decision to retain Comey — while jettisoning all other top government officials — suggests that this has already begun to happen.
When married to Trump’s clear disdain for domestic dissent — he venerates strongman authoritarians, called for a crackdown on free press protections, and suggested citizenship-stripping for flag-burning — the authorities vested in the FBI with regard to domestic political activism are among the most menacing threats Americans face. Trump is also poised to expand the powers of law enforcement to surveil populations deemed suspicious and deny their rights in the name of fighting terrorism, as he has already done with his odious restrictions on immigration from seven Muslim-majority countries. Understanding how the federal government’s law enforcement agency interprets the legal limits on its own powers is, in this context, more essential than ever. Until now, however, the rules governing the FBI have largely been kept secret.
CLEVELAND, OH – JULY 18: Presumptive Republican presidential nominee Donald Trump enters the stage to introduce his wife Melania on the first day of the Republican National Convention on July 18, 2016 at the Quicken Loans Arena in Cleveland, Ohio. An estimated 50,000 people are expected in Cleveland, including hundreds of protesters and members of the media. The four-day Republican National Convention kicks off on July 18. (Photo by Alex Wong/Getty Images) Donald Trump enters the stage at the Republican National Convention on July 18, 2016, in Cleveland, Ohio. Photo: Alex Wong/Getty Images
Today’s publication is the result of months of investigation by our staff, and we planned to publish these articles and documents regardless of the outcome of the 2016 election. The public has an interest in understanding the FBI’s practices no matter who occupies the White House. But in the wake of Trump’s victory, and the unique circumstances that follow from it, these revelations take on even more urgency.
After Congress’s 1976 Church Committee investigated the excesses of Hoover’s FBI, in particular the infamous COINTELPRO program — in which agents targeted and subverted any political groups the government deemed threatening, including anti-war protesters, black nationalists, and civil rights activists — a series of reforms were enacted to rein in the FBI’s domestic powers. As The Intercept and other news outlets have amply documented, in the guise of the war on terror the FBI has engaged in a variety of tactics that are redolent of the COINTELPRO abuses — including, for example, repeatedly enticing innocent Muslims into fake terror schemes concocted by the bureau’s own informants. What The Intercept’s reporting on this new trove of documents shows is how the FBI has quietly transformed the system of rules and restraints put in place after the scandals of the ’70s, opening the door for a new wave of civil liberties violations. When asked to respond to this critique, the FBI provided the following statement:
All FBI policies are written to ensure that the FBI consistently and appropriately applies the lawful tools we use to assess and investigate criminal and national security threats to our nation. All of our authorities and techniques are founded in the Constitution, U.S. law, and Attorney General Guidelines. FBI policies and rules are audited and enforced through a rigorous internal compliance mechanism, as well as robust oversight from the Inspector General and Congress. FBI assessments and investigations are subject to responsible review and are designed to protect the rights of all Americans and the safety of our agents and sources, acting within the bounds of the Constitution.
Absent these documents and the facts of how the bureau actually operates, this may sound reassuring. But to judge how well the bureau is living up to these abstract commitments, it is necessary to read the fine print of its byzantine rules and regulations — which the FBI’s secrecy has heretofore made it impossible for outsiders to do. Now, thanks to our access to these documents — which include the FBI’s governing rulebook, known as the DIOG, and classified policy guides for counterterrorism cases and handling confidential informants — The Intercept is able to share a vital glimpse of how the FBI understands and wields its enormous power.
For example, the bureau’s agents can decide that a campus organization is not “legitimate” and therefore not entitled to robust protections for free speech; dig for derogatory information on potential informants without any basis for believing they are implicated in unlawful activity; use a person’s immigration status to pressure them to collaborate and then help deport them when they are no longer useful; conduct invasive “assessments” without any reason for suspecting the targets of wrongdoing; demand that companies provide the bureau with personal data about their users in broadly worded national security letters without actual legal authority to do so; fan out across the internet along with a vast army of informants, infiltrating countless online chat rooms; peer through the walls of private homes; and more. The FBI offered various justifications of these tactics to our reporters. But the documents and our reporting on them ultimately reveal a bureaucracy in dire need of greater transparency and accountability.
One of the documents contains an alarming observation about the nation’s police forces, even as perceived by the FBI. Officials of the bureau were so concerned that many of these police forces are linked to, at times even populated by, overt white nationalists and white supremacists, that they have deemed it necessary to take that into account in crafting policies for sharing information with them. This news arrives in an ominous context, as the nation’s law enforcement agencies are among the few institutional factions in the U.S. that supported Trump, and they did so with virtual unanimity. Trump ran on a platform of unleashing an already out-of-control police — “I will restore law and order to our country,” he thundered when accepting the Republican nomination — and now the groups most loyal to Trump are those that possess a state monopoly over the use of force, many of which are infused with racial animus.
The Church Committee reforms were publicly debated and democratically enacted, based on the widespread fears of sustained intelligence community overreach brought to light by journalists like Seymour Hersh and Betty Medsger, who covered the shocking files revealing Hoover’s activities that were seized by the Citizens Commission to Investigate the FBI in 1971. It is simply inexcusable to erode those protections in the dark, with no democratic debate.
As we enter the Trump era, with a nominated attorney general who has not hidden his contempt for press freedoms and a president who has made the news media the primary target of his vitriol, one of the most vital weapons for safeguarding basic liberties and imposing indispensable transparency is journalism that exposes information the government wants to keep suppressed. For exactly that reason, it is certain to be under even more concerted assault than it has been during the last 15 years. The revealing, once-secret FBI documents The Intercept is today reporting on, and publishing, demonstrate why protecting press freedom is more critical than ever.
Update: February 1, 2017
This article has been updated to include the role of Betty Medsger and the Citizens Commission to Investigate the FBI in exposing Hoover’s overreach.
Glenn Greenwald, Betsy Reed
January 31 2017, 1:38 p.m.
Find this story at 31 January 2017
Copyright https://theintercept.com/
HIDDEN LOOPHOLES ALLOW FBI AGENTS TO INFILTRATE POLITICAL AND RELIGIOUS GROUPS7 februari 2017
President Trump has inherited a vast domestic intelligence agency with extraordinary secret powers. A cache of documents offers a rare window into the FBI’s quiet expansion since 9/11.
USING LOOPHOLES IT has kept secret for years, the FBI can in certain circumstances bypass its own rules in order to send undercover agents or informants into political and religious organizations, as well as schools, clubs, and businesses.
Beneath the FBI’s redaction marks are exceptions to rules on “undisclosed participation.”
If the FBI had its way, the infiltration loopholes would still be secret. They are detailed in a mammoth document obtained by The Intercept, an uncensored version of the bureau’s governing rulebook, the Domestic Investigations and Operations Guide, or DIOG. The 2011 edition of the book, which covers everything from wiretapping to how to read Miranda rights, was made public in redacted form thanks to a lawsuit brought by civil liberties groups. Beneath the FBI’s redaction marks were exceptions to rules on “undisclosed participation” that could be easy to exploit.
The FBI rules show a significant level of oversight when it comes to looking into “sensitive” groups — namely, those with religious, political, or academic affiliations. For instance, if an undercover agent wants to pose as a university student and take classes, or if an FBI handler wants to tell an informant to attend religious services — two examples straight out of the rulebook — he or she must obtain a supervisor’s approval and attest both to the operation’s importance and to its compliance with constitutional safeguards.
But all those rules go out the window if an agent decides the group is “illegitimate” or an informant spies on the group of his or her own accord.
The FBI insists that supervisors regularly review agents’ work to make sure these exceptions aren’t being misused, and that the extra steps and approvals detailed in the guide are proof that the bureau has voluntarily limited its authorities beyond what it believes to be the legal minimum.
An FBI spokesperson said that a provision in the DIOG encourages agents to err on the side of considering something sensitive if there is any doubt.
“That discretion will be part of our regular case review. Agents will be asked, ‘Hey, why isn’t that a sensitive investigative matter?’” the spokesperson said.
But civil rights groups still worry that the FBI has made use of precisely these kinds of loopholes, silently undermining cherished freedoms enshrined after a dark chapter of FBI history: the COINTELPRO program in the 1950s and ’60s, when the FBI spied on, harassed, and tried to discredit leftists, civil rights leaders, and anti-war protestors. The exposure of COINTELPRO led to a famous Senate investigation and to institutional reform. The bureau adopted new rules and stricter oversight. Since 9/11, however, these hard-won protections have been weakened. What the public has not known is by exactly how much.
“Going into political gatherings, houses of worship — these are First Amendment-protected activities,” said Farhana Khera, the executive director of Muslim Advocates, a group that originally sued to have the rulebook released, particularly over concerns about the issue of undercover infiltration. “We believed the DIOG to be a broadening of their authority to go into those spaces.”
The FBI sees it exactly the other way.
“These are a voluntary narrowing of our authorities. We learn from history and try to get better,” the spokesperson said.
NEW YORK, NY – NOVEMBER 11: Muslims exit the mosque following traditional Friday prayers outside the Islamic Center of Bay Ridge on November 11, 2016 in the Brooklyn borough of New York City. During the sermon, the mosque’s imam reflected on many issues including the election of Donald J. Trump. (Photo by Robert Nickelsberg/Getty Images) People exit the Islamic Center of Bay Ridge following traditional Friday prayers on Nov. 11, 2016, in New York’s Brooklyn borough. Photo: Robert Nickelsberg/Getty Images
THE FBI OPENLY acknowledges that some of its undercover operations can be “intrusive” and carry “a greater risk to civil liberties,” and therefore that they may require higher levels of approval or legal review. The requirements for a particular operation vary depending on how intimately the FBI employee or informant will be involved with the group, and what kind of group it is.
The FBI distinguishes between “sensitive undisclosed participation,” in political, religious, media, or academic groups, and “non-sensitive undisclosed participation,” in groups “such as a business or a club formed for recreational purposes.” (Even this basic distinction was previously redacted.)
The once-censored rules explain that for non-sensitive groups, a supervising agent must sign off if the plan is for an FBI agent to infiltrate a group in order to gain information or as part of an investigation. An informant doing the same thing does not require extra approval. If the participation of the FBI agent or informant will influence the group’s activities, then the head counsel for the division needs to review the plan. If the FBI’s presence is specifically likely to influence the group’s First Amendment-protected activity (if, as the guide specifies, the FBI participant plans to steer the group’s agenda on “social, religious, or political” issues), then the FBI’s office of general counsel must get involved, and perhaps senior FBI officials.
The requirements for infiltrating a group considered sensitive are even more stringent: The FBI agent must get approval both from a supervisor and from the head lawyer of his or her division, while also notifying a committee that oversees FBI operations. And if the intention or likelihood is that this infiltration will influence a sensitive group’s exercise of its First Amendment rights, then the FBI director must sign off.
These rules appear to offer layers of oversight. But they only kick in when certain conditions are met. The policy guide gives agents considerable discretion in deciding whether infiltrating an organization constitutes “undisclosed participation” at all — and therefore, whether it requires the extra approvals.
For instance, none of the rules apply if a foreign government operates the organization, or if the FBI “reasonably” believes the organization to be acting on behalf of a foreign power, so long as its U.S.-based members are mostly foreigners. And the rules only apply to groups the FBI deems “legitimate.” The redacted definition of a “legitimate” group is one “formed for lawful purposes” and whose “activities are primarily lawful.” This would exclude obvious criminal networks but could also exclude activist groups if an agent decides that their “primary purpose” is to hold protests involving unlawful acts.
“An organization whose primary purpose is to engage in destruction of property as a means to bring public attention to commercial activities that harm the environment is also not a legitimate organization within the meaning of this definition because its primary purpose is to engage in criminal conduct,” the guide says. “On the other hand, an organization that seeks to bring attention to a social or political cause by engaging primarily in lawful protest or advocacy, but also some acts of civil disobedience, is a legitimate organization.”
Michael German, a former FBI agent who is a fellow with the Brennan Center for Justice at New York University School of Law, said that such language gives agents wiggle room to justify themselves if they are found to have been improperly investigating an organization.
“It’s not that you can’t ever investigate a legitimate organization, it’s just that it requires an additional level of oversight because of the history of abuse,” German said. “So do we really want to have agents parsing the language of what’s legitimate and what isn’t legitimate without that oversight?”
Classifying constitutionally protected activities as “illegitimate” is not a distant possibility. There have been many recent examples of the FBI twisting or ignoring the rules in order to investigate political or religious groups. In 2010, to take just one example, a Justice Department inspector general found that the FBI had violated policy in investigating groups including the Catholic Worker, Greenpeace, and People for the Ethical Treatment of Animals. Documents released last year showed that the bureau tracked Keystone Pipeline protesters without proper authorization. The FBI has also generated legal controversy with its use of informants in mosques.
The definition of what constitutes “participation” is also flexible in the FBI’s reading.
It was previously known that FBI agents and informants could go to public events without identifying themselves and attend up to five meetings of an organization without triggering the undisclosed participation rules — although sending an informant or employee to a religious service always requires a supervisor’s approval, the guide states.
Another loophole allows that if an informant volunteers information about a group without having been asked to collect it, FBI agents don’t have to worry about whether the informant obtained the information through undisclosed participation.
And although the rules require legal review if the FBI employee’s or informant’s participation is intended to influence a group, what constitutes “influencing” is narrowly defined: A source or undercover employee “simply voting or expressing an opinion” does not count. When it comes to First Amendment concerns, the FBI’s activities must “substantially affect the agenda of the organization” in order to raise flags.
There are certain caveats that go in a more restrictive direction: For instance, the rules specify that joining a mailing list or following a group on Twitter does constitute “participation,” and that agents are supposed to err on the side of caution when determining whether or not a group is “legitimate” or whether having undercover agents participate in group activities is “sensitive.”
Tarek Ismail, senior staff attorney with CLEAR, an initiative at the City University of New York that works with communities affected by counterterrorism policies, said that the breadth of these exceptions elaborated in the DIOG demonstrates “broad rules created and then chipped away.”
He added that the rules’ apparent flexibility made sense of the experiences of many of his clients. “There’s a disconnect between what’s on paper and what’s actually done,” Ismail said. “We see significant departures from these rules in our cases, but clearly it’s not because these rules are hard to live with.”
US Attorney General Michael Mukasey listens to a speaker during the graduation ceremony for Federal Bureau of Investigation Special Agents at the FBI Academy in Quantico, Virginia, on October 30, 2008. AFP PHOTO / Saul LOEB (Photo credit should read SAUL LOEB/AFP/Getty Images) U.S. Attorney General Michael Mukasey listens to a speaker during the graduation ceremony for FBI special agents at the FBI Academy in Quantico, Va., on Oct. 30, 2008. Photo: Saul Loeb/AFP/Getty Images
THE DIOG, DESPITE being hundreds of pages of dense bureaucracy, actually documents a loosening of the standards enacted to rein in the FBI after COINTELPRO and other scandals involving the bureau under Director J. Edgar Hoover.
“The baseline that we started from in the 1970s was that there were no rules governing the FBI,” said Emily Berman, a law professor at the University of Houston.
The fallout from COINTELPRO resulted in new guidelines from the attorney general that reined in domestic intelligence gathering by requiring that agents’ investigations be focused on actual criminal activity. Yet in the decades since — and especially after the 9/11 attacks — the bureau’s mandate has expanded again, beyond the realm of crime fighting and toward intelligence gathering in the name of combating terrorism.
The FBI, which has no single statute governing its activities, has operated under a series of guidelines issued by attorneys general over the years. The DIOG first came out in the last months of the Bush administration in 2008, implementing guidelines from then-Attorney General Michael Mukasey. Mukasey emphasized intelligence sharing and the retention of information “regardless of whether it furthers investigative objectives in a narrower or more immediate sense.” He cited the “historical evolution of the FBI” after the 9/11 attacks toward the elimination of the traditional wall between foreign intelligence and domestic law enforcement.
At the time, civil liberties groups were alarmed that Mukasey’s rules, known as the “Attorney General’s Guidelines for Domestic FBI Operations,” broadened the authorities of the FBI to collect and retain more data than ever before, and allowed for “assessments,” in which agents could probe for information without evidence of wrongdoing. Some of the tactics authorized for assessments were quite invasive, allowing for physical surveillance, interviews, and the tasking of informants to collect information.
Muslim Advocates, with other groups, sued to have the whole rulebook released without redactions. They argued that the redacted portions couldn’t be very sensitive given that the FBI had invited advocacy groups to review portions of the guide at its offices before implementation. But in 2011, a judge disagreed and allowed the redactions to remain. Although portions of the DIOG have been updated since then — the FBI recently posted a new version from 2013, also redacted — the 2011 guide remains the baseline document.
Some of the redactions are inconsistent, with identical text covered in one place and not in another. Most of the text beneath the redactions simply spells out designations of authorities and necessary signoffs for particular activities.
“Now being able to look at what was redacted, it’s hard to understand what the justification would have been” for withholding the information, German said, “other than to prevent having to have a public dialogue about whether these changes to the FBI’s authority were appropriate.”
“This is something that the public has a right to know, what policies the government is operating under, particularly when they’re using authorities that have both a long history and recent history of abuse,” said German. “Anytime you come across some sort of improper activity, you can’t say it’s improper unless you know what the rules are.”
Cora Currier
January 31 2017, 1:06 p.m.
Find this story at 31 January 2017
Copyright https://theintercept.com/
SECRET RULES MAKE IT PRETTY EASY FOR THE FBI TO SPY ON JOURNALISTS7 februari 2017
Rules governing the use of national security letters allow the FBI to obtain information about journalists’ calls without going to a judge or informing the targeted news organization.
President Trump has inherited a vast domestic intelligence agency with extraordinary secret powers. A cache of documents offers a rare window into the FBI’s quiet expansion since 9/11.
This story was originally published on June 30, 2016. We are republishing it along with new reporting on other FBI documents.
SECRET FBI RULES allow agents to obtain journalists’ phone records with approval from two internal officials — far less oversight than under normal judicial procedures.
The classified rules, obtained by The Intercept and dating from 2013, govern the FBI’s use of national security letters, which allow the bureau to obtain information about journalists’ calls without going to a judge or informing the news organization being targeted. They have previously been released only in heavily redacted form.
Media advocates said the documents show that the FBI imposes few constraints on itself when it bypasses the requirement to go to court and obtain subpoenas or search warrants before accessing journalists’ information.
The rules stipulate that obtaining a journalist’s records with a national security letter requires the signoff of the FBI’s general counsel and the executive assistant director of the bureau’s National Security Branch, in addition to the regular chain of approval. Generally speaking, there are a variety of FBI officials, including the agents in charge of field offices, who can sign off that an NSL is “relevant” to a national security investigation.
There is an extra step under the rules if the NSL targets a journalist in order “to identify confidential news media sources.” In that case, the general counsel and the executive assistant director must first consult with the assistant attorney general for the Justice Department’s National Security Division.
But if the NSL is trying to identify a leaker by targeting the records of the potential source, and not the journalist, the Justice Department doesn’t need to be involved.
The guidelines also specify that the extra oversight layers do not apply if the journalist is believed to be a spy or is part of a news organization “associated with a foreign intelligence service” or “otherwise acting on behalf of a foreign power.” Unless, again, the purpose is to identify a leak, in which case the general counsel and executive assistant director must approve the request.
“These supposed rules are incredibly weak and almost nonexistent — as long as they have that second signoff, they’re basically good to go,” said Trevor Timm, executive director of the Freedom of the Press Foundation, which has sued the Justice Department for the release of these rules. “The FBI is entirely able to go after journalists and with only one extra hoop they have to jump through.”
?
DIOG-Appendix-Media-NSLs
4 pages
A spokesperson for the FBI, Christopher Allen, declined to comment on the rules or say if they had been changed since 2013, except to say that they are “very clear” that “the FBI cannot predicate investigative activity solely on the exercise of First Amendment rights.”
The Obama administration has come under criticism for bringing a record number of leak prosecutions and aggressively targeting journalists in the process. In 2013, after it came out that the Justice Department had secretly seized records from phone lines at the Associated Press and surveilled Fox News reporter James Rosen, then-Attorney General Eric Holder tightened the rules for when prosecutors could go after journalists. The new policies emphasized that reporters would not be prosecuted for “newsgathering activities,” and that the government would “seek evidence from or involving the news media” as a “last resort” and an “extraordinary measure.” The FBI could not label reporters as co-conspirators in order to try to identify their sources — as had happened with Rosen — and it became more difficult to get journalists’ phone records without notifying the news organization first.
Yet these changes did not apply to NSLs. Those are governed by a separate set of rules, laid out in a classified annex to the FBI’s operating manual, known as the Domestic Investigations and Operations Guide, or DIOG. The full version of that guide, including the classified annex, was last made public in redacted form in 2011.
The section of the annex on NSLs obtained by The Intercept dates from October 2013 and is marked “last updated October 2011.” It is classified as secret with an additional restriction against distribution to any non-U.S. citizens.
Emails from FBI lawyers in 2015, which were released earlier this year to the Freedom of the Press Foundation, reference an update to this portion of the DIOG, but it is not clear from the heavily redacted emails what changes were actually made.
In a January 2015 email to a number of FBI employee lists, James Baker, the general counsel of the FBI, attached the new attorney general’s policy and wrote that “with the increased focus on media issues,” the FBI and Justice Department would “continue to review the DIOG and other internal policy guides to determine if additional changes or requirements are necessary.”
“Please be mindful of these media issues,” he continued, and advised consulting with the general counsel’s office “prior to implementing any techniques targeting the media.” But the email also explicitly notes that the new guidelines do not apply to “national security tools.”
Allen, the FBI spokesperson, told The Intercept in an emailed statement that “the FBI periodically reviews and updates the DIOG as needed” and that “certainly the FBI’s DIOG remains consistent with all [attorney general] guidelines.”
Bruce Brown, executive director of the Reporters Committee for Freedom of the Press, said that the “use of NSLs as a way around the protections in the guidelines is a serious concern for news organizations.”
Last week, the Reporters Committee filed a brief in support of the Freedom of the Press Foundation’s lawsuit for the FBI’s NSL rules and other documents on behalf of 37 news organizations, including The Intercept’s publisher, First Look Media. (First Look also provides funding to both the Reporters Committee and the Freedom of the Press Foundation, and several Intercept staffers serve on the foundation’s board.)
Seeing the rules in their uncensored form, Timm, of the Freedom of the Press Foundation, said that the FBI should not have kept them classified.
“Redacting the fact that they need a little extra signoff from supervisors doesn’t come close to protecting state secrets,” he said.
The FBI issues thousands of NSLs each year, including nearly 13,000 in 2015. Over the years, a series of inspector general reports found significant problems with their use, yet the FBI is currently pushing to expand the types of information it can demand with an NSL. The scope of NSLs has long been limited to basic subscriber information and toll billing information — which number called which, when, and for how long — as well as some financial and banking records. But the FBI had made a habit of asking companies to hand over more revealing data on internet usage, which could include email header information (though not the subject lines or content of emails) and browsing history. The 2013 NSL rules for the media only mention telephone toll records.
Another controversial aspect of NSLs is that they come with a gag order preventing companies from disclosing even the fact that they’ve received one. Court challenges and legislative changes have loosened that restriction a bit, allowing companies to disclose how many NSLs they receive, in broad ranges, and in a few cases, to describe the materials the FBI had demanded of them in more detail. Earlier this month, Yahoo became the first company to release three NSLs it had received in recent years.
It’s unclear how often the FBI has used NSLs to get journalists’ records. Barton Gellman, of the Washington Post, has said that he was told his phone records had been obtained via an NSL.
The FBI could also potentially demand journalists’ information through an application to the Foreign Intelligence Surveillance Court (or FISA court), which, like NSLs, would also not be covered by the Justice Department policy. The rules for that process are still obscure. The emails about revisions to the FBI guidelines reference a “FISA portion,” but most of the discussion is redacted.
For Brown, of the Reporters Committee, the disclosure of the rules “only confirms that we need information about the actual frequency and context of NSL practice relating to newsgathering and journalists’ records to assess the effectiveness of the new guidelines.”
Top photo: Jerry Delakas, 63, a longtime newspaper vendor in Manhattan’s Cooper Square, stands by his newsstand on April 3, 2012, in New York City.
Cora Currier
January 31 2017, 12:37 p.m.
Find this story at 31 January 2017
Copyright https://theintercept.com/
DESPITE ANTI-PROFILING RULES, THE FBI USES RACE AND RELIGION WHEN DECIDING WHO TO TARGET7 februari 2017
The bureau still claims considerable latitude to use race, ethnicity, nationality, and religion in deciding which people and communities to investigate.
President Trump has inherited a vast domestic intelligence agency with extraordinary secret powers. A cache of documents offers a rare window into the FBI’s quiet expansion since 9/11.
ONE OF THE Obama administration’s high-profile criminal justice reform efforts was a new policy that purported to ban racial profiling in federal law enforcement. But internal policy guidelines The Intercept has obtained show that the FBI has left its racial profiling practices virtually unchanged, and that the bureau still claims considerable latitude to use race, ethnicity, nationality, and religion in deciding which people and communities to investigate.
The issue of profiling by federal law enforcement and immigration authorities has taken on new urgency with the inauguration of Donald Trump, who as a candidate called Mexican immigrants rapists and criminals and was slow to denounce white supremacist supporters. Among his first moves in office has been an executive order banning immigration from a list of majority-Muslim countries.
The FBI updated its policy on racial profiling as recently as March 3, 2016, in a section of its main governing manual, known as the Domestic Investigations and Operations Guide. (The Intercept is publishing the 2011 edition of the DIOG in its entirety, along with the updated section on profiling.) The guidelines make clear that when an FBI agent is deciding whether or how to investigate someone, he or she can consider factors like race, nationality, or ethnicity so long as these factors are clearly relevant and coincide with other reasons for suspicion. And when the FBI selects communities on which to gather intelligence — in order to generate what the bureau calls “domain awareness” — it also allows itself to take such factors into consideration.
The only policy change on profiling added in the five-year gap between the manuals — and in the wake of former Attorney General Eric Holder’s anti-profiling initiative — is that the new version reflects an expanded definition of profiling, which covers not just race and ethnicity but also gender identification, national origin, religion, and sexual orientation.
Civil liberties groups, which have long objected to the FBI’s practice of surveilling ethnic communities and seeding them with informants, say that the guidelines leave the door open to alarming forms of monitoring.
“The fact that the DIOG hasn’t changed is exactly what we had feared,” said Ferhana Khera, president of the group Muslim Advocates. “While we appreciate that Attorney General Holder expanded the categories to include religion, national origin, and sexual orientation, we were concerned that he did not go far enough in making those revisions, and that it still gave a green light to the FBI to engage in activities that would target our communities.”
The flexible guidelines on racial profiling show that the FBI’s formal procedures reflect the blunt talk of its leadership. In late 2014, when the Department of Justice announced the new rules, Holder, who had spoken about his own experiences being stopped by the police as a young black man, heralded them as an important step to ensure “sound, fair, and strong policing practices.”
Yet the very next day, FBI Director James Comey insisted that the new guidance would have no impact on his agency’s counterterrorism investigations or on its ability to look for informants and map Muslim communities and businesses in the United States.
“No, nothing. It doesn’t require any change to our policies or procedures,” he said in a press briefing.
Behind the scenes, the FBI had reportedly pushed back against any rules from Holder that would ban consideration of race, ethnicity, and religion in counterterrorism investigations. Federal law enforcement has long been barred from scrutinizing someone solely on the basis of race or ethnicity, unless chasing down a particular suspect of a crime. But rules in effect under the administration of George W. Bush included a blanket exception for national security and border investigations.
Holder’s guidelines retain significant loopholes. For example, they explicitly permit cultivating sources of a particular ethnicity when investigating a terrorist organization made up of members of that ethnic group. They also allow mapping a city and looking at “population demographics, including concentrations of ethnic demographics,” if that information is collected “pursuant to an authorized intelligence or investigative purpose.” Moreover, the guidelines apply only to federal law enforcement, not to local and state police, and not to federal agents near the borders.
The FBI argues that agents need such latitude in order to recruit informants who might have insight into terrorist networks. For example, the bureau has suggested, agents might look within Somali communities in the United States for people who might have information about the Shabab militant group.
“When there is a threat from outside the country, it makes sense to know who inside the country might be able to help law enforcement,” Comey argued in 2014. “It is about knowing the neighborhoods: What’s it like, where’s the industry, where are the businesses, are there particular groups of folks who live in a particular area?”
In recent years, the American Civil Liberties Union obtained documents showing FBI field offices investigating ethnic communities based on broad generalities. For example, a 2009 document from San Francisco justified mapping that city’s Chinese neighborhoods because “within this community there has been organized crime for generations.” In Michigan, the FBI looked at the “large Middle Eastern and Muslim population” as “prime territory for attempted radicalization.”
Civil liberties groups, and Muslim groups in particular, oppose this logic, noting that the overwhelming majority of Muslim Americans have nothing to do with terror networks.
“Imagine the FBI deciding to collect data on where all Italian-Americans live, the churches that they worship in, and their charitable giving activities, because they’re concerned about the mob,” said Khera. “Rather than focusing on where there’s evidence of particular criminal activity, they collect data in one broad brush on an entire ethnic group.”
The mapping policy has also come under criticism from those who see it as a representation of the FBI’s mutation after the 9/11 attacks into an intelligence agency with broad investigative powers aimed at counterterrorism rather than at solving specific crimes.
Faiza Patel, co-director of the Liberty and National Security Program at the Brennan Center for Justice, said that she worried about the FBI combining mapping with “the vast reams of public information that are now available about everybody (including, for example, social media posts and travel records obtained through license plate readers) to create detailed portraits of each of us and of entire communities.”
An FBI spokesperson said the guidelines under which the FBI operates “are very clear that the FBI cannot predicate investigative activity solely on the exercise of First Amendment rights, including freedom of religion, or on race or ethnicity.”
NOGALES, AZ – FEBRUARY 26: A U.S. Border Patrol agent speaks to a driver at a checkpoint from Mexico into the United States on February 26, 2013 north of Nogales, Arizona. Some 15,000 people cross between Mexico and the U.S. each day in Nogales, Arizona’s busiest border crossing. U.S. Customs and Border Patrol agents are tasked with stopping the illegal flow of drugs into the U.S. (Photo by John Moore/Getty Images) A U.S. Border Patrol agent speaks to a driver at a checkpoint north of Nogales, Ariz., on Feb. 26, 2013. Photo: John Moore/Getty Images
THE FBI’S PROFILING loopholes raise questions about the extent to which other federal law enforcement agencies will amend their practices — especially under a Trump administration that has pledged to take a hard line on immigration and counterterrorism. The Department of Homeland Security, U.S. Customs and Border Protection, and the Transportation Security Administration have all been expected to put out new policies, which are “badly overdue,” said Chris Rickerd, policy counsel for the ACLU.
The Department of Homeland Security, which oversees CBP and TSA, does have its own policy against racial profiling, but it has a broad loophole for national security. CBP’s current guidance states that “the use of nationality as a screening, enforcement, or investigative criterion is appropriate for the vast majority of CBP functions and operations.” A CBP spokesperson told The Intercept this fall that the agency follows Holder’s 2014 rules but did not elaborate on whether or how it will update its own guidance.
A spokesperson for DHS told The Intercept last month that the department “has reviewed the Attorney General’s guidelines on racial, ethnic, religious and other profiling by federal law enforcement and is in the process of developing our own department-wide standards.”
Activist groups have documented the targeting of Latino drivers for traffic stops and other examples of Border Patrol activity that extends well beyond actual border crossings. Last year, The Intercept reported on FBI cooperation with CBP to create lists of passengers arriving from “countries of interest” who might make good informants.
The TSA has also been singled out for allegedly profiling minority passengers for extra screening. In April, a Minnesota TSA manager said that he was told by his supervisor to look for Somali-Americans.
“Absent a specific, reliable suspect description, no law enforcement agency should engage in profiling based on protected characteristics because such profiling is ineffective and offensive,” Rickerd said. “We call on CBP and TSA to make clear that discriminatory enforcement plays no role in their operations, as well as to implement public data collection and training reforms to be vigilant against profiling.”
Top photo: Somali Muslims pray during a soccer tournament in St. Paul, Minn.
Cora Currier
January 31 2017, 1:04 p.m.
Find this story at 31 January 2017
Copyright https://theintercept.com/
US misfires in online fight against Islamic State7 februari 2017
TAMPA, Fla. (AP) — On any given day at MacDill Air Force Base, web crawlers scour social media for potential recruits to the Islamic State group. Then, in a high-stakes operation to counter the extremists’ propaganda, language specialists employ fictitious identities and try to sway the targets from joining IS ranks.
At least that’s how the multimillion-dollar initiative is being sold to the Defense Department.
A critical national security program known as “WebOps” is part of a vast psychological operation that the Pentagon says is effectively countering an enemy that has used the internet as a devastating tool of propaganda. But an Associated Press investigation found the management behind WebOps is so beset with incompetence, cronyism and flawed data that multiple people with direct knowledge of the program say it’s having little impact.
Several current and former WebOps employees cited multiple examples of civilian Arabic specialists who have little experience in counter-propaganda, cannot speak Arabic fluently and have so little understanding of Islam they are no match for the Islamic State online recruiters.
It’s hard to establish rapport with a potential terror recruit when — as one former worker told the AP — translators repeatedly mix up the Arabic words for “salad” and “authority.” That’s led to open ridicule on social media about references to the “Palestinian salad.”
Four current or former workers told the AP that they had personally witnessed WebOps data being manipulated to create the appearance of success and that they had discussed the problem with many other employees who had seen the same. Yet the companies carrying out the program for the military’s Central Command in Tampa have dodged attempts to implement independent oversight and assessment of the data.
Central Command spokesman Andy Stephens declined repeated requests for information about WebOps and other counter-propaganda programs, which were launched under the Obama administration. And he did not respond to detailed questions the AP sent on Jan. 10.
The AP investigation is based on Defense Department and contractor documents, emails, photographs and interviews with more than a dozen people closely involved with WebOps as well as interviews with nearly two dozen contractors. The WebOps workers requested anonymity due to the sensitive nature of the work and because they weren’t authorized to speak publicly.
The information operations division that runs WebOps is the command’s epicenter for firing back at the Islamic State’s online propaganda machine, which uses the internet to sway public opinion in a swath of the globe that stretches from Central Asia to the Horn of Africa.
Early last year, the government opened bidding on a new counter-propaganda contract — separate from WebOps— that is worth as much as $500 million. Months after the AP started reporting about the bidding process, the Naval Criminal Investigative Service told the AP that it had launched an investigation. NCIS spokesman Ed Buice said the service is investigating a whistleblower’s “allegations of corruption” stemming from how the contract was awarded.
The whistleblower’s complaint alleges multiple conflicts of interest that include division officers being treated to lavish dinners paid for by a contractor. The complaint also alleges routine drinking at the office where classified work is conducted. The drinking was confirmed by multiple contractors, who spoke to AP and described a frat house atmosphere where happy hour started at 3 p.m.
One of the most damning accusations leveled by the whistleblower is against Army Col. Victor Garcia, who led the information operations division until July 2016, when he moved to a new assignment at Special Operations Command, also in Tampa. The whistleblower contended that Garcia steered the contract to a team of vendors that included a close friend’s firm. The whistleblower requested anonymity for fear of professional retribution.
The AP obtained a screen-grab from a Facebook page that shows Garcia and the friend at a tiki bar in Key Largo two weeks before the winning team was officially announced Sept. 30. The photo was also turned over to NCIS investigators by the whistleblower, who said the photo created a “clear impression and perception of impropriety.”
Garcia, a West Point graduate and decorated officer, denied any wrongdoing and described the complaint as “character assassination.” Garcia, who moved to his new post two months before the contract was decided, said he scrupulously avoided any discussions about the contract with both his friend and his former deputy. His former deputy served on the five-member panel that reviewed all of the bids.
“Because I was aware of these conflicts of interest, I intentionally kept myself out of that process — with any of these contract processes,” Garcia said.
The whistleblower is a senior manager at a company that lost its bid for the work. He told AP that he was investigated for attempting to accept kickbacks on an unrelated government contract. He denied the allegations, which were made four years ago, and no charges have been filed in the case.
The problems with the WebOps operation and the personal bonds underpinning the new contract illustrate challenges awaiting President Donald Trump. He has promised to boost military spending by tens of billions of dollars while also cutting waste at the Defense Department and ensuring that contractors aren’t getting sweetheart deals.
Charles Tiefer, a professor at the University of Baltimore’s law school and a government contracting expert, reviewed AP’s findings and called Central Command’s lack of rigorous oversight inexcusable.
“These people should not be wasting the money consigned to defend us against terrorism,” said Tiefer, who served on a bipartisan Commission on Wartime Contracting. The commission reported in 2011 that at least $31 billion was lost to waste and fraud in Iraq and Afghanistan.
___
“DO YOU SPEAK ARABIC?”
In a large office room filled with cubicles at Central Command, about 120 people, many of them Arabic language specialists, are assigned to fight IS militants on their own turf: the internet.
The WebOps contract is run by Colsa Corp., based in Huntsville, Alabama. A major challenge for Colsa — and contractors working on other national security programs— is finding people who can speak Arabic fluently and can also get security clearances to handle classified material.
The problem, according to six current and former Colsa employees, is that to engage with operatives of the Islamic State, or their potential recruits, you need to be fluent in language, nuance and Islam — and while Colsa has some Arabic experts, those skills are not widely distributed.
“One of the things about jihadis: they are very good in Arabic,” said one specialist who worked on WebOps.
Another former employee said common translation mistakes he personally witnessed, including the “Palestinian salad” example, were the result of the company hiring young people who were faking language abilities.
He mockingly described the conversations between managers and potential hires: “‘Do you speak Arabic?'” he mimicked. “‘Yes. How do you say ‘good morning?’ Oh, you can do that? You are an expert. You are hired.'”
A third specialist said she asked a colleague, who was assigned to analyze material written in Arabic, why he was discarding much of it. While watching a soap opera online, the colleague said the material was irrelevant because it was in Farsi or Urdu. But when she checked, it was indeed Arabic. She has since left WebOps to find more meaningful work, she said.
The WebOps Arabic program focuses on Syria, Iraq and Yemen, but for most of the time Colsa has been running it, it has had no Syrian or Yemeni staff, the AP was told in separate interviews with two current employees and one who left recently.
Engaging in theological discussions on social media with people who are well versed in the Quran is not for beginners. Iraq and Syria are riven with sectarian violence between Shiite and Sunni Muslims, who follow different interpretations of Islam. Multiple workers said that WebOps “experts” often trip up on language that is specific to one sect or region.
“People can tell whether you are local, or whether you are Sunni or Shia,” said another former worker, so poorly crafted messages are not effective. He said he left WebOps because he was disgusted with the work.
A number of the workers complained to AP that a large group on staff from Morocco, in North Africa, were often ignorant of Middle Eastern history and culture — or even the difference between groups the U.S. considers terrorist organizations. The group was so dominant that colleagues jokingly referred to them as “the Moroccan mafia.”
A lot of them “don’t know the difference between Hezbollah and Hamas,” said the employee who left to find more meaningful work. Hezbollah is an Iran-backed Shiite group based in Lebanon. Hamas, based in the Gaza Strip and the West Bank, is the Palestinian branch of the Sunni Muslim Brotherhood.
Cathy Dickens, a vice president for business management and corporate ethics at Colsa Corp., referred questions to CENTCOM, which declined comment.
___
“YOU SHOULDN’T GRADE YOUR OWN HOMEWORK”
To determine whether WebOps actually dissuades people from becoming radicalized, Colsa’s scoring team analyzes the interactions employees have online and tries to measure whether the subjects’ comments reflect militant views or a more tolerant outlook.
Three former members of its scoring team told the AP they were encouraged by a manager to indicate progress against radicalism in their scoring reports even if they were not making any.
The employee who said she left to find meaningful work recalled approaching a Colsa manager to clarify how the scoring was done shortly after starting her job. She said he told her that the bottom line was “the bread we put on the table for our children.”
The boss told her that the scoring reports should show progress, but not too much, so that the metrics would still indicate a dangerous level of militancy online to justify continued funding for WebOps, she said.
She was shocked. “Until my dying day, I will never forget that moment,” she said.
She, like other former employees, spoke only on condition of anonymity for fear of retribution from Colsa that could affect future employment.
The manager she spoke to declined to comment. AP withheld his name because of security concerns.
Employees and managers routinely inflate counts of interactions with potential terrorist recruits, known as “engagements,” according to multiple workers. Engagements are delivered in tweets or comments posted on social media to lists of people and can also be automated. That automation is at times used to inflate the actual number of engagements, said two former workers, including the one who talked about colleagues faking their language abilities.
The worker who left in disgust explained that a single tweet could be programmed to be sent out to all the followers of a target individually, multiple times. So the targets and their followers get the same tweets tagged to them over and over again.
“You send it like a blind copy. You program it to send a tweet every five minutes to the whole list individually from now until tomorrow,” the former employee said. “Then you see the reports and it says yesterday we sent 5,000 engagements. Often that means one tweet on Twitter.” The person said that he saw managers printing out the skewed reports for weekly briefings with CENTCOM officers. But the volume made it look like the WebOps team’s work was “wow, amazing,” he said.
Garcia said Colsa has a done a good job under his watch, that the data is sufficiently scrutinized and the program is succeeding.
In 2014, a group of more than 40 Defense Department data specialists came to Tampa to evaluate the program. Their unclassified report, obtained by AP, identified what one of the authors called “serious design flaws.” For instance, the report found that any two analysts were only 69 percent likely to agree on how to score a particular engagement. The author said a rate of 90 percent or higher is required to draw useful conclusions.
The report found that computers would be as accurate or better than analysts, and could evaluate effectiveness more quickly — and cheaply.
What Central Command really needed, the report said, was outside oversight.
“You shouldn’t grade your own homework,” said the author, a former U.S. military officer and data specialist once stationed at Central Command. The author, one of many people who signed off on the report, spoke on condition of anonymity for fear of professional retribution.
He said the report was given to officers, including Garcia, and to Colsa. The author said the suggestions were not implemented and WebOps managers resisted multiple attempts at oversight. The author said that when he directly appealed to Garcia for outside assessment, an officer under Garcia said the effort would cloud the mission.
“The argument was that WebOps was the only program at Central Command that was directly engaging the enemy and that it couldn’t function if its staff was constantly distracted by assessment,” he said. The argument worked, he said, and Colsa was not forced or instructed to accept outside oversight.
Garcia disputed that account but would not elaborate on what steps were taken to address the Defense Department data specialists’ concerns. The Government Accountability Office issued a report in 2015 on WebOps oversight, but it is classified.
___
“UNTOUCHABLE”
Despite the problems behind the scenes at WebOps, Central Command will play a key role in the new $500 million psychological operations campaign against the Islamic State and other groups. The five-year contract was a hefty commitment to “degrade and ultimately defeat extremist organizations,” according to a document detailing the scope of the work. It would run parallel to WebOps.
The request for bids was announced in April. Four separate teams of companies competed for the contract, including one led by defense giant Northrop Grumman.
From the start, competitors complained among themselves that Simon Bergman, an executive with the British advertising firm M&C Saatchi, had an advantage because he was friends with Garcia. Bergman was working with Northrop to prepare the bid.
A former British officer, Bergman was deployed to Iraq while Garcia was there working on psychological operations during the Iraq war. It was well known that the two men were close, and in recent years, contractors often saw Bergman at CENTCOM offices.
In April, defense contractor CACI International held a meeting in Tampa to discuss the bid. Three contractors on the team said a CACI manager warned a roomful of people that Garcia had already told him that he would decide who got the contract. The manager said that Garcia indicated that having Bergman on the team would help.
So in mid-September, when a photo appeared on Facebook showing Garcia and Bergman together in the Florida Keys, it did not look good in the eyes of many contractors. Garcia’s girlfriend captured the old friends inside the Tiki Bar at Gilbert’s Resort in Key Largo. They were on her Facebook page, shoulder-to-shoulder, smiling and giving the thumbs up.
Within days, the photos had been taken down from her page.
Two weeks later, the government announced Northrop had won the contract. Its team included M&C Saatchi, Bergman’s firm.
A panel led by the U.S. General Services Administration chose the winner of the contract. Chris Hamm, a senior GSA acquisition executive, said a five-member team scrutinized the technical merits of the proposals for the contract. That team was led by two GSA officials and included three military officers — one of whom was Marine Corps Lt. Col. Matt Coughlin, who reported directly to Garcia before Garcia left his post. Coughlin is the information operations’ liaison with contractors.
In an interview with AP, Hamm said the contract award was handled properly.
“The process is designed to avoid bias,” Hamm said.
But several other contractors on losing teams said Coughlin would clearly have been the person on the panel with the most sway, because of both his technical expertise and the fact that he represented CENTCOM. And given Coughlin’s ties with Garcia, they found that troubling.
Garcia said that while the bids were being considered, he stayed away from any discussions of it with Coughlin, his deputy. So he didn’t even realize the award announcement was imminent when he went with Bergman to the Keys.
“I wasn’t involved with the contracting process at all,” Garcia said. “So I had no idea what the timing of the contract was.”
When asked why the photo with Bergman was taken off Facebook, Garcia declined to comment.
Bergman said that his friendship with Garcia, one of many he has with military officers, is irrelevant. He noted that M&C Saatchi was only a subcontractor.
“I don’t see why my relationship with somebody in the military would have any influence over anything,” he said.
The whistleblower complaint however, filed in December with Central Command’s inspector general, contended the photo of Garcia and Bergman created a “clear impression and perception of impropriety.”
The four-page complaint, now under investigation by NCIS, said the atmosphere at the CENTCOM division, with routine drinking at the office and myriad conflicts of interest, led to an “air of untouchable invincibility.”
Several contractors who spoke to AP, among the nearly two dozen either bidding for work or involved in CENTCOM information operations, said they suspected undue influence in the decision for the $500 million contract. In his complaint, the whistleblower alleges that Garcia told him directly at one point that “any team must include Simon Bergman.”
All the contractors asked for anonymity to discuss sensitive work because they feared repercussions for their companies.
Colsa, the primary WebOps contractor, was not involved in Northrop’s bid. However, nothing prevents Northrop from bringing the company in as a subcontractor.
That’s the plan, said several contractors who have been briefed by Northrop. Such a move would provide ample funding to keep WebOps running for up to five more years.
___
Associated Press researchers Jennifer Farrar, Rhonda Shafner and Monika Mathur contributed to this report.
By DESMOND BUTLER and RICHARD LARDNER
Jan. 31, 2017
Find this story 31 January 2017
© copyright 2017 Associated Press
Digital Counterinsurgency How to Marginalize the Islamic State Online7 februari 2017
The Islamic State, or ISIS, is the first terrorist group to hold both physical and digital territory: in addition to the swaths of land it controls in Iraq and Syria, it dominates pockets of the Internet with relative impunity. But it will hardly be the last. Although there are still some fringe terrorist groups in the western Sahel or other rural areas that do not supplement their violence digitally, it is only a matter of time before they also go online. In fact, the next prominent terrorist organization will be more likely to have extensive digital operations than control physical ground.
Although the military battle against ISIS is undeniably a top priority, the importance of the digital front should not be underestimated. The group has relied extensively on the Internet to market its poisonous ideology and recruit would-be terrorists. According to the International Centre for the Study of Radicalisation and Political Violence, the territory controlled by ISIS now ranks as the place with the highest number of foreign fighters since Afghanistan in the 1980s, with recent estimates putting the total number of foreign recruits at around 20,000, nearly 4,000 of whom hail from Western countries. Many of these recruits made initial contact with ISIS and its ideology via the Internet. Other followers, meanwhile, are inspired by the group’s online propaganda to carry out terrorist attacks without traveling to the Middle East.
ISIS also relies on the digital sphere to wage psychological warfare, which directly contributes to its physical success. For example, before the group captured the Iraqi city of Mosul in June 2014, it rolled out an extensive online campaign with text, images, and videos that threatened the city’s residents with unparalleled death and destruction. Such intimidation makes it easier to bring populations under ISIS’ control and reduces the likelihood of a local revolt.
Foiling ISIS’ efforts on the Internet will thus make the group less successful on the battlefield. To date, however, most digital efforts against ISIS have been too limited, focusing on specific tactics, such as creating counternarratives to extremism, in lieu of generating a comprehensive strategy. Instead of resorting to a single tool, opponents should treat this fight as they would a military confrontation: by waging a broad-scale counterinsurgency.
KNOW YOUR ENEMY
The first step of this digital war is to understand the enemy. Most analyses of ISIS’ online footprint focus on social media. In a Brookings Institution report, J. M. Berger and Jonathon Morgan estimated that in late 2014, 46,000 Twitter accounts openly supported the group. Back then, strategies for fighting ISIS online centered on simply removing such accounts.
Social media platforms are just the tip of the iceberg, however. ISIS’ marketing tools run the gamut from popular public platforms to private chat rooms to encrypted messaging systems such as WhatsApp, Kik, Wickr, Zello, and Telegram. At the other end of the spectrum, digital media production houses such as the Al-Furqaan Foundation and the Al-Hayat Media Center—presumably funded by and answering to ISIS’ central leadership—churn out professional-grade videos and advertisements.
The first step of this digital war is to understand the enemy.
Yet understanding the full extent of ISIS’ marketing efforts without knowing who is behind them is not an actionable insight; it is like understanding how much land the group controls without knowing what kinds of fighters occupy it and how they hold it. An effective counterinsurgency requires comprehending ISIS’ hierarchy. Unlike al Qaeda, which comprises a loose cluster of isolated cells, ISIS resembles something akin to a corporation. On the ground in Iraq and Syria, a highly educated leadership sets its ideological agenda, a managerial layer implements this ideology, and a large rank and file contributes fighters, recruiters, videographers, jihadist wives, and people with every other necessary skill. This hierarchy is replicated online, where ISIS operates as a pyramid consisting of four types of digital fighters.
At the top sits ISIS’ central command for digital operations, which gives orders and provides resources for disseminating content. Although its numbers are small, its operations are highly organized. According to Berger, for example, the origins of most of ISIS’ marketing material on Twitter can be traced to a small set of accounts with strict privacy settings and few followers. By distributing their messages to a limited network outside the public eye, these accounts can avoid being flagged for terms-of-service violations. But the content they issue eventually trickles down to the second tier of the pyramid: ISIS’ digital rank and file.
The U.S. Central Command Twitter feed after it was apparently hacked by people claiming to be Islamic State, January, 2015.
STAFF / REUTERS
The U.S. Central Command Twitter feed after it was apparently hacked by people claiming to be Islamic State sympathizers, January, 2015.
This type of fighter may or may not operate offline as well. He and his ilk run digital accounts that are connected to the central command and disseminate material through guerrilla-marketing tactics. In June 2014, for example, Islamic State supporters hijacked trending hashtags related to the World Cup to flood soccer fans with propaganda. Because they operate on the frontline of the digital battlefield, these fighters often find their accounts suspended for terms-of-service violations, and they may therefore keep backup accounts. And to make each new account appear more influential than it really is, they purchase fake followers from social media marketing firms; just $10 can boost one’s follower count by tens of thousands.
Then there are the vast numbers of radical sympathizers across the globe, who constitute ISIS’ third type of digital fighter. Unlike the rank and file, they do not belong to ISIS’ official army, take direct orders from its leadership, or reside in Iraq or Syria. But once drawn into ISIS’ echo chamber by the rank and file, they spend their time helping the group disseminate its radical message and convert people to its cause. These are often the people who identify and engage potential recruits on an individual level, developing online relationships strong enough to result in physical travel. In June, for example, The New York Times documented how a radical Islamist in the United Kingdom met a young woman from Washington State online and convinced her to consider heading to Syria.
Although joining ISIS’ operations in Iraq and Syria may be illegal, spreading extremism online is not. These fighters are masters at taking advantage of their right to free speech, and their strength lies both in their numbers and in their willingness to mimic ISIS’ official line without having to receive direct orders from its leadership.
ISIS’ fourth type of digital fighter is nonhuman: the tens of thousands of fake accounts that automate the dissemination of its content and multiply its message. On Twitter, for example, so-called Twitter bots automatically flood the digital space with retweets of terrorist messages; countless online tutorials explain how to write these relatively simple programs. In comment sections on Facebook, YouTube, and other sites, such automated accounts can monopolize the conversation with extremist propaganda and marginalize moderate voices. This programmable army ensures that whatever content ISIS’ digital central command issues will make its way across as many screens as possible.
RECAPTURING DIGITAL TERRITORY
Much of the debate over how to combat ISIS on the ground has been binary, split between those proposing containment and those insisting on its defeat. The best strategy for fighting it online, however, is something else: marginalization. The result would be something similar to what has happened to the Revolutionary Armed Forces of Colombia, or FARC, the narcoterrorist group that grabbed headlines throughout the 1990s for its high-profile kidnappings and savage guerrilla warfare. Today, the group has been neither disbanded nor entirely defeated, but its ranks have largely been driven into the jungle.
Along the same lines, ISIS will be neutered as a digital threat when its online presence becomes barely noticeable. The group would find it either too risky or tactically impossible to commandeer control of social media platforms and public chat rooms, and its digital content would be hard to discover. Incapable of growing its online ranks, it would see its ratio of digital fighters to human fighters fall to one to one. It would be forced to operate primarily on the so-called dark Web, the part of the Internet not indexed by mainstream search engines and accessible to only the most knowledgeable users.
Compelling terrorist organizations to operate in secret does make plots more difficult to intercept, but in the case of ISIS, that is a tradeoff worth making. Every day, the group’s message reaches millions of people, some of whom become proponents of ISIS or even fighters for its cause. Preventing it from dominating digital territory would help stanch the replenishment of its physical ranks, reduce its impact on the public psyche, and destroy its most fundamental means of communication.
The Islamic State will be neutered as a digital threat when its online presence becomes barely noticeable.
It will take a broad coalition to marginalize ISIS online: from governments and companies to nonprofits and international organizations. First, they should separate the human-run accounts on social networks from the automated ones. Next, they should zero in on ISIS’ digital central command, identifying and suspending the specific accounts responsible for setting strategy and giving orders to the rest of its online army. When that is done, digital society at large should push the remaining rank and file into the digital equivalent of a remote cave.
The suspension of accounts needs to be targeted—more like kill-or-capture raids than strategic bombing campaigns. Blanket suspensions covering any accounts that violate terms of service could not guarantee that the leadership will be affected. In fact, as Berger and Morgan’s research highlighted, ISIS has learned to protect its digital leadership from suspension by keeping its activities hidden behind strict privacy settings.
This is not to downplay the importance of banning users who break the rules and distribute terrorist content. Technology companies have become skilled at doing just that. In 2014, the British Counter Terrorism Internet Referral Unit, a service run by London’s Metropolitan Police, worked closely with such companies as Google, Facebook, and Twitter to flag more than 46,000 pieces of violent or hateful content for removal. That same year, YouTube took down approximately 14 million videos. In April 2015, Twitter announced that it had suspended 10,000 accounts linked to ISIS on a single day. Such efforts are valuable in that they provide a cleaner digital environment for millions of users. But they would be doubly so if the leadership that orders terrorist content to be distributed were also eliminated.
That, in turn, will require mapping ISIS’ network of accounts. One way law enforcement could make inroads into this digital network is by covertly infiltrating ISIS’ real-world network. This technique has already achieved some success. In April, the FBI arrested two young women accused of plotting attacks in New York City after a two-year investigation that had relied extensively on their social media activity for evidence. Law enforcement should scale such efforts to focus on the digital domain and target ISIS’ digital leadership, suspending the accounts of its members and arresting them in certain cases.
The U.S. Central Command Twitter feed after it was apparently hacked by people claiming to be Islamic State
STAFF / REUTERS
A computer screenshot shows the U.S. Central Command Twitter feed after it was apparently hacked by people claiming to be Islamic State sympathizers January 12, 2015.
Once ISIS’ online leadership has been separated from the rank and file, the rank and file will become significantly less coordinated and therefore less effective. The next step would be to reduce the group’s level of online activity overall, so that it is forced into the margins of digital society. During this phase, the danger is that online, ISIS might splinter into less coordinated but more aggressive rogue groups. With a higher tolerance for risk, these groups might undertake “doxing” of opponents of ISIS, whereby the private information (such as the address and social security number) of a target is revealed, or “distributed denial-of-service attacks,” which can take down an entire website.
To mitigate this threat, the digital fighters’ activities need to be diverted away from extremism altogether. This is where counternarratives against violent extremism can come in. Over the last two years, several notable efforts have been launched, including video series produced by the Arab Center for Scientific Research and Humane Studies and the Institute for Strategic Dialogue. To be effective, these campaigns need to reflect the diversity of the group’s ranks: professional jihadist fighters, former Iraqi soldiers, deeply religious Islamic scholars, young men in search of adventure, local residents joining out of fear or ambition. Moderate religious messages may work for the pious recruit, but not for the lonely British teenager who was promised multiple wives and a sense of belonging in Syria. He might be better served by something more similar to suicide-prevention and anti-bullying campaigns.
For maximum effect, these campaigns should be carefully targeted. An antiextremist video viewed by 50,000 of the right kinds of people will have a greater impact than one seen by 50 million random viewers. Consider Abdullah-X, a cartoon series marketed through a YouTube campaign funded by the European Union. Its pilot episode was promoted using targeted advertising oriented toward those interested in extremist Islam. Eighty percent of the YouTube users who watched it found it through targeted ads rather than through unrelated searches.
Given the diversity of ISIS’ digital rank and file, however, betting on counternarratives alone would be too risky. To combat extremists who have already made up their minds, the coalition should target their willingness to operate in the open. Al Qaeda has taken pains to keep its digital operations secret and works under the cover of passwords, encryption, and rigid privacy settings. These tactics have made the group notoriously difficult to track, but they have also kept its digital footprint miniscule. Likewise, ISIS’ rank and file should be forced to adopt similar behavior.
Achieving this will require creativity. For example, governments should consider working with the news media to aggressively publicize arrests that result from covert infiltration of ISIS’ online network. If any new account with which a digital soldier interacts carries the risk of being that of an undercover agent, it becomes exponentially more hazardous to recruit new members. Law enforcement could also create visual presentations showing how police investigations of digital extremists’ accounts can lead to arrests, thereby telling the cautionary tale that a single mistake can cause the downfall of a digital soldier and his entire social network.
Within the next few years, new high-tech tools may become available to help governments marginalize digital rank-and-file terrorists. One is machine learning. Just as online advertisers can target ads to users with a particular set of interests, law enforcement could use algorithmic analysis to identify, map, and deactivate the accounts of terrorist supporters. Assisted by machine learning, such campaigns could battle ISIS online with newfound precision and reach a scale that would not be possible with a manual approach.
It is worth noting that just like a physical counterinsurgency, a digital counterinsurgency is more likely to succeed when bolstered by the participation of local communities. All the online platforms ISIS uses have forum moderators, the equivalent of tribal leaders and sheiks. The technology companies that own these platforms have no interest in seeing their environments flooded with fake accounts and violent messages. They should therefore give these moderators the tools and training to keep their communities safe from extremist messaging. Here again, machine learning could someday help, by automatically identifying terrorist messages and either highlighting them for moderators or blocking them on their behalf.
ACCESS DENIED
At first glance, ISIS can look hopelessly dominant online, with its persistent army of propaganda peddlers and automated trolls. In fact, however, the group is at a distinct disadvantage when it comes to resources and numbers. The vast majority of Internet users disagree with its message, and the platforms that its fighters use belong to companies that oppose its ideology.
There is no doubt that undertaking a digital counterinsurgency campaign represents uncharted territory. But the costs of failure are low, for unlike in a real-world counterinsurgency, those who fight digitally face no risk of injury or death. That is yet another factor making ISIS particularly vulnerable online, since it means that the group’s opponents can apply and discard new ways of fighting terrorism quickly to hone their strategy.
The benefits of digitally marginalizing ISIS, meanwhile, are manifold. Not only would neutering the group online improve the lives of millions of users who would no longer be as likely to encounter the group’s propaganda; it would also make the group’s real-world defeat more imminent. As ISIS’ digital platforms, communication methods, and soldiers became less accessible, the group would find it harder to coordinate its physical attacks and replenish its ranks. And those fighting it online would gain valuable experience for when the time came to fight the next global terrorist group trying to win the Internet.
By Jared Cohen
November/December 2015 Issue
Find this story at December 2015
©2017 Council on Foreign Relations, Inc.
THE CRIMES OF SEAL TEAM 67 februari 2017
Officially known as the Naval Special Warfare Development Group, SEAL Team 6 is today the most celebrated of the U.S. military’s special mission units. But hidden behind the heroic narratives is a darker, more troubling story of “revenge ops,” unjustified killings, mutilations, and other atrocities — a pattern of criminal violence that emerged soon after the Afghan war began and was tolerated and covered up by the command’s leadership.
1
THE WEDDING PARTY MASSACRE
ON THE AFTERNOON of March 6, 2002, Lt. Cmdr. Vic Hyder and more than two dozen operators from SEAL Team 6 boarded two Chinook helicopters en route to eastern Afghanistan hoping that within hours, they would kill or capture Osama bin Laden.
Earlier that evening, general officers from the Joint Special Operations Command had scrambled the SEALs after watching a Predator drone video feed of a man they suspected was bin Laden set off in a convoy of three or four vehicles in the Shah-i-Kot Valley, where al Qaeda forces had fortified themselves. Although the video had revealed no weapons, and the generals had only tenuous intelligence that the convoy was al Qaeda — just suspicions based on the color of the man’s flowing white garb and the deference others showed him — they were nervous that bin Laden might get away again, as he had a few months earlier after the bombing of the Tora Bora mountains in December 2001. This was a crucial moment: Kill bin Laden now and the war could be over after only six months. The vehicles were headed east toward the Pakistani border, as if they were trying to escape. The mission was code-named Objective Bull.
Afghanistan’s Paktia province is about the size of New Hampshire, with 10,000-foot ridgelines and arid valleys with dried riverbeds below, nestled along the border with Pakistan’s tribal areas. The prominent mountain range often served as the last geographic refuge for retreating forces entering Pakistan. As the special operations helicopters approached the convoy from the north and west, Air Force jets dropped two bombs, halting the vehicles and killing several people instantly.
That was not how the SEALs wanted the mission to develop. Inside the helicopters, some of the operators had pushed to hold off any air attack, arguing that they had plenty of time to intercept the convoy before it reached the Pakistani border. “The reason SEAL Team 6 exists is to avoid bombs and collateral damage,” said a retired SEAL Team 6 member who was on the mission. “We said, ‘Let us set down and take a look at the convoy to determine if it’s al Qaeda.’ Instead, they dropped several bombs.”
The bombing stopped the convoy along a dry wadi, or ravine, with two of the trucks approximately a kilometer apart. Survivors began to flee the wreckage, and over the radio, Hyder and his team heard the order that the convoy was now in a “free fire zone,” allowing the Chinooks’ gunners to fire at anyone deemed a threat, regardless of whether they were armed. The SEALs had no authority over the helicopter gunners.
The two Chinooks landed separately, one near each end of the convoy. Both teams exited the helicopters to find a grim scene. The SEALs with Hyder came out and separated into two groups. One, led by an enlisted operator, took in the damage to one of the vehicles. Men, women, and a small girl, motionless and in the fetal position, appeared dead. Inside the vehicle were one or two rifles, as is customary in Afghanistan, but none of the men wore military clothing or had any extra ammunition. “These were family weapons,” said the retired SEAL.
The SEALs from the other helicopter immediately headed up a steep hill after landing to locate an armed man who had been shot from the helicopter. When they reached the hilltop, the operators looked down in disbelief at women and children, along with the man — all were dead or mortally wounded from the spray of gunfire from the Chinook’s gunners, who had unloaded after the free fire zone had been declared. They realized the man had been trying to protect the women and children.
Other SEALs on the ground proceeded as though the survivors were combatants. Hyder and an enlisted operator named Monty Heath had gone in a different direction and saw a survivor flee the bombed vehicle toward a nearby berm. Heath fired once, hitting the man, sending him tumbling down the back side of the small rise.
At that point, Hyder began assessing the damage and surveying the dead. “I was going around to the different KIAs with my camera to take photos,” Hyder told me in an interview, using the military term for enemies killed in action. “It was a mess.”
Hyder said that he and a few other SEALs began to bury the casualties near a ravine by piling rocks over them. As he did so, he approached the man Heath had shot. “He was partially alive, faced down, his back to me, and he rolled over. I shot him, finished him. He was dying, but he rolled over and I didn’t know whether he was armed or not. That was the end of that.” Hyder said that his single shot had blasted open the man’s head.
According to Hyder, the encounter ended there. But the retired SEAL who was on the mission tells a different story. According to this source, after shooting the man, who turned out to be unarmed, Hyder proceeded to mutilate his body by stomping in his already damaged skull. When Heath, who witnessed Hyder’s actions, reported them to his team leader in the presence of other members of the team, “several of the guys turned and walked away,” said the retired SEAL. “They were disgusted.” He quoted Heath as saying, “I’m morally flexible but I can’t handle that.” Heath refused to comment for this article.
The retired SEAL, who spent the better part of two decades at the command, said he never asked Hyder why he mutilated the corpse. It wasn’t necessary. He assumed it was a twisted act of misplaced revenge over the previous days’ events — specifically, the gruesome death of Hyder’s teammate Neil Roberts.
reset-5-1484005850 Top: Photo of helicopter on Takur Ghar. Bottom left: Screengrab from drone feed during the battle of Roberts Ridge. Bottom right: Candid photo of U.S. Navy SEAL Neil Roberts. Photos: U.S. Department of Defense; Screengrab from video by U.S. Department of Defense; U.S. Navy by the Roberts family
LESS THAN 48 HOURS before Objective Bull commenced, a small reconnaissance group from SEAL Team 6’s Red Team had tried to establish an observation post on the 10,000-foot peak of Takur Ghar, overlooking the Shah-i-Kot valley, where forces from the Army’s 10th Mountain Division intended to strike the last redoubt of al Qaeda forces massed in Afghanistan. Neil “Fifi” Roberts, a member of the SEAL recon team, fell 10 feet from the back of a Chinook and was stranded as the helicopter took fire from foreign al Qaeda fighters who were already on the snow-covered mountaintop. Two hours passed before the SEALs in the damaged helicopter were able to return. They didn’t know it, but Roberts was already dead, shot at close range in the head shortly after his helicopter departed the mountaintop. A Predator drone video feed filmed an enemy fighter standing over Roberts’s body for two minutes, trying to behead the dead American with a knife.
Eventually, two other elements of a quick reaction force — one of which included Hyder — landed at the top of Takur Ghar. In the ensuing 17-hour battle with the al Qaeda fighters, six more Americans were killed, and several were wounded. After the bodies were recovered, Hyder and the other members of Red Team were forced to reckon with the mutilation and near beheading of their fellow SEAL. Hyder was new to SEAL Team 6, but as the ranking officer on the ground during that operation, he was technically in charge. He took Roberts’s death hard.
Neil Roberts was the first member of SEAL Team 6 to die in the Afghan war, and among the first elite operators who died after 9/11. Beyond the dehumanizing manner in which the al Qaeda fighters had treated his corpse, Roberts’s death pierced the SEALs’ self-perception of invincibility.
The battle of Roberts Ridge, as it came to be known, has been frequently described in books and press accounts. But what happened during Objective Bull, the assault on the convoy in the Shah-i-Kot Valley, has never been previously reported.
Roberts’s death, and the subsequent operations in eastern Afghanistan during the winter 2002 deployment, left an indelible impression on SEAL Team 6, especially on Red Team. According to multiple SEAL Team 6 sources, the events of that day set off a cascade of extraordinary violence. As the legend of SEAL Team 6 grew, a rogue culture arose that operated outside of the Navy’s established mechanisms for command and investigation. Parts of SEAL Team 6 began acting with an air of impunity that disturbed observers within the command. Senior members of SEAL Team 6 felt the pattern of brutality was not only illegal but rose to the level of war crimes.
“To understand the violence, you have to begin at Roberts Ridge,” said one former member of SEAL Team 6 who deployed several times to Afghanistan. “When you see your friend killed, recover his body, and find that the enemy mutilated him? It’s a schoolyard mentality. ‘You guys want to play with those rules?’ ‘OK.’” Although this former SEAL acknowledged that war crimes are wrong, he understood how they happen. “You ask me to go living with the pigs, but I can’t go live with pigs and then not get dirty.”
SEAL Team 6 patches. Clockwise from top left: Blue Squadron, known as the Pirates; Gold Squadron, known as the Crusaders or Knights; Red Squadron, known as the Redmen; and Silver Squadron.
NO SINGLE MILITARY unit has come to represent American military success or heroism more than SEAL Team 6, officially designated as the Naval Special Warfare Development Group and known in military vernacular as DevGru, Team 6, the Command, and Task Force Blue. Its operators are part of an elite, clandestine cadre. The men who make it through the grueling training represent roughly the top 10 percent of all SEALs. They are taught to live and if necessary die for one another. The extreme risks they take forge extreme bonds.
Made up of no more than 200 SEAL operators when the Afghan war began, SEAL Team 6 was the lesser known of the U.S. military’s elite “special mission” units. Created in 1980 and based at the Dam Neck Annex of Naval Air Station Oceana near Virginia Beach, the command prided itself on its culture of nonconformity with the larger military. The unit’s name itself is part of an attempt to obscure U.S. capabilities. When it was commissioned, the Navy had only two SEAL (Sea, Air, and Land) assault teams, but founding officer Cmdr. Richard Marcinko hoped that the number six would lead the Soviet military to inflate its assessment of the Navy’s SEALs.
When SEAL Team 6 first deployed to Afghanistan in January 2002, the command had three assault teams, Red, Blue, and Gold, each with a mascot. Red Team, known as the Redmen, employed a Native American warrior as a mascot; Blue Team, known as the Pirates, wore the Jolly Roger; and Gold Team, known as the Crusaders or Knights, wore a lion or a crusader’s cross.
The prevailing narrative about SEAL Team 6 in news coverage, bestselling books, and Hollywood movies is unambiguously heroic; it centers on the killing of Osama bin Laden and high-profile rescue missions. With few exceptions, a darker, more troubling story has been suppressed and ignored — a story replete with tactical brilliance on battlefields around the world coupled with a pattern of silence and deceit when “downrange” actions lead to episodes of criminal brutality. The unit’s elite stature has insulated its members from the scrutiny and military justice that lesser units would have faced for the same actions.
This account of the crimes of SEAL Team 6 results from a two-year investigation drawing on interviews with 18 current and former members of the unit, including four former senior leaders of the command. Other military and intelligence officials who have served with or investigated the unit were also interviewed. Most would speak about the unit only on background or without attribution, because nearly every facet of SEAL Team 6 is classified. Some sources asked for anonymity citing the probability of professional retaliation for speaking out against their peers and teammates. According to these sources, whether judged by its own private code or the international laws of war, the command has proven to be incapable and unwilling to hold itself accountable for war crimes.
Most SEALs did not commit atrocities, the sources said, but the problem was persistent and recurrent, like a stubborn virus. Senior leaders at the command knew about the misconduct and did little to eradicate it. The official SEAL creed reads, in part: “Uncompromising integrity is my standard. My character and honor are steadfast. My word is my bond.” But after 9/11, another code emerged that made lying — especially to protect a teammate or the command from accountability — the more honorable course of action.
“You can’t win an investigation on us,” one former SEAL Team 6 leader told me. “You don’t whistleblow on the teams … and when you win on the battlefield, you don’t lose investigations.”
4-1484018393
BY THE TIME the two dozen Red Team operators departed for Objective Bull, tension had built up between Hyder, a commissioned officer, and the enlisted operators technically under his command. The situation was not particularly unusual. Historically, SEAL Team 6 is known as a unit where officers “rent their lockers,” because they typically serve about three years before rotating out, whereas the enlisted operators remain for much of their careers, often for a decade or more. Simply put, the unit is an enlisted mafia, where tactics are driven by the expertise developed by the unit’s enlisted assaulters, whose abilities and experience at making rapid threat decisions make up the command’s core resource. Officers like Hyder, who did not pass through the brutal SEAL Team 6 internal training program, known as Green Team, are often viewed with suspicion and occasionally contempt by the enlisted SEAL operators.
Even before the attack on the convoy and the alleged mutilation of the dead Afghan, Hyder had committed at least one killing with questionable justification. Several weeks earlier, in January 2002, Hyder killed an unarmed Afghan man north of Kandahar during the unit’s first ground assault of the war. In that operation, Hyder led a team of Red operators on a nighttime mission to capture suspected al Qaeda militants in a compound. After securing several detainees and cordoning the area, Hyder and his men waited for their helicopters to arrive and extract them. During the mission, the SEALs reported receiving small arms fire from exterior positions, though no one was hit. After 90 minutes, as the helicopters were nearing the rendezvous point, one of the SEALs alerted Hyder that an old man who had been lying in a ditch nearby was walking toward the SEALs’ position.
In an interview, Hyder said the man had approached his position with his arms tucked into his armpits and did not heed warnings from other SEALs to stop. Hyder acknowledged that the man likely did not understand English and probably couldn’t see very well. Unlike the SEALs, the man was not wearing night-vision goggles. “He continued to move towards us,” Hyder said. “I assessed he was nearing a distance where he was within an area where he could do damage with a grenade.” Hyder said that a week earlier, a militant had detonated a concealed grenade after approaching some American CIA officers, seriously injuring them. “He kept moving toward us, so at 15 meters I put one round in him and he dropped. Unfortunately, it turned out he had an audiocassette in his hand. By the rules of engagement he became a legitimate target and it was supported. It’s a question, why was he a threat? After all that activity, he’d been hiding in a ditch for 90 minutes, he gets up, he’s spoken to, yelled at in the dark … it’s disturbing. I’m disappointed he didn’t take a knee.”
Hyder, who was the ground force commander for the Kandahar operation, was cleared in an after-action review of the shooting. The rules of engagement allowed the ground force commander to shoot anyone he viewed as a threat, regardless of whether they were armed at the time of the shooting. But in the eyes of the enlisted SEALs of Red Team, Hyder had killed a man who didn’t have to die. Two of the operators with Hyder reported afterward that the man was not a threat. One of those operators was Neil Roberts.
“The SEALs believe that they can handle the discipline themselves, that’s equal to or greater than what the criminal justice system would give to the person.”
The morning after Objective Bull, Red Team gathered at Bagram Air Base. Most of the operators held a meeting to discuss what had happened on the mission. No officers were present, and the enlisted SEALs used the meeting to address Hyder’s alleged mutilation of the dead Afghan the previous day. The discussion covered battlefield ethics. Inside a heated tent, as many as 40 SEAL Team 6 operators asked themselves how they wanted to treat their fallen enemies. Should they seek revenge for Roberts? Was it acceptable, as Hyder had done with the wounded man whom he executed, to desecrate the dead?
“We talked about it … and 35 guys nodded their heads saying this is not who we are. We shoot ’em. No issues with that. And then we move on,” said a former SEAL who was present at the meeting. “There’s honor involved and Vic Hyder obviously traipsed all over that,” he said. “Mutilation isn’t part of the game.”
Nonetheless, Red Team did not report Hyder’s alleged battlefield mutilation, a war crime. In what would become part of a pattern of secrecy and silence, the SEAL operators dealt with the issue on their own and kept the incident from their chain of command.
“The SEALs believe that they can handle the discipline themselves, that’s equal to or greater than what the criminal justice system would give to the person,” said Susan Raser, a retired Naval Criminal Investigative Service agent who led the agency’s criminal division but did not investigate this mission. “They have an internal process that they think is sufficient and they are not inclined to cooperate unless they absolutely have to.” Raser, who conducted investigations into both regular SEAL units and SEAL Team 6, said that in her experience, SEALs simply didn’t report wrongdoing by their teammates.
Senior leaders at the command knew the grisly circumstances of Roberts’s death had unsettled Red Team. “Fifi was mutilated,” said a retired noncommissioned SEAL leader who was involved in internal discussions about how to prevent SEAL Team 6 from seeking revenge. “And then we had to address a very important question, how do you get the guys’ heads straight to mitigate any retaliation for Fifi? Otherwise we knew it’s going to get out of control. A third of the guys literally think they’re Apache warriors, then you had the Muslim way of removing a head. I understand the desire, I don’t condone it, but there was definite retaliation.”
Hyder told me that he did not desecrate the body. “I deny it,” he said, adding that he didn’t understand why Heath would have claimed to have witnessed it. “Even if it was true, I don’t know why he would say that.” Hyder said he was not aware of the Bagram meeting held by the enlisted operators about him or the accusations. “Why would I do that?” he asked. “Somebody else is making this up. Memories get distorted over 14 years. They’re telling you how they remember it. There was a lot of chaos. I’m telling you the absolute truth.”
After the deployment, SEAL Team 6’s leadership examined Hyder’s actions during Objective Bull. For some of them, what was most troubling was not that Hyder might have taken gratuitous revenge for Roberts’s death on an unrelated civilian, but that on more than one occasion, as ground force commander, he had fired his own weapon to neutralize perceived threats. “If you have multiple incidents where the ground force commander pulls the trigger on a deployment, you have a total breakdown of operational tactics,” said one retired SEAL leader. “It’s not their responsibility — that is why we have DevGru operators.”
Beyond the story of the alleged mutilation, the sight of the dead civilians killed during the opening airstrikes of Objective Bull, especially the women and children, left members of Red Team with deep psychological scars. “It ruined some of these guys,” said the former SEAL operator on the mission.
Six days after Objective Bull, the Pentagon announced at a press conference that an airstrike had killed 14 people, who a spokesperson said were “somehow affiliated” with al Qaeda. Sources at SEAL Team 6 who were present during the operation estimated the number of dead was between 17 and 20. Inside the command, the incident became known as the Wedding Party bombing after it was learned that the convoy was driving to a wedding.
Hyder finished his tour at SEAL Team 6 shortly after returning from the Afghanistan deployment and was later promoted to the rank of commander, the Navy equivalent of a lieutenant colonel. He was awarded the Silver Star for his efforts at Takur Ghar to save Roberts and the rest of the Red Team recon element. A few years later, after Hyder’s name was mentioned for another rotation in Red Team, some of Hyder’s former operators informed SEAL Team 6 leadership that he was not welcome back in the unit.
Neil Roberts’s bent rifle was placed on the wall of Red Team’s room at the SEALs’ base near Virginia Beach, a visible reminder of their teammate, their first deployment, and the troubles that would follow.
2-1484018389
2
BLOODY THE HATCHET
ONE CLEAR SIGN that all was not right with the command was the way sadism crept into the SEALs’ practices, with no apparent consequences. A few months after Objective Bull, for example, one of Hyder’s operators began taunting dying insurgents on videos he shot as part of his post-operation responsibilities. These “bleed out” videos were replayed on multiple occasions at Bagram Air Base. The operator who made them, a former SEAL leader said, would gather other members of Red Squadron to watch the last few seconds of an enemy fighter’s life. “It was war porn,” said the former SEAL, who viewed one of the videos. “No one would do anything about them.” The operator who made the bleed-out videos was forced out of SEAL Team 6 the following year after a drunken episode at Bagram in which he pistol-whipped another SEAL.
The SEALs’ successes throughout 2002 resulted in the Joint Special Operations Command choosing the unit to lead the hunt for al Qaeda, as well as the invasion of Baghdad in March 2003. The rise of JSOC as the sharp tip of America’s military effort led to a similar increase in size and responsibility for SEAL Team 6 in the early years of America’s two post-9/11 wars. By 2006, the command rapidly expanded, growing from 200 to 300 operators. What were originally known as assault teams now formally became squadrons, and by 2008, the expansion led to the creation of Silver, a fourth assault squadron. One result of the growth was that back in Virginia, the captain in command of the entire 300-SEAL force had far less oversight over tactical battlefield decisions. It was at this point that some critics in the military complained that SEAL Team 6 — with their full beards and arms, legs, and torsos covered in tattoos — looked like members of a biker gang. Questions about battlefield atrocities persisted, though some excused these actions in the name of psychological warfare against the enemy.
Against this backdrop, in 2006, Hugh Wyman Howard III, a descendant of an admiral and himself a Naval Academy graduate, took command of Red Squadron and its roughly 50 operators. Howard, who has since risen through the ranks and is currently a rear admiral, was twice rejected by his superiors for advanced SEAL Team 6 training. But in 1998, after intervention by a senior officer at Dam Neck, Howard was given a slot on Green Team. Because of Howard’s pedigree, SEAL Team 6 leaders running the training program felt pressure to pass him. After being shepherded through the nine-month training, he entered Red Squadron. Howard took the unit’s identity seriously, and after 9/11, despite the questionable circumstances that led to his ascent, his influence steadily grew.
In keeping with Red Squadron’s appropriation of Native American culture, Howard came up with the idea to bestow 14-inch hatchets on each SEAL who had a year of service in the squadron. The hatchets, paid for by private donations Howard solicited, were custom-made by Daniel Winkler, a highly regarded knife maker in North Carolina who designed several of the period tomahawks and knives used in the movie “The Last of the Mohicans.” Winkler sells similar hatchets for $600 each. The hatchets Howard obtained were stamped with a Native American warrior in a headdress and crossed tomahawks.
At first the hatchets appeared to be merely symbolic, because such heavy, awkward weapons had no place in the gear of a special operator. “There’s no military purpose for it,” a former Red Squadron operator told me. “But they are a great way of being part of a team. It was given as an honor, one more step to strive for, another sign that you’re doing a good job.”
For some of Howard’s men, however, the hatchets soon became more than symbolic as they were used at times to hack dead fighters in Iraq and Afghanistan. Others used them to break doorknobs on raids or kill militants in hand-to-hand combat.
During the first deployments in both Iraq and Afghanistan, it was common practice to take fingers, scalp, or skin from slain enemy combatants for identification purposes. One former SEAL Team 6 leader told me that he feared the practice would lead to members of the unit using the DNA samples as an excuse to mutilate and desecrate the dead. By 2007, when Howard and Red Squadron showed up with their hatchets in Iraq, internal reports of operators using the weapons to hack dead and dying militants were provided to both the commanding officer of SEAL Team 6 at that time, Capt. Scott Moore, and his deputy, Capt. Tim Szymanski.
Howard, who declined to answer questions from The Intercept, rallied his SEALs and others before missions and deployments by telling them to “bloody the hatchet.” One SEAL I spoke with said that Howard’s words were meant to be inspirational, like those of a coach, and were not an order to use the hatchets to commit war crimes. Others were much more critical. Howard was often heard asking his operators whether they’d gotten “blood on your hatchet” when they returned from a deployment. Howard’s distribution of the hatchets worried several senior SEAL Team 6 members and some CIA paramilitary officers who worked with his squadron.
reset-1-1484001268 Top left: Red Squadron tattoo. Top right: A bearded Red Squadron SEAL in Afghanistan. Bottom left: A Winkler hatchet similar to those issued to Red Squadron. Bottom right: Undated photo of Adm. Wyman Howard. Photos: Facebook; airsoft-army.com; www.lightfigher.net; Facebook
BEGINNING IN 2005 and continuing through 2008, as U.S. Special Operations forces became more central to the American military strategy, the number and frequency of operations in both Iraq and Afghanistan increased dramatically.
One former SEAL Team 6 senior leader said that he and others at the command were concerned that the scale and intensity of the violence in Iraq was so great that U.S. operators might be tempted to engage in retaliatory mutilations, a tactic al Qaeda and the Iraqi insurgency sometimes employed. “Iraq was a different kind of war — nothing we’d ever seen,” said the now-retired Team 6 leader. “So many dead bodies, so many, everywhere, and so the potential opportunities for mutilations were great.”
The operational tempo was very high. “On my 2005 deployment in Afghanistan, we only went on a handful of ops,” said a retired SEAL who served under Howard. “By the time we moved over to Iraq, we were doing missions as much as five nights a week. Iraq was a target rich environment, and Wyman allowed us to be more aggressive.” According to several former SEAL Team 6 leaders, it was JSOC commander Gen. Stanley McChrystal who ordered the increased operational tempo and pushed SEAL Team 6, including Howard, to conduct more frequent raids to help wipe out the insurgency in both Iraq and Afghanistan. Howard, according to two of his former operators, was more willing than previous officers to greenlight operations based on “weak” intelligence, leading to more raids and strikes. As a result, Howard became popular among the enlisted SEALs under his command, several of whom defended and praised him.
Howard’s critics argue that the hatchets were emblems of the rogue, at times criminal, conduct on the battlefield the commander was encouraging. “Every one of us is issued and carries a suppressed weapon,” said one former senior SEAL, referring to the Heckler & Koch assault rifles, equipped with silencers, issued to the operators. “There just isn’t a need to carry a two-pound hatchet on the battlefield.” For those who favored them, this former SEAL said, the hatchets could be justified as being no more than knives. “It’s a great way to explain it away, but they have the hatchets to flaunt the law. Our job is to ensure that we conduct ourselves in a way befitting the American people and the American flag. The hatchet says, ‘We don’t care about the Geneva Conventions’ and that ‘we are above the law and can do whatever we want.’”
Critics inside the command were troubled by the combination of battlefield aggression and Howard’s lack of military discipline. A retired noncommissioned officer said Howard’s encouragement and provision of Winkler hatchets was simply adding fuel to the fire. The power of the Native American mascot, he said, was not to be dismissed. Since the 1980s, when Red Team was first created, there were many operators in the unit who had experienced a “metamorphosis of identity and persona” into Native American warriors. “Guys are going out every night killing everything. The hatchet was too intimate, too closely aligned with a tomahawk, to have been a good idea.” The former SEAL, who himself had served in Red during his career, said that by giving operators the weapon of their battlefield persona, Howard sent an unmistakable message to his men: Use it. “That’s when you take away a hatchet,” the retired SEAL said. “Not provide them.”
During one Iraq deployment, Howard returned from a raid to an operations center with blood on his hatchet and his uniform. Back at the base, he gave a speech to a group of analysts and nonoperational officers in which he told them that his bloody appearance was a demonstration of how a battlefield commander should lead. One operator, who confirmed Howard’s remarks, added his own: “That’s the business we’re in.”
3-1484018391
3
HEAD ON A PLATTER
THE DEATH AND attempted decapitation of Neil Roberts on Takur Ghar affected no one so profoundly as Britt Slabinski, the operator who led the rescue team back up the mountain only to find that Roberts was already dead. One former teammate who served with Slabinski described his effort that day — outnumbered and with inferior fire support, taking incoming fire from the moment the helicopter landed — as “one of the most heroic things I’ve ever seen.” On the day when SEAL Team 6 lost its first operator in the post-9/11 era, Slabinski became a unit legend.
By all accounts, Slabinski, a second-generation SEAL who joined Team 6 in 1993, was an excellent sniper and reconnaissance operator. Thin and lanky, he was less physically imposing than many SEALs but was charismatic and dedicated. After Roberts’s death, Slabinksi wanted revenge. In audio of an unpublished interview with the late Malcolm MacPherson, author of a 2005 book about Roberts Ridge, Slabinski describes in great detail an operation that took place about a week after Objective Bull. In that mission, known as Objective Wolverine, Slabinski and his fellow SEALs were sent in Chinook helicopters to follow a convoy they believed was filled with al Qaeda fighters escaping to Pakistan. A drone flying above the convoy showed the occupants of three vehicles were heavily armed.
After the Chinook miniguns strafed the vehicles and stopped them, Slabinski and his team of snipers landed and moved to a rise several hundred yards away from one of the trucks and began firing sniper rounds at the militants. In that brief firefight, the SEALs killed nearly 20 foreign al Qaeda fighters, some of whom carried U.S. military equipment taken from Takur Ghar. Slabinski told MacPherson that Wolverine had been “really good payback.”
“Just a phenomenal, phenomenal day. We just slaughtered those dudes.” After describing one particular fighter who from a distance had resembled Osama bin Laden, Slabinksi continued: “To this day, we’ve never had anything as good as that. Oh my gosh. We needed that … there was not a better group of people to go and do that. The guys needed that to get back in the saddle because everyone was gun shy.”
“I mean, talk about the funny stuff we do. After I shot this dude in the head, there was a guy who had his feet, just his feet, sticking out of some little rut or something over here. I mean, he was dead, but people have got nerves. I shot him about 20 times in the legs, and every time you’d kick him, er, shoot him, he would kick up, you could see his body twitching and all that. It was like a game. Like, ‘hey look at this dude,’ and the guy would just twitch again. It was just good therapy. It was really good therapy for everybody who was there.”
Audio from an unpublished interview with Britt Slabinksi conducted by Malcolm MacPherson, author of a 2005 book on the battle of Roberts Ridge.
Shortly after that operation, Slabinski returned to the SEAL Team 6 base at Dam Neck. He was awarded a Navy Cross, the second highest battlefield award for heroism. For several years afterward, the leaders at the command limited Slabinski’s battlefield exposure — assigning him to Green Team as an instructor, for example — hoping the psychological wounds from Roberts Ridge would heal.
By late 2007, Slabinski was deployed to Afghanistan as the senior noncommissioned officer in Blue Squadron. The war was entering its seventh year and had become intractable, with no clear path to victory. Early in the war, the SEALs’ mission was to hunt down al Qaeda’s senior leaders, who had largely vanished into Pakistan, but now Gen. Stanley McChrystal, the leader of JSOC, extended the mission to target the Taliban, who along with al Qaeda were moving back and forth across the Pakistani border with impunity. The SEALs were now going after low-level Taliban financiers and shadow governors.
Blue Squadron was led at that time by Cmdr. Peter Vasely, a Naval Academy graduate who had not gone through the advanced assault training of Green Team that the other members of SEAL Team 6 had endured. He was an outsider, despite having been at the command for many years. Like Vic Hyder, he struggled to command the respect of his men. Slabinski — experienced, charismatic, and by now legendary — bridged the gap.
According to two senior SEAL Team 6 sources, however, the leadership dynamic in Blue Squadron was a failure. By 2007, the command’s leadership was aware that some Blue Squadron operators were using specialized knives to conduct “skinnings.” Using the excuse of collecting DNA, which required a small piece of skin containing hair follicles, operators were taking large strips of skin from dead enemy fighters. The two leading officers at the command, Moore and Szymanski, were informed that small groups in each of the three squadrons were mutilating and desecrating combatants in both Iraq and Afghanistan.
Slabinkski and others in the squadron had fallen under the influence of an obscure war novel, “Devil’s Guard,” published in 1971 by George Robert Elford. The book purported to be a true account of an S.S. officer who with dozens of other soldiers escaped Germany after World War II, joined the French Foreign Legion, and spent years in Vietnam brutalizing the insurgency. The novel, which glorifies Nazi military practices, describes counterinsurgency tactics such as mass slaughter and desecration and other forms of wanton violence as a means of waging psychological warfare against the “savage” Vietnamese.
“These fucking morons read the book ‘The Devil’s Guard’ and believed it,” said one of the former SEAL Team 6 leaders who investigated Slabinski and Blue Squadron. “It’s a work of fiction billed as the Bible, as the truth. In reality, it’s bullshit. But we all see what we want to see.” Slabinski and the Blue Squadron SEALs deployed to Afghanistan were “frustrated, and that book gave them the answers they wanted to see: Terrorize the Taliban and they’d surrender. The truth is that such stuff only galvanizes the enemy.”
One telling illustration of what had gone wrong with Blue Squadron occurred on December 17, 2007, during a raid in Helmand province. Slabinski had told his operators that he wanted “a head on a platter.” Although some of the more seasoned SEALs took the statement metaphorically, at least one operator took Slabinski at his word, interpreting it as an order.
Later that night, after Blue Squadron’s assaulters had successfully carried out the raid, killing three or four armed men and recovering weapons and explosives, Vasely and Slabinski conducted a walk-through of the compound. Vasely, who was wearing night-vision goggles, looked through a window and saw one of his operators, his back turned, squatting over the body of a dead militant. Vasely later told investigators he saw the operator moving his hand back and forth over the militant’s neck in a sawing motion. Alarmed at seeing what he believed was a decapitation, he told Slabinski to go inside and see what the young operator was doing. By the time Slabinski entered the room where the dead militant lay, according to three former SEAL Team 6 leaders, the operator had severed much of the dead man’s neck.
Slabinski did not report the decapitation, however. He told Vasely that the operator had been trying to remove the dead fighter’s chest rack, a small vest that can hold ammunition and clips. Slabinski told Vasely, and later, Navy investigators, that there had been “no foul play.”
After leaving the compound and returning to their base in Kandahar province, Vasely reported to Moore, his superior officer, that he believed he had witnessed a war crime, a mutilation. Vasely told Moore he wanted an investigation into the incident. Moore, sitting in his office in Virginia Beach, pressed Vasely: What had he actually seen? Was there another explanation?
Moore told his deputy, Szymanski, who was in Afghanistan, to sort things out. Ten days later, the internal JSOC investigation was closed. The Naval Criminal Investigative Service then opened an investigation but was forced to rely on photographs and witness statements because active hostilities made the alleged crime scene inaccessible. When investigators approached the operator accused of mutilating the dead fighter, he exercised his right to remain silent and his right to counsel. A few days after the attempted interview, investigators obtained photos purporting to be of the dead fighter. No cuts were visible in the photos, according to a military official who has reviewed the file. Three weeks after the incident, NCIS closed its investigation, concluding that there was no evidence the SEAL had violated the laws of armed conflict. But according to multiple SEAL sources, the incident did in fact occur.
Szymanski, according to these sources, was directed by Moore to make the episode disappear. “Tim took a dive,” said a former noncommissioned SEAL officer, and it was “at Moore’s direction.” Szymanski had known Slabinski for at least 15 years. They had bonded over Roberts’s death.
Although Blue Squadron had avoided criminal charges, their battlefield conduct continued to set off alarms within the command. Some SEAL Team 6 leaders were appalled by how easily Vasely and Szymanski had folded under Moore’s pressure.
Within two weeks of the apparent beheading, Moore deployed to Afghanistan. While he was there, he confronted the Blue Squadron troop and the operator who’d tried to behead the Taliban fighter. A former SEAL Team 6 leader who has knowledge of the episode told me Moore shamed Slabinski and the squadron for their conduct. That was the only punishment. (The Intercept is withholding the name of the operator, who believed he was following an order. He remains on active duty and has not responded to requests for comment.)
One of the former SEAL Team 6 leaders, who investigated several Blue Squadron incidents, including the mutilation of bodies, said he repeatedly asked the operators why they felt the need to commit such acts. “Often we’d hear, well, they’re savages,” the former leader said. “They don’t play by the rules, so why should we?”
The Intercept submitted three pages of questions to both Adm. Szymanksi, who as head of Naval Special Warfare now commands all SEALs in the Navy, and Capt. Vasely, who currently runs the operations divisions of JSOC. Both declined to comment. Moore did not respond to requests for comment. A spokesperson at Naval Special Warfare, which oversees SEAL Team 6, declined repeated requests for interviews and refused to answer a detailed list of questions, writing in a statement, “We do not entertain or support public discussion of classified information because it puts our forces, their families and our future operations at great risk.” The SEAL command asserted that “all members of Naval Special Warfare are required to comply with the Laws of Armed Conflict in the conduct of military operations.”
reset-3-1484001272 Top: Capt. Peter Vasely with members of Blue Squadron in Afghanistan. Bottom: Britt Slabinski, left, and Capt. Timothy Szymanski, commanding officer of the Naval Special Warfare Group, after Slabinski was blackballed by SEAL Team 6 in Norfolk, Va., March 25, 2011. Photos: www.navyseals.hu; Robert J. Fluegel/U.S. Navy
IN 2010, WHEN Slabinski was up for a promotion at the command, SEAL Team 6 leaders conducted two internal inquiries before making a decision. Almost immediately, the issue that received the most scrutiny was the December 2007 attempted beheading. According to two former SEALs, Slabinski told his teammates and superiors that his remark about wanting a head was figurative and not a literal order. By then, there was no question about whether the attempted beheading had occurred; the question was why.
“We didn’t debate whether Slab had told his guys he wanted a head on a platter — he copped to that. The only issue was, was his order real, or just talk?” said one of the retired SEALs involved. “It didn’t make a difference. He said it and one of his operators did it because he believed he was following an order.”
Ten officers and master chiefs voted unanimously against allowing Slabinski to return to the command. At that point, the second inquiry was commissioned by the SEAL Team 6 commanding officer, Pete Van Hooser. Evidence was presented that Slabinski gave an order to shoot all the men they encountered during another raid, whether or not they were armed. According to the New York Times, Afghans accused Blue Squadron of killing civilians during that operation, but a subsequent military investigation determined that all those killed had been armed and hostile. When Slabinski was confronted by the command’s senior enlisted leader about whether he had instructed Blue Squadron operators to kill all males during the operation, code-named Pantera, Slabinski acknowledged that he had done so. The second inquiry also uncovered the “head on a platter” remark as the instigation for the beheading in December 2007, but the command’s senior enlisted leader told Slabinski he would not get the promotion or be allowed to serve at the command again because of the Pantera order. Overall, it had become clear that Slabinski’s run as a leader on the battlefield caused Blue Squadron to come “off the rails,” according to a former SEAL Team 6 leader.
Slabinski has not responded to multiple queries and requests for comment, though he did deny to the New York Times in 2015 that he gave the illegal pre-mission guidance to kill all males. In his interview with the Times, Slabinski asserted that it was he who had witnessed the operator slashing at the dead fighter’s throat, saying, “It appeared he was mutilating a body.” Slabinski portrayed himself as trying to police his men and said that he gave them “a very stern speech.” He claimed to the Times that he told his men, “If any of you feel a need to do any retribution, you should call me.” Slabinski says nothing in the Times story about Vasely ordering him to investigate the scene or the remark about a head on a platter.
“To this day, he thinks the guys turned on him,” said one of the former SEAL Team 6 leaders. “Well, they did. What we didn’t do was turn him in. You will step over the line and you start dehumanizing people. You really do. And it takes the team, it takes individuals to pull you back. And part of that was getting rid of Britt Slabinski.”
Two other SEAL Team 6 leaders with a combined 35 years at the command said the removal of Slabinski and the failure to pursue official punishment was an indictment of the senior officers — they had failed one of their most basic duties, to hold themselves and others accountable for wrongdoing.
When Szymanski, who was then commanding officer of all regular East Coast-based SEAL teams, heard that Slabinski had been rejected by Team 6, he requested him as his senior enlisted adviser. The request was approved and Slabinski was promoted.
“If a guy cuts off another guy’s head and nothing happens, that becomes the standard,” said one of the former SEAL Team 6 leaders. “You’re moving the bar and buying into an emotional justification, ‘War is hell.’ If you’re not disciplining your force, you’re saying it’s OK.”
Slabinski retired from the military in 2014 after 25 years in the Navy. The operator accused of the attempted beheading has experienced difficulties as a result of his service. Last year, the command became concerned about his psychological condition, determining that he was medically unfit to deploy again. His superiors believed he had become “unglued” over the 2007 deployment. He was quietly removed from Team 6 and returned to a regular SEAL unit. He has told at least one former SEAL Team 6 teammate that he hopes to never deploy again.
“He’s just beginning to suffer for what he did,” said another SEAL Team 6 leader.
5-1484018395
4
A KIND OF SPORT
ON THE SECOND floor of the SEAL Team 6 headquarters in the Dam Neck naval annex, a computer, known as the “ops computer,” stores the classified data on every mission the unit has completed for the past decade. Here, commanders returning from a deployment leave their hard drives with technicians who transfer PowerPoints, after-actions reports, and photos of each operation a squadron conducted abroad. The database contains photographs of persons killed by SEAL operators during their missions and other mission documentation.
Some of those photographs, especially those taken of casualties from 2005 through 2008, show deceased enemy combatants with their skulls split open by a rifle or pistol round at the upper forehead, exposing their brain matter. The foreign fighters who suffered these V-shaped wounds were either killed in battle and later shot at close range or finished off with a security round while dying. Among members of SEAL Team 6, this practice of desecrating enemy casualties was called “canoeing.”
The canoeing photos are dramatic documentary evidence of the extreme and unnecessary violence that began to occur during multiple high-risk, exhausting, and traumatizing tours of duty in Iraq and Afghanistan. “There is and was no military reason whatsoever to split someone’s skull open with a single round,” said a former SEAL Team 6 leader. “It’s sport.”
The former SEAL Team 6 leader said that he first noticed canoeing in 2004, and that it does occur accidentally on the battlefield, but rarely. He said canoeing became “big” in 2007. “I’d look through the post-op photos and see multiple canoes on one objective, several times a deployment,” the retired SEAL said. When SEAL Team 6 operators were occasionally confronted about the desecration, the SEAL leader said, they’d often joke that they were just “great shots.”
Canoeing was just one of several acts of mutilation frequently carried out by SEALs. Two different sources said that over a six-year period — roughly 2005 through 2011 — battlefield reports and accounts of atrocities, particularly mutilations and taking of trophies, were ignored by SEAL Team 6 leadership. One source said his superiors repeatedly refused to address the issue.
The lack of battlefield discipline was not limited to a single squadron. Unlawful violence, aberrations from rules of engagement, mutilations, and disrespect of enemy casualties, actions that had been isolated at the beginning of the Afghan war, had by this point spread throughout SEAL Team 6.
In the early years of the war, SEAL Team 6 had an inflexible standard: Shooting people who were unarmed was forbidden and anyone who did so had to demonstrate the target had displayed hostile intent. Operators and officers prided themselves on their ability to kill only those who were deemed a threat.
If a SEAL couldn’t justify the threat after a shooting, he was quietly removed from the unit. But even that rule evolved over time. SEALs were given wide berth as long as they could explain why they made the decision to shoot an unarmed person. In 2007, for example, a Gold Squadron sniper was pushed out of the unit after he killed three unarmed people — including a child — in at least two different operations. He was allowed to return to the regular SEAL teams. No investigation into an unjustified killing has ever resulted in formal disciplinary action against a member of SEAL Team 6.
reset-2-1484001270 Top left: CIA paramilitary officer and former SEAL Team 6 member Richard Smethers. Top right: Adm. William McRaven. Bottom: McRaven, left, and Capt. Scott Moore, right, then commander of SEAL Team 6. Photos: United States Navy
IN 2008, TENSIONS began to rise between SEAL Team 6 and the CIA over operations in Afghanistan. Paramilitary officers from the CIA, including a covert joint unit under the agency’s command called the Omega program, worked closely with the SEALs. These small teams of CIA, Seal Team 6, and Afghan commandos operated under the agency’s Title 50 authority, which governs covert activities. This meant there was less oversight over their missions — and less accountability if things went wrong.
Late that year, the CIA joined operators from Gold Squadron for an operation near Jalalabad. According to a CIA officer with direct knowledge of the incident, the CIA requested that the SEALs capture, rather than kill, their militant targets. During the pre-dawn raid, a small team from Gold Squadron breached a compound that was home to an insurgent cell that had targeted a U.S. base. Inside, they found six militants, four in one room, all sleeping with weapons near their beds. Despite orders to detain the men, the SEALs killed all six. In the room with four of the suspected insurgents, four SEALs counted down and canoed each sleeping man with a shot to the forehead. One of their teammates killed the other two targets in another room. All six were photographed.
The CIA team on the operation was angry because they had lost an opportunity to interrogate the suspected militants. “These were guys who were running a cell near our base,” the CIA officer said. “We could’ve used the intel.” Outside the compound, the SEALs were quick to show the photos to others on the assault team. “They were smiling, almost gleeful,” he said. “Canoeing them was funny.”
Shortly after that operation, a CIA paramilitary officer named Richard Smethers, who was himself a retired SEAL Team 6 officer, complained to his CIA superiors in Kabul that SEALs were committing atrocities. Smethers threatened to expose the SEALs for what he believed was a series of war crimes; the canoeing incident was just one of several operations in which Smethers alleged that Gold Squadron operators violated the laws of war. Over a period of several weeks, a fight erupted between SEAL Team 6 and CIA officers in Afghanistan. The SEALs quickly intervened and made a deal with the CIA station in Kabul. Gold Squadron was set to redeploy to the U.S., and the SEALs promised to rein in their operators. In exchange, Smethers, who never filed an official allegation or complaint, was sent back to the U.S. Smethers did not respond to requests for comment.
According to multiple members of SEAL Team 6, the fight with the CIA was one of the few instances in which the command’s battlefield misconduct was in danger of being exposed. A retired noncommissioned officer who tried to police the unit said the command suffered from “unspoken oaths of allegiance” among both the officers and the operators, and that the first instinct when misconduct surfaced was to “protect the command and then the men” rather than hold bad actors accountable.
“It’s important that you put this stuff in context,” the CIA officer said. “I’m not going to tell you this didn’t happen. Yes, we — they committed war crimes. It happens in war. War is an adrenaline rush. After three or four deployments in, you need more to get that stimulation. We didn’t hit women or kids. We killed bad guys. And afterwards, we added the psychological warfare.”
The CIA declined to comment for this article.
SMETHERS’S THREAT TO expose Team 6 came just as Vice Adm. William McRaven settled in as the new commander of the Joint Special Operations Command. McRaven became the first Navy SEAL to lead JSOC and was already familiar with Dam Neck’s status as the disrespectful sibling in the U.S. special operations family. In the early 1980s, a group of seasoned enlisted SEAL Team 6 operators kicked McRaven off a training exercise, relieving him of his already tenuous command for being too rule-bound. McRaven was subsequently transferred from the unit.
Just eight months after taking over JSOC, after a series of complaints from the Afghan government over special operations night raids and civilian deaths, McRaven sought to pull Team 6 back from its overly aggressive stance. He ordered a pause in most SEAL and JSOC operations over a two-week period in February 2009. Although the stoppage was not limited to the SEALs, his former unit pushed back against a new set of operational guidelines.
First, the SEALs would now be required to do “call outs” before entering a compound. The intention was to permit women and children to get out of harm’s way before operators conducted their assault. The operators were unhappy about the new restriction, arguing that call outs gave up the tactical advantage of surprise. McRaven’s other directive required a more extensive post-operation review to document and justify combatant deaths. Previously, the command had required only a frontal shot and a profile of each dead militant. The new rule required a full photographic accounting of who was killed, photos of the entire body, where the target was when he dropped, what weapons he held, the vantage point of the operator when he fired, and other atmospherics.
This directive had one primary purpose: to protect U.S. forces from accusations of unjustified killings by Afghan government officials. The photos and other review documents could be shared with local officials to justify operations. But the directive had another benefit. With more extensive photographic documentation, SEAL operators had less time to fire unnecessary rounds into the dead, and they had to use the photos to explain why they fired their weapon. As a result, photographs of canoed enemy fighters virtually ceased to appear in after-action reports.
6-1484019296
MCRAVEN’S NEW ORDERS set off a struggle between the JSOC commander and SEAL Team 6’s enlisted ranks that played out in a series of high-profile hostage rescues ordered by President Obama. The first and best-known was the rescue of Capt. Richard Phillips, captain of the commercial vessel the “Maersk Alabama,” in April 2009 from Somali pirates in the Indian Ocean. Red Squadron snipers killed three pirates who were holding Phillips in a lifeboat. But McRaven, who commanded the operation, had not ordered the snipers to fire, and neither had a SEAL Team 6 officer. The sniper team leader acted under his own “emergency assault” authority to kill the pirates as soon as all three could be taken out at the same time. McRaven, who was informed of the killings only after he knew Phillips was safe, was incensed.
After the operation, $30,000 in cash, which the pirates had stashed in a lifeboat, went missing. The SEALs were suspected of taking the money. The FBI and NCIS investigated two members of Red Squadron and conducted polygraphs, but the money was never recovered and neither of the SEALs was charged.
Then, in October 2010, SEAL Team 6 set out to rescue a British aid worker named Linda Norgrove, who had been taken captive in Afghanistan. The operation, code-named ANSTRUTHER, an homage to Norgrove’s Scottish heritage, was authorized by British Prime Minister David Cameron. The operation commanded high-level interest because Norgrove, though in Afghanistan as an aid worker for DAI, an American NGO, secretly worked with Britain’s MI-6, according to four U.S. military and intelligence sources. Two of these sources told me that the British government informed SEAL Team 6 mission planners that Norgrove worked for the spy agency, and that they had been tracking her movements since the abduction. Asked for comment, the British government told The Intercept that it does not comment on security matters and would “neither confirm nor deny” that Norgrove worked for the intelligence agency.
During a late-night raid at a northern Kunar compound, Silver Squadron operators killed several captors but accidentally killed Norgrove when an inexperienced SEAL threw a fragment grenade at one of the captors.
The operation’s team leader believed that a suicide vest had been detonated by one of the captors, and two Silver Squadron operators initially withheld the fact that a grenade had been thrown. Consequently, the SEALs initially reported to JSOC senior leaders that Norgrove had been killed by her captors.
Later, a JSOC officer watching drone footage of the operation noticed one of the SEALs throw an object that landed and exploded near where Norgrove’s body was found. One of the two SEALs who knew about the grenade eventually told his team leader, who then failed to inform his commanders until he was confronted the next day.
The operation commanded high-level interest because Norgrove, though in Afghanistan as an aid worker for DAI, an American NGO, secretly worked with Britain’s MI-6.
After a joint British-American investigation into the operation identified the failures and recommended that only the SEAL who threw the grenade be punished, McRaven personally traveled to Dam Neck and determined that all three SEALs involved in the cover-up should be thrown out of SEAL Team 6. The “admiral’s mast” was an unprecedented disciplinary action at the command, which had always been allowed to discipline itself. Normally, SEAL Team 6’s commanding officer, a captain, would conduct a captain’s mast, a form of non-judicial punishment. According to a senior JSOC official, the Norgrove operation was an “I told you so moment.” Even so, two of the three SEALs later returned to the unit.
In the world of SEAL Team 6, where operators never face criminal charges — despite allegations of war crimes, unjustified killings, and corruption — the admiral’s mast was a serious rebuke. One former SEAL leader who attended the proceeding told me McRaven’s message to the command’s leadership was clear. “What you’re saying is you have no faith in the commander,” he said. “All of us were upset.” The former SEAL Team 6 leader told me that for the unit’s operators, the greatest punishment was being kicked out of the unit in front of their peers.
McRaven, who did not respond to requests for comment, also held a meeting with a large group of senior officers under his command and said that SEAL Team 6 had effectively made lying to protect a teammate an honorable course of action, according to a person who attended the meeting. “He told us they had put unit and self before mission and country,” the retired officer said. “He reminded us all that our first loyalty was to the Constitution.”
Tactically, however, the command was winning on the battlefield, and despite McRaven’s directives, there was no serious internal scrutiny of the SEALs’ most excessive conduct.
“Several of us confronted the officers,” said one former noncommissioned officer who tried to stop the criminal behavior. “We knew what needed to be done to police the kids.” The former senior enlisted leader said he pressed several commanding officers to address what he believed were war crimes. “We failed to fix the problem,” he said. “It wasn’t complex, and had it been several one-off events, a guy chopping a head off — it wouldn’t be such a failure. But this started in 2002 and continued through the wars. Our leadership punted and I’m not sure it will ever be corrected.”
The failure of SEAL Team 6 to hold itself accountable for battlefield atrocities has resulted in lasting consequences for operators at the command. “No one prepared our guys for the collateral damage and the second- and third-order effects of this war,” the former SEAL leader said. “Night after night of kill or be killed. [There was] so much savagery. I’m not condoning the behavior — there’s no justification to hacking a body — but we didn’t prepare them either. If I told you I cut off a head after an operation, explaining that I got caught up in the moment, went over the line one time — you’d have sympathy for me. War is awful and it’s human to go too far, but this isn’t one time. This is multiple times on each deployment.”
5
THE PRESIDENT’S OWN
ALTHOUGH CANOEING AS a ritualized form of enemy mutilation ceased to be a widespread practice after McRaven’s clamp-down on the SEALs’ atrocities, it did not entirely cease. And though the gruesome and illegal practice has never been previously reported, at least one canoeing incident is quite well known, if hidden in plain sight.
By the time Robert O’Neill entered Osama bin Laden’s bedroom in the Abbottabad compound on May 2, 2011, the al Qaeda leader was bleeding out on the floor, possibly already dead, after being shot in the chest and leg by the lead assaulter on the raid. That operator, known as Red inside the unit, is still an active-duty member of SEAL Team 6 and has never been publicly identified. O’Neill entered the room, walked over to where bin Laden lay on the floor, and shot him twice in the face. He then stood above the now indisputably dead man and canoed him, firing a round into his forehead and splitting open the top of his skull, exposing his brain. Osama bin Laden had been branded by SEAL Team 6.
O’Neill has not been shy about the fact that he canoed bin Laden. “His forehead was gruesome,” he later told Esquire magazine. “It was split open in the shape of a V. I could see his brains spilling out over his face.” He has even alluded to the grisly practice on Twitter. What he has not done is name the practice or reveal that by canoeing bin Laden he had secured the ultimate war trophy, the culmination of a decade’s worth of bloody “sport” by elements of SEAL Team 6 who considered themselves craftsmen of killing.
The story of the bin Laden raid has been told and retold, but crucial details have never been made public. And from the moment President Obama announced the operation’s successful conclusion in a televised address, a variety of individuals and institutions have sought to profit from the elimination of America’s most hated enemy.
Two different SEALs, Robert O’Neill and Matthew Bissonnette, have publicly taken credit for killing bin Laden. According to multiple sources, both of their accounts contain multiple self-serving falsehoods. The texture of those accounts reveals much about what went wrong with the most celebrated special operations command in the U.S. military. The falsehoods, both significant and slight, demonstrate that even when conducting the most important missions, SEAL Team 6 was unable to rise above the culture of deceit, personal enrichment, and self-aggrandizement that has corrupted a fighting unit legendary for its discipline and code of honor.
“The beauty of what they have constructed,” said a former teammate about how Bissonnette and O’Neill cornered the market on the bin Laden raid, “is that there is only one guy, essentially, who can come forward and say they’re lying — and he won’t ever talk.”
reset-7-1484007096 Top left: Navy SEAL Matt Bissonnette in 2001. Top right: Robert O’Neill with his tattoo of two bloody feathers, representing his kills. Bottom: Winkler hatchet from Bissonnette’s personal collection. Photos: U.S. Navy; U.S. Air Photo by Force Technical Sgt. Brian Snyder; Instagram
O’NEILL’S AND BISSONNETTE’S careers mirrored one another. They each entered Red Squadron at the same time, and were both recipients of the Winkler hatchets handed out by Wyman Howard. They were both talented and competitive, and they were determined to profit from their experiences as SEALs.
Bissonnette was viewed by Howard as the prototypical SEAL Team 6 operator: a college-educated enlisted man with a savvy understanding of tactics and technology. O’Neill, by contrast, was not considered as clever as his teammate, but he was a deadly sniper and had a successful tour as a team leader in Red Squadron.
Both men were notorious among their teammates for their self-promotional tendencies — a trait not well-suited for a “team-first” environment. In the end, their inclusion in the bin Laden raid and their roles defined where they fit in: Bissonnette worked closely with the CIA and SEAL Team 6 superiors during the planning phase to help plot out the assault, and would lead a team of operators to find and kill bin Laden’s courier. O’Neill was chosen as a team leader for a group providing external security but ultimately traded that leadership role for a junior spot on the team he and Bissonnette believed would get the first shot at bin Laden.
The 23 SEAL Team 6 operators assigned to the mission prepared constantly for the entire month of April 2011, practicing on two different full-scale mock-ups of the bin Laden compound. Tactically, there was little about the upcoming raid that was complex. Unlike the hundreds of other assaults SEAL Team 6 had carried out in Iraq and Afghanistan, in which the operators would plan and carry out a raid within a matter of hours, this time they had weeks to prepare. They had detailed plans of the Abbottabad compound provided by the CIA and knew where they could expect to find bin Laden. The SEALs’ biggest concern was how much time they would have, which was dictated by the amount of fuel the two Black Hawks could carry for the round trip.
The planning was so meticulous, one retired SEAL Team 6 leader told me, that a helicopter pilot warned mission planners that one of the two stealth Black Hawks they were to use would likely experience a “vortex ring state,” which means air disturbed by the rotors would prevent the helicopter from getting the lift necessary to continue hovering. The pilot noted that the two mock-up compounds had chain link fences around the buildings, allowing the air to disperse, while the real compound had thick concrete walls.
Less than a week before the assault, Bissonnette and O’Neill got into a shouting match at the Dam Neck base over who would sell the inside story of the raid. Several of their teammates on the mission had to intervene, according to a former SEAL Team 6 operator. A former SEAL Team 6 leader told me that O’Neill and Bissonnette originally agreed to cooperate on a book or movie project after the raid was over, but later had a falling out. The former SEAL leader said the extensive amount of training for the mission, combined with Bissonnette’s planning role, gave both men ample opportunity to find ways to put themselves on the third floor, in a good position to kill bin Laden.
Despite claims by John O. Brennan, President Obama’s chief counterterrorism adviser, that the raid was a capture or kill operation, the SEALs were told explicitly to kill bin Laden. There was no plan for capture, and no contingency for a surrender. “They were told, ‘Go in, kill him, and bring the body back,’” said a former SEAL Team 6 leader involved in the raid.
FILE – In this May 5, 2011 file photo, local residents and media are seen outside the house where al-Qaida leader Osama bin Laden was caught and killed in Abbottabad, Pakistan. Local residents say Pakistan has started to demolish the compound in the northwest city of Abbottabad where Osama bin Laden lived for years and was killed by U.S. commandos. Two residents say the government brought in three mechanized backhoes Saturday, Feb. 25, 2012, and began destroying the tall outer walls of the compound after sunset. They set up floodlights to carry out the work. (AP Photo/Aqeel Ahmed, File) Local residents and media on May 5, 2011, outside the compound where al Qaeda leader Osama bin Laden was killed in Abbottabad, Pakistan. Photo: Aqeel Ahmed/AP
ON MAY 1, two stealth Black Hawk helicopters took off from Jalalabad, Afghanistan, and headed east toward Abbottabad. The flight took 90 minutes, and as the Black Hawk Bissonnette rode in approached the compound walls, it effectively slammed on the brakes. The pilot who had warned that one of the helicopters would stall was right. Bissonnette’s helicopter crashed into bin Laden’s side yard. Bissonnette and his teammates were nearly killed, and many of the operators aboard ended up with chronic injuries.
Bissonnette and a small team of SEALs moved from the helicopter to a small building adjacent to bin Laden’s main house. After the SEALs tried blowing the building’s gated front door, someone inside fired several rounds out a window. They were the only shots not fired by the SEALs during the raid. One of Bissonnette’s teammates then put his gun through the front door, which was now slightly ajar, and shot the gunman in the head. He was Ahmed al Kuwaiti, one of bin Laden’s couriers.
Afterward, Kuwaiti’s wife confirmed that bin Laden could be found on the third floor of the main building, just as the team had been briefed. Bissonnette and his team then moved to the main house.
Once inside, the SEALs proceeded slowly and methodically. O’Neill’s teammates shot and killed Kuwaiti’s brother and his wife on the first floor. After blowing open the iron gate blocking the main stairway, the lead assaulters, among them Bissonnette and O’Neill, followed the operator known as Red up the stairs. Red encountered and shot bin Laden’s son just before the second floor landing, and the SEALs following behind him fanned out into the hallways and rooms on the second floor to search and secure the area. It was then that both Bissonnette and O’Neill hung back on the stairway. Both should have remained on the second floor. Instead, as Red began his ascent to the third floor, they followed him up, hoping to get in on the kill. O’Neill was closer to Red, one of the first five assaulters. Bissonnette was much farther back down the stairwell.
As he approached the third floor bedroom, Red saw bin Laden standing in the doorway, peering out. He was unarmed and wearing pajamas. A few of his female relatives were nearby. Red came to a stop and fired two shots with his suppressed rifle. One shot hit bin Laden in the chest and the second shot glanced off his hip or thigh as Bin Laden stumbled backward into his room and fell toward the foot of his bed.
Red could see bin Laden bleeding out from his chest wound but he still had not entered the bedroom.
Red watched bin Laden fall. He later told his teammates that it was possible one arm was twitching reflexively as he died, but otherwise he was effectively dead and not a threat. The distinction was crucial. As the lead assaulter, it was Red’s job to make the most important tactical judgments because he largely blocked the view of the SEALs behind him. According to several former members of SEAL Team 6, the most basic principle of assault training is “follow your shot,” meaning that an operator who has fired on a target must ensure the target no longer poses a threat. Your teammates beside and behind you will cover all the other possible angles and areas of a room as you move forward.
Red could see bin Laden bleeding out from his chest wound but he still had not entered the bedroom. Then, as two of bin Laden’s eldest daughters began to scream, Red quickly corralled them at the doorway, a move considered heroic by other SEALs on the mission. Had the daughters been wearing explosives, Red would have died while shielding his teammates from much of the blast. Instead, he held them back long enough for his teammates, including O’Neill, to enter the bedroom.
O’Neill and two or three more assaulters moved past Red into the bedroom as bin Laden lay on the ground. O’Neill then fired two rounds. According to his own description, the first two rounds hit bin Laden’s forehead. Then O’Neill canoed bin Laden with a final shot.
Conflicting accounts have emerged about how many other SEALs fired rounds into bin Laden’s lifeless body, though one former SEAL Team 6 leader who viewed the body in Jalalabad told me the body appeared to be intact aside from the chest wound and obliterated face.
The SEALs had been specifically asked to avoid shooting bin Laden in the face. O’Neill’s decision to canoe the al Qaeda leader made him unrecognizable. A SEAL who spoke Arabic interviewed bin Laden’s wives and daughters until he was able to get two positive identifications. O’Neill later implied in the Esquire profile that he shot bin Laden because he wasn’t sure Red’s shots had hit the target. He also claimed that bin Laden had been standing when he fired and that a weapon was visible nearby. Yet immediately after the mission, O’Neill described shooting bin Laden while he was on the floor. The two weapons found on the third floor were not discovered until the rooms were searched. Neither was loaded.
O’Neill’s canoeing of bin Laden cost his teammates precious time, but his final shot to bin Laden’s head was unremarkable to them. They ransacked the compound for documents and media for intelligence, left the survivors inside, and returned to Jalalabad air base with the body.
THE RED SQUADRON assaulters later gathered in a private area of Bagram Air Base and debriefed the mission in front of a military lawyer. The squadron’s commanding officer recorded it on a cellphone. Bissonnette claimed he shot and killed al Kuwaiti and had fired bullets into bin Laden on the third floor. According to three sources familiar with the debrief, Bissonnette never fired his weapon at Kuwaiti. At least two of Bissonnette’s teammates who were with him when al Kuwaiti was killed were angry about the deception — taking credit for a teammate’s actions on a mission was unprecedented and dishonorable — but did not contradict him in the presence of a military lawyer. Several of Bissonnette’s teammates later informed their superiors that he had lied about his actions.
During the debrief, Red was identified as having hit bin Laden with a fatal shot, and O’Neill was credited with putting security rounds into him after bin Laden had already gone down. There was no discussion of a visible weapon, no claims that one of bin Laden’s wives had been used as a shield or a threat. The raid, several of the SEALs said afterward, was one of the easiest missions they’d ever conducted. There were no heroics, and, apart from al Kuwaiti’s shots, no firefight.
The SEALs in the unit were furious that the White House revealed to the world that Navy SEALs had carried out the raid, violating the traditional code of silence about their missions.
Some of the assaulters on the mission were also angry with Bissonnette and O’Neill because they neglected their responsibilities after bin Laden’s son was shot. Instead of helping search and secure the second floor, both headed to the third floor, hoping to get a chance for the historic kill. Both operators were accused of breaking with standard operating procedure to get themselves in position to be among the first to see or kill bin Laden. Morale at Red Squadron fell apart shortly after the team returned to Virginia Beach from Afghanistan. The SEALs in the unit were furious that the White House revealed to the world that Navy SEALs had carried out the raid, violating the traditional code of silence about their missions. Within hours, news trucks and reporters fanned out through the seaside town looking for anything affiliated with Navy SEALs.
O’Neill was soon removed from his role as a team leader in Red Squadron after he was observed publicly bragging in Virginia Beach bars that he was the man who shot bin Laden. Bissonnette left Red Squadron soon after the raid and retired from the Navy almost one year later. He had already set himself up for a profitable future. While on active duty, he’d formed a consulting company with four other SEALs and secured a contract with one of the command’s biggest equipment suppliers.
Bissonnette’s bestselling book, “No Easy Day,” was published in September 2012, four months after he retired and less than two weeks after O’Neill got out of the Navy. The publication came as a surprise to the Pentagon because Bissonnette had failed to clear it as required.
In the book, Bissonnette implies that he was directly behind Red just below the third floor when bin Laden was shot, and was one of the next two SEALs who entered bin Laden’s bedroom. His account credits Red with the shot that felled bin Laden and holds that he and a third SEAL — presumably O’Neill — fired several rounds into bin Laden as he was lying on the floor.
After the raid, the White House struggled to describe the exact circumstances of bin Laden’s death. First, bin Laden was armed, involved in a firefight, and using one of his wives as a human shield. Then officials took all three of those details back, though they maintained the al Qaeda leader posed a threat. Bissonnette’s book was the first eyewitness account, and it contradicted the Obama administration’s narrative.
After the publication of “No Easy Day” — which in one chapter describes in great detail the specialized gear, along with brand names, Bissonnette wore on the bin Laden mission — the Navy opened several inquiries into Bissonnette’s outside business contracts. They soon discovered he had violated a series of Navy regulations. A joint NCIS-FBI investigation into whether he disclosed classified material in the book lasted two years. During the investigation, Bissonnette surrendered a photo of bin Laden’s dead body that he had unlawfully retained.
Bissonnette eventually settled his legal case with the government, agreeing to return $6.7 million in profits from the sale of “No Easy Day” and giving up any proceeds from future sales of the book.
Other active-duty SEAL Team 6 operators who worked with Bissonnette on his various consulting deals were punished as a result of their profiteering. The unit conducted a captain’s mast on at least seven SEALs for revealing sensitive information during a series of promotional videos for the video game “Medal of Honor: Warfighter.” The reprimand ended the careers of two veteran SEAL Team 6 noncommissioned officers.
Although Bissonnette was able to sell a book and tell his story first, O’Neill arguably got the better deal. In March 2013, Esquire’s profile of O’Neill portrayed him as a humble “quiet professional” who after 16 years in the Navy would no longer have health insurance and was otherwise a downtrodden American hero. The account did not dwell on the fact that O’Neill had chosen to separate from the Navy nearly four years before he was eligible for extensive retirement benefits.
In O’Neill’s account, he did not see Red fire his shots at bin Laden because he was looking back down the stairs for reinforcements. When he finally entered the bedroom, alone, bin Laden was standing uninjured, a weapon nearby, his wife in front of him like a human shield. Only inches from his target, O’Neill claims, he shot bin Laden twice in the forehead. Bin Laden dropped and O’Neill fired the security round that canoed him.
Some of O’Neill’s teammates were outraged he’d been so brazenly inaccurate and self-serving in his account. For many on the raid, including those who had been present in bin Laden’s bedroom with O’Neill, it was the first time they’d heard anyone in the command say the terrorist leader was standing, posing a threat of any kind.
In 2014, O’Neill unveiled himself as the man who killed bin Laden in an hourlong Fox News special, just as Bissonnette published a second book. The former teammates both hit the press circuit, each telling reporters off the record that the other was a liar. Already a popular motivational speaker, O’Neill now charges up to $35,000 per speech. Today, he is a paid on-air commentator for Fox News and is reportedly eyeing a run for the Senate in his native Montana. He even has his own line of clothing.
Both Bissonnette and O’Neill declined to answer questions for this article.
The truth about what happened in bin Laden’s bedroom may never be fully known. One former SEAL Team 6 leader who was involved in the raid told me he was never too concerned about the discrepancies between O’Neill’s and Bissonnette’s claims. A veteran of hundreds of raids and assaults during his career, the former SEAL said he disagreed with the order to kill bin Laden, regardless of whether he was armed, and compared it to Britt Slabinski’s order to his Blue Squadron men in 2007. “I didn’t give their different accounts much thought,” the SEAL said. “They shot an unarmed dude. It was disappointing. I’d almost wish they’d beaten him to death. That seems more fair.” And here were two guys who set out to make money off a mission that required 23 SEALs to pull off: “It’s dishonorable.”
Bissonnette and O’Neill are no longer welcome at SEAL Team 6 headquarters. The command’s top noncommissioned officer placed their names on the SEAL Team 6 rock of shame, the unofficial list of unit pariahs. The list also includes Britt Slabinski, who was blacklisted in 2015 following the New York Times article that quoted him denying he’d ever ordered his men to kill unarmed Afghan targets. “That’s what’s wrong with my community,” the former SEAL Team 6 leader told me. “Our sense of what’s right and what’s wrong is warped. No one was upset that he ordered a beheading or all the men shot even if they were unarmed. They were mad because he spoke to the New York Times and lied.”
GoogleEarth_Image-2-crop-1484001263 SEAL Team 6 headquarters at Dam Neck naval annex, Virginia Beach, Va., showing the 30-foot trident sculpted from a fragment of the World Trade Center. Photo: Google
SEVERAL MONTHS AFTER the bin Laden raid, in October 2011, SEAL Team 6 held its annual “stump muster,” a reunion of current command members and their families, as well as past leaders and senior operators. That year’s reunion, the first under Wyman Howard as commanding officer, was held at their new headquarters, a $100 million, state of the art testament to the stature of the command as the home of the “President’s Own,” the clandestine global force capable of striking anywhere, killing anyone, the tip of America’s military spear. Outside the main entrance stands a 30-foot trident sculpted out of a fragment of the World Trade Center.
At the reunion, a few hundred yards from the Atlantic Ocean, a small group of current and former master chiefs stood around drinking and telling war stories. One retired senior SEAL Team 6 leader was there who led the unit during the early years of the wars in Afghanistan and Iraq. Over the years, he had worried about battlefield discipline and retaliation after Neil Roberts had been nearly beheaded, and he had feared his men would seek retribution in Iraq during the height of the violence there. He’d left the SEALs before the worst of the atrocities had taken place, though his former teammates would occasionally call him to report what was happening on deployments. He’d been told that Blue Squadron had collected ears and that mutilations had become common. He wasn’t surprised. After more than 30 years in special operations, he knew that elite forces would inevitably cross ethical, moral, and legal boundaries if they were given too long a leash. When he first arrived at Dam Neck, operators in the unit who had served in Vietnam warned him that war crimes and battlefield atrocities hung like a cloud over the entire unit — even if only one SEAL had participated.
Sitting with old friends, the retired SEAL was handed a ring-bound portfolio. Opening it up, he saw a collection of photographs, more than a dozen canoed enemy heads. He was told that the photographs were part of SEAL Team 6’s “greatest hits” of terrorists killed since 9/11. They were not the private collection of some individual operator, but the command’s official after-action pictures. The old sailor put the portfolio down. After a short while, he quietly left the base. He hasn’t returned since.
Illustrations: Attila Futaki, Colorist: Greg Guilhaumond
Matthew Cole
January 10 2017, 12:01 p.m.
Find this story at 10 January 2017
Copyright https://theintercept.com/
New Intercept Exposé Uncovers SEAL Team 6’s Ghastly Trail of Atrocities, Mutilations, Killings7 februari 2017
A stunning new exposé published today in The Intercept about the elite military unit SEAL Team 6 reveals a darker side of the group best known for killing Osama bin Laden. National security reporter Matthew Cole spent two years investigating accounts of ghastly atrocities committed by members of the unit, including mutilating corpses, skinnings and attempted beheadings. According to sources, senior command staff were aware of the misconduct but did little to stop it—and often helped to cover it up.
TRANSCRIPT
This is a rush transcript. Copy may not be in its final form.
AMY GOODMAN: We turn now to a stunning new exposé published today in The Intercept about the elite military unit SEAL Team 6. Known as the “President’s Own,” the group is best known for killing Osama bin Laden, as well as other high-profile rescue missions, including that of Captain Richard Phillips from the Maersk Alabama. But Intercept national security reporter Matthew Cole reveals a darker side of the celebrated group. Cole spent more than two years investigating accounts of ghastly atrocities committed by members of the unit, including mutilating corpses, skinnings and attempted beheadings. According to sources, senior command staff were aware of the misconduct but did little to stop it—and often helped to cover it up. In the article, “The Crimes of SEAL Team 6,” Cole quotes one former leader as saying, “You can’t win an investigation on us. You don’t whistleblow on the teams … and when you win on the battlefield, you don’t lose investigations.”
Well, for more, we’re joined by Matthew Cole.
Welcome to Democracy Now!
MATTHEW COLE: Thank you, Amy.
AMY GOODMAN: Talk about what you found, what we don’t know about—and there’s much we don’t know about—this unit.
MATTHEW COLE: Yeah. I think the biggest takeaway is, is that after 15 years of war and unquestionable successes on the battlefield, there have been virtually no accounts of SEAL Team 6 outside of the parameters of heroism, and they’ve become almost mythic in terms of the American public and how popular they are. And what was missing from those accounts was that after 15 years of continuous warfare, very personal, up-close warfare, there were some very, very dark things that occurred in Iraq and Afghanistan and elsewhere that were largely suppressed and hidden from the public, and actually from the military itself, as a way of protecting the command and those who had gone over the line to commit war crimes.
AMY GOODMAN: So, talk about the bombing that occurred—you write about it in the opening part of this very lengthy article—in Afghanistan.
MATTHEW COLE: Yeah, so, in March of 2002, there was a operation that was—JSOC had video footage of a tall man in white garb—
AMY GOODMAN: It’s Joint Special Operations Command.
MATTHEW COLE: Joint Special Operations Command—and saw someone that they thought was bin Laden, and was afraid he was going to get away. They didn’t have much intelligence, but they had the notion that he was—people around him were showing deference, and he was leaving a compound. So they sent SEAL Team 6 in some helicopters to go investigate and, basically, to do an interdiction. But fearing that the convoy was going to get across the border into Pakistan before the SEALs would get there, JSOC officers ordered a bombing, and they dropped two bombs on the convoy. And they killed a lot of people pretty quickly, almost instantaneously. As the helicopters were coming down onto the scene, they then fired their—the helicopter guns, miniguns, onto the remaining survivors, if—regardless of whether they were armed, because it was all presumed that everyone there was al-Qaeda.
When the SEALs got down onto the ground and inspected, what they found right away was that it was all civilians and that the men, the few men who were armed, were carrying family weapons, because in Afghanistan it’s traditional and customary for each male, at least, and certainly each family, to have one weapon. And, in fact, what they saw were dead women and children, along with men. And it was a horrific sight for the SEALs, who were on their first deployment in the war. And remember, this is right—this is shortly after 9/11 and shortly after the war in Afghanistan begins. And they weren’t veterans yet of those kind of wars.
And according to my sources, the—one of the officers who was on the mission allegedly mutilated one of the victims, one of the civilian victims, after he had been killed. And it was so upsetting to his teammate in the unit, that he then came back and reported it to his leader. And what transpires then is a meeting with everyone in the unit who was enlisted, and not the officers, the next day to discuss battlefield ethics. How are we going to treat the dead? How are we going to conduct ourselves on the battlefield? And the decision in the meeting was, hey—you know, one person who was there told me, “We shoot them, and we move on. If they’re bad guys, we shoot them, and we move on. That’s fine. But we don’t mutilate. That’s not part of the game.” And they essentially ostracized the officer who they believed had done so. But they didn’t turn him in. They didn’t report it. They didn’t tell anyone. It was strictly within the unit. And that’s one of the things—
AMY GOODMAN: And the officer’s name was?
MATTHEW COLE: Was—his name was Lieutenant Commander Vic Hyder. And just to be clear, in the article, on the record, he denies that he stomped this man’s head in. But that story became—it really becomes a sort of blueprint for how SEAL Team 6 has kept war crimes, excessive violence, criminal brutality a secret for 15 years. They keep it in house, and they have their own system of justice—prison rules, if you will. And there is a real divide between the officers, who have the commission by law for law and order, and the enlisted, who make up most of the command.
AMY GOODMAN: Can you talk about the SEAL Team 6 officer who made so-called bleed-out videos?
MATTHEW COLE: OK, he wasn’t an officer. He was an enlisted—he was enlisted. He was a very troubled SEAL, a member of Red Team—Red Squadron, who filmed—his job, he had a responsibility, which was to film the aftermath of an operation for intelligence gathering. So he had a camera. It was part of the normal course of duties. After an operation would end, he went around and filmed to identify—you know, later they can try to identify who had been killed, in terms of the militants.
And he began doing what he—what was described to me as bleed-out videos and what were known as bleed-out videos within the team at the time. He would bring them back, and having—on the battlefield, having taunted people who were dying, essentially telling them that they weren’t—they couldn’t die yet, they weren’t going to heaven, they weren’t going to see Allah, there were no virgins, and then bring the videos back and then spend time reviewing them, rewinding them over and over with a group and doing a countdown, to watch the last few moments of a person’s life as they expired.
And that was done—this wasn’t done in some corner of, you know, some dark hole in Afghanistan. It was done at Bagram Air Base in front of a lot of people. And no one would do anything about it. It was not considered morally reprehensible. And that was—we use that as an example because, in and of itself, it’s not illegal, but it gives you a sense of sort of the dark nature of what this war brought for members of elite special operations forces, in particular, SEAL Team 6.
AMY GOODMAN: Talk about what happened to U.S. Navy SEAL Neil Roberts.
MATTHEW COLE: So, Neil Roberts was the first SEAL Team 6 member and the first special operations soldier to die after 9/11. He was killed by—he fell off the back of a helicopter during Operation Anaconda in early March of 2002 in eastern Afghanistan. And there was a—later became known as the Battle for Roberts Ridge, was an effort to save him. But Roberts fell off, was killed fairly quickly by al-Qaeda fighters, who had already established a stronghold on the mountaintop. And Predator drone feed later sees one of the fighters standing over him, attempting to behead him, and, in fact, mutilated him very significantly. And so, when his body was brought back to Bagram and his teammates found that not only had they lost their teammate and pierced their sense of invincibility, which is appropriately built up for your best warriors, they were devastated by the manner, and the gruesome manner, in which his body had been treated.
And so, Objective Bull, which happens about 18 hours later, we don’t know, but we believe that the alleged stomping in and mutilation of the civilian armed man in Objective Bull was very much—
AMY GOODMAN: Objective Bull is the story you describe before.
MATTHEW COLE: Right.
AMY GOODMAN: That’s the operation, they called it.
MATTHEW COLE: That it was the beginning of what was sort of a tit for tat against al-Qaeda, which was “You do this to ours, we’ll do this to yours.” But the Roberts death and the manner of his death really shook up SEAL Team 6. And although there have been an enormous amount of accounts of the Battle of Roberts Ridge and some of the heroism and valor in trying to get him back, and there were others who died, what had—
AMY GOODMAN: And others who died—
MATTHEW COLE: Up on the—up on the—
AMY GOODMAN: —and didn’t die, as it was originally thought, and survived and then died.
MATTHEW COLE: Right. And so—but what was never told was this incident that happens 18 hours later. And there’s—looking back, it’s easy to see why they wouldn’t tell the story. But the Pentagon itself, they had announced a week after the bombing of—in Objective Bull, that they had killed civilians, but even then, they made—they said that they were associated somehow with—affiliated somehow with al-Qaeda. So they left the impression that although they killed civilians, it was a justifiable bombing. In fact, it was only civilians, and they had no intelligence whatsoever.
AMY GOODMAN: It was a wedding party?
MATTHEW COLE: It was—they were on their way to a wedding party, yes.
AMY GOODMAN: Where does Britt Slabinski fit into this picture?
MATTHEW COLE: Well, that’s very interesting. Britt Slabinksi is sort of at the heart of all of this, although we have to remember that he was an enlisted SEAL and not an officer, although he became a very senior enlisted. Britt Slabinski was on Roberts Ridge. It was—Neil Roberts was part of his team. He was the leader of the team that went back to get Neil Roberts. He won a Navy Cross for his efforts on the top of Takur Ghar, which was the mountaintop in eastern Afghanistan. And he was in the meeting at Bagram after Objective Bull, in which the discussion about how Vic Hyder had behaved and what he had done during Objective Bull was determined that was just not how SEAL Team 6 was going to operate.
Slabinski was devastated by Roberts’ death. And frankly, according to sources who spoke with him at the time, he sought revenge. He wanted to go back out on the battlefield and get payback. And we unearthed, in the course of reporting, some exclusive audio that had never been found before of Slabinski giving an interview to an author, who was writing a book about Roberts Ridge, in which he describes a third operation that happens after Objective Bull, in which they ambushed a group of al-Qaeda fighters who had been on top of Takur Ghar, who had been in the Battle of Roberts Ridge. And he was a sniper who led a sniper team at the time. And they killed roughly 18 or 19 al-Qaeda fighters in eastern Afghanistan in mid-March 2002. And in the audio, what you hear him talk about is the operation as payback and revenge, essentially, for what happened on Roberts Ridge, as a way for the guys and his men to get their confidence back, as I think he says, is to get back in the saddle again.
AMY GOODMAN: Let’s go to the SEAL Team 6 member Britt Slabinski, here describing the aftermath of an operation to take down a convoy they believed was filled with al-Qaeda fighters trying to escape to Pakistan. Slabinski and the team of snipers had killed what? Nearly 20—
MATTHEW COLE: Nearly 20.
AMY GOODMAN: —al-Qaeda—
MATTHEW COLE: Fighters.
AMY GOODMAN: —fighters.
BRITT SLABINSKI: After I shot this dude in the head, there was a guy that had his feet, just his feet, sticking out of some little rut or something over here. I mean, he was dead. But, I mean, you know, it got—people got nervous. I shot him about 20 times in the legs. And every time you’d kick him or shoot him, he would kick up, and you could see his body twitch and all that. And it was like a game. Like [inaudible]. And the guy would just, you know, twitch again. It was good therapy. It was really good therapy for everybody that was there.
AMY GOODMAN: So, that’s Navy SEAL Team 6 member Britt Slabinski, this audio being played publicly for the first time—
MATTHEW COLE: Right.
AMY GOODMAN: —that you got at The Intercept. And the significance of this?
MATTHEW COLE: Well, I think what it does is it gives you a window into the mindset of someone who became a very senior—first of all, he was—after the Battle of Roberts Ridge, he became a legendary SEAL. He had a Navy Cross. He was a hero. He became a very influential member of SEAL Team 6. And at a command that is referred to and known as an enlisted mafia, run effectively by the enlisted SEALs who spend a decade or more in the unit, he was a top leader. And as a result, he ended up in a position running a squadron.
And there were a series of events that occurred, that I report exclusively for the first time, about the fallout of his leadership. And what you get to see—what you get to hear in that is the mindset. I mean, the thing that was most disturbing to me, I think, in listening to it was the gleefulness in his voice, that it was therapy for him. And I don’t—that, I think, gives us some understanding. And as I was talking to a former senior leader of SEAL Team 6 about that tape—he had never heard it, and I showed him the transcript. And one of the things he said, he said, “What’s so scary is, is that this guy undoubtedly influenced so many of our guys with that kind of attitude.”
AMY GOODMAN: Matthew Cole, one of the most disturbing forms of atrocities Navy—the SEAL Team 6 committed was called “canoeing.” If you can talk about that and then talk about whether you believe Osama bin Laden was canoed?
MATTHEW COLE: Yeah, so, one of the—I would say one of the, if not the darkest secret in the last 15 years is that over the course of the war, SEAL Team 6, as well as other elements of JSOC, were involved in something called canoeing, which is a form of firing a bullet in the top of the forehead that splits the head open in the most gruesome manner and leaves, frankly, the brain matter exposed, and looks like a—puts the head, the top of the head, in the shape of a V, with a negative space that looks like a canoe would fit in there or that a canoe went through it. And it can happen incidentally in battle, and it does happen incidentally in battle.
What I found was that for a period of years SEAL Team 6 was photographing—they photographed their dead for documentation and preservation. And for a period of years, canoed dead took up an enormous amount of space in those—in that catalog. And it was not mathematically possible. And what my sources said were, it became a sport. You shoot a person when they’re dead or dying, at very close range, for the sake of seeing the gruesome results.
AMY GOODMAN: And Osama bin Laden?
MATTHEW COLE: Well, what happened to Osama bin Laden was hiding sort of in plain sight. The man who claims that he killed Osama bin Laden, Robert O’Neill, did an interview, a long interview in Esquire in 2013, in which he described what bin Laden’s face looked like after he shot him three times in the face and forehead. And there it is. Without using the word “canoe,” he describes this gruesome scene of splitting the top of his skull open into a V, you know, with the negative space in the shape of a V, and his brain matter exposed. And one of the points that I make in the story is, is that SEAL Team 6 then branded Osama bin Laden. That was—it’s an act of dominance, and it is a form of sport, and it’s reflexive. And it doesn’t—in this case, it does not necessarily mean that Robert O’Neill committed a war crime, but there is no question that the ritualistic manner in which and the frequency in which it occurred and the fact that it had no military necessity was criminal.
AMY GOODMAN: You believe that bin Laden was killed unarmed and in the dark?
MATTHEW COLE: Absolutely. I think one of the things that my story presents fairly conclusively is that the order from the beginning was to kill him, regardless of the situation inside. And, in fact, one of my sources who was a—
AMY GOODMAN: We have four seconds.
MATTHEW COLE: —senior member, said, “Kill him. Bring the body back.” That was the order.
AMY GOODMAN: We’re going to do Part 2 of this conversation, post it online at democracynow.org. Matthew Cole, we’ll link to your piece at The Intercept.
Part 2: Intercept Exposé on How SEAL Team 6 Killed Osama bin Laden, “Canoeing” & Other Atrocities
We continue our conversation with reporter Matthew Cole about his stunning new exposé published this week in The Intercept about the elite military unit SEAL Team 6 that reveals a darker side of the group best known for killing Osama bin Laden. National security reporter Matthew Cole spent two years investigating accounts of ghastly atrocities committed by members of the unit, including mutilating corpses, skinnings and attempted beheadings. According to sources, senior command staff were aware of the misconduct but did little to stop it—and often helped to cover it up.
Watch Part 1: New Intercept Exposé Uncovers SEAL Team 6’s Ghastly Trail of Atrocities, Mutilations, Killings
TRANSCRIPT
This is a rush transcript. Copy may not be in its final form.
AMY GOODMAN: This is Democracy Now!, democracynow.org, The War and Peace Report, as we turn to Part 2 of our discussion about the stunning new exposé published in The Intercept about the elite military unit SEAL Team 6. It’s called the “President’s Own,” the group best known for killing Osama bin Laden, as well as other high-profile rescue missions, including that of Captain Richard Phillips from the Maersk Alabama. But Intercept national security reporter Matthew Cole reveals a darker side of the celebrated group. Cole spent more than two years investigating accounts of atrocities committed by members of the unit, including mutilating corpses, skinnings, attempted beheadings and canoeings, which we’ll talk about in a moment. According to sources, senior command staff were aware of the misconduct but did little to stop it—often helped to cover it up. The article is called “The Crimes of SEAL Team 6.” Cole quotes one former leader as saying, “You can’t win an investigation on us. You don’t whistleblow on the teams … and when you win on the battlefield, you don’t lose investigations.”
Matthew Cole, thank you for staying with us for Part 2 of this conversation. And I want to start where we left off on Democracy Now!, talking about the killing of Osama bin Laden. but now we have a little time, so take us through what happened in May of 2011.
MATTHEW COLE: Well, I think the first thing—the first place to start is that, despite what the Obama administration was at pains to try to say in the hours and days after the raid, was that, from the beginning, the order to the SEALs were—was to go in and kill Osama bin Laden. And it went further than that. The order was to go in and kill all males on the compound, regardless of whether they were armed. It was an assassination, an execution, however you’d like to call it. It was murder. And the SEALs went out and did it, very effectively. And what we know is that despite the fact that—
AMY GOODMAN: You write that even before the killing, that two of the Team 6 members, Matt Bissonnette and Robert O’Neill, had an argument that had to be broken up by their fellow SEALs about who would tell the story after.
MATTHEW COLE: Right. So, the two SEALs who have come out from that raid and given first-hand accounts, one in the form of a book, the other in a magazine article and then in a Fox News special identifying himself as the shooter, were involved in an argument prior to the raid, before they had even gone to Afghanistan and Pakistan, over how they were going to work together to sell the story afterwards, and then had to be separated by their teammates, because they were—it wasn’t a physical fight. They got into a screaming match. And lo and behold, after the raid, they, of course, were the first to get out of the unit, and there was—as one of their former bosses said to me, they were in a race to write a book and make money off of the operation.
And so, after their accounts came out, in addition to the Obama administration’s account, everything sort of got muddled in terms of what happened. And one of the impressions that was left was that bin Laden was killed because he was a threat, because he hadn’t laid down on the ground and said, “I surrender.” But that was always fiction. He was killed because there was an order to kill him, no matter what. And he was killed by a SEAL who was the first to encounter him. He was unarmed. He was wearing, effectively, his pajamas. He was standing with two female relatives to the side—on each side of him. And he was put down with two shots, one to the chest and a second which glanced off his hip as he fell back onto the floor.
And that’s a key point, because he falls down on the floor, and then the man who says that he ended bin Laden’s life, Robert O’Neill—and no one disputes that he put the bullets into bin Laden and effectively ended his life, but the way O’Neill tells the story is that bin Laden was standing, had his wife in front of him, holding his wife’s shoulders as a sort of shield, and has a weapon nearby, and so that he’s scanning the scene and making the determination that—based on his training, that this man is a threat, and he can be killed. And so he shoots him, he drops, and then he puts a third bullet in his forehead. And by his own words, he describes in Esquire magazine a canoeing, which is the intentional splitting open of the skull with a round to the top of the forehead. And what my reporting found was that he wasn’t standing. There was no threat. He was—he would have died had he not been shot by Mr. O’Neill. He was on the ground bleeding out from his—the shot to his chest.
And what was interesting, actually, is how much, I learned over the two years—how much animosity was directed towards the two SEALs who spoke out and exaggerated or lied, whatever you want to say, falsehoods. They spun a story to make themselves heroic and make money off of it, and it wasn’t accurate. And so, there’s an enormous amount of animosity inside the unit at these two guys.
AMY GOODMAN: What did Matt Bissonnette say? You say that he lied in No Easy Day, his book.
MATTHEW COLE: Yeah, so his book—his account, effectively, of how bin Laden died is actually mostly accurate. The issue is, is that he actually wasn’t a witness. He makes—he makes it sound as though he was there and next to O’Neill and, with O’Neill, fires the last shots that kill bin Laden. In fact, he was much further back down the line, comes in later. But prior to that, his team was to go after bin Laden’s courier. And they killed him. Both in the book but then also in the official debrief that SEAL Team 6 did with a lawyer in Bagram Air Base in Afghanistan, he lied and said that he had killed the courier. And, in fact, he had not.
And that became a big deal, because that’s something you—even within their code, that’s something you don’t do. You don’t take credit for another man’s work. And so, in the subsequent years afterwards, their teammates viewed that lie, that he had killed the courier outside in the adjacent compound, as the beginning of Bissonnette’s effort to shape his story so that he could sell it, because you need to have drama whenever you’re selling a myth. And in the case of both O’Neill and Bissonnette, and in SEAL Team 6 at large, that’s what we have here. We have a set of myths. We have narratives that are filled with—you know, let’s say 75 percent of the facts are true, but a quarter of them are false or omitted. And it makes a big difference in terms of understanding what really happened.
AMY GOODMAN: Matthew, you write, “‘The beauty of what they have constructed,’ said a former teammate about how Bissonnette and O’Neill cornered the market on the bin Laden raid, [quote] ‘is that there is only one guy, essentially, who can come forward and say they’re lying—and he won’t ever talk.’”
MATTHEW COLE: Yeah. So that’s in reference to what is known as sort of the lead assaulter on the mission, whose nickname in the unit is “Red.” And he was the first to get up the stairs onto the third floor of Osama bin Laden’s house and is the first to see bin Laden peeking through the doorway of his bedroom. And he fires two shots into bin Laden. And he then waits to see what happens. And they slowly get to the door. One of the things that’s interesting, just as an aside, in learning about special operations and the SEALs is that there’s not a whole lot of running. They have a whole terminology, which is, “Don’t run to your death. Walk to your death.” You take your time to make decisions. And that’s one of the things—you know, their training is—their brilliance is at the tactical level. It’s minutiae. And so, he did exactly as he was trained to do, which was to go slowly to the doorway and see and assess whether or not the person he shot was still a threat.
And he says to his—to the debrief and to the team later, he wasn’t a threat, so he then wraps his arms around two of the women who are in the room, who are becoming hysterical. And that’s described in both O’Neill and Bissonnette’s book. And what’s funny is, is they give him credit for doing something very heroic, that had they been wearing suicide vests, he put himself on top of them and would have absorbed the blast. But what they’ve left out is that the only reason why he made that decision to do that was because he had already determined that bin Laden was either dead or was going to die in a matter of moments.
And he is the one who, effectively, is the only one who could come out and say, “Here’s what really happened,” because he was the first in the room, the first up and the one who fired the shots. And one of their teammates said to me that quote that you just read, which is, there was a cleverness to what O’Neill and Bissonnette did to make it so that it’s just—you know, they’re not going to have people contradicting them in public. And as a result, they’ve made a lot of money.
AMY GOODMAN: And why won’t he contradict them?
MATTHEW COLE: Well, because he is a silent professional. I mean, in a world where silence is part of the—is supposed to be part of the norm. He sticks by it and is still in.
AMY GOODMAN: So explain how, as you put it, Osama bin Laden was canoed.
MATTHEW COLE: So, essentially, O’Neill, who is the second to fire shots in bin Laden, puts two rounds in his face or his forehead. And after he’s down, at a very close range, O’Neill fires a third round. And that round hits him in the top of the forehead. And that’s—canoeing requires a certain location in the head. And by his own description, by O’Neill’s own description, it split open his head and exposed his brain matter and split open his head in a V shape. And that V shape is the canoe.
And what I know, and is not in the story, but what I know is that his face was so disfigured, when they brought his body back to Jalalabad and they took him out of the body bag, they had him nude with only his genitals and his face covered, because—genitals, out of respect, and face, because it was so disfigured, they put a small towel or tissue over his face. And splitting his head open disfigured him so much that the SEALs in the compound couldn’t recognize him. He was unrecognizable. And so, it required one of the SEALs who was there, who was doing—who spoke Arabic, to go around and get confirmation, double confirmation, that this was Osama bin Laden. So there was a practical side to it, too. But splitting his face open, I think, is, it’s very safe to say, a significant reason why the Obama administration never released the photo of bin Laden’s face. It was just too gruesome to show.
AMY GOODMAN: As they had released the photo, for example, of capturing Saddam Hussein.
MATTHEW COLE: Right, or his sons, killing his sons. They put out Uday and Qusay pictures shortly after he was killed. I mean, it was a curious thing to do, given the—what you knew would be conspiracy theories and questions about whether he had even been killed. But his face was just too gruesome to show.
AMY GOODMAN: So you say bin Laden was killed unarmed and in the dark.
MATTHEW COLE: Absolutely. He was killed 15 minutes after the mission began. No lights. Could hear certain things, but there wasn’t a lot of noise. I mean, their suppressed weapons are very quiet. And he dies with no—he has two weapons in the room that they find later in a search. They are—they have no bullets in them. They’re essentially trophies. Certainly wasn’t carrying them or holding onto them. He died in the dark in his pajamas, listening to the sounds of people moving through the house. And with very little—you know, he sticks his head out of his room, and he gets shot.
AMY GOODMAN: And what is your sense of why the Obama administration wanted him dead, not alive?
MATTHEW COLE: Well, I think it was just a heck of a lot easier to not have to worry about the spectacle of a trial, that the story was over and a case closed. And it certainly would easier to sell to the American people that, to some end, part of the war was over. So, you know, and I still think that there are questions that remain unanswered about the mission, the operation and how the—what the administration knew about his location. But by and large, I think the order to kill him was just to have everything tied up neatly.
AMY GOODMAN: Matthew Cole, as you talk about, really, in some of these cases, for the first time, what this unit has done, Team—SEAL Team 6, and you talk about canoeing, in general, there are those who wanted to expose this, like a CIA paramilitary officer’s attempt to blow the whistle on this. Explain what happens to someone who wants to challenge the practices.
MATTHEW COLE: So, in 2008, a former Navy SEAL 6, Team 6, member himself, who was retired and went to the CIA as a paramilitary officer, named Richard Smethers, was upset with some of the conduct that SEAL Team 6 was up to in the late end—the end of the year in 2008. He was upset about civilians being killed, unarmed people being killed, excessive violence and an overall failure of leadership at SEAL Team 6 in not policing their men. And so, he was put forward by a small group of CIA officers at a base in Northeast Afghanistan to complain and to blow the whistle, effectively, on SEAL Team 6. And it began a very rancorous fight between SEAL Team 6 and the CIA in Afghanistan over what to do. And SEAL Team 6 said very quickly he needed to be quiet. And his response was “I’ll go to the press.” And, in fact, I think, specifically, he threatened to go to The New York Times. And SEAL Team 6 told the CIA, “If this guy goes public, we will end his career. He will lose his clearances. He will never work again,” and also told the CIA, “Hey, we’re working together here. If this stuff comes out or there are investigations into war crimes or excessive criminality and excessive violence and brutality, it’ll hurt all of us.” And so the CIA agreed to send him home. He was up for going back home anyway. There was a natural change both with him and with the SEAL unit that was in at the time. And so, the two sides said, “Listen, we will calm things down. You send him home, keep him quiet. And we will go about taking care of our guys.”
And what happened shortly after that is, Admiral Bill McRaven, who was then the commander of the Joint Special Operations Command, had come in, and the complaints from the Afghan government about night raids and civilians, unarmed civilians, being killed had grown—the complaints about them had grown loud inside Afghanistan. And politically, Karzai was hitting U.S. forces. So McRaven orders a stand-down, about a two-week stop in almost all special operations forces. And a lot of that was meant to pull the leash on SEAL Team 6. And he issued new guidelines in terms of how they operated in country. And those guidelines were, in a lot of ways, done to protect SEALs. You know, it is important to remember that in all of this, most members of SEAL Team 6, the majority of SEAL Team 6, did not commit war crimes and atrocities. This was more like a persistent virus. But a significant number did. And they had gotten out of control. And the man who led them, at a very high level, understood that. And so, McRaven orders the stand-down, gives them new rules. And the Smethers issue, the whistleblowing, just sort of fades off into the sunset.
And that was the only case and it was the only time there was someone who had whistleblown on SEAL Team 6, where there was some threat, and they were worried about being exposed for what they were doing on the battlefield. And I think the lesson you can learn from that is, is that they go to great lengths to make sure that it goes away. And it hurts—you know, their view to the CIA, I think, was really interesting. It doesn’t just hurt us. It hurts you. It’ll hurt the administration. It’ll hurt the war. And I think that’s a very compelling argument for people who work in the government or the military when you’re in the middle of a war. And so, it’s swept under the rug. And that—that’s the kind of thing that has occurred at a small level for SEAL Team 6 and at a bigger level. And that’s really what the story is trying to—attempted, and I hope succeeded, in uncovering, are these various levels in which it was obvious that things were going on that were illegal, that were immoral, that were unconscionable, and they were either quietly and implicitly, sort of tacitly encouraged, or people in charge just looked the other way.
AMY GOODMAN: Matthew, talk about how Linda Norgrove fits into this picture and who she was.
MATTHEW COLE: So, Linda Norgrove was a aid worker working in Afghanistan in 2010, when she was kidnapped by factions of the Taliban or militants in Northeast Afghanistan. And she was taken from a road and sent up into a very mountainous place, and was a U.K. citizen, was actually from Scotland originally. And the only unit that was capable, both at the time and in general, to operate in Afghanistan for a high-risk rescue mission was SEAL Team 6. So, the British government requested that SEAL Team 6 go save her. And as SEAL Team 6 was putting the mission together, the British government kept giving her location with a very precise—with total precision. And SEAL Team 6 said, “How do you know where she is with such precision, in a place where we’ve been operating for years, and you just don’t get that kind of fidelity in such short time?” And the British government disclosed, according to my sources, to four sources, that she was working for MI6 and had been essentially working undercover for British intelligence, and so they had a—some form of tracking on her and knew her exact location. And that was a bona fides that SEAL Team 6 needed to feel comfortable with sending their men out to find her at this location. And she was unfortunately killed in the raid, unintentionally, by SEAL Team 6, as the—as a firefight broke out when they arrived.
And the initial story that the SEALs presented to their superiors and to the British government was that she had been killed by one of her captors, who had detonated a suicide vest that he was wearing, and it blew up, and she was nearby, and it killed her. Well, it turned out that that was not what happened. And, in fact, what had occurred was that one of the SEALs, a young SEAL operative on his first hostage rescue mission, had thrown a grenade and hadn’t seen her, and initially had reported that he had thrown the grenade. And what came there was a slow—sorry, I should say, a fast cover-up by three members of SEAL Team 6 who were on the mission, to avoid the embarrassment of what had just happened, which was that, in fact, the captor had not killed her, SEAL Team 6 had.
And that was another case where the punishment, you know, the way the command tried to hold itself accountable, was considered insufficient. And so, Admiral McRaven stepped in and conducted what’s called an admiral’s mast, which was unprecedented. And it’s a—SEAL Team 6 is a—you know, it has a law unto itself. It’s in its own world. It’s its own tribe. And one of the things that it uses is a Navy system called non-judicial punishment. And what it allows you to do is to punish an individual without any form of court-martial. It’s a reprimand. And you can be removed from a unit, but it saves your career. And he stepped in and conducted a mast and punished, threw out, three members of SEAL Team 6. And it was considered this total insult that the admiral had to come to the command and conduct a proceeding that normally would be done by a captain. But I think one of the things I say in the article is, is that this was very dramatic in the world of SEAL Team 6, but even within their own mores, two of the three later returned to the unit. So, you don’t get justice or accountability at SEAL Team 6. It just doesn’t happen. It hasn’t happened. I have sources that argue that it hasn’t happened since they were started in 1980. And I think one of the reasons—one of the motivations for sources to talk to me over the last couple of years has been their frustration, some of them over two decades, to get the command’s leadership to hold itself accountable for what it’s been doing.
AMY GOODMAN: You talk a lot about Britt Slabinski, the legendary member of SEAL Team 6. Talk about the story of this man, who was a Navy Cross winner, telling his men he wanted a head on a platter.
MATTHEW COLE: Yeah, so, in 2007, Britt Slabinski was the Blue Squadron master chief, which is one of the assault teams within SEAL Team 6. And they deployed to Afghanistan late in the year into Kandahar and Helmand, which at the time was, and still is, an incredibly violent, incredibly destabilized section of the country where the Taliban effectively rule. They had encountered an enormous amount of resistance and violence from the Taliban. And at some point during that deployment, he tells his men that he wants a head on a platter. One of his men interpreted that remark as an order, as a direction to be given and followed through. And so, on December 17th, 2007, they conduct a raid into a compound in Helmand province, killing three or four Taliban fighters. And in the aftermath, one of the young operators begins to try to cut off the head of one of the fighters.
And the officer of the unit, who was Slabinski’s superior, happens to be on the mission, and he walks by a window of a compound and peers in and sees this young operator standing over this dead fighter and what he believes is the sawing action over this man’s neck. And he sends Britt Slabinski, who is his senior enlisted leader, into the room to inquire what happened. And Slabinski comes back and says, “No foul play. He was just trying to take gear off of the man’s body, and nothing—nothing was untoward.” But the officer doesn’t believe it. He still has suspicions, thinks there was something wrong with what he saw, and so he goes back and reports it to the command, to his leadership, at SEAL Team 6 and demands an investigation. And two subsequent investigations, first one for JSOC, and which is effectively an internal investigation, and one for the Navy—Naval Criminal Investigative Service, the federal law enforcement organization that the Navy has that conducts criminal investigations—
AMY GOODMAN: NCIS.
MATTHEW COLE: NCIS—find no evidence to support a violation of the law of armed conflict. And part of what they found was that Slabinski tells his story, the officer tells his story, and they—the young SEAL, who was alleged to have done this, refused to testify—he took the Fifth—and was moved out of the country, was sent home. And my sources—from the beginning, it was never a question of whether this operator had mutilated this guy. In fact, he had severed a good portion of this man’s head off before he was stopped by Slabinski. The real question became: Why had he done it? And after some internal inquiries at the command, what became clear was that he believed that he was following an order.
And when Britt Slabinski was up for a promotion a few years later, they did two informal internal inquiries. You can’t call them in investigations. And again, this—you know, these words, they mean something in terms of understanding how subtle SEAL Team 6 operates. They were inquiries. And they were inquiries because there’s no paper record of this. And what they found was that during that deployment, Slabinski had, A, said that he wanted a head on a platter. Some of the men who were more veteran and savvy saw him as speaking metaphorically and didn’t pay attention. The younger ones didn’t. And, B, that this young man, this young SEAL—and, by the way, he wasn’t young. He was young for SEAL Team 6. When you join SEAL Team 6, you already have six years of experience as a SEAL. So he wasn’t a kid. He was just a kid relative to someone like Slabinski, and impressionable and easily influenced. He believes he’s following an order. So, after a mission, he tries to cut a man’s head off. And Slabinski tries to protect him, but also protect himself.
And the inquiry finds that, you know, he—was no question that this was a result of Slabinski’s leadership. And then they find additionally that there was another operation in which he ordered—Slabinski ordered all the men on the operation shot, regardless of whether they were armed. Now, that order is illegal. It is effectively—it’s tantamount to ordering murder or an execution, precisely as the SEALs were ordered in the bin Laden raid to do. As it happened, in that operation, the subsequent investigation found that all the people who were killed in that operation had been armed. But the order itself was illegal. And so, in 2010, Britt Slabinski was told that he could never come back to SEAL Team 6. He was not allowed to be back. And one of my sources, who was a former senior member of the command, said to me something—I’m paraphrasing roughly, but he said, “You know, to this day, Slabinski thinks that the guys turned on him. And they did. But what they didn’t do was turn him in.” And that was—to me, that was so telling. Their justice was to throw him out of the unit. That’s their justice. It wasn’t to bring him up on charges or suggest that he should retire, or provide any other sense of accountability. It was to make sure he couldn’t be among them.
And so, what happens? He is then requested by a—someone who was close to him, who had been another SEAL Team 6 officer, who was in Afghanistan during the Roberts Ridge, Neil Roberts’ death, and that deployment, who was one of the investigators and the senior SEAL Team 6 member on the ground when the young SEAL had tried to behead the Taliban. He—upon learning that Slabinski had been blackballed out of the unit for substantiated allegations of war crimes or criminal activity, what does he do? He requests that he be promoted and come in as his senior enlisted leader at his command. And that man is currently a two-star admiral, Rear Admiral Tim Szymanski. And he is now in charge of all SEALs in the United States. So, that’s the—that really gets at the heart of what is at this story, which is that they knew what was going on. When they had an opportunity to do something about it, not only did they not do anything about it, they effectively encouraged it by promoting their own. There was no punishment whatsoever. And Slabinski, Britt Slabinski, is really—his story, which is really a tragic one, and it starts in 2002 on Roberts Ridge, and it extends all the way out to being blackballed by SEAL Team 6, is really indicative of sort of the worst of what can happen at a unit like this.
AMY GOODMAN: But he is awarded a Navy Cross.
MATTHEW COLE: He was awarded a Navy Cross, and that won’t ever be taken away from him. And he—by all accounts, what he did on the battle—on the top of Takur Ghar during Roberts Ridge to try to retrieve his teammate was heroic. And it’s not—you know, what happened subsequently is not meant to take away from what he did on this day in this mission. But it—you know, the command had opportunities, specifically with Britt Slabinski. The command had opportunities. They understood that he had deep psychological scars from what happened on Roberts Ridge. And they knew he was troubled. And I think the audio that we played, that you played earlier, is indicative of someone who does not have his head right. And I shared that, the transcript of it, with two of his former bosses, who were horrified that he said this, and not only that he said it, but that he said it in an interview to an author, and that the younger men around him were undoubtedly influenced by that kind of talk, by that kind of bravado and bloodlust.
AMY GOODMAN: Let’s go back to that clip, which we played in Part 1 of the conversation. Again, it’s being played here publicly for the first time. A Team 6 member at the time, Britt Slabinksi, describing the aftermath of an operation to take down a convoy that they believed was filled with al-Qaeda fighters trying to escape to Afghanistan—Slabinski and a team of snipers, who killed nearly 20 al-Qaeda fighters.
BRITT SLABINSKI: After I shot this dude in the head, there was a guy that had his feet, just his feet, sticking out of some little rut or something over here. I mean, he was dead. But, I mean, you know, it got—people got nervous. I shot him about 20 times in the legs. And every time you’d kick him or shoot him, he would kick up, and you could see his body twitch and all that. And it was like a game. Like [inaudible]. And the guy would just, you know, twitch again. It was good therapy. It was really good therapy for everybody that was there.
AMY GOODMAN: So, that is, at the time, SEAL Team 6 member Britt Slabinski—actually, not at the time, because this is recounted afterwards. Is that right? And he was—
MATTHEW COLE: No, he was—he was a member. That was in 2004, 2003-2004. He was a member of SEAL Team 6 at the time.
AMY GOODMAN: The title of your investigative exposé in The Intercept is “The Crimes of SEAL Team 6.” The crimes. So, you are putting this out at the end of the Obama administration. Talk about exactly what you found, the crimes as you’ve been telling us, and what you think should happen now.
MATTHEW COLE: I think that what this investigation has found, what I’ve found over the last couple of years, is that there was a consistent and persistent forms of largely mutilations and desecration of bodies in Iraq and Afghanistan, beginning in 2002, continuing all the way through at least 2011. To be honest with you, I don’t think it stopped. I think it might have lessened. I mean, I’ve got some indications that, simply from the lowering of the—slowing down of the tempo of the wars, both in Afghanistan and then the pullout in Iraq, simply brought things to—mostly to a halt. There were a series of pretty horrific acts. We had canoeing, as we described, which is this particular type of firing a bullet into someone’s head after they’ve been killed or are mortally wounded; skinnings, which were done under the excuse of needing DNA and became sort of a cover to pull large sections of skin off of someone with a knife, using these specialized hatchets that were given to some members of the—of SEAL Team 6 to hack bodies after they were killed or, again, dying. There were, frankly, a whole host of criminal activity, excessive violence, brutality, unjustified killings, some of which were not criminal in nature or intent, but were certainly problematic and poor judgment. And again, just there’s not a case—there is not a single case of punishment or legal action against any member of SEAL Team 6 in 15 years for accusations of unjustified killings, in particular, or any atrocity or what would be deemed a war crime, mutilating a body.
You know, one thing that I didn’t mention before, and one of the things that needs to be said, is that what they were doing, in large part, was a form of psychological warfare. I spoke to several SEAL Team 6 members and people who worked with SEAL Team 6 who witnessed war crimes, who said that this was a message that they were sending, and they felt encouraged to send, to al-Qaeda, to the Taliban, that they, too, fought dirty. And that, to me, was one of—I mean, you know, in a large sense, this has been going on since the beginning of time, in terms of warfare. But with such a professional force, it was really startling to hear that America’s most heralded unit, the best of the best, the “President’s Own,” were so emotionally involved with this war and these battles that they felt the need to conduct a form of psychological warfare on the enemy.
And what I think—what I took away from this investigation, what I hope happens is that the senior leaders of the command, who knew about it or should have known about it, are held to account from the standpoint of their ability to be promoted. And I think—we put this story out now. It comes at the end of the Obama administration. It is a very thorough accounting of what this unit became, first under President Bush and then under President Obama. And the senior leaders who knew about it, who failed to hold their men to account, are now senior people inside JSOC and special operations who end up being who President Trump will have at his beck and call to conduct operations. And that is the significance. The real significance here is, is a lot of this is history, but when no one gets punished and people get promoted, you’re bringing that history forward. And you’re saying to people who made decisions when they were, you know, young officers, who are now—have stars on their lapels, who are making serious decisions for the United States and making recommendations to the president about what they’re going to do on a mission or in general in a war zone, they are now in positions of great responsibility and authority, and there has been no accounting. So, if there was something that we hoped could happen out of this, it would be that some of these people’s careers would effectively end. Not fired. There’s—you know, there’s very little chance that anyone will look back into and reopen these investigations. This is more about trying to determine whether particular officers who had served at SEAL Team 6 did their job, whether they, you know, did what they were supposed to do, which was provide law and order.
AMY GOODMAN: And the names of the officers you feel should be challenged?
MATTHEW COLE: There are three in particular that my story goes into. One is current Rear Admiral Hugh Wyman Howard, who is a one-star admiral at JSOC. Another is rear admiral, two-star, Tim Szymanski, who is the commander of WARCOM, which is the overall SEAL command out in California, is effectively the highest-ranking SEAL or the—in charge of all Navy SEALs in the Navy. And Captain Pete Vasely, Peter Vasely, who is—who may in fact be—have already made promotion to admiral, who is—also has a senior position inside JSOC. These are people who have—and, by the way, we spent months, in some cases years, trying to get these people to answer questions, to talk to us. They refused. The military refused to respond to this story for five months, with dozens of questions, specific questions, to get them to say, “Hey, we’d like your help here.” And it was total silence. Total silence.
AMY GOODMAN: And your allegations of what Vasely did?
MATTHEW COLE: Vasely initially reported the beheading in Afghanistan in 2007, but, effectively, allowed Slabinski to cover it up. And so, there was a—in a very subtle way, he made sure that there were no charges. And he—there was pressure applied to him from above to make the charges go away, and he did his duty. He certainly was fully aware of what occurred in that room, and walked away from it.
AMY GOODMAN: And Howard?
MATTHEW COLE: Howard was—Howard is a very interesting individual. He is a descendant of an admiral, a long history of naval officers in his family, graduate of the Naval Academy. And Wyman—he’s known as Wyman in the SEAL world. Wyman Howard was commander of Red Squadron. And he came up with the idea of purchasing $600 custom-made hatchets to give to his men, because their unit insignia and moniker was a Native American warrior. They wear patches. They have tattoos. He thought it would be great to give them a hatchet and then encourage them to wear them on the battlefield. They had no military purpose whatsoever. And then he would—he would tell some of his men and others that he wanted them to go out and bloody their hatchet. And it was largely a euphemism, but not unlike the way Britt Slabinski tells his men that he wants a head on a platter, what occurred was people started using those hatchets to hack bodies and commit war crimes with them. And Howard later became the commander, overall commander, of SEAL Team 6 and has had, frankly, quite a rising career. And when you look deeply at some of the things that happened under his command, it’s quite disturbing. And that’s the point, you know, that no one has looked deeply at what’s occurred.
AMY GOODMAN: And President Obama’s knowledge of all of this?
MATTHEW COLE: Can’t speculate. I mean, I—you know, on the bin Laden raid, obviously, he has very good knowledge. But, you know, overall, my impression and what I’ve been told is that the—what was so, you know, in a way, sinister about what occurred on the battlefield by SEAL Team 6 was their way—their ability to suppress the information from getting out beyond even to the admiral level or the generals level. They kept it in the unit. And so, I don’t know, you know, who knew or how many people knew. I certainly know that senior leaders at JSOC had an idea. They certainly—I’ve spoken to some officers from JSOC who said, “We feared it. We had inclinations. But we never could prove anything.” And, you know, I think that’s probably largely true for a lot of people. “We feared it, but we couldn’t prove anything.”
AMY GOODMAN: And, Matthew Cole, the difference between your piece for The Intercept, your piece called “The Crimes of SEAL Team 6,” and The New York Times in the summer of 2015, “SEAL Team 6: A Secret History of Quiet Killings and Blurred Lines”?
MATTHEW COLE: The Times did a very good job of introducing the public to some of the darker side of SEAL Team 6, which—you know, that article was very well reported. And what it did was it raised a lot of questions, I think. But it didn’t provide a whole lot of answers. And what I tried to do was get past that, which was there was a lot there. And they—their story, in particular, quotes, on the record, Britt Slabinski denying that he ever gave an order to kill all men on an operation, that the young man who—young SEAL who was cutting off the head of another—of a militant had done anything other than having his knife slipped when he was trying to get, you know, military equipment off of a dead body. And my story pieces together what really happened.
And one of the things that was so interesting was that SEAL Team 6 has essentially a—what we call a rock of shame. They have a rock that sits in one of their senior leaders’ offices that has names on of former SEAL Team 6 members that are no longer welcome to come to the command physically. And two names that are on there are Matthew Bissonnette and Rob O’Neill from the bin Laden raid, because of their publicity. After The New York Times article was published, Britt Slabinski’s name was added to that list. And I was talking to my source, who had told me about it, and he was—he was disgusted, but he said—and I think we quoted him in the story—he said, “That’s the problem with SEAL Team 6. They didn’t put his name on after they blacklisted him for suspicion of war crimes. They put his name on after he went and spoke on the record and lied to the press.”
And, you know, I felt—we felt we had to put that in there to explain sort of the full narrative of what the values are, sort of how the values are off at SEAL Team 6. The Times did a very good job with their story, but it didn’t go far enough. It didn’t go deep enough. And I won’t speculate as to why. I’m glad that they did the story. I think we need to have more stories about SEAL Team 6 that are not putting them on a pedestal. They do great work. They do important things. I’m not vilifying them in any way. But they need to be held to account, because the secrecy has insulated them, and their elite stature has insulated them from any kind of accountability or justice.
AMY GOODMAN: This is Democracy Now!, democracynow.org, The War and Peace Report, as we turn to another of Donald Trump’s picks for his Cabinet. This piece in The Intercept is headlined “Trump’s Pick for Interior Secretary Was Caught in ‘Pattern of Fraud’ at SEAL Team 6.” In it, Matthew Cole writes, “A Montana lawmaker tapped by President-elect Donald Trump to be secretary of the interior committed travel fraud when he was a member of the elite Navy SEAL Team 6, according to three former unit leaders and a military consultant. In announcing the nomination of Republican [Rep.] Ryan Zinke, a retired Navy SEAL commander, Trump praised his military background. [He said,] ‘As a former Navy SEAL, he has incredible leadership skills and an attitude of doing [whatever] it takes to win.'” Matthew Cole, you dug deep into Zinke’s history. Talk about what he did as a Navy SEAL and why, ultimately, he was forced out.
MATTHEW COLE: So, Congressman Zinke was a member of SEAL Team 6 as a mid-career officer and junior officer in the 1990s. And he—during the war in Bosnia, in which SEAL Team 6 was assigned, he frequently came home to the United States after a deployment and, instead of coming back to Virginia Beach, would fly to Montana, where he’s from, Whitefish, and work on a house that he had there, that he was hoping to live in when he retired. And he did this several times and was warned, I think after one or two times, that what he was doing was travel fraud. He was expensing it to the U.S. government and calling it work, when in fact it was personal. And he was warned verbally not to do it, and then he got caught doing it again. And after he shifted positions inside SEAL Team 6, the people who followed him discovered his paperwork and realized he had been—he had a long pattern of it. And so they brought it to the command’s attention.
And the command—this was in 1999 or 2000, before the wars—decided that he had to leave the unit. They were going to, you know, spank him. But he wasn’t going to—they weren’t going to punish him or reprimand him in any way. And as one source said to me, the commander of—commanding officer of SEAL Team 6 at the time said, “We don’t want to punish him, because it will hurt his family. He’s got a family, and, you know, he’ll lose pay. And we don’t want to do that. He’s a nice guy.” And so, they wrote his evaluation report in such a way that he wouldn’t be allowed into SEAL Team 6, but he could leave the unit and continue on as a—in his career as an officer in the Navy SEALs. And that’s exactly what happened.
And, you know, in a lot of ways, Zinke is sort of too small a crook to be nominated for Trump’s Cabinet. But it gets at the issue of integrity and leadership in SEAL Team 6, the officer corps. And here was someone who made some serious mistakes and—
AMY GOODMAN: And explain further what he did and how many times he did it.
MATTHEW COLE: Yeah, oh, I’m not sure the specific number of times. We were told multiple times, in the range of four or five times. He would fly out to Montana and claim that it was some kind of SEAL Team 6-related endeavor. Publicly, he has stated that these were training trips. My understanding is, is that he never claimed that they were training trips, and that, in fact, what he was doing was helping to rebuild or renovate a house that he intended to live in when he retired from the military. He was—he’s a native of Whitefish, Montana. And so, he got caught. I couldn’t get a sense, actually, of—my sources couldn’t remember, because it was a long time ago—how much money was the total dollar figures.
He has—in his 2014 campaign, to give him his side of it, he reported that he wrote a check—returned a check to the Navy for something like $214, that covered a travel voucher that he did, and that he had been duly punished for this. He had made a poor decision. He didn’t—he portrayed it as a—something that was justifiable, but that the Navy ultimately decided they wouldn’t pay for.
My sources, who were both contemporaries of his at the time at SEAL Team 6, as well as senior to him, said that that was not an honest portrayal, that he in fact did it several more times than that and for higher amounts, and that there was nothing close to a justifiable reason for his travel. He was spending government time and resources for his own personal efforts on a home, essentially.
AMY GOODMAN: And so, what kind of response—you wrote this in December, after, of course, Donald Trump chose him to be his nominee for secretary of interior. What kind of response did you get to your piece?
MATTHEW COLE: Yeah, you know, a lot of silence. I mean, Zinke has still never responded. The Trump team, the transition team, called me to say that—they didn’t dispute any facts in the story. They only said this was old news. And, you know, they had confidence, the president-elect had confidence in the congressman.
AMY GOODMAN: They called you because you called them?
MATTHEW COLE: Yeah, we had called—we had sought comment before the story ran. They responded after the story published. Zinke’s team never responded. You know, there’s been some response. Actually, a lot of people from Montana responded to our story, on both sides, saying that he was honorable, other side saying that, you know, he was terrible. And he’s their congressman, so it’s a political issue. I think I do—I do know—and it wasn’t in this piece, but there is more to—you know, he had some subsequent positions in the Navy SEALs that were—had some—there were some ethical flags raised in those positions, as well, towards the end of his career. And we may or may not get to those in the coming days. But there was—this was not an isolated incident, is the sense that I have from talking to folks who were in the Navy with him.
AMY GOODMAN: And he was forced to leave?
MATTHEW COLE: He was effectively forced to leave SEAL Team 6. He was not officially forced to leave the Navy. He retired at retirement age.
AMY GOODMAN: And explain the difference.
MATTHEW COLE: The difference between being forced to leave versus?
AMY GOODMAN: Forced to leave SEAL Team 6 but not the Navy.
MATTHEW COLE: So, SEAL Team 6 has—and any unit can do this, but there are effective ways to get someone to move on, which is that when their time is up, when their pre-assigned task is over, their assignment, the evaluation is written in such a manner, as I understand it, that they cannot get another job within that command afterwards, because of the way the evaluation is written. And so, you’re never fired. You are never dismissed. You are—your time is up, and you are quietly told that you just won’t be able to come back here. But no one else is told, going forward, in any other assignment that you get, that that’s what happened to you.
AMY GOODMAN: You write about a celebration, a reunion, really, of Navy SEALs back in Virginia at the headquarters. Describe where that his and what happened.
MATTHEW COLE: So, each year in October, SEAL Team 6 has what it calls its annual stump muster, which is like a reunion, and it brings back old members of the command, original members of the command, people who have just recently retired, current members and their families. And, you know, they—it’s a party. And my story ends with a former senior leader of the command who went back in October of 2011. The organization, the headquarters, had just completed a $100 million building and facility and essentially were christening it. And it was under the command then of Captain Wyman Howard, who had just taken over at SEAL Team 6.
And he was—this former SEAL team leader was standing in a group with old friends, and he was handed a portfolio, a ring-bound book. And he opened it up, and someone said to him, “This is our greatest hits.” And he looked down, and they were a collection of canoed heads since 9/11. And what he realized, and I subsequently was able to confirm, was that this collection was not the private collection of some member of SEAL Team 6. This was the SEAL Team 6 official collection and photo book that they were sending around as entertainment at a private party, essentially, but out in the open. And the senior who saw it decided after he left—he was disgusted with what he saw, and decided he was never going to—he has not gone back to the command for a reunion since, because of how upset he was with the lack of morality and the sort of, you know, bloodlust and glee, you know, the gleefulness around essentially what is their professional work.
AMY GOODMAN: Matthew Cole, I want to thank you for being with us, national security reporter for The Intercept. We’ll link to his new exposé, just out, “The Crimes of SEAL Team 6.” This is Democracy Now! I’m Amy Goodman. Thanks for joining us.
JANUARY 10 and 11, 2017
Find this story at 10 January 2017
Find this story at 11 January 2017
The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.
How The U.S. War In Laos Was Key To The ‘Birth Of A Military CIA’7 februari 2017
Last fall, President Obama, on his final trip to Asia, stopped in Laos for the annual ASEAN summit of Southeast Asian leaders. While there, he pledged millions to help clean up a legacy of U.S. involvement in Laos: unexploded bombs. They were from the 1960s and 1970s — bombs the U.S. dropped in during its campaign to prevent the spread of communism in Southeast Asia.
Vietnam was the most visible part of that war. Over half a million U.S. forces fought there at one point; over 50,000 were killed. Cambodia got coverage – and protests – during the 1969-1970 U.S. bombing campaign there. But Laos, sandwiched between Vietnam, Thailand and Cambodia, and with a population no greater than Los Angeles, received relatively scant attention.
Joshua Kurlantzick, a senior fellow for Southeast Asia at the Council on Foreign Relations, paints a vivid portrait of America’s decade-and-a-half war in Laos in his new book, A Great Place to Have a War: America in Laos and the Birth of a Military CIA.
As the title suggests, the war in Laos got relatively little attention, in part, because it was handed over to a newly formed CIA to run. It started off small, with a few CIA officers training and arming allies from the Hmong hill tribe and ethnic minority to act as a guerilla force. By the end, some 14 years later, the Hmong were fighting pitched battles against the Communist insurgents and their North Vietnamese allies. To help them, the U.S. dropped more bombs in Laos than it had during all of World War II.
At the heart of Kurlantzick’s deftly paced book are conflicted CIA operatives and the Hmong — led by the charismatic Gen. Vang Pao — who did the bulk of the fighting on behalf of the U.S. But what the book does best is examine the CIA’s transformation from an intelligence-gathering organization to a war-fighting one.
As Kurlantzick explained in a phone interview, Laos in the 1960s became “a great place for the CIA to have a war. Not necessarily a good place for anyone else involved. Because what ultimately transpired was that in Laos, the CIA went from a spying organization, intelligence-gathering agency, to one capable of managing and conducting and overseeing a quite substantial conflict. In other words, an organization with war capacities.”
What was the CIA like before it took on the war in Laos?
The CIA had only been around for about 15 years, and even though it had done some things that had received significant notice, it was still a very small organization. The war in Laos was an enormous boon for the CIA in that it raised its bureaucratic profile and boosted its budget. It remains the largest covert operation in U.S. history. So by the time the war was over, the CIA had established itself as a really significant player in the Washington establishment.
Why did that establishment decide to hand over the war in Laos to the CIA?
It was in a climate in which the U.S. public was sort of tired of large-scale war. After the Korean War, the Eisenhower and Kennedy administrations embraced covert war as a major part of U.S. foreign policy. They both very much saw covert war as a means to advance aims without having to pay the price in public opinion.
And soon that war morphed, didn’t it?
At the beginning, there were some good ideas by the Americans – they wanted to make it a relatively small operation, almost a guerilla operation to kind of fight for Laos’ sovereignty. As the war went on, the desire of the Laotians – mostly ethnic Hmong who did the fighting – and the U.S. diverged.
The U.S. aim as the war went on basically became: use Laos as a charnel house, where most of the reason for the fight was to occupy North Vietnamese Army and to kill as many North Vietnamese as possible — the theory being that then, they could not be involved in the fight in Vietnam.
The conflict in Laos ended in defeat in 1975. The Communists won. They remain in power decades later. How was this viewed inside the CIA?
I think the war was — and continues to be — viewed as a success in that they held off, as much as was possible, Laotian Communist and North Vietnamese advances for a significant period of time. It also allowed the CIA to develop paramilitary capabilities. And the war gave the CIA a much more significant place at the U.S. foreign policy-making table.
So the CIA ended up with a bigger role. In the post 9/11 world, that role has expanded even further — for example, with its drone program. Is there a difference between when the military handles a campaign and when the CIA does?
Overall, the use of the uniformed military, for all of their significant flaws, can allow for greater oversight by Congress and the public, for a number of reasons. First of all, unlike special forces or the CIA, they are not required to take pledges of silence on their activities. So their activities are more clearly documented. Also there’s usually a clearer chain of command in the military and a more clear code of ethics. Finally, the military is usually more accountable in its budgeting and its oversight to Congress.
Is there an upside to having a militarized CIA?
Let me begin by saying that I think the current administration – despite their fights over intelligence and analysis – appears to be very much in favor of expanding paramilitaries, both from the CIA and the special forces. The upside for the executive branch is that they are using forces that they don’t need to tell Congress and the American people about. They are not using conventional war, so less Americans would be…
…in harm’s way?
Yes. But there’s a downside to that. The less you put your own people in harm’s way, the more you’re able to make decisions that can be revolutionary because you don’t have skin in the game.
This interview has been edited and condensed.
January 30, 20172:58 PM ET
NISHANT DAHIYA
A Great Place to Have a War
America in Laos and the Birth of a Military CIA
by Joshua Kurlantzick
Hardcover, 323 pages purchase
Find this story at 30 January 2017
© 2017 npr
CIA files: political intrigue, Australian ‘dismay’, and radical Maori7 februari 2017
The CIA release was part of its archiving of all 25-year-old ”non exempt” records.
A mass publication of declassified CIA documents reveal the extent of United States’ intelligence interest in New Zealand during the height of nuclear tensions between the two countries.
The database of previously-confidential documents, published by the CIA this week, contains reports which delve deep into New Zealand’s domestic and international affairs
Swelling anti-nuclear sentiment in the South Pacific during the 1980s was the predominant focus of CIA analysts at the time, and this focus shifted to the political fallout after the 1984 election.
Our prime ministers, race relations and stroppy kinship with Australia were also of considerable interest to US intelligence officials.
A 1982 intelligence report for the US director of intelligence flags the growing movement for a nuclear ban in the South Pacific – and the nuclear-nation was concerned their naval influence could be dented
“Such restrictions would impede movement of US warships in the vital lanes between the United States and Australia and New Zealand.”
Reports show the CIA were well across developments in “maverick” Vanuatu and neighbouring Fiji, who both refused American warships in 1982.
“However overdrawn, anti-nuclear sentiment in the area is genuinely felt and not easily modified,” the report advises.
At the time, the US thought Australia and New Zealand would diplomatically advocate for nuclear ships on a political level.
But there was concern that these efforts might be “diluted” by public sentiment in both countries.
New Zealand Prime Minister Robert Muldoon was a likely – if at times tacit – ally for US nuclear interests in the region.
As anti-nuclear sentiment in the Pacific built, many reports about the impending July 1984 election in New Zealand were filed about the prospect of a Labour victory.
“Muldoon faces major obstacles in his bid for a fourth term,” one report says.
Prime Minister Robert Muldoon was the subject of a candid CIA biography.
NZ ON SCREEN
Prime Minister Robert Muldoon was the subject of a candid CIA biography.
Any renegotiation of ANZUS under a Labour government led by David Lange would have “serious implications” for defence co-operation, and while NZ officials promised a compromise, the CIA was far from assured.
“We are not so sanguine.”
At the time, 40 per cent of the US naval fleet was nuclear-powered.
The CIA said Lange was charismatic but unable to unify the Labour party of the mid-80s.
file
The CIA said Lange was charismatic but unable to unify the Labour party of the mid-80s.
Behind closed doors, Lange conceded that he considered nuclear propulsion – but not nuclear weapons – safe. One CIA report speculates he had failed to convince his caucus of the same.
And, it wasn’t just the Labour party which presented concern for US intelligence officials.
Consideration was given to property magnate Bob Jones’ New Zealand Party, which looked to split the conservative vote.
The CIA archive has millions of pages that can be searched by the public.
AP
The CIA archive has millions of pages that can be searched by the public.
The historic 1984 election saw Lange’s Labour party come into power, and responding to public concern, barred American ships from New Zealand ports.
A president-approved memo to top US government officials in February of the following year illustrates New Zealand’s fall from grace in the eyes of the US.
“New Zealand knows that it cannot expect to continue to receive preferential treatment and consideration in the economic area which it might have enjoys as a closer ally.”
Though, it was stressed as important that no perceivable economic sanctions be implemented.
Directions were given that an “interagency group” promote the US viewpoint in New Zealand.
“In the meantime, the people of New Zealand are still our friends, and the door remains open to the return of an old ally.”
The “port access issue”, or barring of US warships from our ports, remained the status-quo until November 2016, when the USS Sampson visited New Zealand and aided the Kaikoura earthquake recovery effort.
And with that, an old ally returned.
Muldoon v Lange
“For nearly a decade, Muldoon has dominated New Zealand politics … they have continued to vote for this ‘man they love to hate’,” a 1984 report on the New Zealand political climate says.
The US, who considered Muldoon a supporter of ANZUS (a military pact between Australia, New Zealand and the United States), was long-wooed by US leadership.
When Muldoon visited the US in 1981, a briefing note encouraged American president Ronald Reagan to compliment the Prime Minister with a “candid” discussion on a international summit.
“The fact that you had taken him into your confidence on this matter would be helpful in giving him the stature he seeks.”
The same briefing advised offering “an expression of hope” that Muldoon will win the 1981 election – which he did.
In a candid 1984 biography of Muldoon – one of the New Zealand’s most divisive leaders of the modern era – the agency’s East and Southeast Asia desks discussed his abrasiveness and combative style as a National party stalwart.
This abrasiveness was not typically a New Zealand trait, the report said.
It expanded on Muldoon’s sought “stature”, saying he “fancied” himself as a “senior statesmen” in the realm of international finance.
He was a staunch ally of the US and generally satisfied with market access but a Labour victory could cause difficulties with the US-New Zealand relationship. The report writer’s biggest concern was the closing of ports if Labour won the next election (they did).
On Muldoon, he was politically dominant, atypical, and combative with a capacity, the report said.
“He is a tough taskmaster and devastates any associate who is not in full command of the facts of the matter, according to political observers.
“Unable to come up with policies of its own to cure New Zealand’s economic ills, Labor sees political benefit in identifying with a fear of nuclear contamination that is widespread and growing in New Zealand and which spans the political spectrum.”
Just as the prospect of a Labour election win in 1984 was not welcomed, Labour leader David Lange was not favoured by US government figures.
Described as a “charismatic orator”, in a later report, Lange was seen as inexperienced and unable to unify a factional Labour party cabinet except on the anti-nuclear issue.
There’s speculation Lange’s hard anti-nuclear stance was somewhat accidental.
“His penchant for speaking off the cuff in press interviews inched him into a trap from which he could not extricate himself.”
Calling the Lange government’s economic reforms a “calculated gamble” the CIA analysts were not convinced it would pay off, saying sustained growth was unlikely.
“If the economy splutters – for whatever reason – the Labor party will be held responsible in the next election.”
Maori radicalism
In a fascinating report into racial tensions in New Zealand, a 1988 memo from the Office of East Asian Analysis, described the land claim battles as iwi leaders fought for the return of ancestral land.
Relations were strained between Maori and Pakeha, the report said.
“Although the risk of racial violence is small, tensions are likely to increase as the slumping economy swells unemployment among the Maori, and as public resentment builds against Maori demands.”
European New Zealanders were “complacent” in their view of race relations, but Maori activists were challenging the country, an underclass had developed in Auckland, and free market economics were likely to widen the income gap.
“Despite Wellington’s efforts to defuse racial tensions through economic and legislative reforms, the Maori underclass will most likely expand as the Maori population grows, suggesting that racial tensions will persist.”
Maori radicalism was another component and the visit of trade union leader Syd Jackson to Libya – then an international pariah – caught the CIA’s attentions.
“We believe, nonetheless, that the Maoris’ growing political influence could have an indirect effect on Wellington’s foreign nationals…According to the US embassy in Canberra, Australian officials are concerned that racial strife could eventually undermine Wellington’s traditional Western outlook and weaken support in New Zealand for defence and foreign policy links to Australia.”
US on ANZAC
CIA analysts also made some on-the-money comments about New Zealand and Australia’s relationship.
In the 70s and 80s, the anti-nuclear movement and the contentious issue of US warships and port access were high on the agenda.
In one document, the New Zealand stance led to the distancing of trans-Tasman relations with Canberra. Australian officials were worried a failure to find a resolution could spell the end of relations between the US and the two Pacific countries.
Australian Prime Minister Bob Hawke had been criticised as being overly accommodating to the US and was at some risk of being seen as “carrying messages for Washington.”
“This distancing stems from Australian dismay over the antinuclear policies of Lange’s government, particularly its ban on port calls by nuclear ships.
“[Australian PM Bob] Hawke believes Lange’s unyielding stance threatens the ANZUS relationship with the United States and also encourages antinuclear agitation from the left wing of his own Labor Party…Canberra will continue to consult with Washington but will hold back from any approaches to Wellington that could be taken as interference.
“Australian annoyance with Wellington is obvious to all but the New Zealanders…Canberra, nevertheless, finds it politically imperative to take a low-key approach to Wellington. The New Zealanders are quick to see as patronizing any attempt by their larger neighbour to discuss bilateral issues.”
In the Muldoon biography, the writer likened Australia and New Zealand to a bickering family.
“New Zealand places great importance on relations with its large neighbour, despite the almost familial irritants that crop up between them.”
What are the CREST files?
CREST stands for CIA Records Search Tool. The CIA released a searchable archive of some 12 million pages this week, the largest collection of declassified records accessible online.
Previously, documents were available to the public from four terminals at the national archives in Washington, but now 930,000 documents are available on the agency’s electronic reading room.
A freedom of information group, MuckRock, and journalists have been calling for online access for years. MuckRock sued the CIA in June 2014, and in early 2015 a MuckRock user began fundraising to manually scan and digitise the records himself.
The CIA relented, and published a digital archive this week.
It is part of a regular archive process whereby all relevant “non-exempt” 25-year-old records are reviewed, declassified and archived. A trove of material includes reports, analyses, and memos on foreign relations, war crimes, the paranormal, and projects investigating telepathy.
JOHN EDENS AND THOMAS MANCH
Last updated 18:10, January 19 2017
Find this story at 19 January 2017
© 2017 Fairfax New Zealand Limited
The CIA’s New Deputy Director Ran a Black Site for Torture7 februari 2017
IN MAY 2013, the Washington Post’s Greg Miller reported that the head of the CIA’s clandestine service was being shifted out of that position as a result of “a management shake-up” by then-Director John Brennan. As Miller documented, this official — whom the paper did not name because she was a covert agent at the time — was centrally involved in the worst abuses of the CIA’s Bush-era torture regime.
As Miller put it, she was “directly involved in its controversial interrogation program” and had an “extensive role” in torturing detainees. Even more troubling, she “had run a secret prison in Thailand” — part of the CIA’s network of “black sites” — “where two detainees were subjected to waterboarding and other harsh techniques.” The Senate Intelligence Committee’s report on torture also detailed the central role she played in the particularly gruesome torture of detainee Abu Zubaydah.
Beyond all that, she played a vital role in the destruction of interrogation videotapes that showed the torture of detainees both at the black site she ran and other secret agency locations. The concealment of those interrogation tapes, which violated multiple court orders as well as the demands of the 9/11 commission and the advice of White House lawyers, was condemned as “obstruction” by commission chairs Lee Hamilton and Thomas Keane. A special prosecutor and grand jury investigated those actions but ultimately chose not to prosecute.
The name of that CIA official whose torture activities the Post described is Gina Haspel. Today, as BuzzFeed’s Jason Leopold noted, CIA Director Mike Pompeo announced that Haspel was selected by Trump to be deputy director of the CIA.
This should not come as much of a surprise given that Pompeo himself has said he is open to resurrecting Bush-era torture techniques (indeed, Obama’s CIA director, John Brennan, was forced to withdraw from the running in late 2008 because of his support for some of those tactics only to be confirmed in 2013). That’s part of why it was so controversial that 14 Democrats — including their Senate leader Chuck Schumer, Dianne Feinstein, Sheldon Whitehouse, and Tim Kaine — voted to confirm Pompeo.
That Haspel was the actual subject of the 2013 Post story was an open secret. As Leopold said after I named her on Twitter as the subject of that story: “All of us who covered CIA knew. She was undercover and agency asked us not to print her name.” Gina Haspel is now slated to become the second-most powerful official at the CIA despite — or because of — the central, aggressive, sustained role she played in many of the most grotesque and shameful abuses of the war on terror.
Top photo: An interrogation room at Camp Delta in Guantánamo Bay, Cuba, for detainees from the U.S. war in Afghanistan, April 7, 2004.
Glenn Greenwald
February 2 2017, 9:50 p.m.
Find this story at 2 February 2017
Copyright https://theintercept.com/
Rashid Khalidi: Obama’s Condemnation of Israeli Occupation Doesn’t Match His Last 8 Years in Office7 februari 2017
Edward Said professor of Arab studies at Columbia University. He’s the author of several books; his most recent is titled Brokers of Deceit: How the U.S. Has Undermined Peace in the Middle East.
During Wednesday’s press conference, President Obama warned that the expansion of Israeli settlements was making a two-state solution impossible. “I don’t see how this issue gets resolved in a way that maintains Israel as both Jewish and a democracy,” Obama said, “because if you do not have two states, then, in some form or fashion, you are extending an occupation. Functionally, you end up having one state in which millions of people are disenfranchised and operate as second-class occupant—or residents. You can’t even call them ‘citizens’ necessarily.” We get response from Rashid Khalidi, Edward Said professor of Arab studies at Columbia University. He’s the author of several books; his most recent is titled “Brokers of Deceit: How the U.S. Has Undermined Peace in the Middle East.”
TRANSCRIPT
This is a rush transcript. Copy may not be in its final form.
AMY GOODMAN: Well, there was an interesting sort of geography to and diversity to the questions that President Obama answered, all clearly laid out in advance—eight reporters—five women, three men—a gay publication, urban radio. And also he took a question from Janet Rodríguez, White House correspondent for Univision, and Nadia Bilbassy-Charters, senior diplomatic correspondent for Al Arabiya News Channel. She asked President Obama about the Middle East and about particularly the Israeli occupation; President Obama, in his answer, warning that the expansion of Israeli settlements was making a two-state solution impossible.
PRESIDENT BARACK OBAMA: I’ve said this directly to Prime Minister Netanyahu. I’ve said it inside of Israel. I’ve said it to Palestinians, as well. I don’t see how this issue gets resolved in a way that maintains Israel as both Jewish and a democracy, because if you do not have two states, then, in some form or fashion, you are extending an occupation. Functionally, you end up having one state in which millions of people are disenfranchised and operate as second-class occupant—or residents. You can’t even call them “citizens” necessarily. And so—so the goal of the resolution was to simply say that the settlements, the growth of the settlements, are creating a reality on the ground that increasingly will make a two-state solution impossible. And we’ve believed, consistent with the positions that have been taken with previous U.S. administrations for decades now, that it was important for us to send a signal, a wake-up call, that this moment may be passing. And Israeli voters and Palestinians need to understand that this moment may be passing. And hopefully, that then creates a debate inside both Israeli and Palestinian communities that won’t result immediately in peace, but at least will lead to a more sober assessment of what the alternatives are.
AMY GOODMAN: That was President Obama yesterday, again, in the last 48 hours of his presidency. Rashid Khalidi also with us now, Edward Said professor of Arab studies at Columbia University. Your response to what he said and what he has done over this past eight years?
RASHID KHALIDI: Well, he did what he’s been doing for eight years: He sent a signal. The most powerful country on Earth, the sole serious supporter of Israel, without whose support Israel couldn’t do anything, has now, yet again, for administration after administration, sent a signal that what Israeli governments have been doing for decades is going to lead to a one-state solution, in which Palestinians, as he said, are disenfranchised, are not even citizens and so on and so forth. So we have the diagnostician-in-chief telling us about this problem, which he and previous presidents have absolutely—done absolutely nothing to solve. The United States can, could, should act to stop this ongoing annexation, colonization and so forth, which has led to disenfranchisement. I mean, his analysis is impeccable, but his actions—as Professor Glaude said, his actions are just not in keeping with his words, and have not been over eight years in keeping with his words.
AMY GOODMAN: What do you think needs to happen? What opportunity did he miss? So much has happened in the last few weeks, with Secretary of State John Kerry’s speech. You wrote a piece in The New York Times, as well as in The Guardian, saying, “too little, too late.”
RASHID KHALIDI: Right.
AMY GOODMAN: And now [President-elect Trump] appointing, if he’s approved, the ambassador to Israel, who is very much for, among other things, moving the embassy from Tel Aviv to Jerusalem, which Nikki Haley just said—
RASHID KHALIDI: Right.
AMY GOODMAN: —who would be the next U.S. ambassador to the United Nations, she also endorses in her confirmation hearing yesterday.
RASHID KHALIDI: Well, the president-elect’s team includes people like his son-in-law, his nominee for ambassador to Israel and others, who are not just in favor of incendiary acts like moving the embassy, but are themselves major financial or political supporters of the Israeli settler movement. So we’re not just talking about people who are rhetorically in favor of this or that extremist position.
AMY GOODMAN: Talk specifically—you’re talking about Jared Kushner, who will be a top adviser—
RASHID KHALIDI: Jared Kushner.
AMY GOODMAN: —his son-in-law. David Friedman.
RASHID KHALIDI: David Friedman, the ambassador designate, and Jared Kushner are both, according to all the reports, major financial backers of the settlement movement. So, what we have in American and Israeli politics with the arrival of Trump is the completion of a convergence between the extreme right-wing settler, colonial regime that we have in Israel and a segment of the American ruling class, if you want. I mean, Jared Kushner is a major real estate entrepreneur, and he’s used many, many, many of his family’s millions to support not just charitable causes in Israel, but the settler movement, among many other extreme causes.
And so, what we’re seeing on the policy level, what we’re seeing on the media level, what we’re seeing in terms of people who are making political contributions to both the right-wing parties in Israel and American political parties is sort of a convergence of the two systems, but at a time when we’re going to have the most extreme—we have had the most extreme right-wing government in Israel’s history, and when we’re going to have a president who is in favor of things that are sometimes to the right even of that right-wing Israeli government, in terms of what his designees for various positions have said.
AMY GOODMAN: Do you feel President Obama paved the way for this?
RASHID KHALIDI: I think every American president who has stood by idly and just uttered words, like the president has done in his press conference and like the secretary of state did in his speech, and did nothing to actually stop this trend, that he so accurately described, are—they’re all responsible. He is certainly responsible. Had Security Council Resolution 2334 been passed in the first year of this president’s eight years, who knows what might have happened?
AMY GOODMAN: And explain what that resolution is—
RASHID KHALIDI: Well—
AMY GOODMAN: —that caused so much furor, at least on the part of Israeli Prime Minister Netanyahu.
RASHID KHALIDI: That resolution said that everything Israel has done in the Occupied Territories, in Jerusalem and the rest of them, is illegal. It has said that moving its population into occupied territories is a violation of the Geneva Convention, i.e. moving a half a million or 600,000 Israelis into territory occupied is illegal, that the acquisition of territory by force is illegal. And it went on to lay down various other parameters for a solution, including a two-state solution, and the ’67 borders as the basis of that. Now, none of this is new. The United Nations has said this again and again and again. This is a reiteration of Security Council Resolution 242 of November 1967. It’s also a reiteration of positions that have been taken by every single American administration from President Johnson’s to George W. Bush’s, and this one, as well.
But had that been laid down as a marker, a slap in the face of the Netanyahu government, in 2009, when the president came into office, instead of mollycoddling them, instead of continuing to fund settlements—we fund settlements by giving American so-called charities 501(c)(3) status. The president could have reversed that on the first day he was in office, saying, “You cannot send money, tax-free money—you cannot reduce your taxes to support illegal occupation and colonization.” He didn’t do that. The Justice Department, the Treasury could have done that. So, we have financed by—we taxpayers, who are actually paying our taxes, have enabled people who are not paying our taxes, by making so-called charitable deductions, support the settlement movement. Jared Kushner is one of them. [David] Friedman is one of them. There are many, many others.
AMY GOODMAN: So, what do you think is possible now?
RASHID KHALIDI: With Trump as president? Well, I think that this is a—this should be a wake-up call for people in the United States who had some kind of idea of Israel as the light unto the nations, to wake up and realize that the United States has helped to create a situation in which Israeli Jews rule over disenfranchised Arabs, that this is not a light unto the nations. This is not really a democracy, if you have helots. He called them “not citizens.” Well, you can call them what you want. He said they’re disenfranchised. It’s actually worse than that. Go to the Occupied Territories. Go to Arab communities inside Israel. Look at what happened to a member of Knesset yesterday, shot in the face by Israeli border police, because he protested the demolition of a village in the south of Israel. You’re talking about people who, in some cases, nominally have rights—Palestinian citizens of the state of Israel—or in the Occupied Territories having really no rights, and both of whom live under an unjust and discriminatory regime. We have fostered that. We have helped to finance and fund that, all the while our political leaders talk about how wonderful Israel is, how its values and our values—well, these are Jim Crow values. The president talked about Jim Crow. What Israel is enforcing are worse than Jim Crow values. And I think we have to start talking and thinking in those terms and setting ourselves apart or understanding how to set ourselves apart from those kinds of practices that are discriminatory or racist.
AMY GOODMAN: What do you think—what do you think it was that led President Obama to have the ambassador for—to have the United States abstain from this, at the very end of his two terms?
RASHID KHALIDI: I mean, I can’t speculate what was going on in his mind, why at the very end. It’s a really good question. I would love to have seen this eight years ago. Maybe it was his chance to get back at the slights and insults that he’s been receiving from Prime Minister Netanyahu over the past eight years, coming to Congress and attacking American—
AMY GOODMAN: I mean, Netanyahu, famously, to say the least, disrespects him.
RASHID KHALIDI: Right.
AMY GOODMAN: And yet President Obama has been more solicitous of Israel than all the previous presidents—
RASHID KHALIDI: Right.
AMY GOODMAN: —from the Bushes on to Clinton, all involved with resolutions that were critical of Israel, but President Obama did not allow that to happen until now.
RASHID KHALIDI: Exactly. This is the first such resolution that has passed under Obama. Every—as you’ve just said, every previous American president has allowed or has sponsored resolutions that are just as harsh as this or involved elements of this resolution. So, maybe he was—you know, what he seems to be doing in his last few days, few weeks, few months, is to doing—is to do some of the things that maybe he wanted to do but felt he couldn’t do. And it’s really a terrible shame. I mean, this is a—this is a man who came into office, supposedly, with fresh ideas about how to deal with the Middle East. He appointed Senator Mitchell, who ultimately was undermined by people he himself had appointed, and was not able to do what he wanted to do. And from that point on, I think it really was downhill for this president, as far as the Middle East is concerned. His legacy is not a good one, as far as Arab-Israeli issues, as far as the Palestinians are concerned. Palestinians will not—and Arabs and, I would argue, Israelis should not remember this man’s legacy with any fondness.
AMY GOODMAN: Rashid Khalidi, professor of Arab studies at Columbia University, and Eddie Glaude, head of African American Studies at Princeton University, we thank you both for this conversation. This is Democracy Now! When we come back, we look at some of the Senate confirmation hearings. To say the least, heated. Stay with us.
JANUARY 19, 2017
Find this story at 19 January 2017
The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.
Jeremy Scahill on Obama’s Commutation of Chelsea Manning & Continued Demonization of Edward Snowden7 februari 2017
While President Obama has commuted the sentence of Army whistleblower Chelsea Manning, the administration has indicated it has no plans to pardon NSA whistleblower Edward Snowden. White House Press Secretary Josh Earnest said last week, “The release of the information [Manning] provided to WikiLeaks was damaging to national security. But the disclosures by Edward Snowden were far more serious and far more dangerous.” We speak to The Intercept’s Jeremy Scahill, author of the recent piece, “The True Scandal of 2016 was the Torture of Chelsea Manning.”
TRANSCRIPT
This is a rush transcript. Copy may not be in its final form.
AMY GOODMAN: On Friday, White House Press Secretary Josh Earnest told reporters there was a stark difference between the cases of U.S. Army whistleblower Chelsea Manning and NSA whistleblower Edward Snowden.
PRESS SECRETARY JOSH EARNEST: There are some important differences, including the scale of the crime—the crimes that were committed and the consequences of their crimes. Obviously, the—as Chelsea Manning has acknowledged, and as we have said many times, the release of the information that she provided to WikiLeaks was damaging to national security. But the disclosures by Edward Snowden were far more serious and far more dangerous.
AMY GOODMAN: On Friday, a campaign supporting Edward Snowden delivered a petition with more than 1 million signatures to the White House demanding a pardon. Jeremy Scahill, what Josh Earnest said in differentiating Snowden from Chelsea Manning?
JEREMY SCAHILL: Well, I mean, there are clear differences between what Chelsea Manning did and the way that Chelsea Manning has been treated and Edward Snowden. But I do reject the idea that they’re using Edward Snowden as sort of a stepladder to justify this. The reality is that President Obama should have issued a full pardon to Chelsea Manning and should have never allowed the kind of abuse that she’s endured to go on for this period.
Let’s remember, though, that, you know, Chelsea Manning didn’t just leak the “Collateral Murder” video that showed the killing of Iraqi civilians and journalists from the Reuters news agency, didn’t just release the State Department cables that showed all sorts of blackmail, cajoling, corruption, support for dictators around the world, that—it was one of the most incredible moments in the history of democracy in this country, where people actually got to have the curtain pulled back and to see how the government functions in private and how it contradicts the public proclamations of the United States being this beacon of hope, the shining, you know, city on the top of the hill. And also Chelsea Manning provided the Iraq War logs and the Afghan War logs, that detailed numerous crimes committed by the United States and its allies in Iraq and Afghanistan, and also gave us an unprecedented window into how the assassination forces that the U.S. had unleashed in those countries functioned.
But not a single document that Chelsea Manning is known to have released was a top-secret document. And I think that’s a technical distinction from what Edward Snowden did. And I think that that’s part of why Josh Earnest is saying this. But let’s be clear: Edward Snowden also is a whistleblower deserving of an embrace from people who believe in democracy. We understand now the breaking news today was that the Russian government is saying it’s extending Edward Snowden’s ability to stay in Russia for two more years. And a senior Russian official rejected the suggestion by former acting CIA Director Mike Morell that Snowden should be handed over to the U.S. by Putin as a thank you gift to the incoming President Donald Trump, and the Russian Foreign Ministry said it’s curious that a former director of the CIA actually views the giving of people as a gift, and it says a lot about the United States. But, no, I think that the White House is using Edward Snowden in an attempt to justify the commutation of the sentence of Chelsea Manning. I’m ecstatic that Obama did even this. I think he should have gone farther and issued a full pardon to Chelsea Manning.
AMY GOODMAN: One of the things Josh Earnest said—and this is before the announcement that the sentence of Chelsea Manning would be commuted—when talking about Edward Snowden, is he went to a country that is an adversary.
JEREMY SCAHILL: Well, that’s—first of all, that’s an outright lie. When Edward Snowden was in mid-air on the way to Moscow, the United States—
AMY GOODMAN: Headed to Latin America.
JEREMY SCAHILL: Right. Well, we don’t know exactly where, but we understand somewhere in Latin America. While he was in the air en route to Moscow, the United States canceled his passport. So, it was the Obama administration that chose Russia. Edward Snowden did not choose Russia. And then they tried to force Evo Morales—well, they actually did force Evo Morales, the president of Bolivia’s plane down, thinking that Edward Snowden was on board it. My understanding is that supporters of Snowden had bought tickets for him on multiple airlines in an attempt to kind of fog up the U.S. efforts to catch him.
AMY GOODMAN: And so, because he didn’t have his passport, when he was in transit, stopped at Moscow, he couldn’t leave the airport.
JEREMY SCAHILL: Right, he had to stay in the airport for weeks on end.
AMY GOODMAN: Earlier this month, WikiLeaks said its founder, Julian Assange, was prepared to give up his freedom in exchange for Army whistleblower Chelsea Manning. A statement on WikiLeaks’ Twitter page read, “If Obama grants Manning clemency Assange will agree to US extradition despite clear unconstitutionality of DoJ case.” Can you comment on this, Jeremy?
JEREMY SCAHILL: Well, first of all, I mean, I know that our dear friend, the late Michael Ratner, believed that there was a lot of evidence to indicate that there was a secret or sealed indictment against Julian Assange, but that has not been confirmed. So it’s unclear even if there are charges against Julian Assange. Some of the leaked documents from Hillary Clinton’s circle indicate that maybe there is, but it’s unclear that there’s even an extradition request to respond to in the first place. And I think that, you know, Assange has plenty of trouble facing him if he steps outside of that embassy—the potential for the U.S. to want to extradite him, certainly there; Sweden is definitely going to want him to spend some time in jail, and Assange himself has acknowledged that; and the British government, of course, may bring a whole array of new charges against him, as well. But it will be interesting to see what happens. I mean, Assange did say it, and so we’ll see what happens.
AMY GOODMAN: On Tuesday, former New York Times reporter Judith Miller tweeted, “Obama commutes sentence of Chelsea Manning. How many people died because of manning’ leak?” That is what Judith Miller tweeted, the former New York Times reporter.
JEREMY SCAHILL: Judith Miller’s article—
AMY GOODMAN: In the lead-up to the Iraq invasion, Miller wrote several of the key articles that falsely claimed Iraq had an extensive weapons of mass destruction program ahead of the Iraq invasion, paving way for the war in Iraq.
JEREMY SCAHILL: I mean, Judith Miller was a witting participant in a sophisticated propaganda campaign orchestrated by Dick Cheney and the top levels of power in the United States government to falsify a case to invade and destroy Iraq. Hundreds of thousands of innocent people died in that war. Thousands of U.S. soldiers were killed in that war. Judith Miller shouldn’t write with ink; she should write with the blood that she has caused to be shed around the world. And shame on her for attacking Chelsea Manning, whose entire intent was to save lives, when she has knowingly participated in a drive to an unjust, illegal war that killed scores of people. She should, as they say, delete her account.
AMY GOODMAN: Chase Strangio, as we wrap up, your final comment? And do you know what Chelsea Manning will be doing when she gets out of Leavenworth?
CHASE STRANGIO: I have no doubt that Chelsea Manning will continue to just absolutely fight for all the principles that she has long stood for, continue to engage in a campaign of advocacy for transparency, for transgender justice, for the justice of so many people. And I have no doubt that today she, as she always is, is thinking about other people, like Leonard Peltier and other people who are still awaiting to hear about the commutation of their sentences.
AMY GOODMAN: The pardon of General Cartwright?
JEREMY SCAHILL: Well, General Cartwright was part of the official leaks program, where the White House wants to put out information that they feel makes them look glorious, like as we saw John Brennan and others do in the Navy SEAL raid on Osama bin Laden. What this boiled down to was Cartwright leaked information about the Stuxnet virus, and he appeared to have done it with the permission of the highest levels of power in the Obama administration—unclear if Obama himself approved it. But then he got caught lying to the FBI. And the whole point of it was to say, “Hey, we dismantled—or, we penetrated Iran’s nuclear program with this amazing computer virus that we created,” potentially in concert with the Israelis. Cartwright then got caught lying to the FBI. And so, this is sort of akin to, you know, some of the pardons that took place in Richard Nixon’s administration. Basically, Cartwright did this at the pleasure of the White House, so to speak, and so he’s part of the official leaks program, as, you know, so many other unindicted people are in the White House—big contrast to how they treat conscience-motivated whistleblowers.
AMY GOODMAN: And, Nancy Hollander, what this means for future whistleblowers?
NANCY HOLLANDER: I think it’s very important for future whistleblowers to see how Chelsea was treated and mistreated. And none of that is going to go away. But at least the president has reduced her sentence. But we’ve always been concerned, and Chelsea has been concerned, that future whistleblowers will be afraid to come out and step forward. And Chelsea will be out there doing service to her community, and she can’t wait to do that.
AMY GOODMAN: Nancy Hollander, appellate attorney for Chelsea Manning. Chase Strangio, staff attorney at the ACLU, represented Chelsea Manning in a lawsuit against the Pentagon. And Jeremy Scahill, I hope you’ll stay with us for the end of the show to talk about the confirmation hearing for education secretary, Betsy DeVos. When we come back, Oscar López Rivera has also been—had his sentence commuted. We’ll talk with his brother and Juan González. Stay with us.
JANUARY 18, 2017
Find this story at 18 January 2017
The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.
Die BND-Affäre und die Schweiz: BND und NSA sollen Swisscom-Kunden ausspioniert haben27 januari 2017
Der deutsche Geheimdienst BND habe Daten aus der Schweiz an die NSA weitergeleitet: Das sagt ein österreichischer Politiker gestützt auf neu aufgetauchte Dokumente.
KOMMENTARE
Der österreichische Grünen-Politiker Peter Pilz präsentiert in mehreren europäischen Städten Enthüllungen über Spionagepraktiken der NSA – am Mittwoch auch in Bern.
Der österreichische Grünen-Politiker Peter Pilz präsentiert in mehreren europäischen Städten Enthüllungen über Spionagepraktiken der NSA – am Mittwoch auch in Bern. (Bild: Imago)
Der Abhörskandal um den deutschen Bundesnachrichtendienst (BND) und die amerikanische NSA betreffe auch Schweizer Privatpersonen und Firmen. Das sagt Peter Pilz, grüner Abgeordneter im österreichischen Nationalrat, gestützt auf angebliche Geheimdokumente. Am Mittwoch präsentierte Pilz die Dokumente in Bern – zusammen mit der Co-Präsidentin und dem Fraktionschef der Schweizer Grünen, Regula Rytz und Balthasar Glättli.
Mit den Dokumenten glaubt Pilz belegen zu können, dass der BND Internetdaten aus der Schweiz ausspioniert und an die NSA weitergeleitet habe. Passiert sei das im Rahmen der «Operation Eikonal», die deutsche Medien im Oktober 2014 publik gemacht haben. Neu ist jetzt der Bezug zur Schweiz. Pilz präsentierte eine mit vielen technischen Details versehene Liste von über 250 Daten-Transitleitungen durch Deutschland. Dabei handle es sich um eine Prioritätenliste jener Leitungen, die der BND zwischen 2004 und 2008 im Auftrag der NSA ausgespäht habe. Neun der 250 Transitleitungen kommen aus der Schweiz und führen nach Prag, Sydney, Tokio, Seoul, Luxemburg, Warschau und Moskau. Auf Schweizer Seite wurden diese Leitungen laut Liste von der Swisscom betrieben. In Frankfurt, wo sich der grösste Internetknotenpunkt der Welt befindet, soll die deutsche Telekom dem BND Zugriff gewährt haben. Der BND habe die Daten an die NSA weitergegeben, gestützt auf ein Memorandum aus dem Jahr 2002.
Grüne planen Strafanzeige
Wenn die Liste authentisch ist, wäre die Schweiz eines von 64 Ländern, die vom BND/NSA-Lauschangriff betroffen wären. Der Zugriff auf die Leitungen stützt sich laut Pilz auf einen Vertrag zwischen BND und deutscher Telekom von 2004. Diesen Vertrag hat Pilz vor ein paar Tagen in Österreich veröffentlicht. Der Vertrag regelt die Aufklärung von «kabelgestützten leitungs- und paketvermittelten Fernmeldeverkehren, die ihren Ursprung und ihr Ziel nicht in der Bundesrepublik Deutschland haben (‹Transit›)». Über die Herkunft der Dokumente äussert Pilz sich unter Berufung auf den Quellenschutz nicht. Er habe ihre Echtheit jedoch zweifelsfrei verifiziert, sagt Pilz. In Österreich ist der 61-Jährige eine bekannte Grösse. Seit über 20 Jahren gehört er dem Parlament an. Einerseits ist er wegen seiner Streitbarkeit umstritten, andererseits ist er über die Parteigrenzen hinaus respektiert für Verdienste bei der Aufdeckung mehrerer Skandale – etwa bei der Eurofighter- und der Lucona-Affäre.
Im Unterschied zu anderen Grünen – notabene auch zu vielen Schweizer Grünen – hält Pilz Nachrichtendienste und Armee grundsätzlich für notwendig. Warum er sich trotzdem gegen die flächendeckende Überwachung wehrt, begründet Pilz ironisch mit einem Zitat der deutschen Bundeskanzlerin Angela Merkel: «Ausspähen unter Freunden – das geht gar nicht.» Derzeit befindet sich Pilz mit seinen Geheimdokumenten auf einem Medien-Marathon durch Europa. In Wien und Berlin ist er bereits vor den Medien aufgetreten; ein weiterer Auftritt ist in Brüssel geplant.
Den Schweizer Grünen spielt Pilz damit einen politischen Steilpass in der Debatte um das Nachrichtendienstgesetz zu, das der Ständerat am 11. Juni berät. Das Gesetz soll dem Schweizer Nachrichtendienst genau das erlauben, was der BND in Frankfurt gemacht haben soll: die Kabelaufklärung. Die Grünen bekämpfen diese Kompetenzausweitung für den Nachrichtendienst. Sie verlangen auch, dass «die offizielle Schweiz» gegenüber den deutschen Behörden dezidiert auf die mutmassliche Ausspionierung reagiere. Zudem bereitet die Partei laut Glättli vorsorglich eine Strafanzeige bei der Bundesanwaltschaft wegen Spionage vor.
«Keine Garantien abgeben»
Die Swisscom erklärt, sie habe von der möglichen Abhöraktion nur aus den Medien Kenntnis. Die Firma weist darauf hin, dass sie die Kommunikation nur innerhalb der Schweiz schützen könne. «Swisscom kann deshalb für Daten, die das Swisscom-Netz verlassen, keine Garantien abgeben.» Die von Pilz erwähnten neun Leitungen «gehören gemäss unserem Kenntnisstand aktuell nicht uns», teilt die Swisscom mit. Um die Situation vor zehn Jahren zu klären, würde man weitere Angaben brauchen.
Der Nachrichtendienst des Bundes (NDB) reagiert mit einer generellen Stellungnahme. «Der NDB untersucht die Veröffentlichungen betreffend die nachrichtendienstlichen Aktivitäten technischer Natur von ausländischen Nachrichtendiensten, die potenzielle Zusammenhänge mit der Schweiz haben könnten», sagt eine Sprecherin sibyllinisch. Zurzeit seien Abklärungen im Gange, «um Verbindungen zu unserem Land zu prüfen». Präziser wollte die Sprecherin nicht werden.
von Markus Häfliger, Bern27.5.2015, 21:42 Uhr
Find this story at 27 May 2015
Copyright https://www.nzz.ch
German spies ‘can’t be trusted’: Relations between the UK and Berlin intelligence chiefs hit after comments by London27 januari 2017
Germany’s spy agency BND is being frozen out by GCHQ as well as in America
Both believe insecure servers have led to Wikileaks taking classified documents
Berlin officials are angry that secret intelligence data has not been handed over
The freeze-out also applies to the Metropolitan Police and UK Border Force
Relations between British and German spy chiefs have hit rock bottom because London says its counterparts in Berlin cannot be trusted to keep secrets.
At a time of escalating Islamic terror threats across Europe, Germany’s spy agency BND is being frozen out by GCHQ and the National Security Agency in the US.
Both London and Washington believe insecure German data servers have contributed to the leaking of tens of thousands of classified documents to Wikileaks.
And they have infuriated Berlin by refusing to hand over secret intelligence data demanded by left wing and Green politicians which they fear will be aired in the German parliament.
At a time of escalating Islamic terror threats across Europe, Germany’s spy agency BND is being frozen out by GCHQ (base pictured)
At a time of escalating Islamic terror threats across Europe, Germany’s spy agency BND is being frozen out by GCHQ (base pictured)
It is claimed in Germany that a tranche of 500,000 sides of files put out by Wikileaks this month were GCHQ documents on covert mobile phone policy for British intelligence agents dated June 2010 and classified as secret.
They believe that the documents, once shared with Germany, were transferred to hackers – possibly Russian – who then fed them to the whistleblowing group.
Also listed as top secret was a briefing paper for attendees at a pre-G20 meeting held in London between September 2 and 5 2009 in which Turkey’s role in Europe was on the agenda.
It is understood that in November 2014 there was a meeting in Berlin between Sir Simon McDonald, the then British ambassador to Germany, together with Patrick McGuinness, Deputy National Security Adviser for Intelligence, Security, and Resilience at the Cabinet Office, and high security officials in Angela Merkel’s government.
In November 2014 there was a meeting in Berlin between Sir Simon McDonald, the then-British ambassador to Germany, and high security officials in Angela Merkel’s government
In November 2014 there was a meeting in Berlin between Sir Simon McDonald, the then-British ambassador to Germany, and high security officials in Angela Merkel’s government
The British made it plain at the meeting that co-operation between Britain and Germany was becoming increasingly problematic because of leaks.
A source familiar with the meeting said: ‘They stressed that a secret service is just that and that its workings and operations must remain secret and they felt that Germany was leaking them like a sieve.
Britain told the Germans that the freeze on information would not only apply to MI6 and GCHQ but also to the Metropolitan Police, the Serious Organised Crime Agency (SOCA) and the UK Border Force.
The source said: ‘It has now reached the point where there is virtual radio silence between the two biggest and most important intelligence services of the western world and the BND of Germany.
‘Germany is worried because it needs the umbrella protection of these agencies. It is virtually blind without it.’
Another crisis meeting was held in Berlin in February last year to discuss the biggest rift between secret services since the end of the Second World War. It failed to placate the British and the Americans.
High-grade information on jihadists, their movements and terror plans as discovered by London and Washington and directly involving Germany, are no longer being passed on as a matter of routine.
The upheaval has been caused in part by left-wing and green politicians still fuming over the spying activities carried out in Germany by America’s National Security Agency, which involved the eavesdropping on Mrs Merkel’s personal mobile telephone.
The German government requested Britain to release details of the secret operations to a committee probing the NSA and other foreign spy agency activities in the country.
The move was forced by politicians of the hard-left Die Linke and the environmentalist Green parties.
Left-wing and green politicians are still fuming over the spying activities carried out by the National Security Agency, including eavesdropping on Mrs Merkel’s personal mobile
Left-wing and green politicians are still fuming over the spying activities carried out by the National Security Agency, including eavesdropping on Mrs Merkel’s personal mobile
Both the UK and America refused to send any of the requested files to Germany. Included among them was a demand for information about a 2013 operation handled by both countries – and in co-operation with the BND – which was, and remains, top secret but was known to involve a massive surveillance programme on suspected Islamic terrorists across Europe.
Britain fears a ‘big debate’ in the German parliament which would lay open secret sources and intelligence gathering techniques.
A BND insider said: ‘Never has a friendly nation been asked to divulge its secrets in this way. It is outrageous and we completely understand the fury that this has unleashed in Whitehall. But it has left us vulnerable.’
By ALLAN HALL IN BERLIN and IAN DRURY IN LONDON FOR THE DAILY MAIL
PUBLISHED: 00:22 GMT, 16 December 2016 | UPDATED: 01:36 GMT, 16 December 2016
Find this story at 16 December 2016
© Associated Newspapers Ltd
Geheimoperation “Glotaic” CIA hatte direkten Zugriff auf deutsche Telekommunikation27 januari 2017
Der US-Auslandsgeheimdienst konnte nach SPIEGEL-Informationen im Rahmen einer Geheimoperation direkt auf Telefonate aus Deutschland zugreifen. Der BND warnte intern vor einem “politischen Skandal”, sollte die Aktion auffliegen.
Die Central Intelligence Agency (CIA), der Auslandsgeheimdienst der USA, hatte in einer Geheimoperation mit dem Bundesnachrichtendienst (BND) direkten und möglicherweise ungefilterten Zugriff auf Telekommunikationsdaten aus Deutschland. (Lesen Sie hier die ganze Geschichte im neuen SPIEGEL.)
Nach SPIEGEL-Informationen wurden in der Operation “Glotaic” zwischen 2004 und 2006 Telefon- und Faxverkehre des US-Anbieters MCI an dessen deutschem Standort Hilden überwacht. Dabei wurden die Audiodaten abgehörter Gespräche “direkt nach USA geroutet”, damit “die Audiofunktion ohne Aussetzer funktioniert”, wie es in einem vertraulichen Papier des BND heißt.
Bislang hatten BND-Mitarbeiter im NSA-Untersuchungsausschuss des Bundestags angegeben, alle Gespräche seien vom BND gefiltert und geprüft worden.
“Schwerwiegende Risiken” für den BND
Auch in einem anderen Punkt widersprechen die Aussagen im Ausschuss den Informationen aus BND-Dokumenten. So hatte ein BND-Mitarbeiter gegenüber den Parlamentariern angegeben, sein Dienst habe für die gemeinsame Operation von der CIA “keine Technik erhalten”. In einem schriftlichen Vermerk werden aber Rechner erwähnt, die den Deutschen von der CIA zur Verfügung gestellt wurden.
Nach dem offiziellen Ende von “Glotaic” warnte der BND intern vor einem “politischen Skandal”, sollte die Geheimoperation auffliegen. In einem “Stammblatt” vom April 2008 schreiben die Verfasser von “schwerwiegenden Risiken” für den Nachrichtendienst, sollte zum Beispiel bekannt werden, dass die Operation nicht durch das G-10-Gesetz gedeckt gewesen sei, das Beschränkungen des Fernmeldegeheimnisses regelt.
Offiziell hatten BND und CIA nur die Kommunikation zwischen Teilnehmern im Ausland überwacht, die über MCI in Hilden lief. Allerdings seien durch eine Panne auch Strecken von “massiv deutschen Verkehren” überwacht worden, wie es in einer internen E-Mail heißt. Dafür wäre aber eine sogenannte G-10-Anordnung nötig gewesen.
Freitag, 04.09.2015 17:44 Uhr
Find this story at 4 September 2015
© SPIEGEL ONLINE 2015
David Headley: ISI Paid Me for Recon of 26/11 Targets15 april 2016
A U.S. citizen convicted for his role in the 2008 Mumbai attacks told an Indian court on Thursday that the Pakistani intelligence service ISI paid him directly for reconnaissance of target for the 26/11 attacks (CNN-IBN). In his testimony given through video link from the United States, Headley claimed that he was given one hundred thousand Pakistani rupees to scout National Defence College, Chabad House, and other places in Mumbai. Last month, Headley also told the court that he had visited India seven times prior to the attack, on behalf of the banned Pakistani militant organization Lashkar-e-Taiba (LeT), to gather information scouting potential target locations in Mumbai ahead of the attacks. Headley, 52, was captured in 2013 in the United States and plead guilty to charges of working with LeT and his involvement in the attacks, to avoid the death penalty and extradition to India. The November 2008 attacks in Mumbai were a coordinated set of strikes on the railway station, luxury hotels and a Jewish cultural center, and claimed 166 lives along with nine attackers.
PDP and BJP alliance government to be set up in Jammu and Kashmir
The ruling Bhartiya Janata Party (BJP) announced on Friday that it will continue its support to the Peoples Democratic Party (PDP) in the state legislature of Jammu and Kashmir, and nominated Nirmal Singh to be the deputy chief minister in the state (Hindu, IBT). The PDP-BJP coalition came to power in 2014, but earlier this year PDP Chief Minister Mufti Muhammad Sayeed died at the age of 79. The state has been under governor rule since Jan. 8 and talks between PDP and BJP regarding the coalition have broken down a number of times over the past few weeks. But after a meeting last week between Sayeed’s daughter Mehbooba Mufti and Prime Minister Modi, the PDP on Thursday announced Mehbooba Mufti as the chief ministerial candidate.
— Shuja Malik
Pakistan
Pakistan arrests purported Indian intelligence officer
On Friday, Pakistani officials announced that they arrested an Indian intelligence officer in Balochistan (AP, ET, Dawn). Pakistan’s Foreign Ministry alleged that the man was involved in violence and lodged a complaint with India. A spokesperson for the ministry commented, “Kul Yadav Bhoshan, a commander-ranked officer in Indian Navy was working for RAW and was in contact with Baloch separatists and terrorists fueling sectarian violence in Pakistan and Balochistan.”
Pakistan debuts Chinese helicopter
On Wednesday, during a military parade for Pakistan Day, Pakistan debuted its acquisition of the Chinese made CAIC Z-10 helicopter gunship as well as its Shaheen III ballistic missile (DefenseNews). The Z-10 gunship had been under evaluation in Pakistan for the past year and reportedly received impressed reviews from the Pakistani military. On Wednesday, Pakistan also announced that the Z-10 was in service.
BY SHUJA MALIK
Find this story at 25 March 2016
Copyright http://foreignpolicy.com/
Headley denies part of his statement given to NIA about Ishrat Jahan15 april 2016
Pakistani-American terrorist David Coleman Headley on Saturday claimed that LeT commander Zaki-ur Rehman Lakhvi had told him about Ishrat Jahan ‘operation’ though he had also learnt about the case through the media.
Deposing via video conferencing from the U.S. before Judge G.A. Sanap in the 26/11 trial against Abu Jundal, one of the alleged plotters of the Mumbai attacks David Coleman Headley told the court that he didn’t have any first hand knowledge about Ishrat Jahan who was killed in a police encounter.
Headley denied part of his statement given to NIA about LeT operative Ishrat Jahan, who was killed in an alleged fake encounter. He clarified that LeT does not have women’s cell but has women’s wing for women’s social welfare and not for combat or fighting in India and Kashmir.
Headley said he told NIA that before Sajid Mir, Muzammil was the head of the group (LeT).
Talking further about the social cell, he added that the cell looks into women’s education and health and also looks after widows and provides religious education including Quranic classes.
Headley said that he believed that U.S., Israel and India were enemies of Islam. He also added that it is not true that he wanted Islamic rule for India.
Headley’s four days of cross examination concludes today.
MUMBAI, March 26, 2016
Updated: March 26, 2016 16:58 IST
Find this story at 26 March 2016
Copyright© 2016, The Hindu
Ishrat Jahan was a LeT member, Headley tells court15 april 2016
Nineteen-year-old college girl Ishrat Jahan was killed in 2004 in an encounter by the Gujarat police.
The Pakistani-American terrorist David Headley, deposing for the third day on Thursday, told the special court here that Ishrat Jahan, who was killed in an encounter in 2004 by Gujarat police, was working for LeT. The 19-year-old college girl and three others were killed in 2004 in an encounter by police in Gujarat.The four were accused of being involved in a plot to assassinate the then Gujarat Chief Minister Narendra Modi.
Headley, in the deposition, also said Lakhvi told him about the botched up operation in India by Lashkar operative Muzzabil Butt. He was told that a woman named Ishrat Jahan was killed in the shootout. He also stated that LeT has a women’s wing.
Headley, currently lodged in a U.S. prison, has been deposing as an approver through a video link in the November 2008 terror attacks case.
The police had claimed that Ishrat, a resident of Mumbra near Mumbai; Javed Sheikh, son of Gopinath Pillai of Kerala; and Pakistani citizens Amzad Ali Rana and Jishan Jauhar were connected with the LeT and were coming to Gujarat to assassinate Mr. Modi to avenge the 2002 communal riots.
However, a probe by Ahmedabad metropolitan magistrate, S.P. Tamang, has ruled that the June 2004 killing was case of “fake encounter,” by Gujarat policemen including ‘encounter specialist’ D.G. Vanzara.
Mr. Tamang’s report said the Crime Branch police “kidnapped” Ishrat and the others from Mumbai on June 12, 2004 and brought them to Ahmedabad. The four were killed on the night of June 14 in police custody, but the police claimed that an “encounter” took place the next morning on the outskirts of Ahmedabad. That rigor mortis set in between 11 p.m. and midnight the previous night clearly pointed to the fact that the police pumped bullets into Ishrat’s lifeless body to substantiate the encounter theory.
Mr. Tamang said there was no evidence to link Ishrat Jahan and another victim, Javed Sheikh, with the Pakistan-based terror group, Lashkar-e-Taiba. Neither was there anything to establish that they had “come” to Gujarat to kill Mr. Modi.
Read: First day of deposition
Read: Second day of deposition
Here are some important highlights from today’s deposition:
>> Headley tells court that Ishrat Jehan was a member of LeT.19-year-old college girl Ishrat Jahan and three others were killed in 2004 in an encounter by cops in Gujarat.
>>Headley said Lakhvi told him about the botched up operation in India by Muzzamil Butt. He was told that a woman named Ishrat Jahan was killed in the shootout. “I don’t know any suicide bomber and I can’t name any,” he said. “Ishrat was an indian national and not a Pakistani and an LeT operative.”
>>He also said that LeT has a women’s wing.
>> LeT handler Sajid Mir gave Headley Rs 40,000 Pakistani Rupees.
>> He said that he knew Muzzamil had planned the attack at Akshardam temple at Gujarat. Muzzamil told him that after Babri Masjid was demolished it was allowed for them to attack Indian temples.
>> LeT handler Abu Khaffa’s nephew was one of the 10 terrorists involved in the 26/11 attacks.
>> Hazi Ashraf is in charge of finance wing of LeT at Lahore and his nephew was killed in Akshardam temple attack.
>> Then Major Iqbal gave Rs 3500 and also gave Headley counterfeit Indian currency once or twice.
>> Major Pasha also gave him Rs 80,000.
>> The RBI rejected Headley’s application to open an office in A/C market.
>> Headley paid Rs 13,500 per month as rent in 2006.
>> Dr. Tahuvurr Rana (was dr in military) who came to receive Headley and helped opened the office knew of his involvement with LeT.
>> Headley advised Dr Rana to leave Mumbai and return back to USA before the attacks.
>> Major Iqbal told Headley to vacate the office in January 2009.
Ishrat Jahan case: timeline
›
June 15, 2004:
Ishrat Jahan and three others killed in an encounter on the outskirts of Ahmedabad. Police claim they were Lashkar members planning to kill Narendra Modi.
›
September 2009:
Ahmedabad judge S.P. Tamang terms encounter ‘fake’. Mr. Tamang’s report said the Crime Branch police “kidnapped” Ishrat and the others from Mumbai on June 12, 2004 and brought them to Ahmedabad. The four were killed on the night of June 14 in police custody, but the police claimed that an “encounter” took place the next morning on the outskirts of Ahmedabad. That rigor mortis set in between 11 p.m. and midnight the previous night clearly pointed to the fact that the police pumped bullets into Ishrat’s lifeless body to substantiate the encounter theory.Read more
›
September 2010:
The Gujarat High Court constituted a new three-member Special Investigation Team for a fresh probe into the alleged fake encounter killing of Ishrat Jahan in 2004. Read more
›
January 28, 2011:
SIT member Satish Varma files affidavit stating it was a ‘fake’ encounter. Read more
›
›
November 2011:
SIT tells court the encounter was staged
›
December 2011:
High Court orders CBI probe.Read more
›
July 2013:
The CBI’s first charge sheet in the encounter case stated that the unlawful killing was a joint operation of the Gujarat police and the Intelligence Bureau and named seven Gujarat police officials as the accused. Read more
›
July 2013:
CBI court grants P.P.Pandey (an accused in the case) anticipatory bail for 48 hours after a hearing that lasted for over four hours. Read more
›
August 2013:
SC denies senior bail to Pandey. Read more
›
October 2013:
CBI quizzes BJP leader Amit Shah in connection with ‘fake’ encounters. Jailed IPS officer D.G. Vanzara who was later held in the Ishrat Jahan case, had alleged in his resignation letter that the government closely monitored every police action involving ‘terrorists’ during his tenure. Read more
›
March 2014:
A special Central Bureau of Investigation court here issued notices to Amit Shah in the 2004 Ishrat Jahan fake encounter case. Read more
›
May 2014:
A Gujarat CBI court dismissed a plea seeking arraignment of Amit Shah and ex-police commissioner of Ahmedabad K.R. Kaushik as accused in the case. The plea was filed by Gopinath Pillai, father of Pranesh Pillai alias Javed Sheikh who was among the four victims.Read more
›
May 2014:
CBI gives a clean chit to Amit Shah. “There is no sufficient evidence against him. Hence CBI has not chargesheeted him,” CBI PI Vishwas Kumar Meena said in an affidavit filed before the special CBI court in Ahmedabad.Read more
February 2015:
Gujarat revokes suspension of P.P.Pandey.
February 2015:
DG Vanzara walks out of the Sabarmati jail in Ahmedabad eight years after he was jailed in connection with a series of encounter cases in Gujarat.Read more
David Headley arrest: Chronology of events
October 18, 2009: Pakistani-Canadian Tahawwur Hussain Rana, 48, a resident of Chicago and an accomplice of Headley, arrested by the FBI.
October 27, 2009: FBI files affidavit in a Chicago court alleging that Pakistan—based terror group Lashkar—e—Taiba was planning to use Headley to carry out a major terror attack in India and Danish newspaper ‘Jyllands—Posten’
November 30, 2009: Tahawwur Rana categorically denies any involvement in the Mumbai attacks. The detention hearing of Headley scheduled for December 4 at a Chicago court indefinitely deferred.
December 7, 2009: Headley charged in a Chicago court with criminal conspiracy in Mumbai terror attacks and having links with a retired Pakistani army Major who liaised between him and terror groups including LeT and HuJI.
December 8, 2009: US President Barack Obama says indictment of Headley, is an “important day” in his effort to protect the people from terrorists.
December 9, 2009: Headley pleads not guilty before a Chicago court where he was produced. Next hearing postponed till January 12.
December 14, 2009: Headley turns into FBI informant to avoid death penalty. FBI says the Somnath temple in Gujarat, Bollywood stars and Shiv Sena leaders in Mumbai were also the targets of LeT, which was planning to carry out strikes with the help of Headley and Rana.
December 29, 2009: FBI classifies arrest of Headley as its second biggest case for the year 2009.
January 11, 2010: The status hearing of Headley postponed till Feb 23.
January 15, 2010: Ilyas Kashmiri, the dreaded Pakistani terrorist, belonging to the Harakat—ul Jihad Islami, indicted in a U.S. court for the first time in connection with the plot to target the Danish newspaper.
January 26, 2010: Tahawwur Rana pleads not guilty to the charges of helping arrange the 26/11 Mumbai terror attacks and making plans for an attack on the Danish newspaper.
January 27, 2010: Headley pleads not guilty to all the charges of helping arrange the attack on targets in Mumbai and on the Danish paper.
February 23, 2010: A U.S. court adjourns till March 23 the status hearing of Headley.
March 10, 2010: Headley, who pleads guilty to 12-count of terror charges, including plotting the 26/11 Mumbai attacks at the behest of Pakistan-based LeT and conspiring to target a Danish newspaper, escapes death penalty.
January 24, 2013: U.S. federal court sentenced Headley to 35 years in prison for his role in the Mumbai attacks.
July, 2015: Mumbai police seeks to take a deposition of Headley by video-conference to provide evidence against Zabiuddin Ansari (Abu Jundal).
December 10, 2015: Mumbai court pardons David Headley, makes him an approver in 26/11 case.
Updated: February 12, 2016 13:06 IST
Find this story at 12 February 2016
Copyright© 2016, The Hindu
David Headley deposition: Diclosures and revelations15 april 2016
Pakistani-American terrorist David Coleman Headley deposed before a special court in Mumbai regarding his role in the 26/11 Mumbai terror attacks. Headley, appearing from an undisclosed location via video conferencing, spilled the beans on LeT’s involvement with the 26/11 terror attacks.
Headley, who is serving 35-year prison sentence in the US for his role in the Mumbai attacks, spoke about the role of Saeed, another LeT commander Zaki-ur-Rehman Lakhvi as well as his handler in the outfit Sajid Mir.
In his depositions till now, Headley has revealed important information about the planning behind the terror attacks and his role in the same.
Who is Headley? He was born Daood Gilani. His parents — the Philadelphia socialite Serill Headley and Pakistani poet and diplomat Syed Salim Gilani — divorced soon after they moved to Islamabad in 1960. Mrs. Headley returned to Philadelphia. Headley was admitted to a boarding school, where he first met Rana, but then moved to the United States in 1977. He rebelled against his mother’s heavy drinking and multiple sexual relationships by expressing a loathing for all non-Muslims.
Marital life Apart from Shazia Gilani, records show that he was married to Faiza Outhalla, a Lahore-based medical student. Headley divorced her to evade pressure from his family and then married her again after she filed a complaint with police in Lahore that led to his incarceration for several days.He also had another bigamous marriage with a New York-based make-up artist, Portia Gilani, ich ended in divorce in 2005.
His other life Headley married Shazia Gilani, daughter of a retired Pakistan soldier, in 1999. Ms. Gilani moved to the United States in 2008, along with their four children — Haider, Osama, Sumya and Hafsa.
Psychological problems Evidence also emerged that Headley was diagnosed in 1992 with multiple personality disorder — a condition which includes the possession of multiple mannerisms, attitudes and beliefs. His personal life could provide an explanation for why he sought psychological counselling..
26/11 Mumbai attacks Viewing the terror strikes unfold in Mumbai on television, David Headley’s first wife Shazia used code words like “I am watching cartoons” to convey to him that he had “graduated”, a term she used for success of the 26/11 strikes.“I’ve been watching these cartoons (attacks) all day and I am proud of you,” Ms. Shazia wrote in an email to 50-year-old Mumbai accused during the strikes.
Important revelations
“Ishrat was an Indian national and not a Pakistani and an LeT operative,” declares Headley
“The LeT made a mock of the Taj Hotel. However, the meeting of Indian Defence Scientists was cancelled ”
“Sajid Mir was a high-ranking officer in the Pakistani Army and apparently also was in the ISI”
Ishrat Jahan case: timeline
›
June 15, 2004:
Ishrat Jahan and three others killed in an encounter on the outskirts of Ahmedabad. Police claim they were Lashkar members planning to kill Narendra Modi.
›
September 2009:
Ahmedabad judge S.P. Tamang terms encounter ‘fake’. Mr. Tamang’s report said the Crime Branch police “kidnapped” Ishrat and the others from Mumbai on June 12, 2004 and brought them to Ahmedabad. The four were killed on the night of June 14 in police custody, but the police claimed that an “encounter” took place the next morning on the outskirts of Ahmedabad. That rigor mortis set in between 11 p.m. and midnight the previous night clearly pointed to the fact that the police pumped bullets into Ishrat’s lifeless body to substantiate the encounter theory.Read more
›
September 2010:
The Gujarat High Court constituted a new three-member Special Investigation Team for a fresh probe into the alleged fake encounter killing of Ishrat Jahan in 2004. Read more
›
January 28, 2011:
SIT member Satish Varma files affidavit stating it was a ‘fake’ encounter. Read more
›
November 2011:
SIT tells court the encounter was staged
›
December 2011:
High Court orders CBI probe.Read more
›
July 2013:
The CBI’s first charge sheet in the encounter case stated that the unlawful killing was a joint operation of the Gujarat police and the Intelligence Bureau and named seven Gujarat police officials as the accused. Read more
›
July 2013:
CBI court grants P.P.Pandey (an accused in the case) anticipatory bail for 48 hours after a hearing that lasted for over four hours. Read more
›
August 2013:
SC denies senior bail to Pandey. Read more
›
October 2013:
CBI quizzes BJP leader Amit Shah in connection with ‘fake’ encounters. Jailed IPS officer D.G. Vanzara who was later held in the Ishrat Jahan case, had alleged in his resignation letter that the government closely monitored every police action involving ‘terrorists’ during his tenure. Read more
›
March 2014:
A special Central Bureau of Investigation court here issued notices to Amit Shah in the 2004 Ishrat Jahan fake encounter case. Read more
›
May 2014:
A Gujarat CBI court dismissed a plea seeking arraignment of Amit Shah and ex-police commissioner of Ahmedabad K.R. Kaushik as accused in the case. The plea was filed by Gopinath Pillai, father of Pranesh Pillai alias Javed Sheikh who was among the four victims.Read more
›
May 2014:
CBI gives a clean chit to Amit Shah. “There is no sufficient evidence against him. Hence CBI has not chargesheeted him,” CBI PI Vishwas Kumar Meena said in an affidavit filed before the special CBI court in Ahmedabad.Read more
February 2015:
Gujarat revokes suspension of P.P.Pandey.
February 2015:
DG Vanzara walks out of the Sabarmati jail in Ahmedabad eight years after he was jailed in connection with a series of encounter cases in Gujarat.Read more
David Headley arrest: Chronology of events
October 18, 2009: Pakistani-Canadian Tahawwur Hussain Rana, 48, a resident of Chicago and an accomplice of Headley, arrested by the FBI.
October 27, 2009: FBI files affidavit in a Chicago court alleging that Pakistan-based terror group Lashkar-e-Taiba was planning to use Headley to carry out a major terror attack in India and Danish newspaper ‘Jyllands-Posten’
November 30, 2009: Tahawwur Rana categorically denies any involvement in the Mumbai attacks. The detention hearing of Headley scheduled for December 4 at a Chicago court indefinitely deferred.
December 7, 2009: Headley charged in a Chicago court with criminal conspiracy in Mumbai terror attacks and having links with a retired Pakistani army Major who liaised between him and terror groups including LeT and HuJI.
December 8, 2009: US President Barack Obama says indictment of Headley, is an “important day” in his effort to protect the people from terrorists.
December 9, 2009: Headley pleads not guilty before a Chicago court where he was produced. Next hearing postponed till January 12.
December 14, 2009: Headley turns into FBI informant to avoid death penalty. FBI says the Somnath temple in Gujarat, Bollywood stars and Shiv Sena leaders in Mumbai were also the targets of LeT, which was planning to carry out strikes with the help of Headley and Rana.
December 29, 2009: FBI classifies arrest of Headley as its second biggest case for the year 2009.
January 11, 2010: The status hearing of Headley postponed till Feb 23.
January 15, 2010: Ilyas Kashmiri, the dreaded Pakistani terrorist, belonging to the Harakat—ul Jihad Islami, indicted in a U.S. court for the first time in connection with the plot to target the Danish newspaper.
January 26, 2010: Tahawwur Rana pleads not guilty to the charges of helping arrange the 26/11 Mumbai terror attacks and making plans for an attack on the Danish newspaper.
January 27, 2010: Headley pleads not guilty to all the charges of helping arrange the attack on targets in Mumbai and on the Danish paper.
February 23, 2010: A U.S. court adjourns till March 23 the status hearing of Headley.
March 18, 2010: Headley, who pleads guilty to 12-count of terror charges, including plotting the 26/11 Mumbai attacks at the behest of Pakistan-based LeT and conspiring to target a Danish newspaper, escapes death penalty.
January 24, 2013: U.S. federal court sentenced Headley to 35 years in prison for his role in the Mumbai attacks.
July, 2015: Mumbai police seeks to take a deposition of Headley by video-conference to provide evidence against Zabiuddin Ansari (Abu Jundal).
December 10, 2015: Mumbai court pardons David Headley, makes him an approver in 26/11 case.
Sajid Mir
Lashkar-e-Taiba commander
“Sajid Mir was a high-ranking officer in the Pakistani Army and apparently also was in the ISI.”
Who is Sajid Mir?: Born in 1976, according to documents filed to obtain his Indian visa, Mir grew up in a middle-class ethnic Punjabi home.
Mir’s father, according to Indian intelligence officials, earned enough working in Saudi Arabia to build a comfortable family home near Lahore airport, set up a small textile business, and put his sons through college.
He married the daughter of a retired Pakistan army chaplain; the couple are thought to have two sons.
Role in LeT: Mir was made responsible for training the growing number of western jihadists knocking on the Lashkar’s doors.
Fluent in English, Urdu and Arabic, he was known to the foreign jihadists as “Uncle Bill” — a reference to Mir’s affable manner.
Mir and Headley: Intense pressure by the United States led the Lashkar to shut down its camps to foreigners. Headley had arrived at Mir’s camp just after the foreigners were evicted under ISI pressure — and was used to target India alone.
In an intercepted September 17, 2009 phone conversation with a former Pakistani military officer and military trainer called Abdur Rehman Hashim, Headley railed against Mir who, he asserted, had “rotten guts.” “I am just telling you,” he lectured Hashim “that the companies in your competition have started handling themselves in a far better way.”
Updated: February 15, 2016 09:06 IST
Find this story at 15 February 2016
Copyright© 2016, The Hindu
Why David Headley’s coming clean puts the Modi government in a serious dilemma15 april 2016
The disclosures force New Delhi to rethink its strategy in dealing with Pakistan.
Why David Headley’s coming clean puts the Modi government in a serious dilemma
The deposition by David Headley, the Lashkar-e-Taiba operative, has not been earth-shaking in its content. We already knew almost everything he said.
Nonetheless, it was important to hear things from the horse’s mouth.
Having said that, Headley also puts the Narendra Modi government in a serious dilemma.
What do we do now with what Headley has told us? That is the core issue. How exactly are we to follow up on his deposition?
The bureaucratic option is always there – share the contents of Headley’s deposition with the Pakistani authorities through diplomatic channels and seek follow-up action in good faith.
But it will be a cynical thing to do to rest oars thereafter, since we can be 100% certain that Pakistan will do nothing in the matter and will continue to parry.
Pakistan cannot and will not cooperate with India. It cannot cooperate with us because its culpability is crystal clear and those responsible for the 26/11 terrorist strikes in Mumbai included senior Pakistani military officers.
The Pakistani top brass’s involvement in terrorism implies that any action on the Indian demarche by their government will bring the roof crashing down on the Inter-Services Intelligence, better known as ISI, and irreparably damage the reputation of their army as an institution.
It is too much to expect any Pakistani government – or any country for that matter – to indulge in such brutal soul-searching. Those who advocate atonement by Pakistan are either ignorant of statecraft or are simply dissimulating.
What else can India do? Indeed, a blistering international campaign can be launched with India’s able diplomats firing on all six cylinders to expose the grotesque face of Pakistan to the world community.
The Foreign Secretary S Jaishankar promised recently to put Pakistan to “shame”.
Fine. But, where does that take us? For one thing, Pakistan’s reputation is already in the mud but it has been chugging along, nonetheless. Some more mud isn’t going to make any difference.
Besides, it is sheer naivety to believe we can put Pakistan to “shame”. The international community is not willing to join hands with us on such a track.
Second, to every fistful of mud we throw at Pakistan, one can be certain that Islamabad will return with an equal fist. And if past experience is anything to go by, Pakistan has a way of getting the better of us in a slugfest.
Two options
The real dilemma lies on two other counts. One, how do we handle the relations with Pakistan in the aftermath of Headley’s disclosures?
True, he didn’t add much to what we already knew. But he did bring the 26/11 attack back into focus.
The memory was getting jaded in our collective consciousness, which is overcrowded since 2008 with scams, beef-eating, air pollution, gang rapes, et cetera. But the jaded memory got burnished in the past 48 hours. The pain has returned.
For the government, which also happens to be rooted in nationalist sentiments, it becomes difficult to be seen constructively engaging Pakistan when that country’s enemy image is such a widely-shared public perception.
Simply put, it is even difficult to defend Prime Minister Narendra Modi’s overtures to Pakistan as “statesmanlike”.
Equally, the Foreign Secretary’s expected trip to Islamabad for talks will not make sense to the Indian public – in a near future, at least. The government might as well roll down the shutter and close shop as if Pakistan never existed. This is one option.
The other option will be to punish Pakistan in the same coin. The present government unabashedly admires Israel. Ask Israel how best we can punish Pakistan.
Political assassination is a favourite weapon in the Israeli armoury. Commando raid is another. Outright invasion is yet another.
Choose the method best suited to our needs and circumstances. And hit Pakistan hard; hit so hard they cry for mercy. This is a second option.
Both these options are widely recommended by our pundits as mutually reinforcing options, too. But then, there is a catch in all this gung-ho attitude.
Ignoring Pakistan is actually a non-option, if only because we simply cannot choose our neighbour. And in this case, there isn’t any certainty that Pakistan is in any mood to “ignore” us. It will probably keep reminding us every now and then that it does remember us.
Again, even assuming we share the Israeli DNA, Pakistan is not Palestine. While Israel can use Gaza and West Bank as punch bags, if we punch Pakistan, make no mistake, it will punch back.
There is a moral in the story, after all, why Israel ceased to attack Lebanon once it transpired that Hezbollah has a stockpile of 40000 rockets to retaliate. That is the story of all “asymmetric” wars.
Besides, do we really want to get entangled in a futile war of attrition with Pakistan and make it our way of life?
India has so much going for it by way of manifest destiny as an emerging power if only it could sustain a high momentum of growth – for which, of course, a peaceful immediate external environment is a crucial pre-requisite. War and conflicts will be a drain on the resources.
Diplomatic embarrassment
All in all, therefore, Headley’s disposition poses a diplomatic embarrassment. He is an American citizen. What he divulged would already have been known to the US authorities.
On the other hand, the US has lately intensified its collaboration with Pakistan by forming an exclusive Quadrilateral Consultative Group to try to negotiate a settlement with the Taliban.
What emerges is that the US has specific interests to pursue in the region, which demands that Pakistan be cultivated as a key non-NATO regional ally.
The Obama administration continues to do business with the Pakistani military and the ISI despite their dalliance with Osama bin Laden who was responsible for the death of 2996 people in America.
Suffice it to say, the only option open to India too will be to remain engaged with Pakistan, to lower the tensions in the relationship and work toward eliminating the root causes behind this “asymmetric” war.
by MK Bhadrakumar
Published Feb 10, 2016 · 11:30 am. Updated Feb 11, 2016 · 04:35 pm.
Find this story at 10 February 2016
Copyright http://scroll.in/
2008 Mumbai Attacks Plotter Says Pakistan’s Spy Agency Played a Role15 april 2016
The Taj Mahal Palace hotel in Mumbai was ravaged by fire, gunshots and grenade explosions during the 2008 terrorist attacks. Credit Arko Datta/Reuters
NEW DELHI — A Pakistani-American man who helped plot the 2008 terrorist attacks in Mumbai told an Indian court on Monday that he had met throughout the process with two handlers from Pakistan’s military intelligence agency, an Indian prosecutor said.
India has long sought to depose the man, David C. Headley, in hopes of establishing a direct link between the Pakistani government and the assaults in Mumbai, which left more than 163 people dead.
Mr. Headley gave the deposition via teleconference from an undisclosed location in the United States, where he is serving a 35-year sentence for his role in the attacks. The questioning, by Ujjwal Nikam, the Indian public prosecutor, will continue in the coming days.
India hopes to present evidence of official involvement in the attacks, in part to generate pressure on the Pakistani government to take action against the conspirators. Zaki-ur-Rehman Lakhvi, a commander with the militant group Lashkar-e-Taiba who is believed to have overseen the Mumbai attacks, has been free on bail in Pakistan since 2014.
The group’s founder, Hafiz Muhammad Saeed, lives openly in Lahore, in northern Pakistan, and moves freely throughout the country, impervious to the $10 million reward offered by the United States for information leading to his arrest.
Mr. Headley, who identified his contacts at the Inter-Services Intelligence directorate of Pakistan, or ISI, as “Major Ali” and “Major Iqbal,” has linked the terrorist plots to that agency before. He previously told American prosecutors that Lashkar “operated under the umbrella of the ISI” and that an agency official had offered in 2006 to pay him to carry out reconnaissance trips to India before the attacks. He has made similar statements to Indian investigators who have interviewed him in the United States.
A few revelations emerged from Mr. Headley’s questioning on Monday, part of a case against a Lashkar operative, Zabiuddin Ansari. One is that the 10 gunmen who paralyzed Mumbai starting on Nov. 26, 2008, had botched two previous attempts on the city, one in September and one in October, in one case swimming back to shore after their boat hit a rock and their arms and ammunition sank.
Mr. Headley also said that on the advice of his contact in Lashkar, he had changed his birth name, Daood Gilani, to a more American-sounding one so that he could more easily enter India. He visited India seven times before the attacks, recording hours of video of the city for his handlers in Pakistan.
Mr. Headley, 55, the son of a Pakistani poet and diplomat, Syed Saleem Gilani, and a Philadelphia socialite, A. Serrill Headley, carved out a byzantine double game for himself during the years after the Sept. 11 , 2001, attacks in the United States. Convicted of distributing heroin in the United States, he made a deal with officials from the Drug Enforcement Administration to travel to Pakistan in 2002 to gather information on heroin trafficking.
He was swiftly picked up by the Pakistani authorities and decided to work with him.
In 2002, while he was still working as a D.E.A. informant, he began training with Lashkar. Three women — a girlfriend and two former wives of his — approached American officials over the course of several years, saying they suspected him of sympathizing with terrorist groups, but no action was taken.
Mr. Headley was arrested in 2009, when he was caught carrying plans for a terrorist attack on a Danish newspaper. On the basis of his cooperation with investigators, United States officials shielded him from the death penalty at his trial in 2011 and reduced his life sentence to 35 years. Counterterrorism officials have described him as “dangerously engaging,” and they warned about the need to guard against “being sucked into his mind games.”
The United States’ failure to act on warnings about Mr. Headley has been, at times, a source of tension between Washington and New Delhi. Mr. Headley’s appearance as a witness “gives the United States an opportunity to play the observer role in what is a South Asian conversation about terrorism and security,” said Shamila N. Chaudhary, a South Asia fellow at the New America Foundation.
Correction: February 8, 2016
An earlier version of this article misspelled the middle name of David C. Headley’s mother. She was A. Serrill Headley, not Serill.
By ELLEN BARRY and HARI KUMARFEB. 8, 2016
Find this story at 8 Februari 2016
© 2016 The New York Times Company
26/11 attackers made two failed attempts, lost guns at sea: David Headley15 april 2016
Headley told the court that he had changed his name from the original Dawood Gilani after instructions from the LeT commanders, including Lakhvi, and ISI officials.
AMERICAN national and 26/11 scout David Coleman Headley, who deposed before an Indian court on Monday, said that the 10 terrorists who attacked Mumbai on November 26, 2008 had attempted to carry out the strike earlier on two occasions, but failed to execute it.
He said the first attempt was made in September 2008 but it failed as the boat hit some rocks and the terrorists lost all the arms and ammunition at sea.
“The boat disintegrated. The men had life jackets on and came to shore. The weapons and explosives were lost in the ocean,” Headley told the court. He said he does not remember what happened during the second attempt, but it was made “a month or so later”.
“I don’t know exactly where the boat started from, but probably outside Karachi,” he told the court.
Headley told the court that Lashkar-e-Taiba member Sajid Mir had told him to change his name in 2005, and to set up an office in Mumbai and make a “general video” of the city. Headley also said one Major Iqbal, an agent of Pakistan’s Inter Services Intelligence (ISI), had told him that he could be “useful” for “intelligence work” in India.
Headleys diary names Pak Army officers,26/11 attack handlers
In New Delhi, Minister of State for Home Affairs Kiren Rijiju said, “The difference between the state and non-state actors will come to an end after this statement. It is known who all were involved. Headley’s statement will lead to a logical conclusion. It will help us.”
Government sources said India will give Pakistan details of Headley’s testimony regarding Hafiz Saeed’s role as the LeT’s ideologue, and the involvement of ISI officers in training and directing the perpetrators of the 26/11 Mumbai attack.
“While Pakistan has claimed that Saeed is associated with Jamaat ud Dawa, Headley’s testimony is evidence on record of Saeed’s role as an ideologue and indoctrinator for LeT,” said a government official.
Headley said Mir was his “main contact” in the LeT. Headley, originally named Dawood Geelani by his parents, had applied to have his name changed in Chicago in 2005. In 2006, his name was officially changed and he obtained a new passport so he could enter India under an American identity, he said.
Headley deposed via video-link from an undisclosed location in the US in the presence of lawyers Robert Seeder and John Theis and Assistant US Attorney Sarah Streicker.
Asked by special public prosecutor Ujjwal Nikam about the purpose of the office Mir wanted him to open, Headley said, “He did not specify at that time. He specified later what his intention was. Before my first visit, he gave me general instructions to make a general video of Mumbai.”
Headley’s questioning began at the Bombay City Civil and Sessions Court at 7.30 am, three-and-a-half hours before it officially opens, to accommodate the Americans. This comes nearly two months after the court framed charges against him in the ongoing trial of Zabiuddin Ansari, an accused in the 26/11 attack.
Headley, who was handed a 35-year jail term by a court in the US in 2013 for his role in the 26/11 attacks, had signed a plea agreement with the government there, under which he is bound to testify in a foreign court or face the death penalty.
Also Read | David Headley wanted to fight against Indian Army in Kashmir
Dressed in a grey sweater, Headley leaned back in his chair, looking into the court from a large television screen, facing another TV screen on which Ansari was visible, seated in Mumbai Central Prison.
Nikam addressed the 26/11 scout as Mr Headley throughout. When he referred to the LeT as a “military organisation”, Joint Commissioner of Police (Crime) Atulchandra Kulkarni corrected him, “Nikam saheb, military nahi militant, militant.”
Headley, born in Washington DC, deposed that he had come into contact with an ISI agent named Major Ali after he was arrested in Landi Kotal in Pakistan’s Federally Administered Tribal Region (FATA), near the border with Afghanistan, on suspicion of being a foreigner.
While entry of foreigners is prohibited there, Headley was discharged after he produced a Pakistani identity card. “I was carrying in my possession literature about India which I was studying,” he said.
Accompanied by a former Pakistan Army Major named Abdur Rehman Pasha, Headley said he had ventured to FATA to meet a drug smuggler named Zaid Shah. “It had been suggested that Shah could smuggle weapons into India,” Headley said.
Headley said he was interrogated there by Ali, who works for the ISI in Landi Kotal. Headley said that when he disclosed to him that he planned to visit India, Ali introduced him to another ISI agent named Major Iqbal because “he thought I could be useful to him in some intelligence work there”.
Prior to the 26/11 attacks, Headley travelled to India on eight occasions — seven times to Mumbai and once to Delhi. “Most of those visits had been made from Pakistan. Only once or twice I arrived from the UAE or Dubai,” he said. He told the court that he visited India only once after the attacks, on March 7, 2009.
The applications he had submitted to the Consul General of India in Chicago to twice obtain visas contained personal information that was falsified “for the purpose of protecting my cover”, he said.
Dr Tahawwur Rana, a childhood friend of Headley, who was sentenced to 14-year imprisonment by a US court in 2013, had helped him obtain a five-year business visa to India in 2007. They had studied together for five years at a college in Pakistan’s Punjab Province.
In Mumbai, Headley set up a safe house “to live in an enemy country” and posed as an immigration consultant to “maintain my cover”.
In the two years that Headley trained with the LeT, he undertook five to six courses in paramilitary training, handling weapons, ammunition and explosives, and intelligence, at Muridke near Lahore and Muzaffarabad in “Azaad Kashmir”, he said. Training also included a leadership course in which Saeed and senior commander Zaki-ur Rehman Lakhvi delivered “religious speeches”, he said.
Towards the end of the day’s questioning, Headley told Nikam that he wanted to fight the Indian Army in Kashmir but was denied by Lakhvi, who said he was “too old” for it.
Soon afterwards, he was informed by Ali that a suitable task would be found for him, he said.
Nikam, who had started the day with the announcement that his examination of Headley would take at least two days, ended by asking him to identify seven LeT trainers. Headley admitted to knowing Abu Furkhan, Sanaullah, Abu Hanjala Pathan, Abu Usman, Abu Saeed and Abu Fahadullah.
He rejected Nikam’s suggestion that all trainers had served in the Pakistan Army in the past. “No, not at all, some of them could barely read and write,” Headley said to laughter in the courtroom.
Nikam went on, asking Headley if the men could handle sophisticated weapons. He replied: “If you can call an AK-47 a sophisticated weapon, then yes.”
Written by Srinath Rao | Mumbai | Updated: February 9, 2016 5:17 am
Find this story at 9 February 2016
Copyright © 2016 The Indian Express [P] Ltd.
American says he visited Mumbai 7 times before 2008 attack15 april 2016
NEW DELHI (AP) — A Pakistani-American who helped plan a 2008 attack on India’s financial hub told a court Monday that he traveled to India seven times to scout potential targets for a Pakistan-based militant group.
David Coleman Headley gave the Indian court in Mumbai details of his role in planning the attack, in which more than 160 people were killed over three days when a group of 10 men rampaged across the city.
Headley repeated statements that he has made earlier that Pakistan’s main spy agency was deeply involved in planning the attack’s preparations and execution.
FILE- In this Nov. 29, 2008, file photo, an Indian soldier takes cover as the Taj Mahal hotel burns during gun battle between Indian military and militants i…
FILE- In this Nov. 29, 2008, file photo, an Indian soldier takes cover as the Taj Mahal hotel burns during gun battle between Indian military and militants inside the hotel in Mumbai, India. A Pakistani-American who helped plan a 2008 attack on India’s financial hub has told a court in India that he traveled to India seven times to scout potential targets for a Pakistan-based group. (AP Photo/David Guttenfelder, File)
Headley said he supplied his handlers in the Pakistan-based group Lashkar-e-Taiba with videos and maps of luxury hotels, a Jewish center and the city’s main railway station that were attacked, Prosecutor Ujwal Nikam told reporters after Monday’s five hours of testimony.
Headley testified that Lashkar-e-Taiba had tried to launch attacks in India twice earlier without success, said Nikam, who questioned him. The third attempt was the November 2008 attack, Headley said.
Nikam said Headley told the court that in one attempt, a boat in which the men were traveling overturned after hitting rocks and their weapons were lost at sea.
Headley said he joined Lashkar-e-Taiba in 2002 and he and other recruits underwent many years of training in Pakistan, where they were taught the use of weapons and bomb making.
Headley, born of a Pakistani father and an American mother, told the court that his name was Dawood Gilani, but he changed it to David Coleman Headley in 2006 to facilitate his travel to India.
Nikam said Headley used his U.S. passport to travel frequently to India without raising suspicion and was able to give Lashkar-e-Taiba information that was used to plan and carry out the attack.
He said Headley told the court that officials from Pakistan’s intelligence agency, Inter-Services Intelligence were involved. Pakistan insists that ISI has no links to Lashkar-e-Taiba and denies any connection to the Mumbai violence.
Nikam told reporters that “Headley has given us valuable information,” but declined to comment on the testimony about ISI, saying it was up to the government of India to take it up with the government of Pakistan.
Headley testified by video conference from an undisclosed location in the United States, where he is serving a 35-year prison term for his role in the Mumbai attack.
The Mumbai court investigating the attack gave Headley a conditional pardon in December, which allowed him to become a witness.
___
This story has been corrected to fix the spelling of Lashkar-e-Taiba.
By ASSOCIATED PRESS
PUBLISHED: 10:33 GMT, 8 February 2016 | UPDATED: 10:33 GMT, 8 February 2016
Find this story at 8 Februari 2016
© Associated Newspapers Ltd
David Headley: Mumbai plotter ‘visited India’ before attacks15 april 2016
A US man convicted for his role in the 2008 Mumbai attacks has told an Indian court that he visited Mumbai seven times in advance to gather information.
David Headley gave details of the planning to a court in Mumbai on Monday through a video link from a prison in the US.
Headley, 52, pleaded guilty and co-operated with the US to avoid the death penalty and extradition to India.
More than 160 people were killed by gunmen in the November 2008 attack.
Headley is serving a 35-year jail term in the US for his role in the attacks.
Indian prosecutor Ujjwal Nikam said that “this was for the first time that a foreign terrorist” had appeared through a video link in an Indian court to testify.
“This is a very crucial case… I am absolutely satisfied as to what David Headley has revealed in today’s deposition. I may quiz Headley on certain aspects, which were never asked by the FBI,” he added.
Mumbai’s Taj Mahal hotel under attack in November 2008Image copyrightAFP
Image caption
The Mumbai attack targeted a railway station, luxury hotels and a Jewish cultural centre
Mr Nikam added that Headley’s questioning would continue on Tuesday.
The Mumbai court gave him a conditional pardon in December and allowed him to turn witness.
Headley was sentenced in the US in 2013 on 12 counts, including conspiracy to aid militants from the Pakistani group Lashkar-e-Taiba (LeT) which India blames for carrying out the attacks.
After initially denying the charges, he eventually pleaded guilty and co-operated with the US to avoid the death penalty and extradition to India.
He admitted to scouting potential target locations in Mumbai ahead of the attacks.
Headley was born Daood Gilani to a Pakistani father and American mother but changed his name to David Coleman Headley in 2006 “to present himself in India as an American who was neither Muslim nor Pakistani”, US prosecutors had said.
Headley is alleged to have told US prosecutors that he had been working with LeT since 2002.
He was arrested by FBI agents in Chicago in October 2009 while trying to board a plane for Philadelphia.
The 60-hour assault on Mumbai began on 26 November 2008. Attacks on the railway station, luxury hotels and a Jewish cultural centre claimed 166 lives. Nine gunmen were also killed.
The only attacker captured alive, Pakistani Mohammad Ajmal Amir Qasab, was executed in India in 2012.
8 February 2016
Find this story at 8 February 2016
Copyright © 2016 BBC
Mumbai attack: David Headley deposes before Mumbai court; says failed in 2 attempts before 26/11 attack (2016)15 april 2016
Mumbai attack: In the first deposition on a terror act from foreign soil, Pakistani-American Lashkar-e-Taiba (LeT) operative David Headley today told a court here via video-link that Pakistani terrorists attempted to attack Mumbai twice before the 26/11 strikes that killed 166 people but failed both times.
Mumbai attack, Mumbai terror attack, Mumbai attack 26/11, Mumbai attack mastermind, 26/11 attack, David Headley, David Headley latest news
Mumbai attack: David Headley reportedly visited India many times between 2006 and 2008, drew maps, took video footage and scouted several targets for the 26/11 attack including the Taj Hotel, Oberoi Hotel and Nariman House. (PTI)
Mumbai attack: In the first deposition on a terror act from foreign soil, Pakistani-American Lashkar-e-Taiba (LeT) operative David Headley today told a court here via video-link that Pakistani terrorists attempted to attack Mumbai twice before the 26/11 strikes that killed 166 people but failed both times.
In his deposition which began at 7 AM, David Headley said that he was a “true follower of LeT” and came to India eight times – 7 before the terror attack on November 26, 2008 and once after that.
Headley, who was made an approver in the 26/11 attack case, said that his main contact in LeT was Sajid Mir, also an accused in the case.
He told the court that LeT made two unsuccessful attempts to carry out terror attacks before finally striking in November 2008, once in September and another in October.
David Headley said that he joined LeT after being “influenced” by its head Hafeez Saeed and took his first “course” with them in 2002 at Muzaffarabad.
David Headley, who is currently serving 35 years prison sentence in the US for his role in the terror attacks, also said he changed his name from Dawood Gilani to David Headley in 2006 so that he could enter India and set up some business.
“I applied for change in name on February 5, 2006 in Philadelphia. I changed my name to David Headley to get a new passport under that name. I wanted a new passport so that I could enter India with an American identity.
“After I got a new passport I disclosed it to my colleagues in LeT of which one of them was Sajid Mir, the person with whom I was dealing with. The objective for coming to India was to set up an office/business so that I can live in India. Before the first visit, Sajid Mir gave me instructions to make a general video of Mumbai,” David Headley told the court here.
Headley also said that in his Indian visa application he had furnished all “wrong” information “to protect his cover”.
He reportedly visited India many times between 2006 and 2008, drew maps, took video footage and scouted several targets for the attacks including the Taj Hotel, Oberoi Hotel and Nariman House.
His reconnaissance provided vital information for the 10 LeT terrorists and their handlers, who launched the attack.
Speaking to reporters, Headley’s lawyer Mahesh Jethmalani said has “he (David Headley) has confirmed that he joined LeT after being influenced by Hafeez Saeed. He told the court that two unsuccessful attempts to carry out terror attacks were also made before 26/11″. He has not explained the role of LeT in attacks”.
The court is currently trying key plotter Sayed Zabiuddin Ansari alias Abu Jundal, who is facing trial for his alleged role in the terror attacks, which held the city to ransom for three days.
The deposition of David Headley, assumes significance as it may unravel the conspiracy behind the brazen terror strike, which left 166 people dead.
The court had on December 10, 2015, made David Headley an approver in the case and directed him to depose before the court on February 8.
He had then told Special Judge GA Sanap that he was “ready to depose” if granted pardon.
Judge Sanap had then made Headley an approver, subject to certain conditions and granted him pardon.
Last year, the Mumbai Police had on October 8 moved an application before the court saying that Headley deserves to be tried by this (Mumbai) court together with 26/11 key plotter Abu Jundal in the case as both of them are conspirators and abettors behind the dastardly act.
In the application, the Mumbai Police said that from the judgement passed by the US court against Headley, it was clear that he was a member of LeT and he had played an active role in the criminal conspiracy in the terror attack.
The application also said that Headley had entered into a plea agreement with US in 2010 and thereby willingly and voluntarily agreed that he had conspired.
It is evident, the police had said, that Headley has committed the offences of conspiring with LeT for committing illegal acts in India; waging war against the government of India and offences under the Unlawful Activities (Prevention) Act.
He has also been accused of intentionally aiding and abetting the LeT in Pakistan for committing illegal acts in Mumbai, mischief by fire with intent to destroy Hotel Taj, Oberoi and Nariman House, offences under Explosives Act and Explosives Substances Act as also under the Prevention of Damage to Public Property Act.
“This is for the first time in the Indian legal history that a ‘foreign terrorist’ will appear before an Indian court and testify,” Special Public Prosecutor Ujjwal Nikam had said yesterday.
By: PTI | Mumbai | Updated: February 8, 2016 12:38 PM
Find this story at 8 February 2016
Copyright © 2016 The Indian Express [P] Ltd.
David Headley writes memoir in prison, reveals details of 26/11 attack (2015)15 april 2016
In one of the passages in the memoir, Headley writes about his first encounter with LeT militants in October 2000.
In one of the passages in the memoir, Headley writes about his first encounter with LeT militants in October 2000.
NEW YORK: Pakistani-American LeT terrorist David Headley, serving 35 years for his role in the 26/11 Mumbai attacks, has written a memoir in prison detailing how Lashkar’s “dedication” to the cause of the “liberation of Kashmir” inspired him to join the terror group.
American public affairs TV programme Frontline was given access to a draft of the memoir Headley, 54, wrote in jail.
Excerpts from the draft offer a “unique window” into Headley’s turn towards extremism, his training with Lashkar-e-Taiba and his preparations for the Denmark attack against the Jyllands-Posten newspaper.
In one of the passages in the memoir, Headley writes about his first encounter with LeT militants in October 2000.
“On one of my trips, October 2000, I made my first contact with Lashkar-e-Taiba (LeT), quite by accident. I attended their annual convection in November. I was very impressed with their dedication to the cause of the liberation of Kashmir from Indian occupation,” Headley writes.
READ ALSO: Zakiur Rehman Lakhvi released from Adiala jail
He writes that for the terror attack on Mumbai, the plan was to capture an Indian fishing vessel that would not raise alarm with the Indian Coast Guard as it transported the LeT terrorists to Mumbai’s shores.
“The plan was to capture an Indian fishing vessel, which constantly strayed into Pakistani waters, and commandeer it all the way to Mumbai. The hope was that the Indian Coast Guard would not notice an Indian vessel. The boys would carry a GPS device which would guide them directly to the landing site, I had selected earlier,” he writes.
Headley also writes in detail about his decision to join Lashkar “full time” following the 9/11 attacks, and says that by 2002 the group asked him to take “the Daura Aamma, the basic military training course offered by LeT.”
In 2005, Lashkar asked him to change his name from Dawood Gilani to a “Christian sounding name” so that he could travel easily between the US, India and Pakistan and make it difficult for intelligence agencies to track his activities.
“Finally, in June, my immediate superior, Sajid Mir, instructed me to return to the US, change my Muslim name to a Christian sounding name and get a new US passport under that name. He now informed me I would be going to India, since I looked nothing like a Pakistani in appearance and spoke fluent Hindi and Urdu it would give me a distinct advantage in India,” he said.
Describing the training he got at Lashkar camps, Headley writes “we hid most of the day in caves and under trees, while we were given instructions on various lessons.”
He says most of the “practical aspects” of the lessons were carried out at night and during the course, he was trained in “infiltration, survival, camouflage, raid/ambush tactics, hide out, hiding and retrieving weapons caches, more than a dozen night marches, target practice with AK-47 and 9 mm pistol, RPG, grenades, among other training.
“We also went through an extensive indoctrination process and were required to study many Quaranic Chapters and Hadith,” Headley writes.
READ ALSO: David Headley involved in plot to attack Danish newspaper Jyllands-Posten’s office
In the memoir, he recalls the time in 1999 when after serving his sentence for drug trafficking, he had “decided to turn over a new leaf.”
“To make amends for my unrighteous ways I worked for the Drug Enforcement Agency (DEA). I had spent the past fifteen years frequenting the Federally Administered Tribal Areas (FATA) of Pakistan, on heroin procuring expeditions,” he says.
Headley writes that the “lawless land” had remained the same, “frozen in time”, since the 18th century. He started leaning more about his religion “as part of my change.”
Headley says he had not been a practicing Muslim for the past fifteen years, “but the seeds of Islam sown in me by my father and in school had never completely died out.”
Another change Headley made was to break away from his Canadian girlfriend, whom he had been planning to marry.
He agreed to an arranged marriage in Pakistan and he kept visiting the country “four times a year, without the knowledge of the DEA or my Probation Officer” to see his new wife, who he had decided to keep in Pakistan.
On his decision to marry a second time, Headley says that “polygamy was aggressively encouraged” by Lashkar and “they were really happy to see me take this step.”
“I was definitely ‘one of the guys’ now,” he writes. On the plans to attack the Danish newspaper, he says that after the 26/11 Mumbai attack he was told to “lay low.”
Instead, he eventually connects with al Qaida and with the assistance of a contact he has inside the organization he travels to Denmark to scout the Jyllands-Posten newspaper for a possible strike.
Headley’s contact took him to North Waziristan in 2009, where he met the “al Qaida number four” Ilyas Kashmiri.
“He gave me a further pep talk on the Denmark Project, saying that, both, Osama bin Laden and Ayman Zawahiri had stressed upon him the need to conclude this matter quickly. I agreed and assured him of my best effort,” Headley writes.
Headley says since he was “short on manpower” for the Denmark project, he decided to “modify the operation” and instead of assaulting the newspaper building, “just take out the cartoonist, Kurt Westergaard, and do this deed myself.”
He said all he needed to carry out the operation was a handgun, which he knew he could find in Europe.
Headley was arrested in October 2009 at Chicago’s O’Hare Airport on his way back to Pakistan.
PTI | Apr 22, 2015, 07.18 PM IST
Find this story at 22 April 2015
Copyright © 2015 Bennett, Coleman & Co. Ltd
The Memoir of an “American Terrorist” (2015)15 april 2016
David Coleman Headley is not exactly a household name, but his is one of the more unnerving terrorism cases in the post-9/11 era. White male. Government informant. American citizen. In other words, he had the perfect cover.
It was under the safety of that cover that Headley — a former drug smuggler turned informant for the Drug Enforcement Administration — helped stage the November 2008 siege in Mumbai, an audacious attack that left 166 people dead, including six Americans. Working with the Pakistani militant group Lashkar-e-Taiba, Headley used his U.S. passport to travel to India, scout locations for the plot, film them and even find a landing site for the plot’s attackers.
Within weeks of Mumbai, Headley was working on another plot — this time working for Al Qaeda, planning an assault against a Danish newspaper that had published controversial cartoons of the Prophet Muhammad. The plan: A group of attackers would take hostages at the paper, shoot them, behead them and then throw their heads out the window. Again, Headley worked reconnaissance for the mission until his eventual arrest by the FBI at O’Hare International Airport in 2009.
Today, Headley is serving 35 years for his role in Mumbai. His case, however, has hardly gone away. In the aftermath of the Edward Snowden revelations about NSA surveillance, U.S. intelligence officials pointed to the Headley case as an example of how bulk data collection can thwart a terrorist attack. But tonight, in American Terrorist, ProPublica and FRONTLINE investigate that claim.
In the course of our investigation, FRONTLINE was given exclusive access to a draft of a memoir written by Headley after his arrest. Excerpts from the draft offer a unique window into Headley’s turn toward extremism, his training with Lashkar-e-Taiba and his preparations for the Denmark attack.
In one passage, for example, Headley writes about his first encounter with Lashkar militants, describing how he was “very impressed with their dedication to the cause of the liberation of Kashmir from Indian occupation. As Headley tells it:
In 1999, after serving my sentence for drug trafficking, I decided to turn over a new leaf. To make amends for my unrighteous ways I worked … for the Drug Enforcement Agency (DEA) … I had spent the past fifteen years frequenting the Federally Administered Tribal Areas (FATA) of Pakistan, on heroin procuring expeditions. This lawless land had remained the same, frozen in time, since the 18th century. The British had thought it wise to leave this place alone during their rule of India. I started leaning more and more on my religion as part of my change. I had not been a practicing Muslim the past fifteen years, but the seeds of Islam sown in me by my Father and in school had never completely died out. Another change I made was to break away from my Canadian girlfriend, who I had been planning to marry for the past five years, and agree to an arranged marriage in Pakistan. Still on probation, I kept visiting Pakistan four times a year, without the knowledge of the DEA or my Probation Officer, to see my new wife, who I had decided to keep in Pakistan.
On one of my trips, October 2000, I made my first contact with Lashkar-e-Taiba (LT), quite by accident. I attended their annual convection in November. I was very impressed with their dedication to the cause of the liberation of Kashmir from Indian occupation.
In a later passage, Headley marks his decision to join Lashkar “full time” following the 9/11 attacks, and says that by 2002 the group asked him to take “the Daura Aamma, the basic military training course offered by LT.” It was one of several training programs he writes about. In a separate section, he recalls a second course that he attended:
We hid most of the day in caves and under trees, while we were given instructions on various lessons. Most of the practical aspects of the lessons were carried out at night. During this course, I was trained in infiltration, survival, camouflage, raid/ambush tactics, hide out, hiding and retrieving weapons caches, more than a dozen night marches, target practice with AK-47 and 9 mm pistol, RPG, grenades, among other training. We also went through an extensive indoctrination process and were required to study many Quaranic Chapters and Hadith.
By 2005, Lashkar’s plans for Headley are coming into focus. He is trained in explosives, but perhaps most importantly, Lashkar asks him to change the name given to him at birth by his Pakistani father and American mother — Daood Gilani. He chooses David, which is English for Daood; Coleman, which was his grandfather’s name; and Headley, which was his mother’s maiden name. It was a bureaucratic act, but intelligence officials say the change made Headley that much more difficult to track.
Finally, in June, my immediate superior, Sajid Mir, instructed me to return to the United States, change my Muslim name to a Christian sounding name and get a new U.S. passport under that name. He now informed me I would be going to India, since I looked nothing like a Pakistani in appearance and spoke fluent Hindi and Urdu it would give me a distinct advantage in India.
As his training continued, so did his embrace of the Lashkar lifestyle. In 2007, for example, Headley takes a second wife. He describes the decision by saying:
Polygamy was aggressively encouraged by LT and they were really happy to see me take this step. I was definitely “one of the guys” now.
Around the same time, Headley was conducting regular reconnaissance of targets in Mumbai. On one trip, he checks into the Taj Mahal Palace Hotel, which would later be the epicenter of the Mumbai attack, with his new wife for a “honeymoon.” As he cases locations on his trips to the city, Headley says he takes “extensive video.”
The plan was to capture an Indian fishing vessel, which constantly strayed into Pakistani waters, and commandeer it all the way to Mumbai. The hope was that the Indian Coast Guard would not notice an Indian vessel. The boys would carry a GPS device which would guide them directly to the landing site, I had selected earlier.
After the attack, Headley says he was told to “lay low.” Instead, he eventually connects with Al Qaeda and with the assistance of a contact he has inside the organization he travels to Denmark to scout the Jyllands-Posten newspaper for a possible strike.
This paper had published a cartoon of the Prophet Muhammad and was on the top of the hit list for Al Qaeda. The Major told me that the leadership desired the attack to be carried out ASAP on the Newspaper Head Office. I visited Copenhagen in January 2009 and conducted detailed surveillance of the office there as well as their location in Arhus. I was able to make entry into both locations. …
A few days later he took me to North Waziristan, where I met Ilyas Kashmiri, the Al Qaeda number four. He gave me a further pep talk on the Denmark Project, saying that, both, Osama bin Laden and Ayman Zawahiri had stressed upon him the need to conclude this matter quickly. I agreed and assured him of my best effort.
Western intelligence would soon learn of the plot, and close in on Headley. At the end of his draft, he describes the days leading up to his arrest.
I received final instructions in Denmark and left for the United States. in July 2009, I flew to England from Chicago and met Kashmiri’s friends. … Both of these men were also under surveillance by British Police, as a result of which I too came under surveillance. They forwarded their information to the F.B.I. From England, I checked out Denmark one last time and returned to the United States. I had now reached the conclusion that since I was short on man power, I would modify the operation and, instead of assaulting the newspaper building, just take out the cartoonist, Kurt Westergaard, and do this deed myself. All I would need was a handgun, which I knew I could find in Europe … I was finally arrested on 3 October 2009, at O’Hare Airport, on my way back to Pakistan.
APRIL 21, 2015 / by JASON M. BRESLOW
Find this story at 21 April 2015
Copyright http://www.pbs.org/
Headley writes memoir in prison on 26/11 attacks, Lashkar PTI (2015)15 april 2016
He writes that for the terror attack on Mumbai, the plan was to capture an Indian fishing vessel that would not raise alarm with the Indian Coast Guard as it transported the LeT terrorists to Mumbai’s shores. File photo
AP He writes that for the terror attack on Mumbai, the plan was to capture an Indian fishing vessel that would not raise alarm with the Indian Coast Guard as it transported the LeT terrorists to Mumbai’s shores. File photo
Pakistani-American LeT terrorist David Headley, serving 35 years for his role in the 26/11 Mumbai attacks, has written a memoir in prison detailing how Lashkar’s “dedication” to the cause of the “liberation of Kashmir” inspired him to join the terror group.
American public affairs TV programme Frontline was given access to a draft of the memoir Headley, 54, wrote in jail.
Excerpts from the draft offer a “unique window” into Headley’s turn toward extremism, his training with Lashkar-e-Taiba and his preparations for the Denmark attack against the Jyllands-Posten newspaper.
In one of the passages in the memoir, Headley writes about his first encounter with LeT militants in October 2000.
“On one of my trips, October 2000, I made my first contact with Lashkar-e-Taiba (LeT), quite by accident. I attended their annual convection in November. I was very impressed with their dedication to the cause of the liberation of Kashmir from Indian occupation,” Headley writes.
He writes that for the terror attack on Mumbai, the plan was to capture an Indian fishing vessel that would not raise alarm with the Indian Coast Guard as it transported the LeT terrorists to Mumbai’s shores.
“The plan was to capture an Indian fishing vessel, which constantly strayed into Pakistani waters, and commandeer it all the way to Mumbai. The hope was that the Indian Coast Guard would not notice an Indian vessel. The boys would carry a GPS device which would guide them directly to the landing site, I had selected earlier,” he writes.
Headley also writes in detail about his decision to join Lashkar “full time” following the 9/11 attacks, and says that by 2002 the group asked him to take “the Daura Aamma, the basic military training course offered by LeT.”
In 2005, Lashkar asked him to change his name from Dawood Gilani to a “Christian sounding name” so that he could travel easily between the US, India and Pakistan and make it difficult for intelligence agencies to track his activities.
“Finally, in June, my immediate superior, Sajid Mir, instructed me to return to the US, change my Muslim name to a Christian sounding name and get a new US passport under that name. He now informed me I would be going to India, since I looked nothing like a Pakistani in appearance and spoke fluent Hindi and Urdu it would give me a distinct advantage in India,” he said.
Describing the training he got at Lashkar camps, Headley writes “we hid most of the day in caves and under trees, while we were given instructions on various lessons.”
He says most of the “practical aspects” of the lessons were carried out at night and during the course, he was trained in “infiltration, survival, camouflage, raid/ambush tactics, hide out, hiding and retrieving weapons caches, more than a dozen night marches, target practice with AK-47 and 9 mm pistol, RPG, grenades, among other training.
NEW YORK, April 22, 2015
Updated: April 22, 2015 18:23 IST
Find this story at 22 April 2015
Copyright© 2016, The Hindu
AMERICAN TERRORIST (2015)15 april 2016
FRONTLINE investigates American-born terrorist David Coleman Headley, who helped plan the deadly 2008 siege on Mumbai. In collaboration with ProPublica, the film — an updated and expanded version of A Perfect Terrorist — reveals how secret electronic surveillance missed catching the Mumbai plotters, and how Headley planned another Charlie Hebdo-like assault against a Danish newspaper.
APRIL 21, 2015 // 01:23:48
REUTERS/Arko Datta
Find this story at 21 April 2015
Copyright http://www.pbs.org/
AMERICAN TERRORIST A PERFECT TERRORIST (2014)15 april 2016
In 2008 Mumbai Attacks, Piles of Spy Data, but an Uncompleted Puzzle
In the fall of 2008, a 30-year-old computer expert named Zarrar Shah roamed from outposts in the northern mountains of Pakistan to safe houses near the Arabian Sea, plotting mayhem in Mumbai, India’s commercial gem.
Mr. Shah, the technology chief of Lashkar-e-Taiba, the Pakistani terror group, and fellow conspirators used Google Earth to show militants the routes to their targets in the city. He set up an Internet phone system to disguise his location by routing his calls through New Jersey. Shortly before an assault that would kill 166 people, including six Americans, Mr. Shah searched online for a Jewish hostel and two luxury hotels, all sites of the eventual carnage.
But he did not know that by September, the British were spying on many of his online activities, tracking his Internet searches and messages, according to former American and Indian officials and classified documents disclosed by Edward J. Snowden, the former National Security Agency contractor.
They were not the only spies watching. Mr. Shah drew similar scrutiny from an Indian intelligence agency, according to a former official who was briefed on the operation. The United States was unaware of the two agencies’ efforts, American officials say, but had picked up signs of a plot through other electronic and human sources, and warned Indian security officials several times in the months before the attack.
What happened next may rank among the most devastating near-misses in the history of spycraft. The intelligence agencies of the three nations did not pull together all the strands gathered by their high-tech surveillance and other tools, which might have allowed them to disrupt a terror strike so scarring that it is often called India’s 9/11.
“No one put together the whole picture,” said Shivshankar Menon, who was India’s foreign minister at the time of the attacks and later became the national security adviser. “Not the Americans, not the Brits, not the Indians.”
Mr. Menon, now retired, recalled that “only once the shooting started did everyone share” what they had, largely in meetings between British and Indian officials, and then “the picture instantly came into focus.”
The British had access to a trove of data from Mr. Shah’s communications, but contend that the information was not specific enough to detect the threat. The Indians did not home in on the plot even with the alerts from the United States.
Clues slipped by the Americans as well. David Coleman Headley, a Pakistani-American who scouted targets in Mumbai, exchanged incriminating emails with plotters that went unnoticed until shortly before his arrest in Chicago in late 2009. United States counterterrorism agencies did not pursue reports from his unhappy wife, who told American officials long before the killings began that he was a Pakistani terrorist conducting mysterious missions in Mumbai.
That hidden history of the Mumbai attacks reveals the vulnerability as well as the strengths of computer surveillance and intercepts as a counterterrorism weapon, an investigation by The New York Times, ProPublica and FRONTLINE has found.
Although electronic eavesdropping often yields valuable data, even tantalizing clues can be missed if the technology is not closely monitored, the intelligence gleaned from it is not linked with other information, or analysis does not sift incriminating activity from the ocean of digital data.
This account has been pieced together from classified documents, court files and dozens of interviews with current and former Indian, British and American officials. While telephone intercepts of the assault team’s phone calls and other intelligence work during the three-day siege have been reported, the extensive espionage that took place before the attacks has not previously been disclosed. Some details of the operations were withheld at the request of the intelligence agencies, citing national security concerns.
“We didn’t see it coming,” a former senior United States intelligence official said. “We were focused on many other things — Al Qaeda, the Taliban, Pakistan’s nuclear weapons, the Iranians. It’s not that things were missed — they were never put together.”
After the assault began, the countries quickly disclosed their intelligence to one another. They monitored a Lashkar control room in Pakistan where the terror chiefs directed their men, hunkered down in the Taj and Oberoi hotels and the Jewish hostel, according to current and former American, British and Indian officials.
That cooperation among the spy agencies helped analysts retrospectively piece together “a complete operations plan for the attacks,” a top-secret N.S.A. document said.
The Indian government did not respond to several requests for official comment, but a former Indian intelligence official acknowledged that Indian spies had tracked Mr. Shah’s laptop communications. It is unclear what data the Indians gleaned from their monitoring.
Asked if Government Communications Headquarters, or GCHQ, Britain’s eavesdropping agency, should have had strong suspicions of a looming attack, a government official responded in a statement: “We do not comment on intelligence matters. But if we had had critical information about an imminent act of terrorism in a situation like this we would have shared it with the Indian government. So the central allegation of this story is completely untrue.”
The attacks still resonate in India, and are a continuing source of tension with Pakistan. Last week, a Pakistani court granted bail to a militant commander, Zaki-ur-Rehman Lakhvi, accused of being an orchestrator of the attacks. He has not been freed, pending an appeal. India protested his release, arguing it was part of a Pakistani effort to avoid prosecution of terror suspects.
The story of the Mumbai killings has urgent implications for the West’s duel with the Islamic State and other groups. Like Lashkar, the Islamic State’s stealthy communications and slick propaganda make it one of the world’s most technologically sophisticated terror organizations. Al Qaeda, which recently announced the creation of an affiliate in India, uses similar tools.
Although the United States computer arsenal plays a vital role against targets ranging from North Korea’s suspected assault on Sony to Russian cyberthieves and Chinese military hacking units, counterterrorism requires a complex mix of human and technical resources. Some former counterterrorism officials warn against promoting billion-dollar surveillance programs with the narrow argument that they stop attacks.
That monitoring collects valuable information, but large amounts of it are “never meaningfully reviewed or analyzed,” said Charles (Sam) Faddis, a retired C.I.A. counterterrorism chief. “I cannot remember a single instance in my career when we ever stopped a plot based purely on signals intelligence.”
The targeting of Mr. Shah’s communications also failed to detect Mr. Headley’s role in the Mumbai attacks, and National Security Agency officials did not see for months that he was pursuing a new attack in Denmark.
“There are small successes in all of this that don’t make up for all the deaths,” said Tricia Bacon, a former State Department intelligence analyst, referring to intelligence and broader efforts to counter Lashkar. “It’s a massive failure and some small successes.”
Lashkar’s Computer Chief
Zarrar Shah was a digitally savvy operative, a man with a bushy beard, a pronounced limp, strong ties to Pakistani intelligence and an intense hatred for India, according to Western and Indian officials and court files. The spy agencies of Britain, the United States and India considered him the technology and communications chief for Lashkar, a group dedicated to attacking India. His fascination with jihad established him as something of a pioneer for a generation of Islamic extremists who use the Internet as a weapon.
According to Indian court records and interviews with intelligence officials, Mr. Shah was in his late 20s when he became the “emir,” or chief, of the Lashkar media unit. Because of his role, Mr. Shah, together with another young Lashkar chief named Sajid Mir, became an intelligence target for the British, Indians and Americans.
Lashkar-e-Taiba, which translates as “the Army of the Pure,” grew rapidly in the 1990s thanks to a powerful patron: the Inter-Services Intelligence Directorate (ISI), the Pakistani spy agency that the C.I.A. has worked with uneasily for years. Lashkar conducted a proxy war for Pakistan in return for arms, funds, intelligence, and training in combat tactics and communications technology. Initially, Lashkar’s focus was India and Kashmir, the mountainous region claimed by both India and Pakistan.
But Lashkar became increasingly interested in the West. A Qaeda figure involved in the Sept. 11, 2001, attacks on the World Trade Center was arrested in a Lashkar safe house in 2002. Investigators dismantled a Lashkar network as it plotted a bombing in Australia in 2003 while recruiting, buying equipment and raising funds in North America and Europe. In 2007, a French court convicted in absentia the ringleader, Mr. Mir. He remained at large in Pakistan under ISI protection, investigators say.
Lashkar’s alliance with the ISI came under strain as some of the militants pushed for a Qaeda-style war on the West. As a result, some ISI officers and terror chiefs decided that a spectacular strike was needed to restore Lashkar’s cohesion and burnish its image, according to interviews and court files. The plan called for a commando-style assault in India that could also hit Americans, Britons and Jews there.
The target was the centerpiece of Indian prosperity: Mumbai.
Hatching a Plot
Lashkar’s chiefs developed a plot that would dwarf previous operations.
The lead conspirators were alleged to be Mr. Mir and Mr. Lakhvi, according to interviews and Indian court files, with Mr. Shah acting as a technical wingman, running the communications and setting up the hardware.
In early 2008, Indian and Western counterterrorism agencies began to pick up chatter about a potential attack on Mumbai. Indian spy agencies and police forces gathered periodic leads from their own sources about a Lashkar threat to the city. Starting in the spring, C.I.A. warnings singled out the iconic Taj Mahal Palace Hotel and other sites frequented by Westerners, according to American and Indian officials. Those warnings came from electronic and human sources, not from tracking Mr. Shah, other officials said.
“The U.S. intelligence community — on multiple occasions between June and November 2008 — warned the Indian government about Lashkar threats in Mumbai,” said Brian Hale, a spokesman for the director of the Office of National Intelligence. “The information identified several potential targets in the city, but we did not have specific information about the timing or the method of attack.”
United States spy agencies also alerted their British counterparts, according to a senior American intelligence official. It is unclear if the warnings led to the targeting of Mr. Shah’s communications, but by the fall of 2008, the British had found a way to monitor Lashkar’s digital networks.
So had the Indians. But until the attacks, one Indian official said, there was no communication between the two countries on the matter.
Western spy agencies routinely share significant or “actionable” intelligence involving threats with allies, but sometimes do not pass on less important information. Even friendly agencies are typically reluctant to disclose their sources of intelligence. Britain and India, while cooperative, were not nearly as close as the United States and Britain. And India is not included in the tightest intelligence-sharing circles of international, eavesdropping agencies that the two countries anchor.
Intelligence officials say that terror plots are often discernible only in hindsight, when a pattern suddenly emerges from what had been just bits of information. Whatever the reason, no one fully grasped the developing Mumbai conspiracy. “They either weren’t looking or didn’t understand what it all meant,” said one former American official who had access to the intelligence and would speak only on the condition of anonymity. “There was a lot more noise than signal. There usually is.”
Leaving a Trail
Not long after the British gained access to his communications, Mr. Shah contacted a New Jersey company posing online as an Indian reseller of telephone services named Kharak Singh, purporting to be based in Mumbai. His Indian persona started haggling over the price of a voice-over-Internet phone service — also known as VoIP — that had been chosen because it would make calls between Pakistan and the terrorists in Mumbai appear as if they were originating in Austria and New Jersey.
“its not first time in my life i am perchasing in this VOIP business,” Mr. Shah wrote in shaky English, to an official with the New Jersey-based company when he thought the asking price was too high, the GCHQ documents show. “i am using these services from 2 years.”
Mr. Shah had begun researching the VoIP systems, online security, and ways to hide his communications as early as mid-September, according to the documents. As he made his plan, he searched on his laptop for weak communication security in Europe, spent time on a site designed to conceal browsing history, and searched Google News for “indian american naval exercises” — presumably so the seagoing attackers would not blunder into an overwhelming force.
Ajmal Kasab, the only terrorist who would survive the Mumbai attacks, watched Mr. Shah display some of his technical prowess. In mid-September, Mr. Shah and fellow plotters used Google Earth and other material to show Mr. Kasab and nine other young Pakistani terrorists their targets in Mumbai, according to court testimony.
The session, which took place in a huge “media room” in a remote camp on the border with Kashmir, was part of an effort to chart the terrorists’ route across the Arabian Sea, to a water landing on the edge of Mumbai, then through the chaotic streets. Videos, maps and reconnaissance reports had been supplied to Mr. Mir by Mr. Headley, the Pakistani-American who scouted targets.
“The gunmen were shown all this data from the reconnaissance,” said Deven Bharti, a top Mumbai police official who investigated the attacks, adding that the terrorists were trained to use Google Earth and global positioning equipment on their own. “Kasab was trained to locate everything in Mumbai before he went.”
If Mr. Shah made any attempt to hide his malevolent intentions, he did not have much success at it. Although his frenetic computer activity was often sprawling, he repeatedly displayed some key interests: small-scale warfare, secret communications, tourist and military locations in India, extremist ideology and Mumbai.
He searched for Sun Tzu’s “Art of War,” previous terror strikes in India and weather forecasts in the Arabian Sea, typed “4 star hotel in delhi” and “taj hotel,” and visited mapsofindia.com to pore over sites in and around Mumbai, the documents show.
Still, the sheer scale of his ambition might have served as a smokescreen for his focus on the city. For example, he also showed interest in Kashmir, the Indian Punjab, New Delhi, Afghanistan and the United States Army in Germany and Canada.
He constantly flipped back and forth among Internet porn and entertainment sites while he was carrying out his work. He appeared to be fascinated with the actor Robert De Niro, called up at least one article on the singer Taylor Swift, and looked at funny cat videos. He visited unexplainable.net, a conspiracy theory website, and conducted a search on “barak obama family + muslim.”
In late September and again in October, Lashkar botched attempts to send the attackers to Mumbai by sea. During that period, at least two of the C.I.A. warnings were delivered, according to American and Indian officials. An alert in mid-September mentioned the Taj hotel among a half-dozen potential targets, causing the facility to temporarily beef up security. Another on Nov. 18 reported the location of a Pakistani vessel linked to a Lashkar threat against the southern coastal area of Mumbai, where the attack would occur.
Eventually Mr. Shah did set up the VoIP service through the New Jersey company, ensuring that many of his calls to the terrorists would bear the area code 201, concealing their actual origin. But in November, the company’s owner wrote to the fictitious Indian reseller, Mr. Singh, complaining that no voice traffic was running on the digital telephone network. Mr. Shah’s reply was ominous, according to Indian law enforcement officials, who obtained evidence from the company’s communications records with F.B.I. assistance after the attack.
“Dear Sir,” Mr. Shah replied, “i will send trafic by the end of this month.”
By Nov. 24, Mr. Shah had moved to the Karachi suburbs, where he set up an electronic “control room” with the help of an Indian militant named Abu Jundal, according to his later confession to the Indian authorities. It was from this room that Mr. Mir, Mr. Shah and others would issue minute-by-minute instructions to the assault team once the attacks began. On Nov. 25, Abu Jundal tested the VoIP software on four laptops spread out on four small tables facing a pair of televisions as the plotters, including Mr. Mir, Mr. Shah and Mr. Lakhvi, waited for the killings to begin.
In a plan to pin the blame on Indians, Mr. Shah typed a statement of responsibility for the attack from the Hyderabad Deccan Mujahadeen — a fake Indian organization. Early on Nov. 26, Mr. Shah showed more of his hand: he emailed a draft of the phony claim to an underling with orders to send it to the news media later, according to American and Indian counterterrorism officials.
Before the attacks started that evening, the documents show, Mr. Shah pulled up Google images of the Oberoi Hotel and conducted Wikimapia searches for the Taj and the Chabad House, the Jewish hostel run by an American rabbi from Brooklyn who would die in the strike along with his pregnant wife. Mr. Shah opened the hostel’s website. He began Googling news coverage of Mumbai just before the attacks began.
An intercept shows what Mr. Shah was reading, on the news website NDTV, as the killings proceeded.
“Mumbai, the city which never sleeps, was brought to its knees on Wednesday night as it came under an unprecedented multiple terror attack,” the article said. “Even as heavily armed police stormed into Taj Hotel, just opposite the Gateway of India where suspected terrorists were still holed up, blood-soaked guests could be seen carried out into the waiting ambulances.”
A Trove of Data
In the United States, Nov. 26 was the Wednesday before Thanksgiving.
A long presidential election fight was over, and many officials in Washington had already drifted away for their long weekend. Anish Goel, director for South Asia at the National Security Council in the White House, left around 6 a.m. for the eight-hour drive to his parents’ house in Ohio. By the time he arrived, his BlackBerry was filled with emails about the attacks.
The Pakistani terrorists had come ashore in an inflatable speedboat in a fishermen’s slum in south Mumbai about 9 p.m. local time. They fanned out in pairs and struck five targets with bombs and AK-47s: the Taj, the Oberoi Hotel, the Leopold Cafe, Chabad House, and the city’s largest train station.
The killing was indiscriminate, merciless, and seemingly unstoppable over three horrific days. In raw, contemporaneous notes by analysts, the eavesdroppers seem to be making a hasty effort to understand the clues from the days and weeks before.
“Analysis of Zarrar Shah’s viewing habits” and other data “yielded several locations in Mumbai well before the attacks occurred and showed operations planning for initial entry points into the Taj Hotel,” the N.S.A. document said.
That viewing history also revealed a longer list of what might have been future targets. M.K. Narayanan, India’s national security adviser at the time, appeared to be concerned with that data from Mr. Shah in discussions with American officials shortly after the attacks, according to the WikiLeaks archive of American diplomatic cables.
A top secret GCHQ document described the capture of information on targets that Mr. Shah had identified using Google Earth.
The analysts seemed impressed by the intelligence haul — “unprecedented real-time active access in place!” — one GCHQ document noted. Another agency document said the work to piece the data together was “briefed at highest levels nationally and internationally, including the US National Security Adviser.”
As early reports of many casualties came in, Mr. Goel said the focus in Washington shifted to a question already preoccupying the White House: “Is this going to lead to a war between Pakistan and India?” American officials who conducted periodic simulations of how a nuclear conflict could be triggered often began with a terror attack like this one.
On Nov. 30, Mr. Goel was back at his office, reading a stack of intelligence reports that had accumulated on his desk and reviewing classified electronic messages on a secure terminal.
Amid the crisis, Mr. Goel, now a senior South Asia Fellow at the New America Foundation, paid little attention to the sources of the intelligence and said that he still knew little about specific operations. But two things stood out, he said: The main conspirators in Pakistan had already been identified. And the quality and rapid pacing of the intelligence reports made it clear that electronic espionage was primarily responsible for the information.
“During the attacks, it was extraordinarily helpful,” Mr. Goel said of the surveillance.
But until then, the United States did not know of the British and Indian spying on Mr. Shah’s communications. “While I cannot comment on the authenticity of any alleged classified documents, N.S.A. had no knowledge of any access to a lead plotter’s computer before the attacks in Mumbai in November 2008,” said Mr. Hale, the spokesman for the Office of the director of National Intelligence.
As N.S.A. and GCHQ analysts worked around the clock after the attacks, the flow of intelligence enabled Washington, London and New Delhi to exert pressure on Pakistan to round up suspects and crack down on Lashkar, despite its alliance with the ISI, according to officials involved.
In the stacks of intelligence reports, one name did not appear, Mr. Goel clearly recalls: David Coleman Headley. None of the intelligence streams from the United States, Britain or India had yet identified him as a conspirator.
The Missing American
Mr. Headley’s many-sided life — three wives, drug-smuggling convictions and a past as an informant for the United States Drug Enforcement Administration — would eventually collapse. But for now, he was a free man, watching the slaughter on television in Lahore, Pakistan, according to his later court testimony. At the time, he was with Faiza Outalha, his Moroccan wife, having reconciled with her after moving his Pakistani wife and four children to Chicago.
Mr. Headley’s unguarded emails reflected euphoria about Lashkar’s success. An exchange with his wife in Chicago continued a long string of incriminating electronic communications by Mr. Headley written in a transparent code, according to investigators and case files.
“I watched the movie the whole day,” she wrote, congratulating him on his “graduation.”
About a week later, Mr. Headley hinted at his inside information in an email to fellow alumni of a Pakistani military school. Writing about the young terrorists who carried out the mayhem in Mumbai, he said: “Yes they were only 10 kids, guaranteed. I hear 2 were married with a daughter each under 3 years old.” His subsequent emails contained several dozen news media photos of the Mumbai siege.
Almost immediately, Mr. Headley began pursuing a new plot with Lashkar against a Danish newspaper that had published cartoons of the Prophet Muhammad. He went to Denmark in January and cased the newspaper, meeting and exchanging emails with its advertising staff, according to his later testimony and court records. He sent messages to his fellow conspirators and emailed himself a reconnaissance checklist of sorts, with terms like “Counter-Surveillance,” “Security (Armed?)” and “King’s Square” — the site of the newspaper.
Those emails capped a series of missed signals involving Mr. Headley. The F.B.I. conducted at least four inquiries into allegations about his extremist activity between 2001 and 2008. Ms. Outalha had visited the United States Embassy in Islamabad three times between December 2007 and April 2008, according to interviews and court documents, claiming that he was a terrorist carrying out missions in India.
Mr. Headley also exchanged highly suspicious emails with his Lashkar and ISI handlers before and after the Mumbai attacks, according to court records and American counterterrorism officials. The N.S.A. collected some of his emails, but did not realize he was involved in terrorist plotting until he became the target of an F.B.I. investigation, officials said.
That inquiry began in July 2009 when a British tip landed on the desk of a rookie F.B.I. counterterrorism agent in Chicago. Someone named “David” at a Chicago pay phone had called two suspects under surveillance in Britain, planning to visit.
He had contacted the Britons for help with the plot, according to testimony. Customs and Border Protection used his flight itinerary to identify him while en route, and after further investigation, the F.B.I. arrested him at Chicago O’Hare Airport that October, as he was preparing to fly to Pakistan. For his role in the Mumbai attacks, he pleaded guilty to 12 counts and was sentenced to 35 years in prison.
After disclosures last year of widespread N.S.A. surveillance, American officials claimed that bulk collection of electronic communications led to Mr. Headley’s eventual arrest. But a government oversight panel rejected claims giving credit to the N.S.A.’s program to collect Americans’ domestic phone call records. Case files and interviews with law enforcement officials show that the N.S.A. played only a support role in the F.B.I. investigation that finally identified Mr. Headley as a terrorist and disrupted the Danish plot.
The sole surviving attacker of the Mumbai attack, Mr. Kasab, was executed in India after a trial. Although Pakistan denies any role in the attacks, it has failed to charge an ISI officer and Mr. Mir, who were indicted by American prosecutors. Though Mr. Shah and other Lashkar chiefs had been arrested, their trial remains stalled six years after the attack.
Mr. Menon, the former Indian foreign minister, said that a lesson that emerged from the tragedy in Mumbai was that “computer traffic only tells you so much. It’s only a thin slice.” The key is the analysis, he said, and “we didn’t have it.”
James Glanz, of The New York Times, reported from India, New York and Washington; Sebastian Rotella, of ProPublica, reported from Chicago, India, New York and Washington; and David E. Sanger, of The New York Times, reported from Washington. Andrew W. Lehren, of The New York Times, contributed reporting from New York, and Declan Walsh, of The New York Times, from London. Jeff Larson, of ProPublica, and Tom Jennings and Anna Belle Peevey, of FRONTLINE, contributed reporting from New York.
Related Film: A Perfect Terrorist
FRONTLINE and ProPublica teamed up in 2011 to investigate the mysterious circumstances behind David Coleman Headley’s rise from heroin dealer and U.S. government informant to master plotter of the 2008 attack on Mumbai. Also explore our interactive look at Headley’s web of betrayal.
DECEMBER 21, 2014 / by JAMES GLANZ • SEBASTIAN ROTELLA • DAVID E. SANGER The New York Times
Find this story at 21 December 2014
Copyright http://www.pbs.org/
America sacrificed Mumbai to keep Headley in play (2013)15 april 2016
Five years on, this is what we now know. A valued CIA proxy, who infiltrated the Lashkar-e-Toiba (LeT), a banned Pakistani Islamist outfit, planned the Mumbai attacks in which 166 people were killed, and more than 300 injured. David Headley, an American citizen, conceived, scoped and ran supplies for the terrorist ‘swarm’ operation, so called because several independent units simultaneously hit their enemy in multiple locations, coming out of nowhere, multiplying fear and panic.
Headley selected Mumbai, India’s commercial capital, as the theatre of operations while acting as a ‘prized counter-terrorism asset’ for the United States, according to senior officers in the Joint Terrorism Task Force, who described his covert career as running for eleven years. When the LeT’s ten-man suicide squad sailed from a creek in Pakistan’s southern port city of Karachi, at dawn on 22 November 2008, they navigated towards a landing spot in Mumbai, marked on a GPS provided by the Washington DCborn maverick. Reaching the world’s fourth largest metropolis four nights later, LeT’s team fanned out, following routes plotted by Headley over an intense two-year period of surveillance . Shortly before 10pm, the gunmen shot dead tourists at the Leopold Cafe, massacred more than 60 Indian commuters at the Chhatrapati Shivaji Terminus (CST) railway station, and then laid siege to a Jewish centre and two five-star hotels, including the luxurious Taj Mahal Palace, Mumbai’s most famous landmark. Ten men would keep the mega-city burning for more than three days.
This month sees the fifth anniversary of the Mumbai attacks, and the most complete survey to date of former and serving intelligence agents, diplomats, police, and survivors from 12 countries, reveals that the CIA repeatedly tipped off their counterparts in India to an imminent attack, using intelligence derived from their prize asset Headley. What they did not reveal was that their source, a public school educated Pakistani-American dilettante and entrepreneur, was allowed to remain in place even as the attack was realized. His continuing proximity to the terrorist outfit would eventually lead to a showdown between Washington and New Delhi.
Researching ‘The Siege’, we learned that Indian intelligence agents accused their US counterparts of protecting Headley and leaving him in the field, despite the imminent threat to Mumbai. Irate Indian officials claimed that Headley’s Mumbai plot was allowed to run on by his US controllers, as to spool it in would have jeopardized his involvement in another critical US operation . Having infiltrated the LeT, Headley also won access to al-Qaida, making him the only US citizen in the field who might be able to reach Osama bin Laden. Three years before America’s most wanted terrorist was finally run to ground in Abbottabad, this was an opportunity that some in the US intelligence community were not willing to give up.
Phone and email intercepts seen by us confirm how Headley had become trusted by Ilyas Kashmiri, a former LeT commander and senior al-Qaida operative, who led an al-Qaida military affiliate, known as Brigade 313. Based in the Federally Administered Tribal Areas (FATA) of Pakistan, Ilyas Kashmiri was, at one point, considered as a potential successor to Osama bin Laden until his death in June 2011.
In 2009, several months after the Mumbai atrocity, agents from the Research and Analysis Wing (R&AW), India’s foreign intelligence agency, confronted the CIA with these claims, according to accounts seen by us. India is said to have accused the US of pursuing ‘a narrow self-interest’ and having some responsibility in the deaths in Mumbai.
However, the CIA stood firm, one senior agent claiming that ‘Indian incompetence’ was to blame for the attack. In 2006, the US had warned India that the LeT was forming a suicide squad to attack India from the sea. More than 25 increasingly detailed bulletins followed that named Mumbai as the prime objective, and identified several targets, including the Taj hotel. Additional bulletins suggested that a team of highly trained gunmen using AK47s and RDX, military-grade explosives, would seek to prolong the attack by taking hostages and establishing a stronghold, before a final shoot-out that they hoped would be broadcast live around the world on TV.
Some of these bulletins were eventually distilled into notices that reached the police patrolling Mumbai . However, the assessments were ‘ignored or downplayed’ until July 2008 when a senior police officer, a Deputy Commissioner of Police (DCP) with responsibility for security in the district of South Mumbai where the Taj was located, took action . On 12 August 2008, DCP Vishwas Nangre Patil spent nine hours with the Taj’s security staff, writing a report to his seniors that concluded: ‘Overall, the [Taj] management has done very little to adapt the hotel to the changing security environment in the city.’ When a truck bomb devastated the Marriott Hotel in Islamabad, Pakistan, on 20 September 2008, Patil drew up an urgent list of enhanced security measures for the Taj, including snipers on the roof, blast barriers on the driveway and armed guards on all doors. Although security was tightened as a result, most of these measures were withdrawn again after DCP Patil went on leave in the second week of October 2008.
David Headley was a bizarre mix of Eastern and Western cultures and made for a near-perfect mole. His mother was Serrill Headley, a socialite and adventuress from Maryland, whose great-aunt had funded women’s rights and Albert Einstein’s research . His father was Syed Gilani, a renowned radio broadcaster and diplomat from Lahore, who had been seconded to Voice of America. When Headley was born in Washington DC in 1960, he was initially named Daood Saleem Gilani. Within a year, the family had relocated to Pakistan, where Gilani was brought up as a Muslim and schooled at an exclusive military academy. After his parents divorced and Serrill returned to the US to open a bar in Philadelphia, named, suitably, the Khyber Pass, Gilani, aged 17, rejoined her. He lived with her in a flat above the Khyber Pass — and soon immersed himself in the American way of life. Later he moved to the Upper West Side in New York, where he opened a video rental shop, Fliks.
By 1984, Gilani was a six-foot-two American boy, with a fair complexion, broad shoulders and an impressive mop of curly blond hair. Only his distinctively mismatched eyes — one blue one brown —hinted at his mixed heritage and muddled ancestry. Dressed in crumpled Armani jeans, a leather jacket slung over his shoulder, and a £10,000 Rolex Submariner poking out of his cuff, he was already looking for more lucrative opportunities than video rental. That year, he used his dual identities to smuggle half a kilogram of heroin from Pakistan’s tribal areas to New York, selling it through the video store. When German customs officers caught him four years later at Frankfurt airport en-route to Philadelphia, with two kilograms of heroin, Gilani informed on his co-conspirators to the Drug Enforcement Administration (DEA). While, his accomplices were jailed for between eight and ten years, he became a paid DEA informer, infiltrating Pakistan’s drug syndicates . Some US agents warned that Gilani was too volatile to be trusted, and in 1997, he was arrested again in New York for trafficking. He offered another deal, suggesting he infiltrate Islamist radicals who were starting to worry the CIA and FBI.
A letter put before the court reveals prosecutors conceded that while Gilani might have supplied up to fifteen kilograms of heroin worth £947,000, he had also been ‘reliable and forthcoming’ with the agency about ‘a range of issues’ . Sentenced to fifteen months in the low-security Fort Dix prison, New Jersey, while his co-conspirator received four years in a high-security jail, he was freed after only nine months. In August 1999, one year after hundreds had been killed in simultaneous Al-Qaeda bomb attacks on American embassies in Africa, he returned to Pakistan, his ticket paid for by the US government.
By 2006, Daood had joined the inner circle of Lashkar-e-Toiba, which had been proscribed by the UN five years earlier. Coming up with the plan to attack Mumbai and launch LeT onto the international stage, he changed his name to David Headley and applied for a new US passport. He would use it to travel incognito to India on seven surveillance trips, selecting targets in Mumbai which he photographed using a camera he borrowed from his mother-in-law .
Headley was chaotic and his Mumbai plan was almost undermined by his private life. By 2008, he was married to three women, none of who knew of the others’ existence, two living apart in Pakistan and one in New York. The wife in the US, however, grew suspicious after he championed the 9/11 attackers, reporting him to the authorities. Shortly before the Mumbai operation, his cousin Alex Headley, a soldier in the US Army also considered reporting him after Headley announced that he was naming his newborn son Osama and described him as ‘my little terrorist’ . His Pakistani half-brother Danyal Gilani, who worked as a press officer for the Pakistani Prime Minister Yousaf Raza Gilani, disowned him.
Latest Comment
Alan, you make me laugh. U.S.A is headed right down the toilet, and you know it! India knows quite well how to deal with… Read More
You iz in da toilet
SEE ALL COMMENTSADD COMMENT
Eventually, Headley’s mother informed on him to the FBI. Her son was only ever interested in himself, she warned, arguing that his selfishness was born out of his lack of a sense of self. None of the complainants heard anything back, with Serrill Headley, who died ten months before Mumbai, confiding in a friend that her son ‘must have worked for the US government’ .
Five years on, with American officials continuing to remain silent over Headley (and the conflict of interest that enabled him to run amok in the field), and with New Delhi still prevented from accessing him, the full truth about Washington’s culpability in 26/11 remains muddied. In India, where no postmortem of any depth has been carried out into Mumbai, the scale of the intelligence failings — the inability of IB and RAW to develop the leads passed them by the CIA and others — will also never be fully exposed.
Adrian Levy & Cathy Scott Clark | Nov 24, 2013, 05.15 AM IST
Find this story at 24 November 2013
Copyright http://timesofindia.indiatimes.com/
A PERFECT TERRORIST (2011)15 april 2016
It has been called the most spectacular terror attack since 9/11. On the night of Nov. 26, 2008, 10 men armed with guns and grenades launched an assault on Mumbai with a military precision that left 166 dead. India quickly learned the attackers belonged to Lashkar-e-Taiba, a Pakistani militant group associated with Pakistan’s secretive intelligence agency, the ISI. But what wasn’t known then was that a Lashkar/ISI operative had been casing the city for two years, developing a blueprint for terror. His name was David Coleman Headley, and he’d been chosen for the job because he had the perfect cover: he was an American citizen. FRONTLINE and ProPublica reporter Sebastian Rotella team up to investigate the mysterious circumstances behind Headley’s rise from heroin dealer and U.S. government informant to master plotter of the 2008 attack on Mumbai.
NOVEMBER 22, 2011 // 53:40
Find this story at 22 November 2011
Copyright http://www.pbs.org/
Panama Papers: Links revealed to spies and Iran-Contra affair Documents show ex-CIA gun-runners, contractors use offshore firms for personal gain13 april 2016
Adnan Khashoggi: Saudi billionaire negotiated billions of dollars in weapons sales to Saudi Arabia in the 1970s and played “a central role for the US government” with CIA operatives in selling guns to Iran, according to a 1992 US Senate report co-written by then-Senator John Kerry, now the US secretary of state. Photograph: Getty Images
Adnan Khashoggi: Saudi billionaire negotiated billions of dollars in weapons sales to Saudi Arabia in the 1970s and played “a central role for the US government” with CIA operatives in selling guns to Iran, according to a 1992 US Senate report co-written by then-Senator John Kerry, now the US secretary of state. Photograph: Getty Images
One day during his presidential re-election campaign in September 1996, Bill Clinton walked into a room in Westin Crown Center hotel in Kansas City. At stake was a quarter-million dollars in campaign fundraising. Clinton turned to his generous host, Farhad Azima, and led the guests in song.
“Happy birthday to you, happy birthday to you….”
Azima, an Iranian-born American charter airline executive, had long donated to Democratic and Republican administrations. He visited the Clinton White House 10 times between October 1995 and December 1996, including private afternoon coffees with the president. Years later, as Hillary Clinton stood for election to the Senate in December 1999, Azima hosted her and 40 guests for a private dinner that raised $2,500 a head.
Azima’s Democratic fundraising activities provided an interesting twist in the career of a man who has found himself in a media storm of one of America’s major political scandals, the Iran-Contra affair, during the Republican Reagan Administration.
In the mid-1980s, senior Reagan administration officials secretly arranged to sell weapons to Iran to help free seven American hostages then use the sale proceeds to fund right-wing Nicaraguan rebels known as the Contras. On a mission to Tehran in 1985, one of Azima’s Boeing 707 cargo planes delivered 23 tons of military equipment, the New York Times reported. Azima has always claimed to know nothing about the flight or even if it happened.
“I’ve had nothing to do with Iran-Contra,” Azima told ICIJ. “I was investigated by every known agency in the US and they decided there was absolutely nothing there,” said Azima. “It was a wild goose chase. The law enforcement and regulators fell for it.”
Now, records obtained by the International Consortium of Investigative Journalists, the German newspaper Süddeutsche Zeitung and other media partners including The Irish Times reveal new details about one of America’s most colourful political donors. The records also disclose offshore deals made by another Iran-Contra figure, the Saudi billionaire Adnan Khashoggi.
The more than 11 million documents – which stretch from 1977 to December 2015 – show the inner workings of Mossack Fonseca, a Panamanian law firm that specializes in building labyrinthine corporate structures that sometimes blur the line between legitimate business and the cloak-and-dagger world of international espionage.
Spies’ Offshore Dealings
The documents also pull back the curtain on hundreds of details about how former CIA gun-runners and contractors use offshore companies for personal and private gain. Further, they illuminate the workings of a host of other characters who used offshore companies during or after their work as spy chiefs, secret agents or operatives for the CIA and other intelligence agencies.
“You can’t exactly walk around saying that you’re a spy,” says Loch K Johnson, a professor at the University of Georgia, in explaining the cover that offshore firms offer. Johnson, a former aide to a US Senate committee’s intelligence inquiries, has spent decades studying CIA “front” companies.
The documents reveal that Mossack Fonseca’s clients included Saudi Arabia’s first intelligence chief who was named by a US Senate committee as the CIA’s “principal liaison for the entire the Middle East from the mid-1960s through 1979”, Sheikh Kamal Adham, who controlled offshore companies later involved in a US banking scandal; Colombia’s former chief of air intelligence, retired maj gen Ricardo Rubianogroot, who was a shareholder of an aviation and logistics company; and Brig Gen Emmanuel Ndahiro, doctor-turned-spy-chief to Rwanda’s president Paul Kagame.
Adham died in 1999. Ndahiro did not respond to requests for comment. Rubianogroot confirmed to ICIJ partner and Colombian investigative journalism organisation, Consejo de Redacción, that he was a small shareholder in West Tech Panama, which was created to buy an American avionics company. The company is in liquidation.
“We conduct thorough due diligence on all new and prospective clients that often exceeds in stringency the existing rules and standards to which we and others are bound,” said Mossack Fonseca in a statement. “Many of our clients come through established and reputable law firms and financial institutions across the world, including the major correspondent banks . . . If a new client/entity is not willing and/or able to provide to us the appropriate documentation indicating who they are, and (when applicable) from where their funds are derived, we will not work with that client/entity.”
Even wannabe spooks can be found.
“I’ll suggest a name like ‘World Insurance Services Limited’ or maybe ‘Universal Exports’ after the company used in the early James Bond stories but I don’t know if we’d get away with that!” wrote one financier to Mossack Fonseca in 2010 on behalf of a client creating a front company in the British Virgin Islands (BVI). Universal Exports was a fictional company used by the British Secret Service in Ian Fleming’s James Bond novels.
The files further show that Mossack Fonseca also incorporated companies named Goldfinger, SkyFall, GoldenEye, Moonraker, Spectre and Blofeld after James Bond movie titles and villains and was asked to do the same for Octopussy. There is correspondence from a man named Austin Powers, apparently his real name and not the movie character, and Jack Bauer, whom a Mossack Fonseca employee entered into the firm’s database as a client and not the television character after the employee “met him at a pub.”
But Mossack Fonseca’s connection to espionage is more often fact, not fiction.
Men in their flying machines
Panama Papers: Tax officials to consider international action
John McManus: TDs have much to gain from publishing their tax returns
Countries begin to look beyond narrow national interests to tackle tax avoidance
The secret documents show that Farhad Azima incorporated his first offshore company with Mossack Fonseca in the BVI in 2000. The company was called ALG (Asia & Pacific) Limited, a branch of his airline Aviation Leasing Group, a US-based private company with a fleet of more than 60 aircraft.
It was not until 2013 when the firm ran a routine background search on the shareholders of a new company that Mossack Fonseca discovered media articles on Azima’s alleged ties to the CIA. Among the allegations found in online articles shared by Mossack Fonseca employees were that he “supplied air and logistical support” to a company owned by former CIA agents who shipped arms to Libya. Another article quoted an FBI official who said he had been warned by the CIA that Azima was “off limits”.
The firm asked Azima’s representatives to confirm his identity. But it appears that Mossack Fonseca never received a reply. The files indicate that he remained a client and that internal surprises continued.
In 2014, one year after discovering online reports of his connections to the CIA, Hosshang Hosseinpour was cited by the US Treasury Department as helping companies move tens of millions of dollars for companies in Iran, which at the time was subject to economic sanctions.
The files show that Azima and Hosseinpour appeared on corporate documents of a company that planned to buy a hotel in the nation of Georgia in 2011. That was the same year treasury officials asserted that Hosseinpour, who co-founded the private airline FlyGeorgia, and two others first began to send millions of dollars into Iran, which led to sanctions being taken against him three years later.
The documents show that Hosseinpour briefly held shares in the company from November 2011. However, in February 2012 company administrators told Mossack Fonseca that he was not part of the company and his shares had been issued in an “administrative error”. The company, Eurasia Hotel Holdings Limited, changed its name to Eurasia Aviation Holdings and bought a Hawker Beechcraft 400XP corporate jet in 2012 for $1.625 million, files show.
Azima told ICIJ that the company was only used to buy an aircraft and that Hosseinpour had never been involved in the company.
The plane was not going to be used in the US, Azima said, so couldn’t be registered in the US and the choice of the BVI was not for tax purposes. “I’ve filed every tax known to mankind,” Azima told ICIJ.
Hosseinpour could not be reached for comment. In 2013, before the sanctions came into force, he told the Wall Street Journal that he had no connections to Iran and “nothing to do with evading sanctions.”
Another colourful connection to the CIA in the Mossack Fonseca files is Loftur Johannesson, now a wealthy silver-haired 85-year-old from Rekyavik, also known as The Icelander. Johannesson is widely reported in books and newspaper articles to have worked with the CIA in the 1970s and 1980s, supplying guns to anti-communist guerrillas in Afghanistan. With his CIA paychecks, The Icelander reportedly bought a home in Barbados and a vineyard in France.
Johannesson emerges in Mossack Fonseca’s files in September 2002, long after his retirement from secret service. He was connected to at least four offshore companies in the BVI and Panama linked to homes in high-priced locales, including one located behind London’s Westminster Cathedral and another in a beachfront Barbados complex where a similar home is now selling for $35 million. As recently as January 2015, Johannesson paid thousands of dollars to Mossack Fonseca for its services.
“Mr Johannesson has been an international businessman, mainly in aviation related activities, and he completely rejects your suggestions that he may have worked for any secret intelligence agencies,” a spokesman told ICIJ.
Agent Rocco and 008: license to incorporate
Another connection to the Iran-Contra scandal is Adnan Khashoggi. The Saudi billionaire, once thought to be the world’s most extravagant spender, negotiated billions of dollars in weapons sales to Saudi Arabia in the 1970s and played “a central role for the US government” with CIA operatives in selling guns to Iran, according to a 1992 US Senate report co-written by then-Senator John Kerry, the Massachusetts Democrat who is now the US secretary of state.
Khashoggi appears in the Mossack Fonseca files as early as 1978, when he became president of the Panamanian company ISIS Overseas S.A. Most of his business with Mossack Fonseca appears to have taken place between the 1980s and the 2000s through at least four other companies.
Mossack Fonseca’s files do not reveal the purpose of all Khashoggi’s companies. However, two of them, Tropicterrain SA, Panama, and Beachview Inc, were involved in mortgages for homes in Spain and the Grand Canaries islands.
There is no indication that Mossack Fonseca investigated Khashoggi’s past even though the firm processed payments from the Adnan Khashoggi Group in the same year that he made global news when the US charged him with helping Ferdinand Marcos, president of the Philippines, loot millions. Khashoggi was later cleared. Mossack Fonseca’s files show the firm ceased business with Khashoggi around 2003.
The Mossack Fonseca files indicated the company did not discriminate between cold war foes.
Another customer was Sokratis Kokkalis, now a 76-year-old Greek billionaire once accused of spying for the East German Stasi under the alias “Agent Rocco.” A German parliamentary investigation found that in the early 1960s Kokkalis regularly informed on acquaintances and contacts during his time living in Germany and Russia. Until 2010, Kokkalis owned the Greek soccer club Olympiakos, and he now owns Greece’s largest telecommunications company.
Mossack Fonseca discovered Kokkalis’s connections to espionage in February 2015 as part of routine background checks of one of his companies, Upton International Group. Kokkalis “was accused by East German officials of espionage, fraud, and money laundering in the early sixties, but the case was acquitted”, an employee wrote colleagues after an Internet search. Mossack Fonseca’s files reveal that Kokkalis’ agent did not respond to the firm’s requests for details about Kokkalis and his company, including its purpose.
Khashoggi could not be reached for comment. Kokkalis, who did not respond to requests for comment, has previously denied charges and accused “political personalities” and newspapers of a “war” against him.
In 2005, Mossack Fonseca employees learned with some alarm that someone on their books went by the name of Francisco P Sánchez, who Mossack Fonseca employees assumed to be Francisco Paesa Sánchez, one of Spain’s most infamous secret agents. “The story . . . was really scary,” wrote the person who first discovered Paesa’s background. Mossack Fonseca had incorporated seven companies of which P Sanchez was a director.
Born in Madrid before the outbreak of the second World War, Paesa amassed a fortune hunting down separatists and a corrupt police chief before fleeing Spain with millions of dollars. In 1998, Paesa faked his own death; his family issued a death certificate that testified to a heart attack in Thailand. But in 2004, investigators tracked him down in Luxembourg. Paesa himself later explained that reports of his death had been a “misunderstanding”.
In December 2005, a Spanish magazine reported on what it called Paesa’s “business network” that built and owned hotels, casinos and a golf course in Morocco. Without mentioning Mossack Fonseca, the article listed the same seven companies incorporated in the BVI.
In October 2005, Mossack Fonseca had decided to distance itself from the companies of which P Sanchez was a director. “We are concern [sic] of the impact it may have in Mossfon’s image if any scandal arises,” the firm wrote an administrator to explain its decision to cut ties with P Sanchez’s companies.
“We believe in principle that when a client is not up front with us about any facts that are relevant for his or her dealings with us, especially their true identity and background, that this is sufficient reason to terminate our relationship with them,” wrote a senior employee.
Paesa could not be reached for comment.
Two Names, Nine Fingers
Another Internet search, this time in March 2015, alerted the firm that another of its clients – a “Claus Mollner” – had been a customer for nearly 30 years. Among unrelated results from Facebook, a family tree or two and an academic linguistic review, there was one article from the University of Delaware.
“Claus Möllner (the name that Werner Mauss always used to identify himself),” said the article.
Mollner or Mauss, also known as Agent 008 and “The Man of Nine Fingers,” thanks to the lost tip of an index finger, claims to be “Germany’s first undercover agent.” Now retired, Mauss’s website boasts of his role in “smashing 100 criminal groups”.
Colombian authorities briefly held Mauss in 1996 on charges, later dropped, that he conspired with guerillas to kidnap a woman and keep part of the ransom payment. Mauss claims the hostage takers were not rebels, that he never received ransom money and that “all operations carried out worldwide . . . have always been effected with the co-operation of German governmental agencies and authorities”.
While Mauss’s real name never appears in Mossack Fonseca’s files, hundreds of documents detail his network of companies in Panama. At least two companies held real estate in Germany.
Mauss did not personally own any offshore companies, Mauss’s lawyer told ICIJ partners Suddeutsche Zeitung and NDR public television. All companies and foundations connected to him were to “secure the personal financial interests of the Mauss family”, said Mauss’s lawyer, were disclosed and paid applicable taxes.
Mauss’s lawyer confirmed that some companies that appear in Mossack Fonseca’s files were used for “humanitarian operations” in peace and hostage negotiations “for forwarding of humanitarian goods such as hospitals, surgical instruments, large amounts of antibiotics etc”, in order to “neutralize” extortion.
In the files it appears that in March 2015, a Mossack Fonseca employee clicked on the Google search result that linked Mollner to Mauss. Yet there is no other suggestion that Mossack Fonseca discovered his true identity. His companies continued to be on Mossack Fonseca’s books into 2015.
It probably suited Mollner, or Mauss, just fine.
As a journalist who interviewed him in 1998 observed: “The secret of his real identity was always Werner Mauss’s capital.”
Tue, Apr 5, 2016, 19:00 Updated: Tue, Apr 5, 2016, 19:10
Will Fitzgibbon
Find this story at 5 April 2016
© 2016 THE IRISH TIMES
Colombia Calling: The Other Wiretap Scandal (2009)13 april 2016
ILLUSTRATION BY LEO GARCIAWhen the editorial staff of Semana, a feisty Bogotá-based weekly news magazine, was closing out their Feb. 21 edition, they couldn’t help but notice an unmarked car parked for several hours in front of their building. This came as no surprise to editor- in-chief Alfonso Cuéllar, who supervised a six-month long investigation of illegal wiretapping by Colombia’s domestic intelligence agency, the Administrative Department of Security, known in Colombia as the DAS.
“We knew that both the good guys and the bad guys were aware that we were working on the story,” said Cuéllar in a recent interview from Bogotá. “That’s partly why the DAS was shredding all of the evidence a month before it broke.” Backed up by numerous sources and documents, Semana exposed how members of the DAS were illegally spying on Supreme Court judges, former Colombian president César Gaviria, opposition politicians, prominent journalists and even high-ranking members of the ruling party.
Amongst a roster of Machiavellian allegations — from KGB-like tactics used to create “vice files” on prominent politicians, to the selling of sensitive intelligence to narco traffickers and those with links to illegal paramilitary organizations and the National Liberation Army (ELN) guerillas — is one charge that will be of particular interest to the United States, especially as the country contemplates the fallout from its own domestic surveillance scandal. The U.S. government, according to the Semana report, supplied the sophisticated interception devices used by the spies in Colombia.
NOT EVERYBODY IS SO AGNOSTIC
“It will be interesting to see if the rumors that are circulating in Bogotá, that the U.S. Embassy had a role in the wiretapping operation, turn out to be true,” said Joseph Fitsanakis, senior editor of IntelNews and a longtime intelligence analyst. “It won’t be the first time.”
According to sources in Bogotá, the DAS used a system called Phantom 3000, marketed by a company called TraceSpan Communications, a private U.S. company with a development center in Israel. “In this age of high security threats, when foreign terrorists and local criminals use the Internet for communication, TraceSpan is proud to provide Law Enforcement Authorities a new means to fight back,” said Hanan Herzberg, TraceSpan founder and CEO, in a press release for the product. “The system’s small footprint makes it an ideal solution for any law enforcement agency as well as the perfect solution for the Central Office.”
This wouldn’t be the first time that U.S.- supplied intelligence gear was used by the Colombian government. In 2006, the U.S. State Department awarded a $5 million contract to California-based Oakley Networks to provide “Internet surveillance software” to a specialized unit of Colombia’s National Police. The details of that deal emerged when the National Police were accused of spying on a variety of Colombian human-rights groups, as well as U.S.-based interfaith organization, Fellowship of Reconciliation. Oakley Networks, now a subsidiary of the U.S. defense contractor Raytheon Co., bills itself as a “leader in insider threat monitoring and investigations,” that offers “sophisticated monitoring and discovery technologies.”
The Oakley Networks contract came as part of the more than $5 billion the United States has sent to Colombia since 2000 to fund Plan Colombia, ostensibly an effort to eradicate production of the coca leaf. The funding has continued despite the Colombian military’s ties to right-wing paramilitary groups and to the killing of union leaders, human rights activists and indigenous people.
U.S. REMAINS A KEY FRIEND
In Bogotá, the ramifications of the Semana investigation were immediate. The offices of the DAS were raided by the Colombian prosecutor general’s office, the day following Semana’s original story, and the agency’s director general, Capt. Jorge Alberto Lagos, resigned the following week. The entire high command of the agency submitted letters of resignation and Colombia’s attorney general recently declared that 22 DAS detectives had been fired and would face “judicial and administrative investigations,” while also intimating that more dismissals are coming down the pike. Colombian President Álvaro Uribe, for years the Bush administration’s staunchest ally in Latin America, quickly denied any role in the imbroglio and declared that wiretapping would be immediately reassigned to the National Police. As this was the third such scandal in the DAS under Uribe’s watch, not everybody is taking the denial at face value.
The scandal broke just four months after the former head of the DAS resigned after admitting it spied on a prominent leftist politician who had exposed ties between Uribe and rightwing death squads.
“I don’t think it’s a very plausible argument that these were just low-level characters in the DAS, who were setting up these illegal wiretaps on their own initiative,” said Lorenzo Morales, online editor at Semana. “The DAS receives its orders directly from the [Colombian] president and his inner circle.”
The spy scandal does not appear to have dampened U.S.-Colombian relations. Semana broke the story just before Colombia sent a highlevel delegation to meet with Obama administration officials. On Feb. 25, U.S. Secretary of State Hillary Clinton welcomed Colombian Foreign Minister Jaime Bermúdez Merizalde by saying, “It’s a real pleasure to have the representative of a country that has made so many strides and so much progress, and we have a lot to talk about because there is so much we have in common to work on.” Less than two months later, at the Summit of the Americas, President Barack Obama sat next to Uribe and discussed the possibility of a U.S.-Colombian “free trade” agreement — a deal Obama opposed on the campaign trail.
In Bogotá, U.S. embassy officials have not denied playing a role in the Colombian spy operation.
“We have worked with the Administrative Department of Security (DAS) in joint and regional counter-narcotics efforts in a positive and straightforward manner, including providing equipment,” states a diplomatic official at the embassy. “We have no knowledge that any equipment has been misused.”
Semana’s Alfonso Cuéllar says he hopes the paper’s report will put an end to illegal spying.
“I think that one thing we found in our investigation, at least amongst the DAS officials, was that some of these guys don’t think there’s anything wrong with this, they think it’s normal,” he said. “They say, what’s wrong with checking out people that could be potential enemies of the state, or adversaries of the president? Hopefully, one of the things these revelations will get people thinking about is that no, this is not normal.”
Joseph Huff-Hannon is an independent journalist based in Brooklyn who writes on politics and culture.
A coalition of U.S. organizations have called on the U.S. embassy in Bogotá to pressure Colombian officials to stop spying on human rights and peace organizations.
Between 2006 and 2008, Colombian agencies reportedly intercepted more than 150 email accounts of groups including the Fellowship of Reconciliation, the oldest interfaith peace organization in the United States.
“[This] puts at risk our field team and the communities we work with, by suggesting that those working for peace and human rights are subversive, legitimate targets for right-wing violence,” said John Lindsay-Poland, co-director of the Fellowship’s Task Force on Latin America.
The spy operation began after the U.S. State Department awarded a $5 million contract to the California-based Oakley Networks to provide “internet surveillance software” to the intelligence unit of the Colombian National Police as part of Plan Colombia.
“U.S. taxpayers were apparently paying for Colombian agencies to spy on legitimate U.S. and Colombian humanitarian organizations,” wrote the authors of a December 2008 letter to U.S. Ambassador William Brownfield in Bogotá.
In addition, the Fellowship of Reconciliation fears a June 2007 break-in at the organization’s Bogotá office was connected to the surveillance campaign.
“We’ve also now learned that the Colombian military paid for computer hard drives of interest to intelligence’ agencies … These stolen laptops contained sensitive files on our work with members of Colombian peace communities,” Lindsay-Poland said.
BYJOSEPH HUFF-HANNON
MAY 14, 2009 ISSUE #135 —MIKE BURKE
Find this story at 14 May 2009
Copyright https://indypendent.org/
<< oudere artikelen nieuwere artikelen >>