• Buro Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, de overheid in Nederland en Europa kritisch volgt. Een grond-rechten kollektief dat al 30 jaar publiceert over uitbreiding van repressieve wetgeving, publiek-private samenwerking, bevoegdheden, overheids-optreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.

  • Categorieën

  • Brazil wants answers on US surveillance

    Foreign Minister Antonio Patriota is deeply concerned about the scope of a US monitoring programme targeting Brazilians.

    Whistleblower Edward Snowden revealed top secret US surveillance programmes to alert the public [Reuters]

    Brazil’s foreign minister has said his government is worried by a report that the United States has collected data on millions of telephone and email conversations in his country and promised to push for international protection of internet privacy.

    Foreign Minister Antonio Patriota on Sunday expressed “deep concern at the report that electronic and telephone communications of Brazilian citizens are being the object of espionage by organs of American intelligence.

    “The Brazilian government has asked for clarifications” through the US Embassy in Brazil and Brazil’s embassy in Washington, he said.

    Patriota also said Brazil will ask the UN for measures “to impede abuses and protect the privacy” of internet users, laying down rules for governments.

    The O Globo newspaper reported over the weekend that information released by NSA leaker Edward Snowden shows that the number of telephone and email messages logged by the US National Security Agency in January alone was not
    far behind the 2.3 million reportedly collected in the United States.

    The spokesman for the US embassy in Brazil’s capital, Dean Chaves, said earlier that any response to the O Globo report would be issued in Washington.

    There was no immediate response from the office of the US national intelligence director’s office on Sunday, but in response to earlier reports of covert monitoring in Europe, the office said it would respond to concerns of specific nations through diplomatic channels.

    However, “as a matter of policy, we have made clear that the United States gathers foreign intelligence of the type gathered by all nations,” last month’s statement said, without providing further details.

    The chairman of the US Joint Chiefs of Staff warned Sunday that Snowden’s overall disclosures have undermined US relationships with other countries and affected what he calls “the importance of trust”.

    O Globo’s article said that “Brazil, with extensive digitalised public and private networks operated by large telecommunications and internet companies, appears to stand out on maps of the US agency as a priority target for telephony and data traffic, alongside nations such as China, Russia and Pakistan.”

    The report did not describe the sort of data collected, but the US programs appear to gather what is called metadata: Logs of message times, addresses and other information rather than the content of the messages.

    The report was co-authored by US journalist Glenn Greenwald, who has been key in earlier reports on Snowden’s revelations.

    In a column Sunday for the British-based newspaper The Guardian, Greenwald said that “the NSA has, for years, systematically tapped into the Brazilian telecommunication network and indiscriminately intercepted, collected and stored the email and telephone records of millions of Brazilians.”

    He said Brazil was merely an example of a global practice.

    Last Modified: 07 Jul 2013 20:49

    Find this story at 7 July 2013

    © www.aljazeera.com

    XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’

    • XKeyscore gives ‘widest-reaching’ collection of online data
    • NSA analysts require no prior authorization for searches
    • Sweeps up emails, social media activity and browsing history
    • NSA’s XKeyscore program – read one of the presentations

    One presentation claims the XKeyscore program covers ‘nearly everything a typical user does on the internet’

    A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

    The NSA boasts in training materials that the program, called XKeyscore, is its “widest-reaching” system for developing intelligence from the internet.

    The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian’s earlier stories on bulk collection of phone records and Fisa surveillance court oversight.

    The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.

    “I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

    US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”

    But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

    XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as their metadata.

    Analysts can also use XKeyscore and other NSA systems to obtain ongoing “real-time” interception of an individual’s internet activity.

    Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a ‘US person’, though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

    One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst’s ability to query the databases at any time.

    The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a “selector” in NSA parlance) associated with the individual being targeted.

    Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.

    One document notes that this is because “strong selection [search by email address] itself gives us only a very limited capability” because “a large amount of time spent on the web is performing actions that are anonymous.”

    The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.

    Analysts are warned that searching the full database for content will yield too many results to sift through. Instead they are advised to use the metadata also stored in the databases to narrow down what to review.

    A slide entitled “plug-ins” in a December 2012 document describes the various fields of information that can be searched. It includes “every email address seen in a session by both username and domain”, “every phone number seen in a session (eg address book entries or signature block)” and user activity – “the webmail and chat activity to include username, buddylist, machine specific cookies etc”.
    Email monitoring

    In a second Guardian interview in June, Snowden elaborated on his statement about being able to read any individual’s email if he had their email address. He said the claim was based in part on the email search capabilities of XKeyscore, which Snowden says he was authorized to use while working as a Booz Allen contractor for the NSA.

    One top-secret document describes how the program “searches within bodies of emails, webpages and documents”, including the “To, From, CC, BCC lines” and the ‘Contact Us’ pages on websites”.

    To search for emails, an analyst using XKS enters the individual’s email address into a simple online search form, along with the “justification” for the search and the time period for which the emails are sought.

    The analyst then selects which of those returned emails they want to read by opening them in NSA reading software.

    The system is similar to the way in which NSA analysts generally can intercept the communications of anyone they select, including, as one NSA document put it, “communications that transit the United States and communications that terminate in the United States”.

    One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications. Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:

    Chats, browsing history and other internet activity

    Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.

    An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.

    An analyst can monitor such Facebook chats by entering the Facebook user name and a date range into a simple search screen.

    Analysts can search for internet browsing activities using a wide range of information, including search terms entered by the user or the websites viewed.

    As one slide indicates, the ability to search HTTP activity by keyword permits the analyst access to what the NSA calls “nearly everything a typical user does on the internet”.

    The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.

    The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn “call events” collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.

    William Binney, a former NSA mathematician, said last year that the agency had “assembled on the order of 20tn transactions about US citizens with other US citizens”, an estimate, he said, that “only was involving phone calls and emails”. A 2010 Washington Post article reported that “every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications.”

    The XKeyscore system is continuously collecting so much internet data that it can be stored only for short periods of time. Content remains on the system for only three to five days, while metadata is stored for 30 days. One document explains: “At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours.”

    To solve this problem, the NSA has created a multi-tiered system that allows analysts to store “interesting” content in other databases, such as one named Pinwale which can store material for up to five years.

    It is the databases of XKeyscore, one document shows, that now contain the greatest amount of communications data collected by the NSA.

    In 2012, there were at least 41 billion total records collected and stored in XKeyscore for a single 30-day period.

    Legal v technical restrictions

    While the Fisa Amendments Act of 2008 requires an individualized warrant for the targeting of US persons, NSA analysts are permitted to intercept the communications of such individuals without a warrant if they are in contact with one of the NSA’s foreign targets.

    The ACLU’s deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans’ communications without individualized warrants.

    “The government doesn’t need to ’target’ Americans in order to collect huge volumes of their communications,” said Jaffer. “The government inevitably sweeps up the communications of many Americans” when targeting foreign nationals for surveillance.

    An example is provided by one XKeyscore document showing an NSA target in Tehran communicating with people in Frankfurt, Amsterdam and New York.

    In recent years, the NSA has attempted to segregate exclusively domestic US communications in separate databases. But even NSA documents acknowledge that such efforts are imperfect, as even purely domestic communications can travel on foreign systems, and NSA tools are sometimes unable to identify the national origins of communications.

    Moreover, all communications between Americans and someone on foreign soil are included in the same databases as foreign-to-foreign communications, making them readily searchable without warrants.

    Some searches conducted by NSA analysts are periodically reviewed by their supervisors within the NSA. “It’s very rare to be questioned on our searches,” Snowden told the Guardian in June, “and even when we are, it’s usually along the lines of: ‘let’s bulk up the justification’.”

    In a letter this week to senator Ron Wyden, director of national intelligence James Clapper acknowledged that NSA analysts have exceeded even legal limits as interpreted by the NSA in domestic surveillance.

    Acknowledging what he called “a number of compliance problems”, Clapper attributed them to “human error” or “highly sophisticated technology issues” rather than “bad faith”.

    However, Wyden said on the Senate floor on Tuesday: “These violations are more serious than those stated by the intelligence community, and are troubling.”

    In a statement to the Guardian, the NSA said: “NSA’s activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests.

    “XKeyscore is used as a part of NSA’s lawful foreign signals intelligence collection system.

    “Allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKeyscore, as well as all of NSA’s analytic tools, is limited to only those personnel who require access for their assigned tasks … In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring.”

    “Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.

    “These types of programs allow us to collect the information that enables us to perform our missions successfully – to defend the nation and to protect US and allied troops abroad.”

    Glenn Greenwald
    theguardian.com, Wednesday 31 July 2013 13.56 BST

    Find this story at 31 July 2013

    © 2013 Guardian News and Media Limited or its affiliated companies

    Snooping Fears; German Firms Race to Shield Secrets

    Edward Snowden’s revelations about data surveillance have left German firms feeling acutely vulnerable to industrial espionage. In the medium-sized business sector, which contains a host of world leaders in high-tech fields, the race is on to shield vital know-how.

    Markus Stäudinger is a cautious person — especially when he’s sitting in front of his computer. He’s an IT security expert at Gustav Eirich, a southern German engineering company that makes industrial mixing equipment, and he has been encrypting his emails for years. “While I was typing I always had in the back of my mind that it could still be deciphered,” says Stäudinger, 48. He has tried to entrench that mindset in his company.

    Stäudinger has spent years trying to enhance the security of Eirich’s data and communications. He kept telling colleagues to be careful when dealing with sensitive information. He installed extra security features on notebooks and smartphones before they were taken off company premises. Some of the firm’s 750 employees probably shook their heads at all this paranoia. But now, after the NSA revelations of whistleblower Edward Snowden, they all know that Stäudinger was right. “We were always aware that the intelligence services and business work closely together in the US,” said the IT expert. “When we heard about what’s been going on, it didn’t hit us completely out of the blue.”

    Other companies were taken by surprise, though. Be it Prism, Tempora or XKeyscore, reports about mass electronic surveillance and tapped Internet hubs and trans-Atlantic data lines have alarmed German companies. Many firms are now worried that the intelligence services aren’t just trying to pinpoint terrorists but to get at German industrial secrets as well. They fear that their lead over US, British and French competitors could be at risk. And they’ve suddenly realized that they’ve got to do something to protect themselves against the organized theft of data.

    “The reports of the activities of intelligence services are a wake-up call for many companies. It sent alarm bells ringing,” said Rainer Glatz, director of product and know-how protection at the VDMA German engineering association. In the past, warnings of hacker attacks and IT espionage often fell on deaf ears. But now Germany’s small and medium-sized business sector, or Mittelstand, often described as the backbone of the German economy, has woken up to the risk. “There is growing sensitivity,” said Glatz. “In many firms, the management boards are now thinking about how they can shield themselves better.”

    Spying Causes Billions of Euros in Damage

    Action is urgently needed. At most, only one in four Mittelstand firms has an IT security strategy, said Christian Schaaf, founder of the Munich-based consultancy Corporate Trust. Many have limited themselves to a simple firewall and a few anti-virus programs. But that’s not enough to keep out professional hackers, let alone the likes of the NSA. “Many companies are starting to realize that they have to cast a safety net over their data,” said Schaaf.

    There’s plenty to spy on in the Mittelstand, with its thousands of high-tech businesses, ranging from newly developed products to production processes and process control systems, as well as customer lists and price offers in contract tenders. Germany’s domestic intelligence agency, the Office for the Protection of the Constitution, estimates that industrial espionage causes damage totalling between €30 billion and €60 billion ($40 billion to $80 billion) per year. No one knows the exact figure because companies in Germany and across Europe tend to keep quiet when they find out they have been spied on. There are a number of reasons for this: They’re afraid of copycat espionage, they don’t want to reveal to potential new attackers where their weak points are and what they’re doing to protect themselves. And they’re afraid that they may lose customers if their data leaks become public.

    Engineering company Gustav Eirich would be worth spying on. The 150-year-old, family-owned business from Hardheim in the Odenwald region of southern Germany is among the world leaders in its field. Eirich’s machines can mix chemicals and all sorts of materials faster, more thoroughly and more efficiently than those of its international competitors. This is thanks to a host of inventions and innovations that the company has had patented. “Our know-how is our big competitive advantage,” said security chief Stäudinger. And Eirich is doing all it possibly can to protect that lead.

    Possible Boost For German Data Security Firms

    The company refrains from storing information in foreign data processing centers. Video conferences, data transmission and emails — Eirich handles all that via its own cloud server. Skype is forbidden, and the use of Facebook is discouraged. All staff members are given clear instructions to avoid any unintentional releases of sensitive data. As a rule, the company encrypts all emails it sends outside the firm, if the clients go along with that, and they use German software to do the encrypting. “With US programs the intelligence agency will definitely have the general key,” said Stäudinger. “That’s why we try to use domestic products whenever we can.” In Germany, security authorities usually don’t get access to the algorhythms of firms that offer encryption.

    Germany’s comparatively strict rules on data privacy protection represent a possible competitive advantage for German suppliers of IT security. Data processing centers based in Germany have been enjoying a strong increase in demand of late, said Gatz, VDMA’s IT security expert. Providers of private clouds such as Demando, a subsdiary of the Kaiserslautern municipal utility company, offer their customers their own server cabinets and can even make exclusive glass fiber lines available to them so that they don’t have to send sensitive data through the Internet.

    However, even such lines can be tapped into, and almost every encryption code can be cracked. “You can never guarantee 100 percent security,” said Stäudinger. “We know there’s a residual risk. But we set the hurdles as high as possible.” Maybe that will make potential attackers seek easier targets: among companies with less distrustful security chiefs.

    07/23/2013 06:04 PM
    By Claus Hecking

    Find this story at 23 July 2013

    © SPIEGEL ONLINE 2013

    Ghosts of the NSA Relics of Cold War Spying Dot Germany

    The National Security Agency has long been active in Germany, though much of its spying was conducted against the Eastern Bloc during the Cold War. Today, former listening stations and other facilities dot the German landscape.

    Tracking down traces of the National Security Agency in Germany isn’t particularly difficult. One merely has to head to Berlin and look for the city’s highest point. It can be found in the southwest corner of the city — Teufeslberg, or “Devil’s Mountain.” Made of piled up rubble gathered from Berlin following World War II, the “mountain” rises 115 meters (377 feet) above the nearby waterway known as the Havel.

    In the winter, it is the place where Berliners meet to sled; in the summer it is a haven for mountain bikers and daytrippers. And hobby historians: At the very top of the hill stands the most famous NSA relict in Germany — five gigantic white radar balls. The listening station was used until the end of the Cold War, primarily to spy on the east.

    Teufelsberg used to be part of the NSA’s global espionage network called Echelon, which the US intelligence service used to keep an eye on Moscow. From 1957 to 1991, the NSA maintained a presence on Teufelsberg and eavesdropped on satellite-based telephone conversations, filtered fax reports and analyzed Internet datasets. The NSA was still doing all that in 2013, as SPIEGEL recently reported, but it no longer requires the massive radar towers.

    Desolate and in Disrepair

    Today, the artificial hill looks desolate. When the Americans withdrew, the listening station began to fall into disrepair. The covering on the radomes is torn in many places, and inside the facility weeds are growing out of the debris.

    But it’s not just weather and age that have led the buildings to deteriorate. Shortly after the turn of the century, the government of the city-state of Berlin decided that guarding the empty facility had become too expensive. It then became the target of regular break-ins and vandalism. Rotraud von der Heide, an artist and the curator of the Initiative Teufelsberg, a group seeking to preserve the facility, says, “the facility is totally destroyed because private owners weren’t able to carry out their construction plans, and now the building permits have expired. For the past year-and-a-half, two young people have been leasing it.” Originally, a conference hotel had been envisioned for the site, but those plans ultimately failed.

    Those leasing the site are now responsible for security at the facility. Using revenues generated through frequent tours, they are financing the constant repairs required for the fence surrounding property. “New holes are cut in the fence every night, and we turn trespassers over to the police,” said von der Heide. “Earlier, people had parties in the facility. There were also copper thieves who ripped wires out of the walls. That’s no longer possible now.”

    Big Plans

    The initiative has big plans for the hill. During Germany’s “Day of Open Monuments,” in September, they plan to open the former listening station to the public for three days.

    By then, von der Heide plans to completely transform the area into one giant artwork. “The hill is becoming more and more fantastic. It’s a magical art space that is constantly changing,” the artist says. That’s also a product of anonymous graffiti artists whose paintings cover the massive walls and the insides of the radomes, she says.

    A second NSA listening station in Germany, located some 200 kilometers to the west — represents the opposite extreme. Whereas the Teufelsberg radomes were difficult to ignore, the facility in Schöningen, near Braunschweig, was more hidden. Mayor Henry Bäsecke says that there was an American facility in the nearby forest consisting of “containers and large antennas. But the facility has since been torn down. “There’s nothing left here, and nature is slowly reconquering the property,” Bäsecke says.

    At Least 17 Surveillance Hubs at Cold War Peak

    Some 50 kilometers south of Munich is yet another listening post of note. Bad Aibling the southernmost facility in a chain of such espionage centers operated in Germany by US intelligence agencies. In 1989, shortly before the end of the Cold War, SPIEGEL counted 17 such surveillance hubs. But it’s a figure that may have been even higher. The network extended from the town of Schleswig near the Danish border right down to the edge of the Alps. Most of the facilities were located close to the former border between West and East Germany, as close as possible to the enemy.

    In Bad Aibling, the outsized radomes of the disused listening station also dominate the landscape. In 2004, the Americans left, but Germany’s foreign intelligence agency, the BND, continues to operate nearby. The 17,000 resident city is hard at work transforming the 134 hectare (331 acre) property for civilian use. The community has already turned a small part of the property into sporting facilities, Peter Schmid of the city administration says. Here, local teams play football in the shadows of the radomes. The rest is to be built up by a property developer, with plans for a zero-energy settlement to be constructed.

    Still, the area’s eventful history hasn’t been forgotten. Since 2009, it has hosted an annual electro- and house-music festival that attracted 17,000 fans last year to revel between the radar towers and a former aircraft hangar. The name of the two-day festival recalls the American spy network: The Echelon festival.

    07/05/2013 03:24 PM
    By Johannes Korge

    Find this story at 5 July 2013

    © SPIEGEL ONLINE 2013

    „Prism ist nur die Spitze des Eisbergs“ NSA-Mitarbeiter: BND nutzt seit den 90ern Spähsoftware

    Eine Kuppel der ehemaligen Abhörstation der NSA auf dem Teufelsberg in Berlin
    Der BND und der US-Geheimdienst NSA arbeiten offenbar bereits 20 Jahre bei der Datenspionage zusammen. Einem Medienbericht zufolge wurden entsprechende Spähprogramme schon früher geteilt. Auch Kanzlerin Merkel könnte ausspioniert worden sein.
    Die Zusammenarbeit des Bundesnachrichtendienstes BND und der amerikanischen National Security Agency (NSA) bei der Nutzung von Spähsoftware war offenbar schon in den 1990er-Jahren intensiver als bislang bekannt. In einem Gespräch mit dem Magazin „Stern“ sagte der langjährige NSA-Mitarbeiter William Binney, der BND habe neben „Xkeyscore“ noch ein weiteres NSA-Ausspähprogramm genutzt. Der Entschlüsselungsspezialist arbeitete mehr als 30 Jahre in leitender Funktion bei der NSA und war viele Jahre auch für die technische Zusammenarbeit mit dem BND zuständig.

    Laut Binney soll die Zusammenarbeit im Bereich der Spähsoftware bereits Anfang der 1990er-Jahre begonnen haben. 1999 habe der BND von der NSA den Quellcode zum damals entwickelten Spähprogramm „Thin Thread“ erhalten. „Thin Thread“ sollte die Erfassung und Analyse von Verbindungsdaten wie Telefondaten, E-Mails oder Kreditkartenrechnungen weltweit ermöglichen. „Mein Ziel war es, den Datenverkehr der ganzen Welt zu erfassen“, sagte Binney dem „Stern“. Der BND sei „bis heute einer unserer wichtigsten Partner“.

    Mindestens 50 Spähprogramm lieferten Daten
    Auf der Basis von „Thin Thread“ sei eine Vielzahl von Abhör- und Spähprogrammen entwickelt worden. Eines der wichtigsten davon soll das Dachprogramm „Stellar Wind“ sein, dem nach Angaben von Binney mindestens 50 Spähprogramme Daten zugeliefert haben – auch die durch Edward Snowden bekannt gewordene Software „Prism“ zur direkten Erfassung von Telefon- und Internetdaten bei Telekommunikationsunternehmen.

    „Stellar Wind“ sei mindestens bis 2009, möglicherweise auch bis 2011 im Einsatz gewesen. Es werde heute wahrscheinlich unter anderem Namen fortgeführt, so Binney gegenüber dem Magazin.

    Nach Schätzungen von Binney speichert die NSA mittlerweile zwischen 40 und 50 Billionen Telefonate und E-Mails aus der ganzen Welt, vor allem Verbindungsdaten, aber auch Inhalte. Das von der NSA zurzeit gebaute Datenzentrum in Bluffdale im US-Bundesstaat Utah könne aufgrund seiner Kapazitäten „mindestens 100 Jahre der globalen Kommunikation speichern“, sagte Binney dem „Stern“. „Dieser Ort sollte uns endgültig in Angst und Schrecken versetzen. Die NSA will alles. Jederzeit.“ Er fügte hinzu: „Diese Macht gefährdet unsere Demokratie.“

    Regierungskommunikation im Visier der NSA
    Neben William Binney äußerten sich im „Stern“ zwei weitere ehemalige ranghohe NSA-Mitarbeiter, die zu Whistleblowern wurden: J. Kirk Wiebe, der für die Datenanalyse zuständig war, und Thomas Drake, der zur Führungsebene des Geheimdienstes gehörte. Binney trat im Oktober 2001 aus Protest gegen die NSA-Spähprogramme unter der Regierung von George W. Bush von seinem Posten zurück.
    Die Ex-Geheimdienstler halten es für möglich, dass selbst Daten von Kanzlerin Angela Merkels Handy auf den Servern der NSA landen. „Prism ist nur die Spitze des Eisbergs“, so Drake gegenüber dem „Stern“. „Ihre Kanzlerin könnte sich einmal für das Programm „Ragtime“ interessieren. Es dient unter anderem der Abschöpfung von Regierungskommunikation durch die NSA“. Auch Binney hält das Ausspionieren von Merkels Verbindungsdaten für nicht ausgeschlossen. „Ich würde sogar sagen, dass es durchaus möglich ist“, sagte er dem Magazin.

    Mittwoch, 24.07.2013, 16:59

    Find this story at 24 July 2013

    © FOCUS Online 1996-2013

    BND nutzte bislang unbekanntes NSA-Spähprogramm

    Im stern packen drei Ex-NSA-Mitarbeiter aus: Der BND nutzte seit Anfang der 90er Jahre ein bislang unbekanntes Spähprogramm. Für die Kanzlerin könnte der Begriff “Ragtime” wichtig werden. Von Katja Gloger

    “Hallo, Merkel am Apparat.”: Womöglich landen auf den Servern der NSA auch Handydaten der Kanzlerin. Mit dem Programm “Ragtime” spioniert die NSA Kommunikation von Regierungen aus.
    © Rainer Jensen/DPA/LBN

    Die Zusammenarbeit des Bundesnachrichtendienstes BND und der amerikanischen National Security Agency (NSA) bei der Nutzung von Spähsoftware war offenbar schon in den 90er Jahren intensiver als bislang bekannt. In einem Gespräch mit dem stern sagte der langjährige NSA-Mitarbeiter William Binney, der BND habe neben “Xkeyscore” noch ein weiteres NSA-Ausspähprogramm genutzt. Der Entschlüsselungsspezialist arbeitete mehr als 30 Jahre in leitender Funktion bei der NSA und war viele Jahre auch für die technische Zusammenarbeit mit dem BND zuständig.

    BND hatte den Quellcode

    Laut Binney soll die Zusammenarbeit im Bereich der Spähsoftware bereits Anfang der 90er Jahre begonnen haben. 1999 habe der BND von der NSA den Quellcode zum damals entwickelten Spähprogramm “Thin Thread” erhalten, zu Deutsch “dünner Faden”.

    “Thin Thread” sollte die Erfassung und Analyse von Verbindungsdaten wie Telefondaten, E-Mails oder Kreditkartenrechnungen weltweit ermöglichen. “Mein Ziel war es, den Datenverkehr der ganzen Welt zu erfassen”, so Binney zum stern. Der BND sei “bis heute einer unserer wichtigsten Partner”.

    Auf der Basis von “Thin Thread” wurde eine Vielzahl von Abhör- und Spähprogrammen entwickelt. Eines der wichtigsten davon soll das Dachprogramm “Stellar Wind” (“Sternwind”) sein, dem nach Angaben von Binney mindestens 50 Spähprogramme Daten zugeliefert haben – auch die durch Edward Snowden bekannt gewordene Software “Prism” zur direkten Erfassung von Telefon- und Internetdaten bei Telekommunikationsunternehmen. “Stellar Wind” war mindestens bis 2009, möglicherweise auch bis 2011 im Einsatz. Es werde, so Binney, heute wahrscheinlich unter anderem Namen fortgeführt.
    Neues Datenzentrum kann 100 Jahre der globalen Kommunikation speichern

    Nach Schätzung von Binney speichert die NSA mittlerweile zwischen 40 und 50 Billionen Telefonate und E-Mails aus der ganzen Welt, vor allem Verbindungsdaten, aber auch Inhalte. Das von der NSA zur Zeit gebaute Datenzentrum in Bluffdale im US-Bundesstaat Utah könne aufgrund seiner Kapazitäten “mindestens 100 Jahre der globalen Kommunikation speichern”, sagte Binney dem stern. “Dieser Ort sollte uns endgültig in Angst und Schrecken versetzen. Die NSA will alles. Jederzeit.” Und fügte hinzu: “Diese Macht gefährdet unsere Demokratie.”

    Neben William Binney äußern sich im stern zwei weitere ehemalige ranghohe NSA-Mitarbeiter, die zu Whistleblowern (“Enthüllern”) wurden: J. Kirk Wiebe, der für die Datenanalyse zuständig war, und Thomas Drake, der zur Führungsebene des Geheimdienstes gehörte. Binney trat im Oktober 2001 aus Protest gegen die NSA-Spähprogramme unter der Regierung von George W. Bush von seinem Posten zurück.
    Auch Merkels Handydaten womöglich auf NSA-Servern

    Die Ex-Geheimdienstler halten es für möglich, dass selbst Daten von Kanzlerin Angela Merkels Handy auf den Servern der NSA landen. “Prism ist nur die Spitze des Eisbergs”, so Drake zum stern. “Ihre Kanzlerin könnte sich einmal für das Programm “Ragtime” interessieren. Es dient unter anderem der Abschöpfung von Regierungskommunikation durch die NSA”. Auch Binney hält das Ausspionieren von Merkels Verbindungsdaten für nicht ausgeschlossen: “Ich würde sogar sagen, dass es durchaus möglich ist.”

    24. Juli 2013, 16:51 Uhr

    Find this story at 24 July 2013

    © stern.de

    Skandale, Organisation, Geschichte NSA, Mossad und die verräterische Nackttänzerin – so spionieren die Geheimdienste

    Eine Chronik der Geheimdienstarbeit: Von Meisterspionin Mata Hari bis zur Cyber-Spionage der NSA
    Geheimdienste wie NSA, Mossad oder BND scheinen tun zu können, was sie wollen: Überwachen, ausspionieren, töten – ihre Methoden sind dabei nicht immer legal. FOCUS Online zeigt die interessantesten Geheimdienste der Welt, ihre Organisation, ihre Geschichte, ihre Skandale.
    Die Enthüllungen des ehemaligen Geheimdienstlers Edward Snowden zeigen, wie zügellos und weit verbreitet heute abgehört wird. Dabei richtet sich die Arbeit der Geheimdienste nicht nur gegen Offizielle und Politiker. Auch ganz normale Bürger werden überwacht. Die Öffentlichkeit ist besorgt, Fragen nach der Kontrolle der Behörden drängen sich auf, die Menschen fordern Konsequenzen.

    Dabei galten Geheimdienste schon immer als mysteriös und spannend. Doch die Realität ihrer Arbeit hat oft wenig mit den Meisterspionen a la James Bond oder „Mission Impossible“-Held Ethan Hunt zu tun. Die Behörden sammeln Daten, werten sie aus, informieren, desinformieren, verhandeln und tauschen. Ihr Netz haben sie über die ganze Welt ausgeworfen. Das zeigen nicht erst die Enthüllungen von Prism und Edward Snowden.

    Eines der ältesten Gewerbe der Welt
    „Spionage ist eines der ältesten Gewerbe der Welt“, erklärt der Historiker und Geheimdienstexperte Siegfried Beer im Gespräch mit FOCUS Online. Beer leitet das österreichische Center für „Intelligence, Propaganda & Security Studies“, kurz ACIPSS, in Graz. Das Wissen um den Feind sei für jeden Staat von entscheidender Bedeutung. Schon Alexander der Große, der makedonische Heeresführer, dessen Reich ungeheure Ausmaße annahm, verließ sich auf Spionage.

    Das wurde ihm beinahe zum Verhängnis, wie Wolfgang Krieger in seiner „Geschichte der Geheimdienste“ zeigt: 333 v. Christus, bei Issus „berühmter Keilerei“, wurde Alexander falsch informiert. Seine Agenten sagten ihm, der Perserkönig und sein Heer seien noch weit entfernt – Tatsache war, dass sie aneinander vorbeimarschiert waren. Und Alexander so in umgekehrter Schlachtformation kämpfen musste – doch er siegte.

    Eine Folge der Industrialisierung
    „Organisierte, moderne Spionage gibt es aber erst seit etwa 130 Jahren“, erklärt der Geheimdienst-Experte Beer vom ACIPSS. „Großbritannien nahm eine Vorreiterrolle ein.“ Die Briten begannen in den 1870er-Jahren mit dem Aufbau eines Nachrichtendienstes: aus Angst vor den unterdrückten und rebellischen Iren. Das brachte die anderen Länder unter Zugzwang: Alle europäischen Großmächte des 19. Jahrhunderts gründeten ihrerseits nach und nach Geheimdienste.

    „Die moderne Spionage ist eine Folge der Industrialisierung“, sagt Beer. Wegen der verbesserten Kommunikation, den schnellen Transportwegen und der beginnenden Globalisierung mussten die Regierungen umdenken. In den Weltkriegen und dem Kalten Krieg entwickelten sie neue Methoden, um ihre Feinde besser zu überwachen und sich entscheidende Vorteile zu sichern. Heute hat jedes Land eigene Geheimdienste. Nicht nur zur Spionage und Gegenspionage, sondern auch zur Sicherung eigener Daten. Und, vor allem nach 9/11, zur Terrorismusbekämpfung.
    Geschichten aus Hunderten Jahren Spionage
    Doch die Prism-Enthüllung ist nur eine in einer langen Reihe vergleichbarer Skandale. Seien es Spione, die überliefen, die gefährlichen Methoden des Mossad oder die Meisterspione des KGB. Seitdem es organisierte Spionage gibt, werden die verborgenen Tätigkeiten in regelmäßigen Abständen enthüllt. Und immer bieten sie genug Stoff für spektakuläre Geschichten. FOCUS Online stellt eine Auswahl der aktivsten und gefährlichsten Geheimdienste der Welt und ihre Methoden vor – und zeigt ihre brisantesten Skandale und berühmtesten Spione.
    Deutschland – BND, BfV, MAD
    Montage/Panther
    In Deutschland sammelt unter anderem der Bundesnachrichtendienst Informationen
    Organisation der deutschen Nachrichtendienste

    Drei Nachrichtendienste teilen sich in Deutschland den Schutz der Bürger: Das Bundesamt für Verfassungsschutz (BfV) beobachtet das Inland, der Bundesnachrichtendienst das Ausland (BND), der militärische Abschirmdienst (MAD) kümmert sich um den Schutz der Armee. Die drei Behörden arbeiten großteils getrennt.

    Geschichte des BND

    Die Alliierten gaben 1949 die Struktur des Geheimdienstes in der Bundesrepublik vor. Dabei zogen sie vor allem die Lehren aus dem System des NS-Regiems: Die Geheime Staatspolizei, kurz Gestapo, hatte dort die Möglichkeit, eigenmächtig Verhaftungen durchzuführen. Das darf der Verfassungsschutz in Deutschland nicht. Die Nachrichtendienste haben generell keine polizeilichen Befugnisse.

    Der BND ist als deutscher Auslandsgeheimdienst dem Kanzleramt unterstellt und wurde 1956 gegründet. Zu den Aufgabenbereichen gehört die Beobachtung mutmaßlicher Terroristen, der organisierten Kriminalität, illegaler Finanzströme, des Rauschgifthandels, der Weitergabe von ABC-Waffen und Rüstungsgütern sowie von Krisenregionen wie Afghanistan oder Pakistan. Dazu wertet der BND Informationen von menschlichen Quellen, elektronische Kommunikation sowie Satelliten- und Luftbilder aus. Er zählt etwa 6000 Mitarbeiter – vom Fahrer bis zum Nuklearphysiker. Wie viel Geld der BND für Spionage ausgeben darf, hält die Behörde streng geheim.

    1950 wurde in der Deutschen Demokratischen Republik wohl einer der bekanntesten Geheimdienste der Welt gegründet: Das Ministerium für Staatssicherheit, kurz Stasi. Angegliedert an die Stasi war der Auslandsgeheimdienst Hauptverwaltung Aufklärung, die sich vor allem mit dem westlichen Bruder beschäftigte. Die Stasi mauserte sich zu einem entscheidenden Machtinstrument der sozialistischen Regierung. Sie unterdrückte Andersdenkende, warb sogenannte Spitzel an, inhaftierte Dissidenten – die Bevölkerung hatte Angst vor der Behörde. Das lag daran, dass die Behörde polizeiliche Befugnisse hatte. Bis heute läuft die Aufarbeitung über das Ausmaß der Stasi-Überwachung.

    Spektakuläres über den BND

    Deutsche Spione à la James Bond? Falsch. Beim BND sind Fremdsprachenexperten, Informatiker, Juristen, Biologen, Ingenieure und Islamwissenschaftler gefragt, keine Superagenten. Sie werden innerhalb von zwei bis drei Jahren zum Agenten ausgebildet – und dann als Tarifbeschäftigte, Soldaten und Beamten angestellt.

    2006 erschütterte ein Bericht über die Arbeit des BND die Bundesrepublik: Im großen Stil hörte der Dienst Journalisten ab. Gerade in den Achtzigern war der Bedarf an Informationen besonders hoch, namhafte Autoren bei Zeitungen wie Stern, Spiegel oder FOCUS standen unter Beobachtung.
    Welche Rolle spielte der BND im Irak-Krieg 2003? Hartnäckig halten sich Gerüchte, dass der Dienst einen Informanten hatte, der behauptete, dass der Irak Massenvernichtungswaffen und Biolabore besessen haben soll. Weiterhin haben Agenten des BND, so zeigt Alexandra Sgro in ihrem Buch „Geheimdienste der Welt“, angeblich strategische Informationen über irakische Verteidigungsstellungen und Truppenbewegungen an die USA weitergegeben. Die Bundesregierung hatte offiziell verlauten lassen, dass sich Deutschland aus dem Irak-Krieg heraushält – lässt sich dieser Status nach den Enthüllungen noch halten?
    Türkei – MIT
    Colourbox/Montage
    Die Türkei hat nur einen Nachrichtendienst: den „Millî Istihbarat Teşkilâti“
    Organisation türkischen Geheimdienstes

    Der Millî Istihbarat Teşkilâti (MIT) ist der einzige Nachrichtendienst der Türkei. Er ist für innere Sicherheit und Spionageabwehr zuständig. Außerdem hat er die Pflicht, für den Schutz der Landesgrenzen zu sorgen. Der Geheimdienst untersteht direkt dem Premierminister und ist dafür verantwortlich, bedrohliche Gruppierungen im In- und Ausland zu beobachten. Dabei gibt es häufig gewaltsame Konflikte mit Anhängern der verbotenen Arbeiterpartei Kurdistans PKK. Denn diese kämpfen für die Autonomie der kurdischen Gebiete der Türkei.

    Geschichte des MIT

    Schon vor der Gründung der Türkei gab es Geheimdienste. 1913 wurde Teşkilât-I Mahsusa als erster zentralisierter und organisierter türkischer Nachrichtendienst gegründet. Er sollte die Aktivitäten von Separatisten eindämmen. Während des Ersten Weltkrieges erlebte die Behörde ihre Blütezeit und war militärisch und paramilitärisch aktiv. Das Ende des Krieges bedeutete auch das Ende des Geheimdienstes.

    Sein Nachfolger war Karakol Cemiyeti, der Zivilpersonen und kleine Gruppierungen ab 1919 im türkischen Unabhängigkeitskrieg mit Waffen ausstattete. So gelang es, die Besatzungsmächte zu besiegen. Als die Briten im Jahr 1920 Istanbul besetzten, lösten sie auch den Nachrichtendienst auf. Danach gab es viele verschiedene Geheimdienste, die nie lange Bestand hatten. Bis 1965 der Millî Istihbarat Teşkilâti gegründet wurde.

    Spektakuläres über den MIT

    Wie Sgro in ihrem Buch „Geheimdienste der Welt“ schreibt, werden beim türkischen Geheimdienst nur schriftliche Bewerbungen angenommen, die per Post eingesendet werden – eine Vorbereitung auf die Spionagetätigkeit? Die frisch gebackenen Agenten bekommen ihren Arbeitsort dann per Losverfahren zugeteilt.

    In den Neunzigern machten Berichte die Runde, der türkische Geheimdienst würde militante Separatisten bekämpfen. Allerdings nicht nur im eigenen Land, sondern auch in Deutschland. Dabei schüchterten die Agenten angeblich Oppositionelle ein, bedrohten Asylbewerber und kündigten Repressalien gegen die in der Türkei lebenden Verwandten an.
    Ein anderes Ziel hatte laut Spekulationen sogenannter Experten der türkische Geheimdienst Mitte der 2000er-Jahre: Zu diesem Zeitpunkt war gerade die sogenannte Sauerland-Gruppe verhaftet worden. Sie plante offenbar einen Bombenanschlag in Deutschland, unterstützt von dem Türken Mevlüt K. – laut Medienberichten ein Informant des türkischen Geheimdienstes. Fakt ist: Er ist untergetaucht und wird per internationalem Haftbefehl gesucht.
    Frankreich – DGSE
    Motage/Panther
    Frankreichs Geheimdienst DGSE
    Organisation des französischen Geheimdienstes

    Der französische Geheimdienst nennt sich „Direction Générale de la Sécurité Extérieure“, kurz DGSE. Spezialoperationen des DGSE müssen von oberster Stelle genehmigt werden: Seit 2009 darf sie nur der französische Präsident bewilligen. Wer eingestellt wird, entscheidet das Verteidigungsministerium. Schwerpunkt des Geheimdienstes mit Sitz in Paris: Terrorismusbekämpfung. Außerdem haben die Geheimdienstler ein Auge auf Länder, in denen Massenvernichtungswaffen hergestellt und vertrieben werden.

    Geschichte des DGSE

    Die Geschichte des DGSE beginnt mit Charles de Gaulle. Der spätere Ministerpräsident Frankreichs ließ 1940 aus dem Exil einen Geheimdienst zusammenstellen. Er sollte für die Widerstandsbewegung „France Libre“ gegen das NS-Regime spionieren. Nach dem Krieg wurde ein neuer Geheimdienst gegründet, der Service de Documentation Extérieure et de Contre-Espionnage (SDECE). Seine Aufgaben: ausländische Berichterstattung und Gegenspionage. 1982 löste ihn der DGSE ab.

    Die Schwerpunkte des DGSE sind stark von Frankreichs Geschichte als Kolonialmacht geprägt. Denn zu seinen ehemaligen Kolonien pflegt Frankreich auch heute noch wirtschaftliche Beziehungen. Die Regierungen sollten also stabil bleiben. Wo Frankreich Fundamentalismus fürchtete, griff der Geheimdienst ein. So wie Ende der 1980er-Jahre in Algerien. Angeblich ermordete der DGSE 1992 den algerischen Präsidenten Muhammad Boudiaf. Und auch in Syrien könnte sich die Behörde 2012 eingemischt haben, Sgro. Agenten sollen dem syrischen General Manaf Tlass bei der Flucht geholfen haben. Der stand einst Machthaber Assad nahe.

    Spektakuläres über den DGSE

    Die wohl legendärste Doppelspionin überhaupt war für die Franzosen im Einsatz: Mata Hari. Die Nackttänzerin ließ sich zur Zeit des Ersten Weltkriegs von den Deutschen dafür bezahlen, französischen Militärs Geheimnisse zu entlocken. Gleichzeitig spionierte sie für die Franzosen in den von den Deutschen besetzten Gebieten. Die schöne Niederländerin wurde schließlich von den Franzosen zum Tode verurteilt, weil sie auch an Deutschland Geheimnisse verraten haben soll. Was genau sie wem erzählt hat, ist bis heute nicht bekannt. Erst 2017 wird der französische Staat die Akten freigegeben.

    In den 1980er-Jahren kämpfte der französische Geheimdienst gegen Greenpeace. Die französische Regierung testete zu dieser Zeit im Mururoa-Atoll im Pazifik Atomwaffen. Greenpeace-Aktivisten wollten dagegen protestieren. Agenten des DGSE gelang es, auf dem Greenpeace-Schiff Sprengsätze anzubringen. Bei der Explosion starb ein Mensch. Bewilligt wurde die Aktion angeblich vom damaligen Präsidenten François Mitterand. Der Verteidigungsminister rechtfertigte das Vorgehen: Anders hätte man den Protest nicht verhindern können.
    Großes Aufsehen erregte auch der Vorgänger des DGSE, der SDECE: 1965 verschwand Ben Barka, ein Marokkaner im französischen Exil – bis heute ist nicht geklärt, wer ihn entführt hat. Im Verdacht stehen französische Agenten. Sie hätten damit dem marokkanischen König geholfen und zugleich den Einfluss Frankreichs auf Marokko gesichtert. Bakra war in Marokko wegen Hochverrats verurteilt worden, weil er den König scharf kritisiert hatte. Er soll vom marokkanischen Innenminister getötet worden sein.
    Brasilien – Abin
    dpa/Montage
    Brasiliens Nachrichtendienst heißt „Agência Brasiliera de Inteligência“
    Organisation des brasilianischen Geheimdienstes

    Der brasilianische Geheimdienst heißt Agência Brasileira de Inteligência (Abin) und ist dem Präsidenten unterstellt. Die Aufgaben umfassen Spionage- und Terror-Abwehr, Informationsbeschaffung und Schutz der Bürger.

    Geschichte der Albin

    Schon 1927 wurde die militärische Behörde Conselho de Defesa Nacional gegründet, die sich zunächst mit geheimdienstlichen Aufgaben beschäftigte. Nachdem die Folgeorganisation die Arbeit in den Wirren des Militärputsches von 1964 schon wieder einstellte und durch einen regimehörigen Dienst ersetzt wurde, bestand die Behörde bis 1990. Die Abin wurde 1999 gegründet und übernimmt seitdem die Aufgabe des In- und Auslands-Geheimdienstes – im Gegensatz zu seinem Vorgänger als zivile Behörde.

    Spektakuläres über die Albin

    Nachwuchsarbeit bei Zehn bis 15-Jährigen? Warum nicht, muss sich die Abin gedacht haben. 2005, so beschreibt es Sgro in ihrem Buch, habe eine Informationsveranstaltung stattgefunden, bei der Jugendlichen die Arbeit von Agenten nahegebracht wurde. Dieses Programm soll weitergeführt werden und sich in Zukunft verstärkt an Schüler und Studenten richten.

    Es muss eine skurrile Situation gewesen sein: 1983 entdeckte ein Maler im Büro des damaligen Präsidenten eine Wanze mit aktivem Sender. Brasilianische Zeitungen machten schnell den Schuldigen aus: den Geheimdienst. Der habe sich derartige Abhör-Vergehen schon öfters zuschulden kommen lassen, so die Argumentation. Die wahren Hintergründe bleiben unbekannt.
    Im Juli diesen Jahres kam im Zuge des weltweiten Abhörskandals heraus, dass auch Brasilien im Fadenkreuz der NSA stand: Millionen Emails und Telefonate seien abgehört worden. Nach Informationen der Zeitung „O Blobo“ ist Brasilien das am meiste ausgespähte Land Lateinamerikas.
    Syrien – Abteilung für militärische Aufklärung
    AFP
    Syriens Geheimdienst ist in der Hand des Machthabers Baschar al-Assad
    Organisation des syrischen Geheimdienstes

    Etwas unübersichtlich stellt sich die Situation in Syrien dar: Fünf Behörden teilen die Geheimdienst-Aufgaben unter sich auf. Es gibt einen allgemeinen zivilen Nachrichtendienst, einen Nachrichtendienst der Luftwaffe, das Direktorat für Staatssicherheit sowie das Direktorat für politische Sicherheit im Innenministerium – in den Zeiten des Umbruchs ist aber vor allem eine Behörde wichtig: die Abteilung für Aufklärung. Sie unterstützt die militärischen Truppen und soll Dissidentengruppen zerschlagen – und soll dabei an illegalen Aktionen beteiligt gewesen sein.

    Geschichte der Abteilung für Militärische Aufklärung

    Die Gründung der Abteilung für Militärische Aufklärung datiert auf das Jahr 1969. In der westlichen Welt wurde der Geheimdienst allerdings erst in den 2000er-Jahren bekannt. Im Kampf gegen die Auswirkungen des arabischen Frühlings in Syrien koordinierte die Abteilung ab 2010 die Niederschlagung von Demonstrationen und die Diskreditierung der Rebellen.

    Doch auch in westliche Staaten entsendete der Geheimdienst seine Agenten: So soll ein Deutsch-Libanese über mehrere Jahre hinweg Informationen über syrische Oppositionelle in der Bundesrepublik gesammelt und an den syrischen Geheimdienst weitergegeben haben. Und auch der BND hat offenbar gute Kontakte nach Syrien: Die Tagesschau berichtete im Mai, dass der BND-Präsident an einem Treffen mit syrischen Geheimdienstlern teilgenommen haben soll.

    Spektakuläres über die Abteilung für Militärische Aufklärung

    Wenig ist über die Arbeit des syrischen Geheimdienstes bekannt. Doch ein Name steht wohl in direktem Zusammenhang mit einer Aktion syrischer Agenten im Jahr 2011: Oberstleutnant Hussein Harmusch. Er rief in einem Internetvideo dazu auf, sich gegen die syrische Regierung zu stellen und setzte sich in die Türkei ab. Kurze Zeit später verschwand er spurlos. Was war passiert? Sgro schildert die Geschichte folgendermaßen: Am Tag seines Verschwindens traf sich Harmusch mit einem türkischen Agenten, der ihn mit dem Auto abholte, aber nach Eigenaussage wenige Minuten später wieder absetzte.

    Mehr als zwei Wochen nach dieser Episode strahlte das syrische Staatsfernsehen ein Video aus, in dem Harmusch seinen Aufruf zum Widerstand widerrief. Experten erkennen einen tiefverängstigten Mann, sie gehen davon aus, dass er gezwungen wurde. Harmusch verschwindet daraufhin von der Bildfläche, bis heute weiß niemand, wo er ist. Nur die türkische Regierung äußerte sich noch einmal zu dem Fall: Sie ließ verlauten, dass der angebliche türkische Agent tatsächlich aus Syrien stammte.

    Mit welcher Grausamkeit der syrische Geheimdienst beispielsweise gegen Dissidenten vorgeht, zeigen Berichte aus dem Jahr 2012: Menschenrechtsorganisationen sprechen bei den Geheimdienstzentren in Damaskus von der „Hölle auf Erden“. „Human Rights Watch“ erfasste zahlreiche Fälle, in denen Familien ihre vermissten Angehörigen nur noch tot finden konnten: Mit Brandflecken und Blutergüssen übersät. Überlebende berichten von Methoden, die man aus dem europäischen Mittelalter kennt: Sie wurden an den Händen aufgehangen, dann wurden sie geschlagen und geschnitten. Oder sie wurden auf Kreuz-ähnliche Holzbretter geschnallt und von Häschern auf die Fußsohlen geschlagen. Andere berichten von Stromschocks im Genitalbereich und weiteren Foltermethoden.
    Die Beobachtergruppe „Violations Documentation Center“ spricht von über 25 000 Syrern, die seit 2011 verhaftet worden sind. Weniger als ein Fünftel sei bislang freigelassen worden. Experten gehen allerdings von weiter höheren Zahlen aus: Sie sprechen von Hunderttausenden Inhaftierten.
    Russland – KGB, FSB, SWR, GRU
    Colourbox/Montage
    Der FSB ist nur einer von Russlands Geheimdiensten
    Organisation des russischen Geheimdienstes

    Russland verlässt sich seit dem Zerfall der Sowjetunion auf diese Geheimdienst-Behörden: Den Inlandsgeheimdienst FSB, den Auslandsnachrichtendienst SWR, den Schutzdienst FSO und den Militärnachrichtendienst GRU. Die Aufgaben des SWR umfassen dabei Gegenspionage und Fernaufklärung, der Dienst umfasst rund 13 000 Mitarbeiter. Spannend ist aber vor allem der Inlandsgeheimdienst FSB, da er als Nachfolger des berüchtigten KGB gilt.

    Geschichte des russischen Geheimdienstes

    Die Wirren um die Abdankung des Zaren Nikolaus II. in der Februarrevolution 1917 forderten ein ganzes Land heraus: Eine provisorische Regierung wurde gebildet, die Oktoberrevolution brach aus, schon bald übernahmen kommunistische Bolschewiken die Macht. Der starke Mann Lenin regte die Gründung eines neuen Geheimdienstes an, um die Konterrevolution und Klassenfeinde zu bekämpfen.

    Nach einigen Umstrukturierungen und dem Zweiten Weltkrieg entstand 1954 der KGB als eigenständiges Ministerium. Erst 1991, mit dem Ende der Sowjetunion, hörte er auf zu existieren – wobei der Geheimdienst in Weißrussland noch immer KGB heißt. Der sowjetische KGB arbeitete dabei sowohl nach innen als auch nach außen, dazu gehörten Gegenspionage, Auslandsspionage, Bekämpfung von Regimegegnern, Sicherung der Parteimitglieder. SWR und FSB wurden in den 1990-Jahren gegründet und teilen sich wiederum in eigene Büros und Organe auf.

    Spektakuläres über den russischen Geheimdienst

    Normalerweise sind es Geschichtsbegeisterte, die Geheimdiensten Verschwörungstheorien andichten. In den 80er-Jahren, so schreibt Sgro in ihrem Buch, war es allerdings der KGB selbst, der für Furore sorgte: Tüchtige Sowjet-Agenten setzten das Gerücht in Umlauf, dass die US-Amerikaner den HI-Virus hergestellt und aus Versehen freigesetzt hätten. Der Plan: die USA damit zu diskreditieren. Selbst die deutsche Zeitung „taz“ griff die These auf. 1987 entschuldigte sich der Staatschef Gorbatschow bei US-Diplomaten, die Zeitung brauchte 20 Jahre länger und entschuldigte sich 2010.

    Unabhängig davon unterstanden dem KGB einige der berühmtesten Spione des 20. Jahrhunderts: Beispielsweise sorgte der Journalist Richard Sorge dafür, dass sich die Sowjets auf die deutschen und japanischen Angriffspläne einstellen konnten – weil der überzeugte Kommunist Dokumente weitergab. Aldrich Ames dagegen arbeitete eigentlich beim CIA, dort leitete der die Abteilung „Gegenspionage UDSSR“. Was niemand wusste: Ames spionierte für Russland. Er bekam Geld, die Sowjets die Namen von US-Spitzeln. Und dann wären da noch das Spionage-Ehepaar Rosenberg, der Doppel-Agent Heinz Felfe, der Atomwaffen-Physiker Klaus Fuchs und und und.

    Wie im Kalten Krieg: Erst im Juli stand ein russisches Agenten-Ehepaar vor dem Gericht in Stuttgart. Das Ehepaar firmierte unter den Decknamen Andreas und Heidrun Anschlag. Auch wenn die beiden nicht als klassische Spione gearbeitet haben sollen, hatten sie wohl als eine Art Briefkasten gedient. Das Paar wurde 2011 von Beamten des BKA und der GSG9 aufgespürt und festgenommen, nachdem sie 20 Jahre lang unentdeckt geblieben waren. Derzeit verhandeln russische und deutsche Behörden über einen Austausch der beiden Russen gegen einen deutschen Agenten.
    Dass auch der moderne russische Geheimdienst an traditionellen Methoden festhält, zeigt eine Meldung der russischen Zeitung „Iswestija“. Zum Schutz streng geheimer Informationen schreiben russische Geheimdienste auf Schreibmaschinen, nicht digital, auch handschriftliche Aufzeichnungen seien üblich. Besonders beliebt: das deutsche Modell Triumph-Adler Twen 180. Dabei hat jede Schreibmaschine eine eigene Signatur, so dass jedes Dokument der Maschine zugeordnet werden kann, auf der es geschrieben wurde.
    Neuseeland – GCSB
    Colourbox/Montage
    „Government Communications Security Bureau“ heißt der Geheimdienst Neuseelands
    Organisation des neuseeländischen Geheimdienstes

    Neuseeland hat zwei Geheimdienstbehörden: Den Security Intelligence Service und das nachgeordnete Government Communications Security Bureau (GCSB). Das GCSB kümmert sich um die nationale Sicherheit, überwacht ausländische Datenströme, stellt Sicherheitssysteme für die Regierung zusammen – Einheimische und Zugezogene mit ständigem Wohnsitz dürfen dabei nicht überwacht werden. Die Behörde ist dem Premierminister unterstellt.

    Geschichte des GCSB

    Im Jahr 1977 wünschte sich der neuseeländische Premierminister einen Geheimdienst – vergleichsweise spät im Vergleich zu anderen Staaten. Schnell wurden Anlagen für die Überwachung in Waihopai und in Tangimoana gebaut. Bis dahin arbeiteten Angestellte des Auslands- und Verteidigungsministeriums an der Nachrichtenbeschaffung. Um besser reagieren zu können, baute die Regierung das GCSB auf.

    Vor den Augen der Öffentlichkeit im Verteidigungsministerium versteckt, wurde die Behörde in den Anfang der 80er-Jahren zunächst nur der Politik vorgestellt. 1984 erfuhr die neuseeländische Öffentlichkeit von der Existenz des Geheimdienstes.Bis das GCSB aber eine eigene Behörde wurde, sollten noch mehrere Jahrzehnte vergehen: 2003, durch einen Erlass, wurde das GCSB als öffentliche Dienstleistungsabteilung eingerichtet.

    Spektakuläres über das GCSB

    Ausgerechnet ein Deutscher mit doppelter Staatsbürgerschaft – er hat auch einen finnischen Pass – wurde zum Politikum in Neuseeland: Kim Schmitz, auch bekannt als Kim Dotcom, geriet aufgrund zwielichtiger Online-Geschäfte in das Fadenkreuz des GCSB. Schmitz wurde im Januar 2012 aufgrund des Verdachts auf Urheberrechtsverletzungen sowie Geldwäsche verhaftet, doch bereits zuvor hörten neuseeländische Agenten Mr Dotcom ab – ohne Einverständnis der Regierung, allerdings im Auftrag der Polizei.
    Die Auswertung von Emails und Telefonaten, so zeichnet Sgro in ihrem Buch „Geheimdienste der Welt“ nach, brachte die Behörde auf die Spur der meisten Mitangeklagten. Das Problem: langjährige Bewohner Neuseelands dürfen nicht bespitzelt werden. Das Ergebnis: Die gesammelten Daten waren illegal erworben, der Premierminister entschuldigte sich bei Schmitz und dem neuseeländischen Volk.
    Österreich – HNA, HAA, BVT
    Motage/Panther
    Einer der österreichischen Geheimdienste, das Abwehramt
    Organisation des österreichischen Geheimdienstes

    In Österreich gibt es drei Geheimdienste: Der Auslandsnachrichtendienst ist das Heeresnachrichtenamt (HNaA oder HNA). Sein Gegenstück ist das Heeres-Abwehramt (HAA oder HabwA) als militärischer Inlandsnachrichtendienst. Beide unterstehen dem Bundesministerium für Landesverteidigung und Sport. Das Bundesamt für Verfassungsschutz und Terrorismusbekämpfung (BVT) ist die dritte Behörde.

    Geschichte der österreichischen Geheimdienste

    Militärische Nachrichtendienste gibt es in Österreich seit den Napoleonischen Kriegen. Napoleon veränderte damals mit seiner „Grande Armée“ die Kriegsführung, die Truppen waren beweglicher und agierten schneller. Die österreichische Monarchie musste darauf reagieren und begann, ein strukturiertes „militärisches Nachrichtenwesen“ aufzubauen. 1850 wurde der erste offizielle Nachrichtendienst in der österreichischen Monarchie eingerichtet: das Evidenzbüro. Ende des 19. Jahrhunderts überwachten dann die ersten „Geheimen Polizeiagenten“ hauptsächlich die öffentliche Sittlichkeit.

    Diese Struktur änderte sich bis zum Anschluss Österreichs an das Deutsche Reich im Jahr 1938 kaum. Danach spionierte die Gestapo im Inland, der Sicherheitsdienst war für das Ausland zuständig und die Abwehr für militärische Spionage. Sie galten auch in Österreich als mächtiges Instrument der Nationalsozialisten. Eine der ersten Amtshandlungen nach dem Zweiten Weltkrieg war die Gründung einer österreichischen Staatspolizei. Erst 1955 gründete das Bundesheer einen militärischen Geheimdienst.

    1972 wurde dieser in das heutige Heeres-Nachrichtenamt (HNaA) umgebaut. Zunächst beschäftigte sich dieses sowohl mit Auslandsaufklärung als auch mit Abwehr. 1985 wurde vom HNaA das Abwehramt abgespalten, weil das Heeresnachrichtenamt zu mächtig geworden war. Heute ist das Heeresnachrichtenamt vor allem im Einsatz gegen Terrorismus, Organisierte Kriminalität und irreguläre Migration.

    Spektakuläres über die österreichischen Geheimdienste

    Im Parlament ist ein ständiger Unterausschuss des Landesverteidigungsausschuss für die Kontrolle des Heeresnachrichtenamtes zuständig, die Parlamentarier sind aber auf strenge Verschwiegenheit vereidigt. Das HNaA soll eng mit US-amerikanischen Geheimdiensten zusammenarbeiten und vor allem in der Zeit des Kalten Krieges wichtige Informationen über Vorgänge in den Balkanstaaten an die USA weitergegeben haben. 1968 waren es österreichische Agenten des Heeresnachrichtenamtes, die als erste über den Einmarsch der Truppen des Warschauer Pakts in die Tschechoslowakei Bescheid wussten.
    Das Stillschweigen rund um die Arbeit des Heeresnachrichtenamtes verlieh dem Nachrichtendienst zwischenzeitlich große Macht. Das ging so weit, dass sogar Verteidigungsminister ausspioniert worden sein sollen. Als Verteidigungsminister Friedhelm Frischenschlager das zufällig erfuhr, soll er so erbost gewesen sein, dass er im Jahr 1985 das Heeresnachrichtenamt reformieren und das Heeres-Abwehramt davon abspalten ließ. Die beiden Nachrichtendienste sind bis heute politisch verfeindet: Das HNaA wird der Österreichischen Volkspartei zugeordnet, das HAA den österreichischen Sozialdemokraten. Diese sollen sich seit ihrem Bestehen immer wieder gegenseitig ausspionieren.
    USA – CIA, FBI, NSA, DEA
    Montage/Colourbox
    Zwei der US-Geheimdienste: FBI und CIA
    Organisation des US-amerikanischen Geheimdienstes

    Über keinen Geheimdienst gibt es derart viele Informationen wie über den US-amerikanischen. Der Auslandsgeheimdienst CIA, die inländische Spionageabwehr FBI, die weltweit operierende NSA, die amerikanische Bundespolizei, die Drogenbehörde DEA und elf weitere Dienste bilden die sogenannte United States Intelligence Community (IC). Insgesamt sollen dort etwa 200 000 Menschen arbeiten mit einem Gesamtbudget von 30 Milliarden Euro.

    Geschichte des CIA und der NSA

    Mit Gründung des Amts der Marineaufklärung begann 1882 die offizielle geheimdienstliche Aufklärung der USA. Doch schon unter George Washington hatten Agenten in geheimen Operationen, Aufklärung und Spionage gearbeitet. Die bekannteste Einrichtung, die Central Intelligence Agency, wurde 1947 ins Leben gerufen. Sie ist die Folgeorganisation des Office of Strategic Services, das im Laufe des Zweiten Weltkriegs aufgebaut wurde. Das Ziel: Die Sammlung strategisch wertvoller Informationen, aber auch Sabotage und Spionageabwehr. Mit dem National Security Act übernahm die Behörde Aufgaben, die FBI-Chef J. Edgar Hoover zunächst für seine Agenten vorgesehen hatte. ACIPSS-Experte Siegfried Beer erklärt, dass die USA zwar sehr spät mit der Errichtung eines Auslandsgeheimdienstes begonnen haben, dieser heute aber zu den effizientesten weltweit gehört.

    Doch eine andere Behörde macht derzeit Schlagzeilen: Die National Security Agency (NSA). Ihr Aufgabengebiet ist die weltweite, nachrichtliche Aufklärung. Die Wurzeln der Behörde reichen bis in die 40er-Jahre zurück, die offizielle Gründung datiert auf das Jahr 1952. Seitdem hält die NSA mit den technologischen Entwicklungen von Satellit bis Internet Schritt. In den Mittelpunkt einer weltweiten Diskussion über Datenschutz rückte die NSA, weil der Geheimdienstler Edward Snowden brisante Informationen über die weltweite Überwachung und die Kenntnisnahme europäischer Politiker von den Abhör-Programmen der Behörde veröffentlichte.

    Spektakuläres über die CIA

    „Bis in die frühen Siebziger hinein hatte die CIA weitgehend freie Hand“, sagt Beer. Und das nutzte die Agency voll aus: Waren CIA-Agenten am Attentat an John F. Kennedy beteiligt? Welche Rolle spielte die CIA bei den Anschlägen von 2001? Verdient die Behörde an weltweiten Drogen- und Geldwäschegeschäften? Für Verschwörungstheoretiker ist der US-Geheimdienst eine wahre Pandora-Kiste hanebüchener Geschichten. Dabei gibt es zahlreiche verbriefte Operationen: 1961 war die CIA beispielsweise an der Invasion in der Schweinebucht beteiligt, bei der Exilkubaner auf Kuba landen und die Regierung Castros stürzen wollten – und scheiterte spektakulär.
    Viele weitere Operationen mit dem Ziel, Machthaber zu stürzen, wurden von der CIA angeleiert. In Afghanistan warben CIA-Agenten ab 1979 bis zu 100 000 Einheimische an, trainierten sie, unterstützten sie mit Waffen und Geld und schickten sie in den Kampf gegen sowjetische Truppen. Wohl einer der Hauptgründe für die gegenwärtige Stärke der Taliban in dem befreiten Land. Nicht immer nutzt die Agency bei ihren Operationen legale Mittel, Menschenrechtsorganisationen werfen der Behörde Verletzung internationalen Rechts und Folter vor.
    Großbritannien – MI5, MI6
    Motage/Panther
    Großbritanniens MI5 und MI6
    Organisation des englischen Geheimdienstes

    Neun Behörden kümmern sich in Großbritannien um die Geheimdienstarbeit, organisiert im Secret Service Bureau. Am bekanntesten sind sicherlich der Security Service und der Secret Intelligence Service, kurz: MI5 und SIS oder MI6. Während sich der Blick des MI5 in das eigene Land richtet, kümmert sich der MI6 um das Ausland. Hinlänglich bekannt wurde der MI6 durch die Arbeit des wohl berühmtesten Spions James Bond, auch wenn dieser natürlich nur ein Roman- und Filmheld und kein echter Agent ist.

    Geschichte des MI6

    Ursprünglich war der MI6 für die Marine zuständig, als er 1909 gegründet wurde. Zunehmend spezialisierte sich der Dienst aber auf das Ausland, im Ersten Weltkrieg sammelten Agenten Informationen über das Deutsche Reich und kämpften gegen den Kommunismus in Russland. Nach der Machtübernahme durch die Nationalsozialisten arbeitete der SIS unter anderem an der Entschlüsselung der Geheim-Codes der Nazis.

    Im Kalten Krieg versuchte sich die Behörde in der Anwerbung sowjetischer Offizieller oder an Staatsstreichen, über die Erfolgsrate schweigt sie sich bis heute aus. Seit 1994 sind die Zuständigkeiten im Intelligence Services Act geregelt. Auch die Überwachung von Telefonaten und Internetaktivitäten Verdächtiger gehört zur Aufgabe der Behörde. Könnten Sie ein MI6-Agent sein?

    Spektakuläres über den MI6

    Eine der bekanntesten und schillerndsten Personen in der Geschichte der Geheimdienste ist Thomas Edward Lawrence, auch bekannt als Lawrence von Arabien. Der studierte Archäologe begab sich 1914 offiziell zur Kartographierung in den Nahen Osten, unter der Hand ging es um militärisches Auskundschaften. Aufgrund seiner Erfolge und Fähigkeiten wurde er schnell vom britischen Geheimdienst angeworben – und integrierte sich derart gut in die einheimischen Beduinenvölker, dass er sie zum Aufstand gegen die Fremdherrschaft durch die Türken führte. Ganz im Sinne seines Heimatlandes. Noch zu Lebzeiten wurde Lawrence zum Mythos – und zu einem beliebten Gesprächsgegenstand der englischen Aristokratie.
    Eine spektakuläre Mordtheorie geistert seit dem 3. August 1997 durch Großbritannien: Wurde Prinzessin Diana, die Ex-Frau des britischen Thronfolgers Prinz Charles, vom MI6 beseitigt? Sgro schreibt dazu, dass das britische Königshaus Angst vor einem muslimischen Schwiegervater des zukünftigen Königs gehabt hatte und Lady Di zu allem Überfluss auch noch schwanger gewesen sein soll. Diana war seit kurzem mit Dodi Al-Fayed zusammen, dem Sohn des Harrod-Geschäftsführers Mohamed Al-Fayed. Bis heute ist der Fall nicht aufgeklärt, Gerüchte über vertauschte Blutproben, eine überschnelle Einbalsamierung zur Vertuschung der Schwangerschaft und den Einsatz einer Stroboskop-Lichtkanone zur Blendung des Limousinen-Fahrers machen noch immer die Runde.
    Spanien – CNI
    panther/Montage
    CNI, das Kürzel des spanischen Geheimdienstes, steht für „Centro Nacional de Inteligencia“
    Organisation des spanischen Geheimdienstes

    In Spanien kümmert sich der Centro Nacional de Inteligencia (CNI) um Spionage-Dinge. Der Geheimdienst ist Teil des spanischen Verteidigungsministeriums. Seine Aufgaben umfassen die Informationsbeschaffung und Abwehr, aber auch wirtschaftliche Analysen und politische Risikobewertungen. Der spanische Ministerrat fungiert einerseits als Kontrollorgan, andererseits bestimmt er jährlich die Ziele der Behörde neu. Der CNI umfasst etwa 600 Mitarbeiter.

    Geschichte des CNI

    Die Wurzeln der Behörde liegen in der Zeit des spanischen Bürgerkriegs: 1935 gründete die Zweite Republik einen Geheimdienst, der – überrascht vom Beginn des Krieges – allerdings nie seine Arbeit aufnahm. Bis zu acht verschiedene Dienste arbeiteten bis in die 70er-Jahre gleichzeitig, zum Teil beschafften sie sogar dieselben Informationen.

    Erst 1972 gründete sich der erste offizielle Geheimdienst in Spanien, der sogenannte Zentrale Dokumentationsdienst – noch unter der Diktatur des Generals Francisco Franco. Hauptzweck war der Schutz der Diktatur und die Aufdeckung von Umsturzplänen. 1977, zwei Jahre nach dem Tod des Diktators, wurde der Geheimdienst reformiert und dem Verteidigungsministerium angegliedert.

    Spektakuläres über das CNI

    „Sieben spanische Agenten im Irak getötet“ – diese Nachricht ging 2003 um die Welt. Mit einem Schlag verlor der spanische Geheimdienst praktisch alle Experten in dem Land. Und alles nur, weil die Agenten offenbar einem irakischen Doppelagenten zum Opfer fielen. An einem Samstag im November trafen sich vier dort stationierte CNI-Agenten mit ihren Kollegen, die sie ablösen sollten. Mit dabei: ihre Kontaktperson und Informanten – und ein Maulwurf, der die Spanier an Saddams Truppen verriet. Ein tödlich verwundeter Agent rief offenbar noch während des Hinterhalts bei der CNI-Zentrale an und flehte mit letzter Kraft: „Sie bringen uns um. Schickt Hubschrauber herbei!“.
    Ein schwieriges Verhältnis hat der CNI zum spanischen Königshaus: Als sich König Juan Carlos in den 2000ern eine Geliebte leistete, musste Spaniens Geheimdienstchef vor dem Parlament antanzen und Auskunft geben – offiziell zum Schutz der Monarchie und des Wohl des Königs. Doch eigentlich ging es um die Frage, ob die „enge Freundin“ des Königs auf Staatskosten ausgehalten wurde. Die Befragung verlief allerdings hinter verschlossenen Türen und ergab nichts Erhellendes. Erst ein Mitarbeiter der Polizeigewerkschaft erhärtete die Gerüchte und so wurde das Verhältnis zum Politikum – ohne Beteiligung des CNI.
    Israel – Mossad
    AFP/Montage
    Israels berüchtigter Geheimdienst Mossad
    Organisation des israelischen Geheimdienstes

    In Israel gibt es vier Behörden, die sich um nachrichtendienstliche Belange kümmern: Den militärischen Geheimdienst Aman, den wissenschaftlichen Nachrichtendienst Lakam, den Inlandsgeheimdienst Schin Bet und den – sicherlich am bekanntesten – Auslandsgeheimdienst Mossad. Das Hauptquartier des Mossad befindet sich in Tel Aviv, laut Schätzungen arbeiten in der Behörde etwa 1200 Geheimdienstler. Darunter aktive Agenten, die sogenannten Katsas, und freiwillige Helfer, die sogenannten Sjanim – organisiert in einem weltweiten Netz israelischer Spione. Der Mossad kümmert sich um die Sicherheit des Landes und des Militärs, gilt aber auch als operativer Arm der Regierung – Geschichten über Liquidierungen und Entführungen durch Mossad-Agenten gibt es seit jeher.

    Geschichte des Mossad

    Israel ist ein vergleichsweise junger Staat: 1947 teilte die UN Palästina in einen jüdischen und einen arabischen Staat – um einen Lebensraum für die Überlebenden des Holocausts zu schaffen. Für die arabische Bevölkerung stellten die Pläne jedoch eine Provokation dar: Einer der zentralen Konflikte des 20. Jahrhunderts war geschaffen. Kriegerische Auseinandersetzungen folgten, gleichzeitig arbeiteten inoffizielle Organisationen daran, arabische Aufstände zu vermeiden. 1949 gründete der damalige Premierminister David Ben-Gurion dann den ersten offiziellen Geheimdienst, zunächst dem Außenministerium zugeordnet, später Teil des Büros des Premierministers.

    Spektakuläres über den Mossad

    Wie Alexandra Sgro in ihrem Buch „Geheimdienste der Welt“ beschreibt, wählte der Mossad seine Bewerber besonders streng aus: Angehende Agenten mussten ihre Geschicklichkeit unter Beweis stellen, indem sie an gut einsehbaren Stellen Bomben platzieren sollten – ohne, dass sie dabei gesehen werden. Wer geschickt genug war, wurde Agent. Heute steht am Beginn lediglich ein medizinischer und psychologischer Check, die Ausbildung dauert drei Jahre – mit einem Stundenplan aus Ausfragen, Leeren toter Briefkästen, Durchführung von Anschlägen und die spezielle israelische Kampfkunst Krav Maga.

    Doch das sollte nicht darüber hinwegtäuschen, dass der Mossad einer der effizientesten Geheimdienste weltweit ist, erklärt der Experte Beer. Eine der spektakulärsten – und ersten großen – Operationen des Mossads war die Gefangennahme des nach Argentinien geflohenen Nazis Adolf Eichmann. Er war als Mitglied des Reichsicherheitshauptamtes maßgeblich an der Deportation und Ermordung der Juden im „Dritten Reich“ beteiligt. Er tauchte in Südamerika unter, wurde allerdings vom Mossad aufgespürt und 1960 verhaftet. Nach einem neunmonatigen Prozess wurde er zum Tode verurteilt und 1962 hingerichtet.

    Zehn Jahre später kam es bei den Olympischen Spiele in München zur Katastrophe: Eine palästinensische Terror-Gruppe ermordete elf israelische Sportler – die israelische Führung schwor Rache. Die Sonderheinheit „Caesarea“ jagte die acht Mörder über den gesamten Globus und vollendete die Hatz mit dem Mord an dem letzten Attentäter im Jahr 1979. Die Operation „Zorn Gottes“ ging in die Geschichte ein – wohl auch deshalb, weil ein Unschuldiger sterben musste. Mossad-Agenten töteten den Marokkaner Ahmed Bouchiki. Sie verwechselten ihn mit einem der palästinensischen Attentäter.
    Und auch heute noch scheint der Mossad sehr aktiv zu sein. 2012 machte ein Medienbericht die Runde, wonach sich israelische Agenten Mitte der 2000er als CIA-Spione ausgegeben haben sollen, um eine Rebellen-Organisation zu Anschlägen im Iran anzustiften. Es war eine der „besonderen“ Methoden im geheimen Atomkrieg. Von 2010 bis 2012 wurden vier iranische Atom-Wissenschaftler ermordet – von Israel, so Beobachter.
    China – Ministerium für Staatssicherheit
    Colourbox
    In China ist das Ministerium für Staatssicherheit als Geheimpolizei tätig
    Organisation des chinesischen Geheimdienstes

    Der Geheimdienst in der Volksrepublik China teilt sich in das Ministerium für Staatssicherheit und den Militärnachrichtendienst auf. Das Ministerium kümmert sich dabei um in- wie ausländische Belange und gilt als einer der größten Geheimdienste weltweit. Die Methoden wie Netzzensur, Verletzung von Menschenrechten und zum Teil gewalttätige Überwachung von Dissidenten zeigt, dass das Ministerium ein Dienst mit polizeilichen Befugnissen zu sein scheint.

    Geschichte des Ministeriums für Staatssicherheit

    Dass Geheimdienste nicht erst ein Phänomen der Moderne sind, zeigt das riesige Netzwerk von Geheimdiensten in der Ming-Dynastie. Die Agenten wurden von Eunuchen angeführt, zumeist einfache Männer aus dem Volk. Die Ming-Herrscher sahen sich im 16. Jahrhundert zunehmend bedroht durch die Macht der Geheimtruppen und ihren Führern. Alle Maßnahmen kamen schließlich zu spät, die große Ming-Dynastie zerbrach. Unter anderem wegen des Konflikts zwischen hohen Beamten und den aus niedriger Herkunft stammenden Eunuchen.

    Im Jahr 1949 gründete die Kommunistische Partei den Vorläufer des Sicherheitsministeriums. Die Behörde sollte die Granden der Partei über weltweite Vorkommnisse unterrichten, basierend auf Nachrichten der Presseagenturen und einer limitierten Zahl Zeitungen und Bücher. Mit der Konsolidierung der Macht der Kommunistischen Partei wuchs auch die Aufgabe des Geheimdienstes, die jäh durch die Kulturrevolution unterbrochen wurde. In den Siebziger Jahren wurde die Arbeit wieder aufgenommen und die Behörde in kurzer Zeit massiv erweitert, bis sie 1983 in das Ministerium für Staatssicherheit überformt wurde – um alles abzuwehren, was dem sozialistischen System Chinas gefährlich werden könnte.

    Spektakuläres über das Ministerium für Staatssicherheit

    Die größte Bedrohung geht von Chinas Cyberspionage aus: Erst im Mai hatte eine US-Expertenkommission eine Liste von militärischen Projekten veröffentlicht, die vom chinesischen Geheimdienst über das Internet ausspioniert wurde. Darunter derart wichtige strategische Objekte wie das Patriot-Raketenabwehrsystem, Flugzeuge und Kriegsschiffe. Aber auch das Videosystem für Drohnen, Nanotechnologie, Nachrichtenverbindungen – der Schaden sei kaum absehbar, so die Kommission. Der Hintergrund sind offenbar die Modernisierungsbemühungen der chinesischen Armee.
    Doch auch vor Ort scheinen chinesische Spione ihrer subversiven Tätigkeit nachzugehen: Etwa 120 Agenten arbeiten in den USA, Kanada, Japan, West-, Ost- und Nord-Europa als Geschäftsleute, Industrie-Arbeiter, Banker, Wissenschaftler, Journalisten.
    Finnland – Supo
    Motage/Panther
    Der „Supo“, der zivile Nachrichtendienst, ist nur einer von Finnlands Geheimdiensten
    Organisation des finnischen Geheimdienstes

    In Finnland gibt es zwei offizielle Nachrichtendienste: Zum einen die „Suojelupoliisi“ (Supo), den zivilen Nachrichtendienst, und das „Pääesikunnan tiedusteluosasto“, den militärischen Nachrichtendienst. Die Supo ist ein Teil der finnischen Polizei und untersteht dem Innenminister, ihr Hauptquartier steht in Helsinki. Etwa 220 Geheimdienstler arbeiten dort an Terrorismus-Bekämpfung, Gegenspionage und allgemein der Bekämpfung von Verbrechen, die sich gegen die Regierung und die Politik richten.

    Das „Pääesikunnan tiedusteluosasto“ dagegen untersteht dem finnischen Verteidigungsminister. Die Behörde ist mit dem Schutz des finnischen Hoheitsgebiets beauftragt. Ein zentrales Mittel für die Überwachung ist die Funkaufklärung: Sie sitzt in der zentralfinnischen Kleinstadt Tikkakoski.

    Geschichte der Supo

    Finnland litt schon immer unter seiner exponierten Lage: Über Jahrhunderte hinweg führten Schweden und Russland ihre kriegerischen Konflikte auf dem finnischen Festland aus, erst im 19. Jahrhundert konnten die Finnen die Fremdherrschaft abschütteln und zu einem eigenständigen Staat werden, obgleich eine starke Abhängigkeit zu Russland auch weiterhin bestand. 1917 rief Finnland seine Unabhängigkeit aus, eine tiefe Kluft zwischen rechten und linken politischen Kräften durchzog jedoch das Land.

    Darin fußt die Geschichte der Geheimdienste: Rechte Kräfte gründeten eine Vorläufer-Organisation der Supo, um die „Roten“ zu überwachen. Nach dem Ende der Konflikte 1919 wurde die Geheimdienstarbeit dem Innenministerium unterstellt. Ab da lässt sich eine durchgehende Spionage-Tätigkeit bis in die Gegenwart verfolgen. Doch die politische Entzweiung brodelte weiter: 1949 wurde die Supo gegründet, um die mit Kommunisten besetzte Staatspolizei abzulösen. Die Organisation hat kein eigenes Einsatzkommando. Sie kann allerdings auf das „Karhu“-Team zurückgreifen, ähnlich dem amerikanischen Swat-Team.

    Spektakuläres über die Supo

    Eine der spektakulärsten Einsätze ist sicherlich Operation Stella Polaris: Im Zweiten Weltkrieg wurde Finnland erneut Dreh- und Angelpunkt östlicher und westlicher Machtinteressen. Einerseits verbündete sich Finnland zwar mit Nazi-Deutschland, andererseits fürchtete die Führung sowohl eine Invasion der Wehrmacht als auch der sowjetischen Truppen. Die Lösung war eine geheime Operation mit den Vereinigten Staaten: Mehrere finnische Spione setzten sich in das benachbarte Schweden ab und verkauften Informationen über das „Dritte Reich“ und die Sowjetunion an die USA.
    1942, bei einem Besuch Heinrich Himmlers, spionierte der finnische Geheimdienst den damaligen Reichsführer SS aus – und rettete so wohl 2000 Juden das Leben, wie die Historikerin Janne Könönen 2002 herausfand. Die heimlich abfotografierte Liste mit den Namen einheimischer Juden wurde dem damaligen Staatspräsidenten ausgehändigt – dieser sprach sich vehement gegen eine Auslieferung der Juden aus und bewahrte sie so vor der sicheren Deputation in deutsche Lager.
    Die schwierige Quellenlage
    Das Internet ist voll brisanter Informationen über die Geheimdienste der Welt. Teilweise ist die Quellenlage mysteriös – und oft falsch. Behörden, die im Geheimen agieren, haben es natürlich an sich, zu den wildesten Verschwörungstheorien einzuladen, die Grenzen zwischen Wahrheit und Fiktion verwischen gerne. Doch es gibt auch seriöse und wissenschaftliche Ansätze – eine Übersicht:

    Einen pragmatischen und sehr überblicksreichen Ansatz bietet das Buch „Geheimdienste der Welt“ von Alexandra Sgro, 2013 erschienen im Compact Verlag. Sgro fasst die wichtigsten Informationen zu bekannten Geheimdiensten wie MI6, BND, CIA aber auch unbekannteren Behörden wie Schwedens Säkerhetspolisen oder Griechenlands Ethniki Ypiresia Pliroforion zusammen und reichert die Berichte mit Geschichten zu den größten Skandalen und bekanntesten Spionen an.

    Auf der wissenschaftlichen Seite schreibt der emeritierte Professor Dr. Wolfgang Krieger in seiner Monographie „Geschichte der Geheimdienste. Von den Pharaonen bis zur CIA“, 2010 in der zweiten Auflage bei C.H. Beck erschienen. Wie der Titel vermuten lässt, beginnt Krieger seine historische Suche nach den Wurzeln der Spionage in der Antike und verfolgt sie bis in die Gegenwart. Die aktuellsten Entwicklungen zu Snowden und der NSA fanden dabei aufgrund des Veröffentlichungszeitpunktes nicht in das Buch. Spannend: Trotz allem schreibt Krieger über Bürgerrechtsverletzungen, versteckte Kooperationen der internationalen Geheimdienste und „Whistleblower“.

    Das „Austrian Center for Intelligence, Propaganda & Security Studies“ (ACIPSS) ist eine wissenschaftliche Plattform unter der Ägide von Professor Dr. Siegfried Beer. Das ACIPSS bietet Tagungsberichte, wissenschaftliche Studien und Interviews zu aktuellen Phänomenen – wie beispielsweise zum Abhör-Skandal. Außerdem beschäftigt sich das Center mit der Geschichte der Geheimdienste im europäischen Westen sowie den USA.

    Von FOCUS-Online-Redakteur Julian Rohrer , FOCUS-Online-Autor Johannes Ruprecht und FOCUS-Online-Autorin Lisa Kohn

    Find this story at Augustus 2013

    © FOCUS Online 1996-2013

    Datenspionage in Deutschland; BND schnüffelte millionenfach für US-Geheimdienste

    Ist der Bundesnachrichtendienst ein Handlanger der US-Geheimdienste? Einem Bericht des “Spiegel” zufolge leiten die deutschen Agenten noch weit mehr Daten an die US-Kollegen weiter als angenommen.

    Eine Demonstrantin vor dem Gebäude des Bundesnachrichtendienstes

    Der Bundesnachrichtendienst (BND) übermittelt nach einem “Spiegel”-Bericht in großem Umfang Metadaten aus der eigenen Fernmeldeaufklärung an die wegen ihrer Datensammelwut umstrittene US-Behörde NSA. Der deutsche Auslandsgeheimdienst gehe inzwischen davon aus, dass sich sein Standort im bayerischen Bad Aibling hinter einer der beiden Datensammelstellen (Sigads) verbergen könnte, über die der US-Geheimdienst laut Unterlagen aus dem Archiv des US-Informanten Edward Snowden allein im Dezember 2012 unter der Überschrift “Germany – Last 30 days” rund 500 Millionen Metadaten erfasste. Das schreibt das Hamburger Magazin in seiner neuen Ausgabe.
    Anzeige

    Der BND betonte, man arbeite mit der NSA seit über 50 Jahren zusammen – “insbesondere bei der Aufklärung der Lage in Krisengebieten, zum Schutz der dort stationierten deutschen Soldatinnen und Soldaten und zum Schutz und zur Rettung entführter deutscher Staatsangehöriger. Genau diesen Zielen dient auch die Zusammenarbeit mit der NSA in Bad Aibling, die in dieser Form seit über zehn Jahren erfolgt und auf einer Vereinbarung aus dem Jahr 2002 basiert.” Nach wie vor gebe es “keine Anhaltspunkte dafür, dass die NSA in Deutschland personenbezogene Daten deutscher Staatsangehöriger erfasst”, betonte der Geheimdienst-Sprecher.

    Man gehe davon aus, “dass die Sigad US-987LA und -LB” den Stellen “Bad Aibling und der Fernmeldeaufklärung in Afghanistan zugeordnet sind”, teilte der BND laut “Spiegel” mit. “Vor der Weiterleitung von auslandsbezogenen Metadaten werden diese in einem mehrstufigen Verfahren um eventuell darin enthaltene personenbezogene Daten Deutscher bereinigt.” Deutscher Telekommunikationsverkehr werde nicht erfasst, so der BND.

    Unterlagen aus dem Snowden-Archiv zufolge unterhalten NSA-Abhörspezialisten auf dem Gelände der Mangfall-Kaserne in Bad Aibling eine eigene Kommunikationszentrale und eine direkte elektronische Verbindung zum Datennetz der NSA, so “Der Spiegel”. Die Weiterleitung der Metadaten in diesem Umfang wirft laut Magazin neue Fragen auf, etwa nach der rechtlichen Grundlage für einen derart weitgehenden Austausch.

    Dem BND zufolge laufen “alle Aktivitäten im Rahmen von Kooperationen mit anderen Nachrichtendiensten unter Einhaltung der Gesetze, insbesondere des BND-Gesetzes und des G-10-Gesetzes”. Die Übermittlung personenbezogener Daten deutscher Staatsangehöriger erfolge auch “nicht massenhaft, sondern nur im Einzelfall und nach Vorgaben des G-10-Gesetzes. Im Jahr 2012 wurden lediglich zwei Datensätze eines deutschen Staatsangehörigen im Rahmen eines derzeit noch laufenden Entführungsfalls an die NSA übermittelt.”

    3. August 2013, 20:34 Uhr

    Find this story at 3 August 2013

    © stern.de

    NSA use of bases in Germany remains murky

    More than 20 years after the end of the Cold War, the US still has several military bases in Germany. Experts think that they could play a key role for the NSA’s activities.

    “German law applies on German soil and anyone operating here needs to adhere to it,” German Chancellor Angela Merkel said at a news conference before the summer recess. Merkel made the comment in connection with alleged US intelligence activities in Germany.

    After Merkel had gone off on holiday, UK daily The Guardian published fresh revelations on the NSA software XKeyscore. The article showed a graphic that pointed to data being mined by US intelligence from servers in Germany rather than just from servers based in the US.

    There is now speculation that the NSA and other US intelligence agencies obtain access to German Internet hubs via US military bases in Germany. More than 50,000 US soldiers are still based in Germany – more than the entire armed forces of Belgium. Worldwide, the US has several hundred bases.
    Gaycken: Spying from US military basis likely

    It helps to be close by

    IT specialist Sandro Gaycken from the Free University Berlin says it is highly likely that the US uses its military bases to gain access to cables. “It helps to be physically close to the data hubs you want to mine from,” he told DW. “It does make sense,” he added.

    But can US intelligence really gain access without the German government’s knowledge? Gaycken says it is possible, but unlikely. “If it’s servers in allied countries, it could be that special contracts allow you direct and legal access to those systems,” he explains.

    Legal basis for spying

    And there are agreements regulating US intelligence activities on US military bases in Germany. In 1968, the G10 law was passed, regulating the surveillance of postal and telecommunications services by German intelligence agencies.

    The law also included an administrative agreement that allowed wiretapping and surveillance by the allied forces in Germany for the purpose of protecting the troops.

    On Friday (02.08.2013) Germany’s Foreign Ministry declared that “the administrative agreement from 1968/69 in connection with the G10 law” with the US and the UK was being suspended “by mutual consent.”

    German Foreign Minister Guido Westerwelle called it “a necessary and correct consequence resulting from the recent debates about privacy.”
    The German government suspended an agreement with the US

    Purely symbolic?

    But the announcement has not changed anything, as the agreement has long been obsolete, according to a government spokesman, who said on July 8 that it had not been applied since reunification in 1990.

    And so the speculating continues as to the legality of the NSA’s activities in Germany. What is clear is that US intelligence agencies operate on US military bases in Germany.

    The German Defense Ministry issued a paper listing companies that profited from discounts available to those who do business with US forces in Germany. The paper names 207 companies that were granted discounts “for analytical services.”

    “Senior intelligence systems analyst” or “signal intelligence analyst” are two job descriptions that would have fit the bill, according to the paper.

    The German government told reporters on July 31 that “analytical activities” included technical, military services. But they said they were not exactly sure what that entails.

    The firm whistleblower Edward Snowden worked for, Booz Allen Hamilton, was granted a license for “intelligence operations” in Germany, according to a German Foreign Ministry source from November 28, 2008.
    Scmidt-Eenboom: NSA is an all too powerful force

    What happened in the Dagger complex?

    Some of the companies eligible for those discounts may well be working for the NSA in the Dagger complex in Griesheim near Darmstadt. More than 1,000 US intelligence agents work in this predominantly underground complex.

    “Germany could demand for the US to close down a facility like the one in Griesheim – if Germany took the view that the Americans are violating Germans’ civil rights,” says intelligence expert Erich Schmidt-Eenboom.

    “But that would mean confrontation, also between the various agencies. And that’s something the relatively small [German Foreign Intelligence Service] BND cannot afford.”

    Date 03.08.2013
    Author Marcus Lütticke / ng
    Editor Richard Connor

    Find this story at 3 August 2013

    © 2013 Deutsche Welle

    Überwachung; BND leitet massenhaft Metadaten an die NSA weiter

    Die NSA verfügt über Millionen Verbindungsdaten aus Deutschland – nach SPIEGEL-Recherchen übermittelt der Bundesnachrichtendienst viele der Informationen. Auch die technische Kooperation der beiden Geheimdienste ist enger als bislang bekannt.

    Hamburg – Der Bundesnachrichtendienst (BND) übermittelt in großem Umfang Metadaten aus der eigenen Fernmeldeaufklärung an die NSA. Der deutsche Auslandsgeheimdienst geht inzwischen davon aus, dass sich sein Standort in Bad Aibling hinter einer der beiden Datensammelstellen (Sigads) verbergen könnte, über die der US-Geheimdienst laut Unterlagen aus dem Archiv des Whistleblowers Edward Snowden allein im Dezember vergangenen Jahres unter der Überschrift “Germany – Last 30 days” rund 500 Millionen Metadaten erfasste.

    Man gehe davon aus, “dass die Sigad US-987LA und -LB” den Stellen “Bad Aibling und der Fernmeldeaufklärung in Afghanistan zugeordnet sind”, erklärte der BND gegenüber dem SPIEGEL. Unter Metadaten versteht man bei Telefonaten, E-Mails oder SMS die Verbindungsdaten, also unter anderem die Informationen, wann welche Anschlüsse miteinander verbunden waren.

    “Vor der Weiterleitung von auslandsbezogenen Metadaten werden diese in einem mehrstufigen Verfahren um eventuell darin enthaltene personenbezogene Daten Deutscher bereinigt.” Deutscher Telekommunikationsverkehr werde nicht erfasst, so der BND. Zudem habe man bislang “keine Anhaltspunkte, dass die NSA personenbezogene Daten deutscher Staatsangehöriger in Deutschland erfasst”. Ob die NSA noch weitere Metadaten aus Deutschland sammelt, und wenn ja auf welchem Wege, ist weiterhin unbekannt.

    Unterlagen aus dem Snowden-Archiv zufolge unterhalten NSA-Abhörspezialisten auf dem Gelände der Mangfall-Kaserne in Bad Aibling eine eigene Kommunikationszentrale und eine direkte elektronische Verbindung zum Datennetz der NSA.

    Die Weiterleitung der Metadaten in diesem Umfang wirft neue Fragen auf, etwa nach der rechtlichen Grundlage für einen derart weitgehenden Austausch. Dem BND zufolge laufen “alle Aktivitäten im Rahmen von Kooperationen mit anderen Nachrichtendiensten unter Einhaltung der Gesetze, insbesondere des BND-Gesetzes und des G-10-Gesetzes”.

    BND gab NSA Kopie zweier Programme

    Auch die technische Kooperation ist enger als bekannt. Unterlagen aus dem Snowden-Archiv zufolge gaben NSA-Spezialisten Vertretern von BND und Bundesamt für Verfassungsschutz ein Training im Umgang mit den neuesten Analysemethoden des Programms XKeyscore – dem Material zufolge soll es dabei unter anderem um Verhaltenserkennung (“behavior detection”) gehen.

    Umgekehrt zeigten sich NSA-Analysten schon vor Jahren an Systemen wie Mira4 und Veras interessiert, die beim BND vorhanden waren. “In einigen Punkten haben diese Werkzeuge Fähigkeiten, die die US-Sigint-Möglichkeiten übertreffen”, heißt es in den Unterlagen. Sigint bedeutet nachrichtendienstliche Informationsgewinnung. Weiter heißt es, dass der BND “positiv auf die NSA-Bitte nach einer Kopie von Mira4 und Veras” geantwortet habe.

    Der BND teilte am Abend als Reaktion auf den SPIEGEL-Bericht mit, er arbeite seit über 50 Jahren mit der NSA zusammen, insbesondere bei der Aufklärung der Lage in Krisengebieten. Diesem Ziel diene auch die Kooperation in Bad Aibling, die seit mehr als zehn Jahren erfolge und auf gesetzlicher Grundlage stattfinde. Personenbezogene Daten deutscher Staatsangehöriger würden nur im Einzelfall übermittelt.

    03. August 2013, 18:06 Uhr

    Find this story at 3 August 2013

    © SPIEGEL ONLINE 2013

    NSA-Skandal empört Datenschützer; Schaar will Schnüffel-Server notfalls persönlich aufspüren

    Die NSA soll für ihre Schnüffelei auch Server in Deutschland nutzen. Datenschützer Peter Schaar verlangt darüber Auskunft von den Telekomanbietern. Weil diese schweigen, droht er mit Kontrollbesuchen.

    “Die Tätigkeit von ausländischen Nachrichtendiensten auf deutschem Boden muss geklärt werden”: Deutschlands oberster Datenschützer Peter Schaar.

    Die USA halten uns hin, die Bundesregierung weiß angeblich von nichts und Kanzlerin Merkel gibt sich mit solchen Details nicht ab: Manchmal scheint es, als wäre der Bundesdatenschutzbeauftragte Peter Schaar der einzige Offizielle, der wirklich an der Aufklärung der NSA-Spähaffäre interessiert ist. Tief besorgt über die offenbar fast grenzenlosen Möglichkeiten zur Überwachung des Internets durch den US-Auslandsgeheimdienst zeigte sich Deutschlands oberster Datenschützer am Freitag in der ARD. “Das versetzt uns in Alarm, zurecht”, sagte Schaar. Das Programm “XKeyscore” sei “nicht nur so ein Stück Software”. Es handele sich offensichtlich um ein System, das aus einem Programm und weltweit verteilten Servern besteht.
    Anzeige

    “Was mich besonders beunruhigt, sind die Meldungen darüber, dass es auch in Deutschland entsprechende Server geben soll, über die entsprechende Informationen über den Internetverkehr abgegriffen werden”, erklärte Schaar. Dieser Frage gehe er derzeit nach. Er habe sich an die entsprechenden Telekommunikationsunternehmen gewandt – aber “bisher kaum Antworten gekriegt”. Er und seine Mitarbeiter hätten jedoch das Recht, sich dies vor Ort anzuschauen, warnte der Bundesbeauftragte die Telekomanbieter. “Und gegebenenfalls werden wir davon auch Gebrauch machen.”

    Von der Bundesregierung erwartet er dabei offenbar mehr Unterstützung und ein selbstbewussteres Auftreten gegenüber der US-Regierung und der NSA: “Auch die Tätigkeit von ausländischen Nachrichtendiensten auf deutschem Boden, etwa im Rhein-Main-Gebiet, wo sich die wichtigsten Internetknoten befinden, muss geklärt werden”, forderte er in der “Berliner Zeitung”.
    “Unsere Grundrechte werden ausgehebelt”

    Die eigene Regierung griff Schaar in der NSA-Affäre ungewöhnlich scharf an. “Wie Herr Pofalla zu sagen, die deutschen Nachrichtendienste hielten zu 100 Prozent den Datenschutz ein, ist sehr mutig”, sagte er der Zeitung mit Bezug auf die jüngsten Beschwichtigungen von Kanzleramtsminister Ronald Pofalla (CDU). “Wenn Sie meine Tätigkeitsberichte lesen, werden Sie feststellen, dass da auch nicht alles zu 100 Prozent datenschutzkonform gelaufen ist.”

    Da in- und ausländische Nachrichtendienste ihre Informationen offenbar austauschten, bestehe der begründete Verdacht, “dass auf diese Weise unsere Grundrechte ausgehebelt werden, selbst wenn es bei uns eine gesetzliche Begrenzung auf 20 Prozent der Übertragungskapazität gibt”. Klärungsbedarf sieht Schaar nach wie vor, da nicht nur das Parlamentarische Kontrollgremium – in dem Pofalla jüngst vorgesprochen hatte – Anspruch auf Informationen habe. “Wir brauchen mehr Transparenz”, sagte er der Zeitung, “nicht nur gegenüber Geheimgremien, sondern in der Öffentlichkeit”. Eine Kontrolle im Geheimen sei nur “sehr begrenzt wirksam”.
    “Ich habe Friedrichs Äußerung nicht verstanden”

    Tadelnde Worte richtete Schaar auch an Bundesinnenminister Hans-Peter Friedrich (CSU), der im Zusammenhang mit den aufgedeckten Überwachungsprogrammen von einem “Supergrundrecht” auf Sicherheit gesprochen hatte. “Ich habe diese Äußerung nicht verstanden”, sagte der zum Jahresende aus dem Amt scheidende Datenschutzbeauftragte. “Es gibt im Grundgesetz ein einziges Supergrundrecht, und das ist die Menschenwürde.” Sicherheit sei wichtig, dürfe aber nicht über allem stehen. Schaar zufolge muss eine Demokratie den Anspruch haben, “hier steuernd einzugreifen und die Überwachung zurückzufahren”.

    2. August 2013, 11:32 Uhr

    Find this story at 2 August 2013

    © stern.de

    NSA: permission to spy in Germany

    Germany has been under surveillance by the United States for decades, and German leaders have been fully aware of it, says historian Josef Foschepoth. The reason? Secret post-war accords.

    Deutsche Welle: The NSA spy scandal continues to ruffle feathers in Germany, Mr. Foschepoth. As a historian, you say the surveillance has been going on since the early days of post-war Germany. So, the revelations of Edward Snowden were not a surprise to you?

    Josef Foschepoth: No, not really. I was surprised instead by the initial reactions, in particular, from the political side. They were as if this had happened for the first time, as if it was something terribly bad and unique. But that is not the case. From my own research, I know that this happened countless times in the 1960s in Germany.

    How do you explain the rather low-key response from the German government?

    Well, such affairs are always very uncomfortable because they bring to light something that had functioned in the shadows. And this function should not be disturbed, so it’s played down. But now, this is no longer the case because it is an instance of severe and intensive surveillance. And moreover: it has been conducted by a friendly state.

    This surveillance, as you’ve said, has been going on for decades, since the beginning of the Federal Republic of Germany in 1949. What rights did the occupation forces – among them, the Americans – have at that time?

    Let’s be clear that the victorious forces were in Germany to occupy the country. They wanted to make sure that Germany would never again be a threat as it was during the Nazi dictatorship. But, after the victory over Nazi Germany, a further conflict began with the Soviet Union and the Cold War was born. It was a two-fold conflict that required a new strategy from the United States. A policy of double containment ensued: containment of the Soviet Union on the one hand and Germany on the other. And an essential element of this policy was surveillance.

    The so-called General Treaty, which regulated ties between Germany and the three allied powers, went into effect in 1955. The Federal Republic was to have the full powers of sovereignty over its domestic and foreign affairs. What did that mean for the surveillance strategy of the Americans?

    These formulations, of course, are always very nice and are meant for the public, more than anything. Ten years after the end of World War Two, the Germans felt the fundamental urge to be a sovereign state once again. But that was not the case at all because in the treaties from 1955 – it was volumes of treaties – were secret supplemental agreements which guaranteed key rights for the Western allied forces; among them, the right to monitor telephone and postal communications.

    What was the motivation for the German side behind all this?

    The Americans exerted massive pressure. They did not want to give up this territory, which was geostrategically important for its surveillance operations. German leaders, of course, wanted to be able to say that we now had a bit more sovereignty; in other words, a few strokes for the reawakening national psyche. Of course, what they didn’t say was we had to accept the same circumstances we had in the past under the occupation in the future as well, due to the international treaties and secret agreements. And these agreements are still valid and binding for every German government, even today.

    How could these agreements survive all these years?

    They were secret. The US had build a little America with its bases, in which the German government could not govern. When then-chancellor Helmut Kohl worked to clinch German reunification, he realized that this issue was a little difficult and controversial, so he said let’s just ignore it, and so, there were no negotiations over America’s special status rights. Therefore, these supplemental agreements are still in effect.

    Chancellor Merkel stresses that Germany is not a ‘big brother’ society. You say that Germany is one of the most closely monitored countries in Europe.

    The phrase ‘big brother society’ is certainly a bit polemical. But let me put it this way: The fall from grace happened in 1955 when Konrad Adenauer agreed to the special status rights in negotiations with the allied forces. The recognition of these rights by the chancellor meant that there was no going back to the sanctity and privacy of post and telecommunications, as it is written in the German constitution. That is how the large German-allied intelligence complex arose.

    That is interesting in that Germans are known for being very private about their data and it’s why they put great emphasis on data privacy.

    In the early years of the Federal Republic that was even more pronounced than it is today. That is why it was kept secret in the first place.

    Professor Josef Foschepoth is a historian at the University of Freiburg and author of the book “Überwachtes Deutschland. Post- und Telefonüberwachung in der alten Bundesrepublik” (Vandenhoeck & Ruprecht, Göttingen, 2012)

    Find this story at 29 July 2013

    © 2013 Deutsche Welle

    Rumors of NSA surveillance outpost in Wiesbaden persist

    Is a new building under construction at US Army headquarters in Wiesbaden also designed to house NSA spies? There are rumors, but the army says the facility is strictly for military intelligence units.

    One of the US Army’s most important facilities in Europe since the end of World War Two is in Wiesbaden, west of Frankfurt. During the Berlin blockade, this is where US planes took off in 1949 to supply Berlin with food, fuel and aid in what became known as the Berlin airlift. Today, the US Army in Europe (USAREUR) has its headquarters in Wiesbaden and is reportedly building a new military intelligence center that may also be used by the US National Security Agency (NSA.)

    The chief of Germany’s Federal Intelligence Service (BND), Gerhard Schindler, is said to have disclosed the plans during a closed-door meeting of parliament’s internal affairs committee. The BND, however, denied a subsequent German newspaper report on the planned surveillance outpost,and refused further comment.
    Mayor Gerich held lengthy talks with the US

    The army applied for a building permit for the high-tech structure, the Consolidated Intelligence Center (CIC), in 2008. The building is expected to be completed by the end of 2015, and will cost 124 million euros ($163 million). In the wake of mounting outrage at disclosures that the NSA was spying on allied governments and their citizens, Wiesbaden Mayor Sven Gerich wanted more information on the new surveillance outpost at Clay Barracks. Gerich met earlier this week for four hours of talks with Colonel David Carstens, commander of the US garrison in Wiesbaden.

    Friendly clarification

    The US military did not react angrily when asked about a possible NSA presence, the Wiesbaden mayor told DW. They understand how sensitive the issue is in Germany, Gerich said: “Colonel Carstens literally told me, this is purely a US Army facility, not an NSA facility.”

    But how credible is this information? “I do not have the impression that Colonel Carstens was lying,” the German mayor said, adding that the building was designed to house elements of a brigade currently at a base in Darmstadt. The US Army’s military intelligence brigade is being given better working conditions and more space to gather information for the safety of US troops in Europe. Larger structures, including antennas are not planned, Mayor Gerich said and made it clear that the city is in no position to object, anyway.
    The former NSA monitoring base in Bad Aibling near Munich

    New openness

    The meeting with the US military had an element of surprise, Gerich said. Media have reported the new surveillance structure in Wiesbaden will be completely sealed off, with access only by US personnel and even construction firms and material shipped from the US. However, it appears this secrecy is to be loosened somewhat by new information polices to accommodate concern among the population. Colonel Carstens offered to invite the media once construction of a good part of the surveillance center was finished. He wants people to realize that there are no subterranean facilities.
    Under certain circumstances the German government could have the site shut down

    The NSA site in Griesheim near Darmstadt has quite a few underground, or secret, facilities. Intelligence groups formerly set up in the Bavarian town of Bad Aibling work at the so-called Dagger Complex. That facility was closed in 2004, due to political pressure by former Bavarian state premier Edmund Stoiber. There was concern American intelligence services were using the Echelon intelligence collection and analysis network at the Bad Aibling station for industrial espionage in Germany. “They did not just have an eye on the Balkans, Afghanistan and Iraq,” German espionage expert Erich Schmidt-Eenboom told Deutsche Welle.

    Probably no NSA in Wiesbaden

    According to the expert, the Griesheim units are predominantly involved in satellite tracking. Depending on intelligence priorities, satellites are repositioned in their orbit, and moved to cover new areas of a crisis. NSA experts help with the data analysis. “If it is true that the Griesheim unit is not being moved to Wiesbaden, the information the US colonel gave the mayor is correct: NSA staff will not be working in the new surveillance building,” Schmidt-Eenboom said. The Wiesbaden mayor’s office confirmed authorities always noted military intelligence units from Darmstadt would move to Wiesbaden, there was never mention of the NSA in Griesheim .
    Satellite trackers reposition satelites

    Schmidt-Eenboom pointed out, however, that should the US Army’s information turn out to be false after all, the German government has the right to demand the site be shut down. Under the NATO Status of Forces Agreement, intelligence installations are not meant to provide protection to one individual nation, but to all member states.

    Should US spying activities actually target Germany, a difficult situation would arise – in theory. In reality, according to information spread by US whistleblower Edward Snowden, German and American intelligence services cooperate closely. Thus, and despite official disclaimers, experts are convinced NSA workers come and go at US bases across Germany.

    Date 26.07.2013
    Author Wolfgang Dick / db
    Editor Gregg Benzow

    Find this story at 26 July 2013

    © 2013 Deutsche Welle

    Police investigate ‘United Stasi of America’ artist

    Berlin police are investigating whether an artist who projected “United Stasi of America” onto the US embassy in the German capital earlier this week could be charged with a criminal offence.

    German artist Oliver Bienkowski projected the message, along with a picture of internet tycoon and online activist Kim Dotcom onto the US embassy in Berlin on Sunday night.

    He was likening reported sweeping internet surveillance by Washington and London to spying by the former East German secret police. And while the image was projected onto the building for 30 seconds on Sunday night, the action has caused quite a stir.

    An investigation has been launched into whether the action constituted “slander against the organizations and representatives of a foreign state,” the Berlin-based Der Tagesspiegel newspaper reported on Thursday.

    Bienkowski’s lawyer Fabian Eickstädt pointed out that the projection was onto the US embassy, which is technically US territory. “For me it is not even clear whether German law would apply,” he said.

    And Der Tagesspiegel said that a criminal case of slander could only be launched if the victim were to make a formal complaint. The US embassy told the paper it had no interest in a prosecution.

    While Dotcom had no problem claiming the projection. “I defaced the U.S. embassy in Berlin with a truth-projection last night. 0Wned!” he tweeted. The video on YouTube has garnered nearly 80,000 hits.

    Dotcom, a German national, is the founder of file-sharing website Megaupload that was shut down by US authorities who seek to extradite him on charges of racketeering, fraud, money laundering and copyright theft.

    Dotcom, born Kim Schmitz, denies any wrongdoing and is free on bail in New Zealand ahead of his extradition hearing.

    US intelligence leaker Edward Snowden, in limbo at a Moscow airport, is also seeking to evade US justice after leaking explosive details about a vast US electronic surveillance programme and bugging of European missions.

    Germany has reacted with particular alarm to the revelations about the US and British spy programmes, given its history of state surveillance under the Nazis and the communist East German regime.

    Published: 11 Jul 2013 11:51 CET | Print version

    Find this story at 11 July 2013

    © The Local Europe GmbH

    Im Namen von „Kim Dotcom“ bestrahlte er die US-Botschaft; Dieser Freimaurer verübte den Licht-Anschlag

    Berlin – Er ist bekennender Freimaurer, Sympathisant der Hacker-Gruppe „Anonymous“ – und er hat den Licht-Anschlag auf die US-Botschaft in Berlin für „Kim Dotcom“ verübt.

    Oliver Bienkowski (31), Chef einer Düsseldorfer Guerilla-Werbeagentur, projizierte den Schriftzug „United Stasi of America“ auf das Botschaftsgebäude. Für die Aktion brauchte er mehrere Wochen Vorbereitung, dazu drei Tage lang in der Hauptstadt, um sich den Ort anzuschauen.

    Sonntagnacht schlägt er zu: Plötzlich blitzt gegenüber dem Berliner Holocaust-Mahnmal die Licht-Botschaft auf. Darunter ein Bild von Internet-Betrüger Kim Schmitz (39), alias „Kim Dotcom“.

    ► Die Licht-Parole auf der US-Botschaft soll ein Protest gegen die Abhör-Aktivitäten der USA sein. Und weil Bienkowski ein Fan von „Kim Dotcom“ ist, schrieb er ihm per Mail von der Idee. Bienkowski zu BILD.de: „Er hat gesagt, dass wir sein Bild benutzen dürfen. Der Slogan stammt von ihm.“ Hacker „Kim Dotcom“ lebt in Neuseeland und betrieb dort die illegale Daten-Tauschbörse „Megaupload“.

    Der Licht-Anschlag kostete 5000 Euro, inklusive digitalem Beamer. Bienkowski hat alles aus eigener Tasche bezahlt. Auf YouTube stellte der Künstler ein Video der Aktion ein.

    Schließlich wurde er von der Polizei verjagt, eine Anzeige fürchtet der Lichtmaler, wie er sich nennt, aber nicht. Für die Grünen strahlte er bereits das Kanzleramt an, beim „Festival of Lights“ zauberte er einen Regenbogen aufs Brandenburger Tor.

    „Kim Dotcom“ freute sich seinerseits über die Aufmerksamkeit und postete den ersten BILD-Artikel bei Twitter.

    Ein Sprecher der US-Botschaft über die Aktion: „Sehr lustig, aber wer so einen Vergleich anstellt, kennt weder die Stasi noch Amerika.“

    08.07.2013 – 18:09 Uhr
    Von SOLVEIG RATHENOW

    Find this story at 8 July 2013

    © BILD.de

    System XKeyscore: US-Privatfirmen suchen Überwachungsfachleute

    Das Spionagewerkzeug XKeyscore, das NSA und BND einsetzen, hat viele Fans – auch in privaten US-Unternehmen. In Stellenanzeigen suchen die Firmen ganz offen nach Fachleuten für diverse NSA-Programme. Wichtige Einstellungsbedingung: ein bestandener Lügendetektortest.

    Washington/Fort Meade – Die National Security Agency ist eine gewaltige Behörde. Der “Washington Post” zufolge arbeiten derzeit etwa 33.000 Menschen für den US-Geheimdienst, der auf Spionage, Verteidigung und Angriff in Netzwerken spezialisiert ist. Die NSA unterhält nicht nur eine riesige Zentrale in Fort Meade, Maryland, sondern auch noch zahlreiche Stützpunkte in den USA und anderswo. Im britischen Menwith Hill sollen demnächst bis zu 2500 NSA-Bedienstete arbeiten. In Bluffdale, Utah, baut der Geheimdienst derzeit das vermutlich größte Rechenzentrum des Planeten.

    Doch all diese Einrichtungen sind nur ein Teil des tatsächlichen Geheimdienstapparats – andere Teile der US-Sicherheitsarchitektur sind längst outgesourct. In einem großangelegten Bericht über diese Schattenbranche schätzte die “Washington Post” schon 2010, dass von 854.000 Personen mit der Sicherheitsfreigabe “Top Secret” 265.000 Vertragsangestellte von Privatunternehmen waren.

    Noch immer suchen sowohl die NSA als auch die knapp 500 privaten Firmen, mit denen sie zusammenarbeitet, ganz offen nach weiterem Fachpersonal für Überwachung, Spionage und Cyberwar. Eine ganze Reihe von Stellenanzeigen der NSA selbst für Positionen etwa im Bereich Computer Network Operations beginnt jeweils mit der gleichen, erstaunlich offenen Passage:

    “Unsere Nation ist in eine neue Ära eingetreten, die tiefgreifende Veränderungen hinsichtlich der Operationsweise der National Security Agency mit sich bringt. Die explosive Ausbreitung des World Wide Web verlangt nach einer Mission im Bereich Computer Network Operations. Diese wichtige Mission besteht aus drei Teilen: Netzwerkverteidigung, Netzwerkattacken und Erschließung von Computernetzwerken. Um diese Funktionen zu erfüllen, sucht die NSA Menschen, die mit hoher Sachkunde und Leidenschaft den Krieg im Cyberspace gewinnen wollen.”

    Dass der Geheimdienst den “Krieg im Cyberspace” als gegeben betrachtet, lässt tief blicken. Die NSA verschickt solche Stellenanzeigen sogar über einen eigenen Twitteraccount.

    Doch die NSA selbst ist bei weitem nicht die einzige Organisation, die in Online-Stellenanzeigen freimütig mit dem eigenen Bedarf an Arbeitskräften hausieren geht. Eine ganze Reihe von Unternehmen sucht beispielsweise Analysten, Techiker, Programmierer, die mit dem als streng geheim eingestuften System XKeyscore umgehen können, das SPIEGEL-Informationen zufolge auch der Bundesnachrichtendienst (BND) und der Verfassungsschutz (BVF) einsetzen.

    Doch nicht nur nach Fachleuten im Umgang mit dieser NSA-Software wird gesucht. In zahlreichen Stellenanzeigen tauchen Programmnamen auf, die man von den bislang publizierten NSA-Folien – etwa über das Prism-Programm – kennt. Andere stehen auf einer Liste mit NSA-Programmnamen, die der Geheimdienst-Fachmann William Arkin schon im März 2012 veröffentlichte.

    Einige Beispiele:

    Der Rüstungskonzern L3 Communications (nicht zu verwechseln mit dem Telekommunikationskonzern Level 3 Communications) sucht für seine Sicherheitssparte einen Systems Integration Engineer am Standort Maryland / Fort Meade – dort ist auch die NSA zu Hause. Mit Programmen wie XKeyscore sollte sich der Bewerber auskennen, vor allem mit dem Entwickeln von Zusatzprogrammen, sogenannten Plug-ins.
    Als Netzwerk-Spezialist ist man gefragt bei Tasc. Die Firma mit mehreren tausend Mitarbeitern und laut “Washington Post” schon 2009 einem Jahresumsatz von zwei Milliarden Dollar bietet IT-Lösungen für Geheimdienste und Militär an. Mitbringen sollen Bewerber Kenntnisse von NSA-Programmen wie XKeyscore, Tuningfork, Discoroute oder Marina. Letzteres dient den Prism-Folien zufolge der Auswertung von Internetverbindungsdaten. Die potentiellen Mitarbeiter werden mit der Aussicht gelockt, “Schutz und Sicherheit zu verbessern und die Grundwerte der Gesellschaft zu schützen”.
    Das Unternehmen CyTech sucht einen Analysten, der sich auf das Auswerten verschiedener Quellen versteht – mit NSA-Programmen wie Anchory/Maui, Pathfinder oder Skywriter. Pluspunkte sind Kenntnisse von Pinwale und XKeyscore. Pinwale ist ein Analyseprogramm für Video-Inhalte, das ebenfalls auf den Prism-Folien auftaucht.

    Die Liste ließe sich fortsetzen: Auch andere einschlägige Unternehmen wie Saic, Raytheon oder BAE Systems suchen nach qualifizierten Fachkräften für Überwachungssoftware, die man nun als NSA-Werkzeuge kennt. Umgekehrt preisen im Business-Netzwerk LinkedIn Dutzende Mitglieder ihre Erfahrung mit XKeyscore und anderen NSA-Programmen als Qualifikation an.

    Was Bewerber in der Regel mitbringen müssen: eine Sicherheitsfreigabe “mit Lügendetektor”. Die Kandidaten müssen Dokumente der höchsten Geheimhaltungsstufe einsehen dürfen, außerdem eine Überprüfung durchlaufen haben, um auch mit besonders gesicherten Informationen zu arbeiten.

    Auch auf den XKeyscore- und den Prism-Folien steht stets “Top Secret” – die Unternehmen aus dem Dunstkreis der US-Geheimdienste suchen dennoch ganz offen nach Fachleuten. Womöglich nach solchen, die wiederum die NSA selbst ausgebildet hat. Für sein “Digital Network Exploitation Analyst Development Program” (DDP) wirbt der Geheimdienst etwa mit den Worten: “Wegen ihres Fachwissens und der Bandbreite ihrer Erfahrungen herrscht intensive Nachfrage nach Personen mit einem Abschluss in diesem Programm.”

    Tatsächlich wandern ständig junge, gut ausgebildete Leute von den US-Diensten zu privaten Unternehmen ab, die einfach besser bezahlen – um dann über Outsourcing-Verträge doch wieder für NSA oder CIA zu arbeiten. So war es auch bei Edward Snowden: Er arbeitete für die CIA, bevor er sich von der privaten Firma Booz Allen Hamilton anheuern ließ, um dann für ein sechsstelliges Gehalt als Systemadministrator zu arbeiten. Bis er sich mit Tausenden NSA-Dokumenten aus dem Staub machte.

    22. Juli 2013, 18:08 Uhr
    Von Christian Stöcker und Ole Reißmann
    Mitarbeit: Judith Horchert

    Find this story at 22 July 2013

    © SPIEGEL ONLINE 2013

    ‘Key Partners’; Secret Links Between Germany and the NSA

    Chancellor Angela Merkel has repeatedly said she knew nothing about American surveillance activities in Germany. But documents seen by SPIEGEL show that German intelligence cooperates closely with the NSA and even uses spy software provided by the US. By SPIEGEL

    It was a busy two days for the surveillance specialists of the Bundesnachrichtendienst (BND), Germany’s foreign intelligence agency. At the end of April, a team of 12 senior BND officials flew to the United States, where they visited the heart of the global American surveillance empire: the National Security Agency (NSA). The purpose of their mission can be read in a “top secret” NSA document which SPIEGEL has seen — one of the trove of files in the possession of whistleblower Edward Snowden.

    According to the document, BND President Gerhard Schindler repeatedly expressed an “eagerness” to cooperate more closely with the NSA. The Germans, the document reads, were looking for “guidance and advice.”

    Their wish was fulfilled. Senior employees with the NSA’s Foreign Affairs Directorate were assigned to look after the German delegation. The Americans organized a “strategic planning conference” to bring their German partners up to speed. In the afternoon, following several presentations on current methods of data acquisition, senior members of a division known as Special Source Operations, or SSO, spoke to their German guests. The SSO, one of the most secretive groups within the intelligence community, is the division that forms alliances with US companies, especially in the IT sector, for data mining purposes. Snowden describes this elite unit as the NSA’s “crown jewels”.

    The journey to Washington wasn’t the first educational trip by German intelligence officials across the Atlantic this spring — nor was it the last. Documents from Snowden that SPIEGEL has seen show that cooperation between Berlin and Washington in the area of digital surveillance and defense has intensified considerably during the tenure of Chancellor Angela Merkel. According to one document, the Germans are determined to “strengthen and expand bilateral cooperation.”

    Completely Unaware?

    This is awkward news for Merkel, who is running for re-election as the head of the center-right Christian Democrats. The German campaign had been relatively uneventful until recently, but now a new issue seems to have emerged: the Americans’ lust for data. Opposition politicians have intensified their attacks in recent days. First Peer Steinbrück, the Social Democratic candidate for the Chancellery, accused Merkel of having violated her oath of office for failing to protect the basic rights of Germans. Not long later, SPD Chairman Sigmar Gabriel referred to Merkel as a “spin doctor who is trying to placate the population.” According to Gabriel, it has since been proven that the German government knew about the NSA’s activities.

    But the attacks from the SPD are not the chancellor’s biggest worry; the real threat comes from within. At a very early juncture, Merkel insisted that her government had been completely unaware of the NSA’s activities. It is a position she reiterated before starting her summer vacation last Friday.

    She will now be judged on the basis of those statements. Internally, Merkel’s advisors argue that she had no choice but to take such a clear position. After all, both the head of the BND and the president of the Federal Office for the Protection of the Constitution (BfV), Germany’s domestic intelligence agency, had said that they had had no detailed knowledge of the Prism surveillance program and the extent of American data collection. On what basis could Merkel have contradicted them?

    But with each day, fears are growing at the Chancellery that a paper could eventually turn up that clearly shows the government’s knowledge of the NSA activities.

    But does that really matter? What is worse? To be governed by a cabinet that conceals its connivance from citizens? Or to have a chancellor and ministers whose intelligence agencies exist in a parallel world, beyond the supervision of the government and parliament? Internal NSA documents show that the Americans and German intelligence agencies are cooperating more closely than previously known. The repeated assertions by the government and intelligence agencies in recent weeks that they were not fully aware of what US surveillance specialists were doing appear disingenuous in the extreme in light of the documents SPIEGEL has seen from the collection secured by Snowden.

    ‘Key Partners’

    According to those documents, the BND, the BfV and the Bonn-based Federal Office for Information Security (BSI) all play a central role in the exchange of information among intelligence agencies. The NSA refers to them as “key partners.”

    The Americans provided the BfV with one of their most productive spying tools, a system called “XKeyscore.” It’s the same surveillance program that the NSA uses to capture a large share of the up to 500 million data sets from Germany, to which it has access each month, according to internal documents seen and reported on by SPIEGEL on the first of this month.

    The documents also reveal the lengths to which the German agencies and German politicians were willing to go to develop an even closer relationship with the Americans. This is especially applicable to the G-10 law, which establishes the conditions under which surveillance of German citizens is permissible. In one classified document — under a section titled “Success Stories” — it reads: “The German government modifies its interpretation of the G-10 privacy law … to afford the BND more flexibility in sharing protected information with foreign partners.”

    The claim that German intelligence agencies knew nothing was already hard to believe given that they have been cooperating with American agencies for decades. According to an NSA document from this January, cooperation between the offensive divisions of the NSA and the BND’s “Technical Reconnaissance” unit began long ago in 1962.

    The Americans are extremely satisfied with the Germans. For decades, Washington poked fun at the conscientious German spies, who always had a legal decree on hand to justify why they were regrettably unable to participate in an especially delicate operation. This was a source of annoyance to the Americans, but ultimately they had no choice but to accept it.

    More recently, however, that has changed, as the Snowden documents indicate: The German bureaucrats have become real spies.

    During the course of 2012, in particular, the Germans showed great “eagerness and desire” to improve their surveillance capacities and even “to take risks and to pursue new opportunities for cooperation with the US,” according to the NSA documents to which SPIEGEL was given access.

    A Close Link

    The shift to a more offensive German security policy began in 2007, when Merkel’s conservatives were in power in a coalition with the SPD, the so-called “Grand Coalition.” Based on information the NSA had passed on to the BfV, German authorities discovered a group of Islamists led by convert Fritz Gelowicz, known as the Sauerland cell. Gelowicz and several of his friends had planned to detonate bombs in Germany. To this day, the German government is grateful to the Americans for the tip.

    According to the NSA document, the successful operation created “a significant level of trust” between the NSA and the BfV. Since then, the document reads, there have been “regular US-German analytic exchanges and closer cooperation in tracking both German and non-German extremist targets.” The documents show that the NSA also provided several training sessions for BfV agents. The aim was “to improve the BfV’s ability to exploit, filter and process domestic data.” The hope was to create interfaces so that data could be exchanged on a larger scale — a cooperation “that could benefit both Germany and the US,” the paper reads.

    The pact also intensified on German soil. An NSA analyst accredited as a diplomat at the US Embassy in Berlin uses an office at the BfV once a week. According to the document, the analyst’s job is to “nurture” the thriving relationship with the BfV. The agent also “facilitates US requirements.” In addition, the Germans set up a “communications link” to the NSA to improve ties between agencies.

    Personal relationships also intensified. In May alone, just a few weeks before the Snowden revelations began, BfV President Hans-Georg Maassen, Interior Minister Hans-Peter Friedrich and the 12-member BND delegation paid a visit to NSA headquarters. In the same month, NSA Director General Keith Alexander traveled to Berlin, where he made a stop at the Chancellery, which supervises the BND.

    The cooperation went beyond high level visits. According to the papers from the Snowden files which SPIEGEL has seen, the NSA provided the BfV with XKeyscore, and BND officials were also very familiar with the tool, given that their job was to instruct their counterparts with German domestic intelligence on how to use the spy program. The main reason the BfV was to be provided with XKeyscore was to “expand their ability to support NSA as we jointly prosecute CT (counter-terrorism) targets.”

    A “top secret” presentation dated Feb. 25, 2008, which almost reads like an advertising brochure (the American spies are apparently very proud of the system), reveals all the things XKeyscore was capable of doing already five years ago.

    NSA Pleased with German ‘Eagerness’
    According to the presentation, the system is easy to use and enables surveillance of raw data traffic “like no other system.”

    An NSA transparency titled “What is XKeyscore?” describes a buffer memory that enables the program to absorb a “full take” of all unfiltered data for a number of days. In other words, XKeyscore doesn’t just track call connection records, but can also capture the contents of communication, at least in part.

    In addition, the system makes it possible to retroactively view which key words targeted individuals enter into Internet search engines and which locations they search for on Google Maps.

    The program, for which there are several expansions known as plug-ins, apparently has even more capabilities. For instance, “user activity” can be monitored practically in real time and “anomalous events” traced in Internet traffic. If this is true, it means that XKeyscore makes almost total digital surveillance possible.

    From the German perspective, this is especially troubling. Of the roughly 500 million data sets from Germany to which the NSA has access each month, XKeyscore captured about 180 million in December 2012.

    This raises several questions. Does this mean that the NSA doesn’t just have access to hundreds of millions of data sets from Germany, but also — at least for periods of days — to a so-called “full take,” meaning to the content of communication in Germany? Can the BND and the BfV access the NSA databases with their versions of XKeyscore, which would give them access to the data on German citizens stored in those databases?

    If this were the case, the government could hardly claim that it had no knowledge of the Americans’ vigorous data acquisition activities.

    German ‘Eagerness’ Is ‘Welcomed’

    SPIEGEL put these questions to both agencies and the Chancellery, but it received no answers on the use of the system. The BND merely issued a brief statement, saying that it was regrettably unable to comment publicly on the details of intelligence activities.

    The NSA and the White House were similarly curt in their responses to SPIEGEL inquiries, merely noting that they had nothing to add to the remarks President Barack Obama made during his recent visit to Berlin.

    The new revelations also shine a spotlight on the presidents of the BND and the BfV, Gerhard Schindler and Hans-Georg Maassen. Both men are relatively new in their positions. But BND President Schindler in particular, in office since January 2012, has already made his mark. He embodies the new, more offensive approach being taken by the foreign intelligence agency, which the NSA has expressly praised. Schindler’s “eagerness,” according to the NSA documents, was “welcomed” already in 2012.

    When he came into office, the outspoken head of the BND encapsulated the new willingness to take risks. Internally, he asked each BND department to submit three proposals for joint operations with the US intelligence agencies.

    Of course, there are also positive sides to this closer cooperation with the Americans. One of the BND’s responsibilities is to protect German soldiers and prevent terrorist attacks. Doing so adequately is impossible without help from the Americans. Conversely, the BND’s reputation has improved among US intelligence agencies, especially after it proved to be helpful in the Kunduz region of northern Afghanistan, where the German military, the Bundeswehr, is stationed. The Germans are now the third-largest procurer of information there.

    They don’t just share their information with the NSA, but also with 13 other Western countries. Some time ago, the agency brought its technical equipment in Afghanistan up to the latest standard. Results have been especially good since then, and the NSA is pleased.

    In recent years, the BND has had the capability to listen in on phone conversations on a large scale in northern Afghanistan, aiding in the arrests of more than 20 high-ranking members of the Taliban — including Mullah Rahman, once the shadow governor of Kunduz.

    Relaxed Interpretation of Privacy Laws

    According to an NSA document dated April 9, Germany, as part of the surveillance coalition in Afghanistan, has developed into the agency’s “most prolific partner.” The Germans are similarly successful in North Africa, where they also have special technical capabilities of interest to the NSA. The same applies in Iraq.

    But according to the documents, the German foreign intelligence agency went even further in its effort to please the Americans. “The BND has been working to influence the German government to relax interpretation of the privacy laws to provide greater opportunities of intelligence sharing,” the NSA agents noted with satisfaction in January.

    Indeed, when Schindler took office, BND officials were divided over whether it was legal to pass on information to partner intelligence agencies that had been obtained in accordance with the German G-10 law. Schindler decided that it was, and the United States was pleased.

    The surveillance base in Bad Aibling, a well-known American listening post in southern Germany, also shows how close ties are between the BND and the NSA. It was a symbol of technical espionage during the Cold War. Most recently, the NSA referred to the listening post by the code name “garlic.” Although the last parts of the base were officially handed over to the BND in May 2012, NSA officials still come and go.

    The NSA chief for Germany is still stationed at the local Mangfall Barracks. Some 18 Americans were still working at the surveillance station at the beginning of the year, 12 from the NSA and six working for private contractors. The office is expected to be scaled back during the course of the year, with the plans ultimately calling for only six NSA employees to remain at the base. According to the Snowden documents, their work will be to “cultivate new cooperation opportunities with Germany.”

    To be sure, intensive cooperation in counterterrorism activities is part of the core mission of Germany’s foreign intelligence agency. But did lawmakers know about the scope of cooperation with the Americans? And, if they did, since when?

    Making Things Worse

    So far, the BND has been able to count on support from the Chancellery for its new approach. But things seem to be changing. The surveillance scandal has the potential to shake public confidence in the German government and in Chancellor Merkel — and could negatively effect her chances for re-election.

    The NSA’s activities, of course, are not exactly driving the German people into the streets in droves. Nevertheless, revelations as to the extent of America’s surveillance abroad are chipping away at Merkel’s image as a reliable manager of the government. Some 69 percent of Germans are dissatisfied with her efforts to shed light on the issue, a number that has alarmed the Chancellery. Until the end of last week, Merkel had tried to distance herself from the subject, issuing only sparse statements. Instead of Merkel, Interior Minister Friedrich was expected to handle the delicate matter.

    But Friedrich only made things worse, returning largely empty-handed from his trip to Washington. Instead, he seemed extremely proud of the fact that he had been allowed to speak with US Vice President Joe Biden.

    To make matters worse, Friedrich had hardly returned to Germany before making the remark that “security” was a “Supergrundrecht,” a new concept that implies that security trumps other civil rights. A minister charged with upholding the constitution who suddenly invented an interpretation of the German constitution that suits the NSA’s purposes? At that moment, Merkel must have realized that she couldn’t leave things entirely to her interior minister.

    Last Friday, shortly before leaving for her summer vacation, Merkel unveiled an eight-point plan intended to provide more data security. But most of her points felt more like placebos. How, for example, are European intelligence agencies to agree on common data privacy guidelines if British and French intelligence agents are already snickering over the Germans’ obsession with data privacy?

    In a Bind

    Merkel is in a bind. On the one hand, she doesn’t want to give the impression that she is doing nothing about the Americans’ lust for information. On the other hand, this also brings the scandal closer to the chancellor. In the end, it will revolve around the question of how much the government knew about the Americans’ surveillance activities. Last Friday, the BND insisted, once again, that it had “no knowledge of the name, scope and extent of the NSA ‘Prism’ project being discussed.”

    But even if that’s true, Prism was only a part of the NSA’s surveillance system, and the new documents show that Germany was indeed extremely familiar with the agency’s comprehensive ability to spy. They benefited from it, and they wanted more.

    But Merkel claims that she knew nothing about the Americans’ surveillance software. “I became aware of programs like Prism through current news reports,” she told the left-leaning weekly newspaper Die Zeit last week. According to Merkel’s staff, when she uses such language, she is relying on statements made by the German intelligence chiefs.

    But what does that mean? Does the German government still have its intelligence agencies under control? Or have they become a kind of state-within-a-state?

    And who exactly keeps track of whether the agencies, in their zeal to enforce the “Supergrundrecht” of security, haven’t already gone too far?

    The place where the activities of domestic and foreign intelligence agencies ought to be debated is the Parliamentary Control Panel in the German Bundestag. By law, the government is required to regularly and “comprehensively” inform the 11 members of the board, which meets in secret, about the work of the BND and the BfV, and explain “procedures with special importance.”

    Oddly enough, the board has met four times since the beginning of the NSA scandal, and, four times, lawmakers have learned little about the global data surveillance programs. Instead, they were forced to listen to long-winded lectures by those responsible, the essence of which generally was: We really don’t know anything.

    Spotlight on Merkel

    Over the years, the board has mutated into a stage for large egos and is no longer particularly secret. The problem is that many panel members don’t have sufficient time or expertise to truly understand the kind of activities the intelligence agencies are engaged in. It is a perfect situation for Germany’s spies: The less the public learns about their activities, the more they can go about their business undisturbed.

    “Monitoring of the agencies is purely theoretical,” says Hans-Christian Ströbele, the Green Party representative on the board. “We don’t learn about the truly explosive issues until they’ve been exposed by the media.” This isn’t surprising, given the vagueness of statutory provisions on the supervision of intelligence agencies.

    The agencies enjoy “complete freedom,” says attorney Wolfgang Neškovi, who once spent many years on the control board for the Left Party. The CDU, its Bavarian sister party, the Christian Social Union (CSU), and the liberal Free Democratic Party (FDP) have now agreed to establish an intelligence body to monitor the intelligence agencies. But in light of recent events, CDU domestic policy expert Clemens Binninger believes that a “major solution” is needed. He favors the idea of a parliamentary intelligence official, to be provided with his own powers and staff.

    There is also growing mistrust of the intelligence agencies within Merkel’s government, a situation which led to a memorable scene in the federal press conference last Wednesday. According to a NATO document that had been circulated before the press conference, the German military was indeed aware of the existence of Prism. Government spokesman Steffen Seibert stated that it was the BND’s assessment that the program in question had nothing to do with NSA spy software. But he made sure to keep a distance from the intelligence agency’s assessment. Later, the Defense Ministry issued a statement of its own which directly contradicted the BND statement.

    It is an awkward situation for Merkel. In the midst of an election campaign, her government suddenly looks to be characterized by chaos. Of course, if it turns out that the intelligence agencies were deceiving her, she could clean house. BND chief Schindler would seem to be in the front of the firing line, with Ronald Pofalla, who, as Merkel’s chief of staff, is tasked with monitoring the intelligence agencies, not far behind.

    But the Chancellery staff has no illusions. The SPD and the Greens will continue putting Merkel in the NSA spotlight no matter what happens. “The chancellor is more interested in defending the interests of the US intelligence agencies in Germany than German interests in the United States,” says SPD Chairman Gabriel. It seems unlikely that the opposition will stand down any time between now and election day, on Sept. 22.

    BY RENÉ PFISTER, LAURA POITRAS, MARCEL ROSENBACH, JÖRG SCHINDLER and HOLGER STARK
    Translated from the German by Christopher Sultan
    07/22/2013 12:19 PM

    Find this story at 22 July 2013

    © SPIEGEL ONLINE 2013

    Nach Offenlegung von NSA-Unterlagen; BND und Verfassungsschutz haben Spähsoftware “getestet”

    Die Präsidenten der deutschen Geheimdienste haben Vorwürfe dementiert, wonach sie mittels NSA-Spähsoftware im großen Stil Daten gesammelt hätten. Die Software sei nur zu Testzwecken verwendet worden.

    Hans-Georg Maaßen, der Präsident des Bundesamtes für Verfassungsschutz, gerät nach Enthüllungen über eine in Deutschland verwendete NSA-Spähsoftware zusehends unter Druck

    Der Präsident des Bundesamtes für Verfassungsschutz (BfV), Hans-Georg Maaßen, und der Präsident des Bundesnachrichtendienstes (BND), Gerhard Schindler, haben sich gegen die Vorwürfe gewehrt, ihre Dienste hätten in großem Umfang mit dem US-Geheimdienst NSA (National Security Agency) zusammengearbeitet. Zu einem Bericht des Nachrichtenmagazins “Der Spiegel”, wonach das BfV NSA-Software zur großflächigen Ausspähung von Daten verwende, sagte Maaßen der Zeitung “Bild am Sonntag”, dass dies nur zur Testzwecken geschehe. Die zur Verfügung gestellte Software werde “derzeit” aber nicht für die Arbeit des BfV eingesetzt.
    Anzeige

    Auch BND-Chef Schindler sagte der Zeitung, es gebe keine “millionenfache monatliche Weitergabe von Daten aus Deutschland an die NSA” durch seinen Dienst. 2012 seien zwei einzelne personenbezogene Datensätze deutscher Staatsbürger an die NSA übermittelt worden. Die Zusammenarbeit mit der NSA habe er jüngst im Parlamentarischen Kontrollgremium vorgetragen.
    Riexinger fordert Suspendierung der Geheimdienst-Chefs

    “Der Spiegel” hatte am Samstag vorab aus seiner jüngsten Ausgabe berichtet, der Verfassungsschutz habe der NSA mit der Schnüffelsoftware “Xkeyscore” beim Datensammeln geholfen. Mit dem Programm könne unter anderem sichtbar gemacht werden, welche Begriffe eine Zielperson in eine Suchmaschine eingegeben habe. Auch sei das System in der Lage, teilweise auf Kommunikationsinhalte zuzugreifen.

    Der Vorsitzende der Partei Die Linke, Bernd Riexinger, forderte die Suspendierung Maaßens und Schindlers “bis zur vollständigen Klärung der Vorwürfe”. Alles spreche dafür, dass die deutschen Geheimdienste die “systematische Aushebelung von Grundrechten” betrieben hätten. Auch die Klärung der politischen Verantwortung müsse ohne Ansehen der Person vorangetrieben werden. Im kommenden Bundestag werde seine Partei deshalb die Einsetzung eines Untersuchungsausschusses beantragen, fügte Riexinger hinzu.
    Grüne fordern Änderung des Grundgesetzes

    Als Konsequenz aus der NSA-Datenaffäre fordern die Grünen eine Änderung des Grundgesetzes. In einem Beitrag für die “Frankfurter Rundschau” schreiben die Spitzenkandidaten Katrin Göring-Eckardt und Jürgen Trittin: “Was für Briefe gilt, muss für jede E-Mail und SMS gelten.” Deshalb wollen die Grünen “den Artikel 10 Grundgesetz – das Postgeheimnis – ausbauen, zu einem Kommunikations- und Mediennutzungsgeheimnis auch für die digitale Welt”.

    21. Juli 2013, 10:30 Uhr

    Find this story at 21 July 2013

    © stern.de

    Deutschland tiefer in US-Spionage verstrickt als angenommen; BND und Verfassungsschutz „testen“ NSA-Spähsoftware

    Der BND wisse seit Jahren von der nahezu totalen Datenerfassung
    Der Auslandsgeheimdienst BND und das Bundesamt für Verfassungsschutz nutzen laut eines Medienberichts eine Spähsoftware des US-amerikanischen Geheimdienstes NSA. Es gilt als eines der ergiebigsten Spionage-Programme und ermöglicht nahezu digitale Totalüberwachung.
    Was wissen Angela Merkel und ihre Minister in der Abhör-Affäre? Laut einem Bericht des Nachirchtenmagazins „Spiegel“ nutzen der Auslandsgeheimdienst BND und das Bundesamt für Verfassungsschutz eine Spähsoftware des US-amerikanischen Geheimdienstes NSA. Das berichtet das Magazin am Samstag auf seiner Internetseite. Das gehe aus geheimen Unterlagen der NSA hervor, die dem Magazin vorlägen. Demnach habe sich der BND um die Schulung des Verfassungsschutzes mit dem Umgang des Programms gekümmert. Der Verfassungsschutz, so das Magazin weiter, habe die NSA bei der Terrorbekämpfung unterstützt.

    Das System „XKeyscore“, um das es sich handele, sei ein ergiebiges Spionagewerkzeug, so der „Spiegel“ weiter. Es ermögliche die digitale Totalüberwachung und könne beispielsweise sichtbar machen, nach welchen Begriffen Zielpersonen im Internet gesucht haben. Von rund 500 Millionen Datensätzen aus Deutschland, auf die die NSA monatlich Zugriff habe, seien im Dezember 2012 etwa 180 Millionen von „Xkeyscore“ erfasst worden.

    Verantwortungslose Heuchelei
    In der Meldung des „Spiegel“ heißt es außerdem, dass sich die „Zusammenarbeit deutscher Dienste mit der NSA zuletzt intensiviert“ hätte. Weiterhin hätten die Amerikaner die deutschen Kollegen und den BND-Präsidenten Gerhard Schindler für ihren Eifer gelobt. In Afghanistan, so zitiert das Magazin aus einem internen Papier, sei der BND der „fleißigste Partner“ in Sachen Informationsbeschaffung. BND und Verfassungsschutz hätten sich auf Anfragen des „Spiegels“ aber nicht zum Einsatz des Spionagewerkzeugs geäußert.

    Die Hinweise auf eine Einbindung europäischer Nachrichtendienste in die Ausspähprogramme des US-Geheimdienstes NSA verdichten sich also. Nach Darstellung des früheren NSA-Chefs Michael Hayden im ZDF hatten die USA ihre Kooperation mit den Europäern nach den Anschlägen vom 11. September 2001 massiv ausgeweitet – und dabei keinen Zweifel an den Zielen gelassen: „Wir waren sehr offen zu unseren Freunden.“ Zu dieser Zeit regierten in Deutschland SPD und Grüne. Sie dringen nun auf rasche Aufklärung. Die CDU warf der Opposition deshalb „verantwortungslose Heuchelei“ vor.

    Samstag, 20.07.2013, 18:46
    dpa / Paul Zinken

    Find this story at 20 July 2013

    © FOCUS Online 1996-2013

    Merkel denies US spying ‘old news’ to army

    The German government Wednesday denied a report claiming that the nation’s military knew for years about the US surveillance programme PRISM revealed by fugitive former intelligence analyst Edward Snowden.

    Germany’s foreign intelligence service BND said that a separate programme with the same name existed for NATO forces in Afghanistan to share intelligence.

    The spokesman for Chancellor Angela Merkel, who faces elections on September 22, said he had no reason to doubt the BND statement.

    The issue is sensitive for Merkel, who said last week she only learnt about the scope of the US National Security Agency (NSA) snooping through media reports.

    Many Germans are angry that their emails, phone calls, web searches and other data have been captured and stored under the NSA programme.

    Any suggestion that the government failed to stop it or was complicit in it
    would spell political danger for Merkel, whose chancellery oversees Germany’s
    secret services.

    The mass-circulation daily Bild reported earlier that the German military
    command for northern Afghanistan had been informed of PRISM in September 2011

    in a letter from the Kabul command of the NATO-led International Security
    Assistance Force.

    According to Bild the letter mentioned that the programme was for phone
    and email surveillance and run by the NSA.

    However, the BND later said in a brief statement: “The programme referred
    to as PRISM in today’s Bild newspaper is a NATO/ISAF programme that is not
    identical to the PRISM programme of the NSA. It is also not classified as
    secret.”

    The BND also stressed that it “had no knowledge of the name, scope and extent of the NSA programme”.

    Merkel has testily told Washington that “we are not in the Cold War anymore” but also defended the role of secret services in keeping citizens safe and preventing terrorist attacks.

    Snowden, on the run from the US government, has been marooned at a Moscow
    airport since June 23 and on Tuesday filed an application for temporary asylum
    in Russia. Venezuela, Bolivia and Nicaragua have said they would be open to
    offering refuge to Snowden.

    Published: 17 Jul 2013 17:00 CET | Print version

    Find this story at 17 July 2013

    © The Local Europe GmbH

    Spähaffäre; Deutsche Geheimdienste außer Kontrolle

    Der NSA-Skandal geht in Woche sechs, doch die Aufklärung läuft schleppend. Die Spähaffäre wirft ein Schlaglicht auf das Geflecht von Bundesregierung, Parlament und Agenten-Apparat. Kann man Geheimdienste überhaupt kontrollieren?

    Berlin – Die Bundesregierung gerät im Skandal um amerikanische Spähaktivitäten zunehmend unter Druck – und zieht sich auf drei Formeln zurück. Erstens: Deutsche und ausländische Nachrichtendienste arbeiten zusammen. Zweitens: Von der Dimension der Spähprogramme habe man erst durch den Whistleblower Edward Snowden erfahren. Drittens: Details über die Arbeit deutscher Geheimdienste werden nicht öffentlich, sondern in Gremien beraten.

    In einem dieser Gremien ging die Debatte um die Spionageaffäre am Dienstag in die nächste Runde: Innenminister Hans-Peter Friedrich (CSU) war im Parlamentarischen Kontrollgremium zu Gast – eine vertraulich tagende Gruppe, die die deutschen Geheimdienste überwachen soll. Dreimal tagte das Gremium in den vergangenen Wochen. Viel klüger ist man allerdings noch immer nicht.

    Der NSA-Skandal wirft ein Licht auf das undurchsichtige Geflecht von Bundesregierung, Parlament und Geheimdiensten: Wer informiert wen? Kann man Nachrichtendienste überhaupt kontrollieren? Wie geht es jetzt weiter?

    Die wichtigsten Fragen und Antworten:

    1. Warum tagt das Gremium geheim?

    Die elf Mitglieder des Parlamentarischen Kontrollgremiums (PKG) setzen sich aus Innen- und Sicherheitsexperten aller Bundestagsfraktionen zusammen. Sie treffen sich in einem abhörsicheren, fensterlosen Raum in einem Nebengebäude des Reichstags, unweit der Kantine. Da die Arbeit der Geheimdienste naturgemäß geheim bleiben soll, ist die Gruppe zur Verschwiegenheit verpflichtet, auch gegenüber anderen Abgeordneten.

    Innenminister Friedrich berichtete am Dienstag dem PKG, was er während seines Besuchs in Washington an Informationen bekam. Ähnlich wie beim Bundessicherheitsrat, der über Rüstungsexporte entscheidet, dringen aber nur selten Details nach draußen, so auch dieses Mal.

    Bei der letzten Sitzung war Kanzleramtsminister Ronald Pofalla geladen, der unter anderem für die Koordinierung der Geheimdienste zuständig ist. Dazu die Chefs der drei Geheimdienste: Bundesnachrichtendienst (BND), Militärischer Abschirmdienst (MAD), Bundesamt für Verfassungsschutz (BfV). Die Grünen fordern, die Kanzlerin selbst müsse vor dem Gremium erscheinen. Das soll in absehbarer Zeit allerdings nicht passieren.

    Die Regierung muss das Gremium über die Arbeit der Geheimdienste und besondere Vorgänge unterrichten. Die Gruppe darf Geheimakten einsehen und Mitarbeiter der Dienste befragen.

    So weit die Theorie. In der Praxis kann die Arbeit frustrierend sein, denn was Bundesregierung und Geheimdienste für berichtenswert halten, entscheiden sie zunächst einmal selbst. Die Folge: Von wirklich heiklen Vorfällen oder möglichen Skandalen erfahren die Bundestagskontrolleure oft erst aus den Medien.

    2. Kann man Geheimdienste überhaupt kontrollieren?

    Zwar mag die Kontrolle hierzulande besser sein als anderswo. Doch eine echte Überwachung der Geheimdienste ist kaum möglich. Wie sollen elf Parlamentarier auch überblicken, was Zehntausende Agenten im In- und Ausland treiben?

    Der Grünen-Abgeordnete Hans-Christian Ströbele, Dienstältester im PKG, sagte einmal: “Wie sollen wir die Geheimdienste kontrollieren, wenn wir keine Informationen bekommen?” Der Abgeordnete Wolfgang Neskovic, der für die Linken bis 2012 im PKG saß, nannte das Kontrollniveau “erbärmlich”, das Gremium einen “Wachhund ohne Gebiss”. Geheimdienstler würden die Sitzungen als “Märchenstunde” verspotten.

    Neben dem PKG ist aber auch noch die beim Bundestag angesiedelte sogenannte G-10-Kommission für die Kontrolle der Geheimdienste zuständig. Der Name bezieht sich auf das “Gesetz zur Beschränkung des Brief-, Post- und Fernmeldegeheimnisses” (Artikel-10-Gesetz). Auch dieses Gremium tagt geheim. Es hat vier Mitglieder, die vom PKG bestellt werden. Sie müssen keine Bundestagsabgeordneten sein. Derzeit sitzt dem Gremium der SPD-Politiker Hans de With vor, der einst Parlamentarischer Staatssekretär im Justizministerium war.

    Die G-10-Kommission muss ihre Genehmigung erteilen, wenn Geheimdienste Computer oder Telefone anzapfen wollen, um deutsche Staatsbürger auszuspähen. Auch die Durchsuchung von Kommunikationsdaten nach bestimmten verdächtigen Schlagworten muss die Kommission genehmigen.

    2011 soll das Gremium den Inlandsgeheimdiensten insgesamt 156 Abhörmaßnahmen bewilligt haben. Die Gründe dafür sind im Gesetz festgelegt, unter anderem geht es um Terrorabwehr, Waffen- und Drogenschmuggel sowie organisierte Geldwäsche.

    Allerdings kann auch der Auslandsgeheimdienst BND bei der G-10-Kommission beantragen, im großen Stil Daten an den internationalen Internetknotenpunkten abzufischen. Eine flächendeckende Überwachung ist verboten, das Gesetz sieht eine Grenze von 20 Prozent vor. Die wird angeblich nicht ausgeschöpft, sondern “pendelt bei etwa fünf Prozent”, sagte jüngst Kommissionschef de With.

    3. Was wussten deutsche Agenten vom US-Lauschangriff?

    Darauf gibt es bislang keine abschließende Antwort. Die hiesigen Geheimdienstler sagen, sie hätten keine Hinweise darauf, dass an deutschen Kommunikationsknotenpunkten Daten abgesaugt wurden. Es gebe zwar eine Zusammenarbeit mit den US-Behörden. Über massenhafte Lauscheinsätze gegen deutsche Bürger sei man aber nicht informiert gewesen.

    Der Whistleblower Snowden hatte im SPIEGEL angegeben, deutsche und amerikanische Geheimdienste steckten in Sachen Internetüberwachung “unter einer Decke”. Auch ein Bericht der “Bild”-Zeitung wirft neue Fragen auf. Demnach wusste der BND angeblich seit Jahren von der nahezu kompletten Datenerfassung durch die Amerikaner und griff in Gefahrenlagen aktiv darauf zu.

    Derzeit kann nichts nachgewiesen, aber Zweifel können auch nicht ausgeräumt werden. Wenn deutsche Geheimdienste von den Aktionen der US-Dienste gewusst und diese möglicherweise unterstützt haben, wäre das nach deutschem Recht strafbar.

    4. Wie geht es jetzt weiter?

    Die Kanzlerin telefonierte mit US-Präsident Barack Obama, mehrere Fragenkataloge wurden verfasst, zwei Delegationen nach Washington geschickt. Zur Zeit wird gewartet: Darauf, dass die USA einige als geheim eingeordnete Dokumente deklassifizieren, also aus der Geheimhaltungsstufe herausheben. Von diesem Schritt verspricht sich Berlin Aufschluss über das Ausmaß der NSA-Aktivitäten. Weitere Besuche und Gespräche sind geplant.

    Teile der Opposition fordern einen parlamentarischen Untersuchungsausschuss. Schnelle Antworten gäbe es durch den aber auch nicht. Im EU-Parlament beschäftigt sich der Innenausschuss mit der Materie und will bis Ende des Jahres einen Bericht vorlegen. Zu einem Sonderausschuss konnte man sich in Straßburg nicht durchringen. Sechs Wochen nach den Enthüllungen sind also wichtige Fragen noch immer offen. Gut möglich, dass das Thema den Wahlkampf mitbestimmen wird – vor allem, wenn noch weitere Details herauskommen sollten.

    16. Juli 2013, 14:25 Uhr
    Von Annett Meiritz und Philipp Wittrock

    Find this story at 16 July 2013

    © SPIEGEL ONLINE 2013

    Daten über Entführte; Deutscher Geheimdienst profitierte von NSA-Sammelwut

    Noch immer behauptet die Bundesregierung eisern, sie habe von den US-Schnüffelprogrammen erst kürzlich erfahren. Nun wird klar, dass der BND schon vor Jahren gezielt in den USA nach gespeicherten Daten von entführten Deutschen fragte – und sie auch bekam.

    Berlin – Der Bundesnachrichtendienst (BND) hat in den vergangenen Jahren immer wieder von der Sammelwut der US-Geheimdienste im Internet profitiert und offenkundig von der kompletten Speicherung auch deutscher Daten gewusst. Unter Berufung auf US-Geheimdienstler berichtete die “Bild”-Zeitung am Montag, der deutsche Dienst habe bei Geiselnahmen im Jemen und Afghanistan in den vergangenen Jahren mehrfach gezielt um die von der NSA gespeicherten Internetdaten der Entführten gebeten. So sollten die letzten Kontakte der Gekidnappten und mögliche Hintergründe des Verschwindens recherchiert werden.

    Was sich wie eine selbstverständliche Amtshilfe unter befreundeten Diensten anhört, hat weitreichende Implikationen. Da der BND sich direkt wegen der gespeicherten Daten an die US-Kollegen wandte, müssen die Deutschen von dem Speicherprogramm der Amerikaner gewusst haben. Ebenso muss dem Geheimdienst klar gewesen sein, dass die USA auch deutsche Kommunikation standardmäßig speichern.

    Die neuen Fakten passen nicht zur angeblichen Ahnungslosigkeit der deutschen Regierung bis hoch ins Kanzleramt. Diesem ist der BND direkt unterstellt. Von dort ließ Kanzlerin Merkel noch in der vergangenen Woche mitteilen, sie habe erst aus der Presse vom Abhörprogramm Prism erfahren. Seit Anfang Juni enthüllt der Ex-Geheimdienstmitarbeiter Edward Snowden immer wieder Details über die Praktiken der internationalen Geheimdienste (eine Chronik der Affäre finden Sie hier).

    Für den BND waren die US-Daten sicherlich hilfreich. Bei Entführungen sind vor allem die letzten E-Mails und Telefongespräche wichtig. An ihnen kann man ablesen, ob die Opfer bedroht wurden, es geschäftliche Probleme im Vorfeld gab oder ob gar das Umfeld der Gekidnappten an der Verschleppung beteiligt sein könnte.

    Die Daten der NSA flossen laut “Bild”-Zeitung mehrfach in die Arbeit deutscher Krisenstäbe ein, um entführte Deutsche zu befreien. US-Regierungs- und Geheimdienstkreise betonen laut der Zeitung ebenfalls, dass der BND seit Jahren von der nahezu totalen Datenerfassung weiß, in Gefahrenlagen darauf zugreifen konnte – und dies auch aktiv tat.

    Auch in Zukunft sollen die Daten fließen

    Die Bundesregierung reagierte ausweichend auf diese Enthüllungen. Ein Regierungssprecher sagte lediglich, es sei “bekannt, dass es zwischen den deutschen Nachrichtendiensten und US-Diensten eine langjährige Kooperation gibt”.

    Tatsächlich aber bangen die Dienste derzeit um diese Kooperation. So bat Innenminister Hans-Peter Friedrich bei seiner US-Reise hinter verschlossenen Türen eindringlich, dass die USA trotz der Affäre auch in Zukunft NSA-Informationen weitergeben. Dies verlautete aus seinem Ministerium. Aus Friedrichs Sicht sind die US-Daten – ganz gleich wo sie herkommen – für die Gefahrenabwehr in Deutschland extrem wichtig. Öffentlich erwähnt hat er seine Bitte an die USA jedoch in keinem der vielen Statements während und nach der Reise.

    15. Juli 2013, 11:16 Uhr

    Find this story at 15 July 2013

    © SPIEGEL ONLINE 2013

    Indispensible Exchange; Germany Cooperates Closely with NSA

    German authorities insist they knew nothing of the NSA’s Internet spying operations. But SPIEGEL research shows how closely US and German agencies work together. The German opposition is asking uncomfortable questions 11 weeks ahead of a general election.

    Chancellor Angela Merkel’s government faces uncomfortable questions about German involvement in American and British Internet and telephone surveillance after whistleblower Edward Snowden told SPIEGEL that German agencies and the NSA are “in bed together.”

    With a general election due in 11 weeks, the controversy has opened up a new battleground in the campaign, and the opposition center-left Social Democrats (SPD) and the Green Party are charging onto it.

    SPD leader Sigmar Gabriel said it could be that Merkel “knows more than has become known so far.”

    Thomas Oppermann, a senior member of the SPD, called on the government to cancel surveillance cooperation agreements with the United States. Hans-Christian Ströbele, a lawmaker with the Greens, said he didn’t believe the government’s statements that it didn’t know about the spying.

    “For me it’s just a matter of time before the government admits something,” he told SPIEGEL ONLINE. Petra Pau of the Left Party said Merkel should stop “pretending she knew nothing.”

    For the last four weeks, the German government has been insisting that it didn’t know that the United States has spent years monitoring vast quantities of Internet traffic, emails and telephone calls.

    The parliament’s oversight committee monitoring German intelligence activities has met three times since the revelations came to light, and each time senior government representatives who had been called to testify shrugged their shoulders.

    The Federal Office for the Protection of the Constitution — Germany’s domestic intelligence agency — the BND foreign intelligence agency, and Merkel’s Chancellery were all apparently unaware of what has been going on. Interior Minister Hans-Peter Friedrich said he knew nothing but made clear that the data fishing by Germany’s American friends was bound to be OK. Criticism of it, he said, amounted to “anti-Americanism.”

    Germany Cooperates Closely With NSA

    But Snowden told SPIEGEL that the BND knew more about the activities of the NSA in Germany than previously known.

    SPIEGEL reporting also indicates that cooperation between the NSA and Germany’s foreign intelligence service, the BND, is more intensive than previously known.

    A lot is at stake for Europe and the US. This week talks will begin on the planned trans-Atlantic free trade agreement, the Transatlantic Trade and Invesment Partnership (TTIP). The Americans’ snooping could endanger the project.

    The Snowden case is entering its next round. At first he revealed how the NSA spes on data networks. Last week SPIEGEL reported that the US was also spying on its allies including Germany. Now the controversy has broadened to include whether the allies themselves are involved in the snooping.

    There are times when the inner workings of the world suddenly come to light. Veils fall to the ground and the world suddenly looks different. These are such times.

    A man does something that represents the best traditions of the West — he enlightens people, points out wrongdoing and opens eyes. That’s what Edward Snowden has done. And what’s happening to him? The West’s leading nation, the US, is hunting him down, and almost every country is going along with it, especially the rest of the West.

    Western Nations Kow-Towing to US

    Fear is governing the world, fear of the wrath of the US, fear of President Barack Obama who was once hailed as a global savior. Few seem ready to dare to take on the political and economic superpower.

    The West is making itself look ridiculous through submissiveness, by failing to live up to its own values. Meanwhile, states like China or Russia, the constant focus of Western moral finger-wagging, were the first where Snowden sought shelter.

    Last Wednesday, Merkel and Obama had a telephone conversation in which both tried to play down the row. There would be “opportunities for an intense exchange about these questions,” officials said afterwards. That wasn’t the tough talking that 78 percent of Germans are demanding of Merkel in her dealings with the US on the issue, according to a recent opinion poll by Infratest Dimap.

    This week a German government delegation will travel to Washington for talks with the Department of Homeland Security, the NSA and the US administration. They hope to glean information on what has been going on. When German opposition parties complained that the delegation only consisted of second-tier officials, Interior Minister Friedrich hastily decided to join them.

    9/11 Silenced Criticism of ‘Echelon’ Spying System

    Foreign data snooping has caused outrage in Germany and Europe before. Twelve years ago, a European Parliament committee criticized “Echelon,” which it described as a “global surveillance system for private and business communcations.” In a 200-page report, the committee said that within Europe, all communications via email, telephone and fax were regularly monitored by the intelligence services of the US, Britain, Canada and Australia.

    The European lawmakers recommended a series of rules and agreements to curb the snooping. But two months later, terrorists flew planes into the World Trade Center and it quickly emerged that some of them had lived in Germany. All criticism of “Echelon” fell abruptly silent.

    But the German government, despite all its current protestations of ignorance and innocence, cannot be unaware that US surveillance specialists remain active on German soil. At present the NSA is expanding its presence in Germany considerably.

    The best-known monitoring facility is in the Bavarian town of Bad Aibling, extensively described in the “Echelon” report. Officially, the Americans gave up the listening post in 2004. But the white domes of the “Echelon” system, known as radomes, are still there. When the site was officially turned over to civilian use, that didn’t apply to the area with the snooping technology. A connecting cable now transmits the captured signals to the site of the Mangfall army base a few hundred meters away. This is officially a German army communications base — but in truth it belongs to the BND. Cooperating closely with a handful of NSA surveillance specialists, the German foreign intelligence service analyzes telephone calls, faxes and everything else transmitted via satellite.

    BND Admits Monitoring Cooperation With NSA

    Officially, the BND post in Bad Aibling doesn’t exist, and neither does the local cooperation with the Americans. But in a confidential meeting with the parliament’s intelligence oversight committee, BND head Gerhard Schindler last Wednesday confirmed the cooperation with the US service,

    There are other locations in Germany where the Americans engage in data monitoring. The US army runs a top secret lstening post in the town of Griesheim near Darmstadt, in western Germany. Five radomes stand on the edge of the August-Euler airfield, hidden behind a little forest. If you drive past “Dagger Complex” you get suspicious looks from security guards. It’s forbidden to take photos. Inside, soldiers analyze information for the armed forces in Europe. The NSA supports the analysts.

    The need for data appears to be so great that the US army is building a new Consolidated Intelligence Center in the nearby city of Wiesbaden. The $124 million building will house bug-proof offices and a high-tech control center. As soon as it’s completed, “Dagger Complex” will be shut down. Only US construction firms are being used. Even the building materials are being brought in from the US and closely guarded along the way.

    Is it really conceivable that the German government knows nothing of what the NSA is doing on its own doorstep? Last month Interior Minister Friedrich said in a parliamentary debate on the NSA snooping: “Germany has fortunately been spared big attacks in recent years. We owe that in part to the information provided by our American friends.” Sentences like that reveal a pragmatic view of the US surveillance apparatus: What the NSA gets up to in detail is secondary — what counts is what its snooping reveals. And that information, intelligence officials admit, is indispensable.

    Without the tip-offs provided by the Americans, authorities would be partly blind in the fight against terrorism. While the BND and the Federal Office for the Protection of the Constitution are bound by strict rules, foreign intelligence agencies operating in Germany are largely uncontrolled in what they do, as long as it serves the war on terror.

    Frankfurt’s Role as East-West Data Crossroads

    The example of Frankfurt, Germany’s financial center, illustrates that. Frankfurt is a major crossroads for digital data. This where fiber-optic cables from Eastern Europe and Central Asia meet data lines from Western Europe. Emails, photos, telepone calls and tweets from crisis-hit countries in the Middle East also pass through Frankfurt. This is where international providers — companies like Deutsche Telekom or US firm Level 3, which claims to transmit a third of the world’s Internet traffic — operate digital hubs.

    For agencies like the NSA or BND, Frankfurt is an inexhaustible source of information. Documents provided by Snowden show that the NSA accesses half a billion pieces of communication each month. The BND also helps itself to data here. It is allowed to tap up to 20 percent of it. The service feeds data from five hubs in Germany for analysis to its headquarters in Pullach near Munich. Its analysts comb through the data for phone calls, emails or Internet messages that might uncover a nuclear smuggling deal or an al-Qaida plot.

    The BND uses the NSA’s help to analyze Internet traffic from the Middle East. The Americans provide the Germans with special tools that work with Arabic search terms. Does the US agency get access to the data in return? The BND denies this. All cooperation is in the form of assessing “finished intelligence,” or completed intelligence reports, it insists.

    But relations between the BND and NSA are closer than publicly admitted. They work together on clearly defined individual joint operations abroad when it comes to fighting terrorism or monitoring weapons shipments. At the Bad Aibling listening post, an NSA team works closely with BND agents. The BND uses Bad Aibling mainly to monitor Thuraya satellite phones used in remote regions of Pakistan and Afghanistan. The Americans help the Germans in this work. Is it really conceivable that with such close cooperation the one partner didn’t know what the other was doing?

    US Need Not Fear Much German Criticism

    “We have no information so far that Internet hubs in Germany were spied on by the NSA,” says the president of the Federal Office for the Protection of the Constitution, Hans-Georg Maassen. He also has no information on any snooping on the German government by the US. The agency has set up a working group to investigate Snowden’s allegations.

    In the end it’s relatively insignificant whether any light will be shed on the outflow of German Internet data to the US. The German authorities are unlikely to criticize the Americans too harshly. “We can be blackmailed,” said a high-ranking security official. “If the NSA shut off the tap, we’d be blind.”

    The US isn’t just a friend, it’s an all-powerful force one can choose to be friends with or not. The Snowden case shows how closely intertwined friendship and submissiveness can be.

    SVEN BECKER, THOMAS DARNSTÄDT, JENS GLÜSING, HUBERT GUDE, FRITZ HABEKUSS, KONSTANTIN VON HAMMERSTEIN, MARC HUJER, DIRK KURBJUWEIT, MATHIEU VON ROHR, MARCEL ROSENBACH, MATTHIAS SCHEPP, JÖRG SCHINDLER, GREGOR PETER SCHMITZ, CHRISTOPH SCHULT, HOLGER STARK
    07/08/2013 05:47 PM

    Find this story at 8 july 2013
    © SPIEGEL ONLINE 2013

    Police go in search of online pranksters

    Too much data surveillance?

    Not everybody has a sense of irony. Some people simply lack the ability to read between the lines. A funny, ironical remark left online could see the police come knocking at your door.

    “I’m known for my sense of irony. But even I would not have come to think of putting a statue of liberty in New York Harbor,” Irish Nobel Prize winner of Literature George Bernard Shaw once said. But, as far as we know, he got away with this sharp-tongued comment when trying to enter US territory, a comment that implicitly made fun of the US’ idea of liberty.

    But maybe he was only left alone because in the early 20th century, border officials did not yet have access to the vast amount of data about people desiring to cross into their countries as they do today. Today, every visitor seems transparent; and harmless but remarks are often interpreted as evil intentions. Shaw’s fellow countryman just experienced that.

    US Homeland security strike

    The young Irishman was denied entry by the US homeland security agency DHS at Los Angeles airport. The reason: an ironic remark on Twitter. The sender insists he wasn’t even targeting the US. On the contrary, he wanted to tell his followers that he was going to “party to the extreme in LA,” and he described it by saying that “digging out Marilyn Monroe” and “destroying America” were part of his plan. But immigration officers didn’t care much about his sense of humor. He spent 12 hours detained in a cell.
    Security comes first during border controls in the US

    “I can only advise against such remarks, even if you’re sure you’re being ironic,” said Klaus Lodigkeit, a Hamburg-based IT law specialist. “Americans store almost all our phonecalls, they store a lot online, and make backup copies. And if they search for a name or a nickname online and find such posts they can link to a certain person then you represent a danger for the security of the United States. So be careful.”

    Cheeky teenager

    But offhand and ironic remarks online can also be misinterpreted outside of airports’ immigration zones. Just before the verdict for security guard George Zimmerman was announced, the killer of black teenager Trayvon Martin, a 15-year-old in the small town of Zion in Illinois posted a comment online. If Zimmerman was acquitted, he wrote, he would shoot dead every single person in Zion and then also be acquitted of charges.

    A short while later, local police detained the teenager. After an examination, the officers were convinced he didn’t constitute a threat. “He doesn’t own any weapons and doesn’t have access to any either,” a police report said.

    Crazy or just foolish?

    18-year-old US citizen Justin Carter wasn’t that lucky. According to his parents, he had a fight with other users while playing a fantasy role-playing game online. When the users then wrote on Facebook that he was “a lunatic, crazy, and off his head,” Carter replied: “Yeah, sure I’m a total mess, I will go and shoot children at a school and eat their beating hearts.”

    He must have instantly realized that remarks like that are often misunderstood. He quickly added a ‘LOL’ [‘Laughing out loud’] and a ‘JK’ [‘Just Kidding’]. But it didn’t help: He spent several months in prison because of that comment on Facebook. He has been released on bail.

    “If you publish a concrete threat to life or physical condition online, the threat itself constitutes a criminal offence,” according to IT legal expert Lodigkeit. “It’s enough to be convicted. And you’re remanded in custody while investigations are conducted because you’re considered a flight risk.”
    The Pirate party criticizes online spying and surveillance activities by governments

    But does that give security agencies in Germany and the US the right to spy on private communication? “No,” said Mario Tants, spokesman for online freedom advocates the Pirate party in the German state of Schleswig-Holstein. “In the cases we’ve talked about, security authorities in the US didn’t screen private communication. Instead, what happened was that somebody who knew the respective perpetrator or potential perpetrator gave them hints. And if a real person gives a real hint, then security agencies are obliged to examine what’s going on.”

    ‘NSA spy protection league’

    The latest case from Germany is slightly more confusing in comparison. 28-year-old Daniel Bangert invited others on facebook to join him on a “Walk to the Dagger complex.” It’s a US-American installation near Darmstadt in the German state of Hesse, where the NSA is said to have underground offices. Bangert clearly used an ironic tone, calling his group the “NSA spy protection league,” inviting others to “explore and observe.”

    But the US military police in Germany apparently don’t share Bangert’s sense of humor. The Americans informed German security agencies who then visited the young man early in the morning and interrogated him. State security were also involved and asked Bangert questions about his “political leanings,” as he put it.

    “That’s exactly what we’re critical of,” said Mario Tants from the Pirates’ party. “In future, any citizen writing anything anywhere has to expect a visit by the police or state protection. That’s the problem in surveillance states, and we’re actually effectively already there.”

    Date 21.07.2013
    Author Marcus Lütticke / nh
    Editor Jessie Wingard

    Find this story at 21 July 2013

    © 2013 Deutsche Welle

    Spaziergang in Grieshei; Neue Spion-Safari am Dagger Complex

    Wegen eines angekündigten Spaziergangs zum streng geheimen Dagger Complex bekam Daniel Bangert Besuch vom Staatsschutz. Das schreckt ihn nicht ab: Jetzt lädt er zu einer zweiten Erkundungstour nach Griesheim, um “NSA-Spione” zu beobachten.

    Selten hat ein Spaziergang für so viel Aufsehen gesorgt: Der Griesheimer Daniel Bangert hatte auf Facebook scherzhaft dazu eingeladen, einen Erkundungsgang zum streng geheimen Dagger Complex zu unternehmen. Vor der abgeschotteten US-Einrichtung in der Nähe von Darmstadt wolle man “gemeinsam den bedrohten Lebensraum der NSA-Spione erforschen”.

    Der ironische Aufruf stieß auf Facebook zunächst nicht auf viele Interessenten, dafür aber bei der Polizei. Die US-Militärpolizei, die für die Sicherheit auf dem Dagger Complex zuständig ist, hatte die deutsche Polizei eingeschaltet – die Bangert prompt aus dem Bett klingelte. Danach kam auch noch der Staatsschutz vorbei und brachte Bangert dazu, seinen Spaziergang als Demo anzumelden, was er auch tat. Schließlich spazierten 70 Leute in Begleitung zweier Streifenwagen zu der abgeschotteten US-Einrichtung.

    Trotz oder wegen des ganzen Wirbels soll es nun einen weiteren Erkundungsgang geben. “Der Vorstand des NSA-Spion-Schutzbundes lädt Sie recht herzlich zum zweiten Entdecken und Beobachten Wochenende am Dagger Complex ein”, heißt es in einer öffentlichen Einladung auf Facebook.

    Ein Picknick auf der Straße

    Schließlich war die letzte demonstrative Entdeckertour zwar ein großer Medienerfolg, vom “wissenschaftlichen” Standpunkt aus gesehen aber ein Reinfall: “Ein Teil der Gruppe hat mit allerlei Lockrufen versucht, die NSA-Spione aus ihrem Bau zu locken”, schreibt Bangert in einem Rückblick auf Facebook. Leider habe man aber “keine echten NSA-Spione zu sehen” bekommen. Deshalb wolle man dieses Mal “im Anschluss an den Spaziergang ein Picknick auf der Straße vor dem Dagger Complex machen”. Vielleicht ließen sich die Spione ja “durch den Duft diverser Köstlichkeiten aus ihrem Bau locken”.

    Es sollen wieder viele Kameras mitgebracht werden, Papier und Stift, Verpflegung fürs Picknick und Blumen, “um den Lebensraum der NSA-Spione etwas aufzupeppen”. Verkleidungen sind erwünscht, und Theaterrequisiten, etwa in Form von Edward-Snowden-Masken, sind ausdrücklich erlaubt.

    Klingt alles wie beim letzten Mal – nur dürften sich diesmal wohl ein paar mehr spazierende Demonstranten einfinden, die aus den Medien vom Wirbel um den ersten Erkundungsgang erfahren haben. Deshalb steht in der aktuellen Einladung außerdem: Der Spaziergang und das anschließende Picknick seien selbstverständlich angemeldet.

    Die Teilnehmerzahl ist nicht abzuschätzen

    “Wie viele Teilnehmer es werden, ist völlig unberechenbar”, sagt Initiator Daniel Bangert, “das habe ich auch der Polizei gesagt: Es können 50 werden oder auch 1000, wobei ich das nicht glaube.” Er habe diesmal Kooperationsgespräche geführt, und wieder sei der Staatsschutz dabei gewesen, erzählt er. Auch wenn das womöglich in Darmstadt so üblich sei, irritiere ihn das.

    Trotzdem tut er sich den ganzen Stress gern an, angefangen bei den Formalitäten bis hin zu den Fragen der vielen Journalisten. “Ich finde einfach, dass da bei den Leuten mehr Interesse herrschen könnte”, begründet er seine Motivation. Und seine Geschichte zeige doch, “dass ein Einzelner sehr wohl etwas erreichen kann, auch ohne Mittel”.

    Ansonsten hofft er auf ein bisschen Hilfe durch die anderen selbsternannten Spion-Forscher: Es stünden mehr Ordner zur Verfügung; doch es wäre gut, wenn ein paar Teilnehmer Warnwesten mitbrächten.

    19. Juli 2013, 14:19 Uhr
    Von Judith Horchert

    Find this story at 19 July 2013

    © SPIEGEL ONLINE 2013

    Spy-spotter: joke about scary visit came true

    A German man who called on Facebook friends concerned about American secret service operations to join him in a walk around a US army spy centre near his home, found secret service men at his door checking his political leanings.

    Daniel Bangert, 28, told The Local he had joked about US spies reading what he had written – and had even told his friends he was waiting for a knock on the door – when it actually came.

    “I was still very sleepy when the phone rang – it was 7.17 in the morning – and a police officer started asking questions about what I was planning,” he said.

    “Then the doorbell rang and I saw out the window that a police van was parked outside. The officer on the phone said I should open the door to the others.”

    He put on a “Team Edward” T-shirt with a picture of NSA whistle-blower Edward Snowden, and answered scores of questions about his plans.

    Bangert, a veteran of the Blockupy protests in Frankfurt, had set up a group calling itself “NSA spy protection league” (NSA Spion Schutzbund), as if the US spies were an endangered species of birds.

    He wanted, he said, to take a walk with some friends to “observe them in their natural habitat” – the Dagger Complex in Griesheim near Darmstadt. This is one base where the NSA (US National Security Agency) is said to operate from. The authority stands accused of monitoring much of Germany’s internet traffic.

    The uniformed police seemed satisfied with his answers about the expected number of people on the walk – 32 had shown an interest, Bangert told The Local. But despite there being no specific agenda, and no plans for a rally or speeches, he was told he had to register the event.

    “I asked them why, but they could not really explain it to me. They couldn’t help me understand what the difference was between going for a walk and meeting up to play football – which you don’t have to register,” he said.

    A few hours later, his phone rang again, and one of the police officers who had been at his house that morning, told him the state security wanted to talk with him.

    “She said I should call them, that it was important that I did. So I did, and they asked me again about the Facebook entry, and how many people were expected and so on. Then they asked if I would go to see them or if they could come to see me for a personal conversation.”

    He said a state security agent arrived with a local police officer, and asked him a load of questions about his political activities and his opinions, and whether he had any connection to activists willing to use violence. They suggested his Facebook entry could be interpreted in different ways, but he said he was really just organizing a walk.

    “Then they told me I should not put the meeting on the internet, that I should not write about it,” he added.

    They seemed to be concerned that the walk could get out of control if lots of people showed up – like the Facebook parties which are hijacked by hoodlums. “But I was not offering anything for free like at the parties,” he said.

    “And in any case, all there is, is a fence, with nothing behind it – everything is underground. No-one is interested.”

    In the end around 80 people showed up on Saturday to take a walk, have a talk and look at the US base.

    The “NSA spy protection league” Facebook page says of the day: “A group of people young and old gathered at the Griesheim market square and walked to the NSA spy complex, in the most fabulous weather. On the way there, surveillance methods were discussed … and possible behaviour of the NSA spies was the subject of consideration.”

    It said some of the group had tried with various calls to tempt the NSA spies from the building, but none showed themselves. “Taking part in the walk was not enough, just to know that NSA spies are there – everyone agreed they wanted to see NSA spies with their own eyes. We will see what we can do.”

    Hannah Cleaver
    Published: 15 Jul 2013 17:44 CET | Print version

    Find this story at 15 July 2013

    © The Local Europe GmbH

    C.I.A. Report Finds Concerns With Ties to New York Police

    WASHINGTON — Four Central Intelligence Agency officers were embedded with the New York Police Department in the decade after Sept. 11, 2001, including one official who helped conduct surveillance operations in the United States, according to a newly disclosed C.I.A. inspector general’s report.

    That officer believed there were “no limitations” on his activities, the report said, because he was on an unpaid leave of absence, and thus exempt from the prohibition against domestic spying by members of the C.I.A.

    Another embedded C.I.A. analyst — who was on its payroll — said he was given “unfiltered” police reports that included information unrelated to foreign intelligence, the C.I.A. report said.

    The once-classified review, completed by the C.I.A. inspector general in December 2011, found that the four agency analysts — more than had previously been known — were assigned at various times to “provide direct assistance” to the local police. The report also raised a series of concerns about the relationship between the two organizations.

    The C.I.A. inspector general, David B. Buckley, found that the collaboration was fraught with “irregular personnel practices,” that it lacked “formal documentation in some important instances,” and that “there was inadequate direction and control” by agency supervisors.

    “While negative public perception is to be expected from the revelation of the agency’s close and direct collaboration with any local domestic police department, a perception that the agency has exceeded its authorities diminishes the trust placed in the organization,” Mr. Buckley wrote in a cover memo to David H. Petraeus, then the C.I.A. director.

    The declassification of the executive summary, in response to a Freedom of Information Act suit, comes at a time of intense interest in domestic spying after leaks by a former contractor for the National Security Agency.

    It also comes amid lawsuits against the Police Department alleging unconstitutional surveillance of Muslim communities and mosques in New Jersey and New York. And a group of plaintiffs from a 1971 lawsuit over harassment of political groups by the Police Department’s so-called Red Squad has asked a judge to tighten guidelines stemming from that case on police investigations involving political or religious activity.

    Paul J. Browne, a police spokesman, said that the lawsuits were without merit. He also said that the inspector general had found nothing illegal and that the last embedded C.I.A. official left the police in 2012.

    “We’re proud of our relationship with C.I.A. and its training,” he said, saying it was partly responsible for the absence of casualties from a terror attack in New York in the years since Sept. 11 and the anthrax attacks. He added that the terrorists “keep coming and we keep pushing back.”

    The C.I.A.-Police Department partnership dates from 2002, when David Cohen, a former C.I.A. officer who became deputy commissioner for intelligence at the Police Department after the Sept. 11 attacks, reached out to his former agency in building up its counterterrorism abilities.

    The inspector general’s office began the investigation in August 2011 after The Associated Press published an article about the C.I.A.’s relationship with the Police Department’s intelligence division. It was part of a series about New York police surveillance of Muslims that was later awarded a Pulitzer Prize for investigative reporting.

    When the classified report was completed in 2011, spokesmen for the C.I.A. and the Police Department said it had concluded that the C.I.A. had not violated a law and an executive order that prohibited it from domestic spying or performance of law-enforcement powers. But the document shows that that conclusion was not the whole story. The inspector general warned in his cover letter that the collaboration raised “considerable and multifaceted” risks for the agency.

    This week, it released an executive summary and cover memo in response to a Freedom of Information Act lawsuit filed by the Electronic Privacy Information Center, a nonprofit civil-liberties group, which provided it to The New York Times.

    “The C.I.A. is not permitted to engage in domestic surveillance,” said Ginger McCall, the director of the group’s Open Government Project. “Despite the assurances of the C.I.A.’s press office, the activities documented in this report cross the line and highlight the need for more oversight.”

    Dean Boyd, a C.I.A. spokesman, said the inspector general found no legal violations or evidence that the agency’s support to the Police Department constituted “domestic spying.”

    “It should come as no surprise that, after 9/11, the C.I.A. stepped up its cooperation with law enforcement on counterterrorism issues or that some of that increased cooperation was in New York,” he said in an e-mail. “The agency’s operational focus, however, is overseas, and none of the support we have provided to N.Y.P.D. can rightly be characterized as ‘domestic spying’ by the C.I.A. Any suggestion along those lines is simply wrong.”

    The report shows that the first of the four embedded agency officers began as an adviser in 2002 and went on an unpaid leave from the agency from 2004 to 2009. During that latter period, it said, he participated in — and directed — “N.Y.P.D. investigations, operations, and surveillance activities directed at U.S. persons and non-U.S. persons.”

    The official received a Police Department paycheck. He told the inspector general that he “did not consider himself an agency officer and believed he had ‘no limitations’ as far as what he could or could not do.” C.I.A. lawyers said that officials on unpaid leave who are “acting in a personal capacity and not subject to C.I.A. direction” are not constrained by the law barring the agency from domestic security functions, the report said.

    Another C.I.A. analyst was detailed to the Police Department in early 2008 and remained on the agency’s payroll. From about February to April 2008, he told the inspector general he had received daily files, including the police intelligence division’s investigative reports “that he believed were unfiltered.”

    That meant they had not been prescreened to remove information unrelated to foreign intelligence information, like evidence of domestic criminal activity. Later, the report says, the system was changed and police analysts gave him printouts of only those reports deemed to have potential foreign-intelligence information — about 10 to 12 a day.

    Still, a former Police Department intelligence analyst who now works for the C.I.A.’s National Clandestine Service maintained that the embedded C.I.A. official had not had “unrestricted or unfiltered access” to the reports. The inspector general did not clear up the discrepancy.

    Meanwhile, the Police Department sent a detective to the C.I.A. from October 2008 to November 2009 to “receive agency operational training to enhance the capability” of its intelligence division’s counterterrorism efforts in the metropolitan area.

    Two other agency officials also worked for a period at the Police Department. One “spent considerable time and effort trying to help N.Y.P.D. improve its volatile relationship with the local F.B.I.,” and the report said senior agency officials expressed concern that the arrangement had “placed the agency in the middle of a contentious relationship.”

    “The revelation of these issues,” Mr. Buckley wrote, “leads me to conclude that the risks associated with the Agency’s relationship with the N.Y.P.D. were not fully considered and that there was inadequate direction and control by the agency managers responsible for the relationship.”

    June 26, 2013
    By CHARLIE SAVAGE

    Find this story at 26 June 2013

    © 2013 The New York Times Company

    C.I.A. TIE REPORTED IN MANDELA ARREST

    The Central Intelligence Agency played an important role in the arrest in 1962 of Nelson Mandela, the African National Congress leader who was jailed for nearly 28 years before his release four months ago, a news report says.

    The intelligence service, using an agent inside the African National Congress, provided South African security officials with precise information about Mr. Mandela’s activities that enabled the police to arrest him, said the account by the Cox News Service.

    The report, scheduled for publication on Sunday, quoted an unidentified retired official who said that a senior C.I.A. officer told him shortly after Mr. Mandela’s arrest: ”We have turned Mandela over to the South African Security branch. We gave them every detail, what he would be wearing, the time of day, just where he would be.”

    Mark Mansfield, a spokesman for the agency, declined to comment on the news-service report. ”As a matter of policy, we do not discuss allegations of intelligence activities,” he said.

    Protecting Pretoria’s Rule

    Reports that American intelligence tipped off the South African officials who arrested Mr. Mandela have circulated for years. Newsweek reported in February that the agency was believed to have been involved.

    Mr. Mandela is scheduled to visit the United States beginning June 20 for a five-city tour that will include talks with President Bush and a speech before a joint meeting of Congress.

    The news-service report said that at the time of Mr. Mandela’s arrest in August 1962, the C.I.A. devoted more resources to penetrating the activities of nationalist groups like the African National Congress than did South Africa’s then-fledgling security service.

    The account said the American intelligence agency was willing to assist in the apprehension of Mr. Mandela because it was concerned that a successful nationalist movement threatened a friendly South African Govenment. Expansion of such movements outside South Africa’s borders, the agency feared, would jeopardize the stability of other African states, the account said.

    Arrest at a Roadblock

    A retired South African intelligence official, Gerard Ludi, was quoted in the report as saying that at the time of Mr. Mandela’s capture, the C.I.A. had put an undercover agent into the inner circle of the African National Congress group in Durban.

    That agent provided the intelligence service with detailed accounts of the organization’s activities, including information on the whereabouts of Mr. Mandela, then being sought as a fugitive for his anti-apartheid activities.

    The morning after a secret dinner party with other congress members in Durban, Mr. Mandela, dressed as a chauffeur, ran into a roadblock. He was immediately recognized and arrested.

    The retired official said that because of concern over the propriety of the C.I.A.’s actions in the Mandela case, ”higher authorities” required that the State Department approve any similar operations in the future. The report said the State Department refused on at least three occasions to allow the agency to provide South African officials with information about other dissidents.

    By DAVID JOHNSTON, Special to The New York Times
    Published: June 10, 1990

    Find this story at 10 June 1990

    Copyright 2013 The New York Times Company

    Ex-official: Cia Helped Jail Mandela

    WASHINGTON — For nearly 28 years the U.S. government has harbored an increasingly embarrassing secret: A CIA tip to South African intelligence agents led to the arrest that put black nationalist leader Nelson Mandela in prison for most of his adult life.

    But now, with Mandela en route to the U.S. to a hero`s welcome, a former U.S. official has revealed that he has known of the CIA role since Mandela was seized by agents of the South African police special branch on Aug. 5, 1962.

    The former official, now retired, said that within hours after Mandela`s arrest Paul Eckel, then a senior CIA operative, walked into his office and said approximately these words: “We have turned Mandela over to the South African security branch. We gave them every detail, what he would be wearing, the time of day, just where he would be. They have picked him up. It is one of our greatest coups.“

    With Mandela out of prison, the retired official decided there is no longer a valid reason for secrecy. He called the American role in the affair

    “one of the most shameful, utterly horrid“ byproducts of the Cold War struggle between Moscow and Washington for influence in the Third World.

    Asked about the tip to South African authorities, CIA spokesman Mark Mansfield said: “Our policy is not to comment on such allegations.“

    Reports that American intelligence tipped off the South African officials who arrested Mandela have circulated for years. Newsweek reported in February that the agency was believed to have been involved.

    Mandela, now 71, arrives in the United States June 20 as part of an international tour to bolster the anti-apartheid movement. The deputy African National Congress president, widely regarded as the world`s pre-eminent political prisoner when he finally was released in February, is due to be honored by a ticker-tape Broadway parade and to address a joint session of Congress.

    But in 1962 the CIA`s covert branch saw the African National Congress as a threat to the stability of a friendly South African government. At the time, that government not only had just signed a military cooperation agreement with the United States but also served as an important source of uranium.

    The CIA knew of Mandela`s whereabouts because it had put an undercover agent into the inner circle of the African National Congress group in Durban, according to Gerard Ludi, a retired South African intelligence official.

    Mandela was being sought as a fugitive for his anti-apartheid activities. The morning after a secret dinner party with other congress members in Durban, Mandela, dressed as a chauffeur, ran into a roadblock. He was immediately recognized and arrested.

    June 10, 1990|By Joseph Albright and Marcia Kunstel, Cox News Service.

    Find this story at 10 June 1990

    © www.chicagotribune.com

    Former Black Panther Assata Shakur Added to FBI’s Most Wanted Terrorist List

    Update: Watch our interview on Assata Shakur with her attorney Lennox Hines & scholar Angela Davis.

    The FBI added Assata Shakur to its Most Wanted Terrorist List today. In addition, the state of New Jersey announced it was adding $1 million to the FBI’s $1 million reward for her capture. Shakur becomes the first woman ever to make the list and only the second domestic terrorist to be added to the list.

    Assata Shakur, the former Joanne Chesimard, was a member of the Black Panther Party and Black Liberation Army. She was convicted in the May 2, 1973 killing of a New Jersey police officer during a shoot-out that left one of her fellow activists dead. She was shot twice by police during the incident. In 1979, she managed to escape from jail. Shakur fled to Cuba where she received political asylum. She once wrote, “I am a 20th century escaped slave. Because of government persecution, I was left with no other choice than to flee from the political repression, racism and violence that dominate the U.S. government’s policy towards people of color.”

    In 1998, Democracy Now! aired Shakur reading an open letter to Pope John Paul II during his trip to Cuba. She wrote the message after New Jersey state troopers sent the Pope a letter asking him to call for her extradition.

    RUSH TRANSCRIPT
    I hope this letter finds you in good health, in good disposition, and enveloped with the spirit of goodness. I must confess that it had never occurred to me before to write you, and I find myself overwhelmed and moved to have this opportunity.

    Although circumstances have compelled me to reach out to you, I am glad to have this occasion to try and cross the boundaries that would otherwise tend to separate us.

    I understand that the New Jersey State Police have written to you and asked you to intervene and to help facilitate my extradition back to the United States. I believe that their request is unprecedented in history. Since they have refused to make their letter to you public, although they have not hesitated to publicize their request, I am completely uninformed as to the accusations they are making against me. Why, I wonder, do I warrant such attention? What do I represent that is such a threat?

    Please let me take a moment to tell you about myself. My name is Assata Shakur and I was born and raised in the United States. I am a descendant of Africans who were kidnapped and brought to the Americas as slaves. I spent my early childhood in the racist segregated South. I later moved to the northern part of the country, where I realized that Black people were equally victimized by racism and oppression.

    I grew up and became a political activist, participating in student struggles, the anti-war movement, and, most of all, in the movement for the liberation of African Americans in the United States. I later joined the Black Panther Party, an organization that was targeted by the COINTELPRO program, a program that was set up by the Federal Bureau of Investigation to eliminate all political opposition to the U.S. government’s policies, to destroy the Black Liberation Movement in the United States, to discredit activists and to eliminate potential leaders.

    Under the COINTELPRO program, many political activists were harassed, imprisoned, murdered or otherwise neutralized. As a result of being targeted by COINTELPRO, I, like many other young people, was faced with the threat of prison, underground, exile or death. The FBI, with the help of local police agencies, systematically fed false accusations and fake news articles to the press accusing me and other activists of crimes we did not commit. Although in my case the charges were eventually dropped or I was eventually acquitted, the national and local police agencies created a situation where, based on their false accusations against me, any police officer could shoot me on sight. It was not until the Freedom of Information Act was passed in the mid-’70s that we began to see the scope of the United States government’s persecution of political activists.

    At this point, I think that it is important to make one thing very clear. I have advocated and I still advocate revolutionary changes in the structure and in the principles that govern the United States. I advocate self-determination for my people and for all oppressed inside the United States. I advocate an end to capitalist exploitation, the abolition of racist policies, the eradication of sexism, and the elimination of political repression. If that is a crime, then I am totally guilty.

    To make a long story short, I was captured in New Jersey in 1973, after being shot with both arms held in the air, and then shot again from the back. I was left on the ground to die and when I did not, I was taken to a local hospital where I was threatened, beaten and tortured. In 1977 I was convicted in a trial that can only be described as a legal lynching.

    In 1979 I was able to escape with the aid of some of my fellow comrades. I saw this as a necessary step, not only because I was innocent of the charges against me, but because I knew that in the racist legal system in the United States I would receive no justice. I was also afraid that I would be murdered in prison. I later arrived in Cuba where I am currently living in exile as a political refugee.

    The New Jersey State Police and other law enforcement officials say they want to see me brought to “justice.” But I would like to know what they mean by “justice.” Is torture justice? I was kept in solitary confinement for more than two years, mostly in men’s prisons. Is that justice? My lawyers were threatened with imprisonment and imprisoned. Is that justice? I was tried by an all-white jury, without even the pretext of impartiality, and then sentenced to life in prison plus 33 years. Is that justice?

    Let me emphasize that justice for me is not the issue I am addressing here; it is justice for my people that is at stake. When my people receive justice, I am sure that I will receive it, too. I know that Your Holiness will reach your own conclusions, but I feel compelled to present the circumstances surrounding the application of so-called “justice” in New Jersey. I am not the first or the last person to be victimized by the New Jersey system of “justice.” The New Jersey State Police are infamous for their racism and brutality. Many legal actions have been filed against them and just recently, in a class action legal proceeding, the New Jersey State Police were found guilty of having an, quote, “officially sanctioned, de facto policy of targeting minorities for investigation and arrest,” unquote.

    Although New Jersey’s population is more than 78 percent white, more than 75 percent of the prison population is made up of Blacks and Latinos. Eighty percent of women in New Jersey prisons are women of color. There are 15 people on death row in the state and seven of them are Black. A 1987 study found that New Jersey prosecutors sought the death penalty in 50 percent of cases involving a Black defendant and a white victim, but only 28 percent of cases involving a Black defendant and a Black victim.

    Unfortunately, the situation in New Jersey is not unique, but reflects the racism that permeates the entire country. The United States has the highest rate of incarceration in the world. There are more than 1.7 million people in U.S. prisons. This number does not include the more than 500,000 people in city and county jails, nor does it include the alarming number of children in juvenile institutions. The vast majority of those behind bars are people of color and virtually all of those behind bars are poor. The result of this reality is devastating. One third of Black men between the ages of 20 and 29 are either in prison or under the jurisdiction of the criminal justice system.

    Prisons are big business in the United States, and the building, running, and supplying of prisons has become the fastest growing industry in the country. Factories are being moved into the prisons and prisoners are being forced to work for slave wages. This super-exploitation of human beings has meant the institutionalization of a new form of slavery. Those who cannot find work on the streets are forced to work in prison.

    Not only are the prisons used as instruments of economic exploitation, they also serve as instruments of political repression. There are more than 100 political prisoners in the United States. They are African Americans, Puerto Ricans, Chicanos, Native Americans, Asians, and progressive white people who oppose the policies of the United States government. Many of those targeted by the COINTELPRO program have been in prison since the early 1970s.
    Although the situation in the prisons is an indication of human rights violations inside the United States, there are other, more deadly indicators.

    There are currently 3,365 people now on death row, and more than 50 percent of those awaiting death are people of color. Black people make up only 13 percent of the population, but we make up 41.01 percent of persons who have received the death penalty. The number of state assassinations has increased drastically. In 1997 alone, 71 people were executed.

    A special rapporteur appointed by the United Nations organization found serious human rights violations in the United States, especially those related to the death penalty. According to his findings, people who were mentally ill were sentenced to death, people with severe mental and learning disabilities, as well as minors under 18. Serious racial bias was found on the part of judges and prosecutors. Specifically mentioned in the report was the case of Mumia Abu-Jamal, the only political prisoner on death row, who was sentenced to death because of his political beliefs and because of his work as a journalist, exposing police brutality in the city of Philadelphia.

    I believe that some people spell God with one “O” while others spell it with two. What we call God is unimportant, as long as we do God’s work. There are those who want to see God’s wrath fall on the oppressed and not on the oppressors. I believe that the time has ended when slavery, colonialism, and oppression can be carried out in the name of religion. It was in the dungeons of prison that I felt the presence of God up close, and it has been my belief in God, and in the goodness of human beings that has helped me to survive. I am not ashamed of having been in prison, and I am certainly not ashamed of having been a political prisoner. I believe that Jesus was a political prisoner who was executed because he fought against the evils of the Roman Empire, because he fought against the greed of the money changers in the temple, because he fought against the sins and injustices of his time. As a true child of God, Jesus spoke up for the poor, for the meek, for the sick, and the oppressed. The early Christians were thrown into lions’ dens. I will try and follow the example of so many who have stood up in the face of overwhelming oppression.

    I am not writing to ask you to intercede on my behalf. I ask nothing for myself. I only ask you to examine the social reality of the United States and to speak out against the human rights violations that are taking place.

    On this day, the birthday of Martin Luther King, I am reminded of all those who gave their lives for freedom. Most of the people who live on this planet are still not free. I ask only that you continue to work and pray to end oppression and political repression. It is my heartfelt belief that all the people on this earth deserve justice: social justice, political justice, and economic justice. I believe it is the only way we will ever achieve peace and prosperity on this earth. I hope that you enjoy your visit to Cuba. This is not a country that is rich in material wealth, but it is a country that is rich in human wealth, spiritual wealth and moral wealth.

    Respectfully yours,
    Assata Shakur
    Havana, Cuba

    Find this story at 2 May 2013

    Former Black Panther Assata Shakur Becomes First Woman On FBI’s Most Wanted Terrorist List

    Assata Shakur, an ex member of the Black Panthers who escaped from prison and fled to Cuba in 1979, has officially been added to the FBI’s Most Wanted Terrorist list, making her the first woman ever. Shakur — born JoAnne Byron (married name Chesimard) — was a member of the Black Panthers and the Black Liberation Army when she was convicted of killing a New Jersey police officer in 1973. In 1979, she managed to escape from prison and fled to Cuba, where she was granted political asylum and has been ever since. Since 2005, the FBI has classified her as a domestic terrorist and has offered a $1 million reward for her capture. Yesterday, the 40-year anniversary of the New Jersey Turnpike shootout, they upgraded her to the 10 Most Wanted List.

    There’s a lot to read and sift through in regards to Shakur’s involvement in that incident and the various other crimes of which she was accused and convicted. Shakur has long maintained her innocence in regards to the death of New Jersey State Trooper Werner Foerster on May 2, 1973, and during her trial, her defense team presented testimony from medical experts that asserted the wounds Shakur obtained during the shootout — she was shot in both arms and the shoulder — would have made it impossible for her to fire upon Foerster. Additionally, during the trial, one of the prosecution’s primary witnesses, the other officer present (and wounded) at the shootout, Trooper James Harper, admitted he’d lied in all three of his initial statements when he said Shakur shot and killed Foerster and also shot at him. He admitted on the stand that he had in fact never seen Shakur with a gun and that she did not shoot at him. There was also no gunpowder found on Shakur’s fingers. (Shakur testified that after she was shot by Foerster, she took cover for the duration of the gunfight.) In the end, the all-white, 15-person jury, five of whom had personal ties to state troopers, convicted Shakur of all eight counts (two murder charges and six assault charges). She was sentenced to 26 to 33 years in prison.

    Of her conviction and eventual escape to Cuba, Shakur once wrote, ”I am a 20th century escaped slave. Because of government persecution, I was left with no other choice than to flee from the political repression, racism and violence that dominate the U.S. government’s policy towards people of color.” There have been numerous attempts to have her extradited, including an appeal to Pope John Paul II in 1998. In response, Shakur wrote a letter to the Pope which you can read here.

    Amelia McDonell-ParryMay 3, 2013

    Find this story at 3 May 2013

    © The Frisky is a member of Spin Entertainment, a division of SpinMedia

    When states monitored their citizens we used to call them authoritarian. Now we think this is what keeps us safe

    The internet is being snooped on and CCTV is everywhere. How did we come to accept that this is just the way things are?

    These days we are all supects, or at least consumers. Photograph: Alamy

    America controls the sky. Fear of what America might do can make countries divert planes – all because Edward Snowden might be on one.

    Owning the sky has somehow got to me more than controlling the internet. Maybe because I am a simpleton and sometimes can only process what I can see – the actual sky, rather than invisible cyberspace in which data blips through fibre-optic cables.

    Thus the everyday internet remains opaque to all but geeks. And that’s where I think I have got it wrong. My first reaction to the Prism leaks was to make stupid jokes: Spies spy? Who knew? The fact that Snowden looked as if he came from central casting didn’t help. Nor did the involvement of Julian Assange, a cult leader who should be in Sweden instead of a cupboard in an embassy.

    What I failed to grasp, though, was quite how much I had already surrendered my liberty, not just personally but my political ideals about what liberty means. I simply took for granted that everyone can see everything and laughed at the idea that Obama will be looking at my pictures of a cat dressed as a lobster. I was resigned to the fact that some random FBI merchant will wonder at the inane and profane nature of my drunken tweets.

    Slowly but surely, The Lives of Others have become ours. CCTV cameras everywhere watch us, so we no longer watch out for each other. Public space is controlled. Of course, much CCTV footage is never seen and often useless. But we don’t need the panopticon once we have built one in our own minds. We are all suspects.

    Or at least consumers. iTunes thinks I might like Bowie; Amazon thinks I want a compact tumble dryer. Really? Facebook seems to think I want to date men in uniform. I revel in the fact that the algorithms get it as wrong as the man who knocks on my door selling fish out of a van. “And not just fish,” as he sometimes says mysteriously.

    But how did I come to accept that all this data gathered about me is just the way it is? Wasn’t I once interested in civil liberties? Indeed, weren’t the Lib Dems? Didn’t freedom somehow incorporate the idea of individual privacy? When the state monitored all its citizens as though they were suspects – whether in East Germany or North Korea – we called it authoritarianism. Now we think it is what keeps us safe.

    In 2009 I sat on a panel with Vince Cable at the cross-party Convention on Modern Liberty. Cable told us that a recession could provide the preconditions for fascism. Gosh, I thought, that’s a bit strong. Then the recession hit and austerity became the narrative that subsumed all debates about freedom. No one poor is free, and it is no coincidence that the poor are the most snooped on of all.

    What Snowden, who is no spy, has revealed is the nature of the game: that surveillance is a huge private industry; that almost full control of the internet has been achieved already; that politicians here and in the US have totally acquiesced to industrial-scale snooping. There is a generation now made up of people who will never have had a private conversation online or by phone. These are my children. And should they or anyone else want to organise against the powers that be, they will be traceable. We have sleepwalked into this because liberty remains such an alien concept, still. But the US has the fourth amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizure, shall not be violated.”

    It has been violated. Bradley Manning is in prison, Guantánamo remains open, CIA agents who spoke out about waterboarding are banged up. And there are other kinds of whistleblowers who conveniently kill themselves. The letter from Daniel Somers, who served in Iraq, says he was made to do things he could not live with. He described his suicide as a mercy killing and reminded us that 22 veterans kill themselves every day. This is not whistleblowing. It is screaming into a void.

    But we remain passive while other European countries are angry at what Snowden has told us. We maintain the special relationship. For Snowden, the truth will not set him free, it will imprison him for ever. We now debate whether we should exchange liberty for security, but it is too late. As John Locke said: “As soon as men decide all means are permitted to fight an evil, then their good becomes indistinguishable from the evil they set out to destroy.” He could have been talking about our passivity.

    When did you surrender your freedom to communicate, something that was yours and yours alone, whether an email to a lover or a picture of your child? Ask yourself, do you feel safer now you know that you have no secrets? Now, the intimacies that are of no import to anyone but you have been subject to virtual extraordinary rendition. Because, fundamentally, your government does not trust you. Why therefore should you trust it?

    Suzanne Moore
    The Guardian, Wednesday 3 July 2013 20.00 BST

    Find this story at 3 July 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Job Title Key to Inner Access Held by Snowden

    WASHINGTON — Intelligence officials refer to Edward J. Snowden’s job as a National Security Agency contractor as “systems administrator” — a bland name for the specialists who keep the computers humming. But his last job before leaking classified documents about N.S.A. surveillance, he told the news organization The Guardian, was actually “infrastructure analyst.”

    It is a title that officials have carefully avoided mentioning, perhaps for fear of inviting questions about the agency’s aggressive tactics: an infrastructure analyst at the N.S.A., like a burglar casing an apartment building, looks for new ways to break into Internet and telephone traffic around the world.

    That assignment helps explain how Mr. Snowden got hold of documents laying bare the top-secret capabilities of the nation’s largest intelligence agency, setting off a far-reaching political and diplomatic crisis for the Obama administration.

    Even as some members of Congress have challenged the N.S.A.’s collection of logs of nearly every phone call Americans make, European officials furiously protested on Sunday after Mr. Snowden’s disclosure that the N.S.A. has bugged European Union offices in Washington and Brussels and, with its British counterpart, has tapped the Continent’s major fiber-optic communications cables.

    On Sunday evening, The Guardian posted an article saying documents leaked by Mr. Snowden show 38 embassies and missions on a list of United States electronic surveillance targets. Some of those offices belong to allies like France, Italy, Japan and Mexico, The Guardian said.

    Mr. Snowden, who planned his leaks for at least a year, has said he took the infrastructure analyst position with Booz Allen Hamilton in Hawaii in March, evidently taking a pay cut, to gain access to a fresh supply of documents.

    “My position with Booz Allen Hamilton granted me access to lists of machines all over the world the N.S.A. hacked,” he told The South China Morning Post before leaving Hong Kong a week ago for Moscow, where he has been in limbo in the transit area of Sheremetyevo airport. “That is why I accepted that position about three months ago.”

    A close reading of Mr. Snowden’s documents shows the extent to which the eavesdropping agency now has two new roles: It is a data cruncher, with an appetite to sweep up, and hold for years, a staggering variety of information. And it is an intelligence force armed with cyberweapons, assigned not just to monitor foreign computers but also, if necessary, to attack.

    After the 2001 terrorist attacks, the documents suggest, the N.S.A. decided it was too risky to wait for leads on specific suspects before going after relevant phone and Internet records. So it followed the example of the hoarder who justifies stacks of paper because someday, somehow, a single page could prove vitally important.

    The agency began amassing databases of “metadata” — logs of all telephone calls collected from the major carriers and similar data on e-mail traffic. The e-mail program was halted in 2011, though it appears possible that the same data is now gathered in some other way.

    The documents show that America’s phone and Internet companies grew leery of N.S.A. demands as the years passed after 9/11, fearing that customers might be angry to find out their records were shared with the government. More and more, the companies’ lawyers insisted on legal orders to compel them to comply.

    So the N.S.A. came up with a solution: store the data itself. That is evidently what gave birth to a vast data storage center that the N.S.A. is building in Utah, exploiting the declining cost of storage and the advance of sophisticated search software.

    Those huge databases were once called “bit buckets” in the industry — collections of electronic bits waiting to be sifted. “They park stuff in storage in the hopes that they will eventually have time to get to it,” said James Lewis, a cyberexpert at the Center for Strategic and International Studies, “or that they’ll find something that they need to go back and look for in the masses of data.” But, he added, “most of it sits and is never looked at by anyone.”

    Indeed, an obscure passage in one of the Snowden documents — rules for collecting Internet data that the Obama administration wrote in secret in 2009 and that the Foreign Intelligence Surveillance Court approved — suggested that the government was concerned about its ability to process all the data it was collecting. So it got the court to approve an exception allowing the government to hold on to that information if it could not keep up. The rules said that “the communications that may be retained” for up to five years “include electronic communications acquired because of the limitation on the N.S.A.’s ability to filter communications.”

    As one private expert who sometimes advises the N.S.A. on this technology put it: “This means that if you can’t desalinate all the seawater at once, you get to hold on to the ocean until you figure it out.”

    Collecting that ocean requires the brazen efforts of tens of thousands of technicians like Mr. Snowden. On Thursday, President Obama played down Mr. Snowden’s importance, perhaps concerned that the manhunt was itself damaging the image and diplomatic relations of the United States. “No, I’m not going to be scrambling jets to get a 29-year-old hacker,” the president said during a stop in Senegal.

    Mr. Obama presumably meant the term to be dismissive, suggesting that Mr. Snowden (who turned 30 on June 21) was a young computer delinquent. But as an N.S.A. infrastructure analyst, Mr. Snowden was, in a sense, part of the United States’ biggest and most skilled team of hackers.

    The N.S.A., Mr. Snowden’s documents show, has worked with its British counterpart, Government Communications Headquarters, to tap into hundreds of fiber-optic cables that cross the Atlantic or go on into Europe, with the N.S.A. helping sort the data. The disclosure revived old concerns that the British might be helping the N.S.A. evade American privacy protections, an accusation that American officials flatly deny.

    And a secret presidential directive on cyberactivities unveiled by Mr. Snowden — discussing the primary new task of the N.S.A. and its military counterpart, Cyber Command — makes clear that when the agency’s technicians probe for vulnerabilities to collect intelligence, they also study foreign communications and computer systems to identify potential targets for a future cyberwar.

    Infrastructure analysts like Mr. Snowden, in other words, are not just looking for electronic back doors into Chinese computers or Iranian mobile networks to steal secrets. They have a new double purpose: building a target list in case American leaders in a future conflict want to wipe out the computers’ hard drives or shut down the phone system.

    Mr. Snowden’s collection of pilfered N.S.A. documents has cast an awkward light on officials’ past assurances to Congress and the public about their concern about Americans’ privacy.

    It was only in March that James R. Clapper Jr., the director of national intelligence, told a Senate committee that the N.S.A. did not collect data on millions of Americans. Mr. Snowden’s records forced Mr. Clapper to backtrack, admitting his statement was false.

    Last week, two senators challenged even the accuracy of a fact sheet prepared by the N.S.A. to counter Mr. Snowden’s claims about the phone data and Internet collection programs. Agency officials did not defend themselves; the fact sheet simply disappeared, without explanation, from the agency’s Web site.

    Newly disclosed slides from an N.S.A. PowerPoint presentation on the agency’s Prism database of Internet data, posted on Saturday by The Washington Post, reveal that the F.B.I. plays a role as middleman between the N.S.A. and Internet companies like Google and Yahoo. The arrangement provides the N.S.A. with a defense, however nominal, against claims that it spies on United States soil.

    Even in the unaccustomed spotlight after the N.S.A. revelations, intelligence officials have concealed more than they have revealed in careful comments, fearful of alerting potential eavesdropping targets to agency methods. They invariably discuss the N.S.A.’s role in preventing terrorist attacks, an agency priority that the public can easily grasp.

    In fact, as Mr. Snowden’s documents have shown, the omnivorous agency’s operations range far beyond terrorism, targeting foreigners of any conceivable interest. British eavesdroppers working with the N.S.A. penetrated London meetings of the Group of 20 industrialized nations, partly by luring delegates to fake Internet cafes, and the N.S.A. hacked into computers at Chinese universities.

    At Fort Meade, on the N.S.A.’s heavily guarded campus off the Baltimore-Washington Parkway in Maryland, such disclosures are seen as devastating tip-offs to targets. The disclosure in Mr. Snowden’s documents that Skype is cooperating with orders to turn over data to the N.S.A., for example, undermined a widespread myth that the agency could not intercept the voice-over-Internet service. Warned, in effect, by Mr. Snowden, foreign officials, drug cartel leaders and terrorists may become far more careful about how, and how much, they communicate.

    “We’re seeing indications that several terrorist groups are changing their communications behavior based on these disclosures,” one intelligence official said last week, speaking on the condition of anonymity. “We’re going to miss tidbits that could be useful in stopping the next plot.”

    Mr. Snowden’s breach is an unplanned test of the N.S.A.’s decades-old conviction that it can operate effectively only under absolute secrecy. The agency is conducting a damage assessment — a routine step after major leaks — but the assessment itself is likely to remain classified.

    The N.S.A.’s assessment of Mr. Snowden’s case will likely also consider what has become, for intelligence officials, a chilling consideration: there are thousands of people of his generation and computer skills at the agency, hired in recent years to keep up with the communications boom.

    The officials fear that some of them, like young computer aficionados outside the agency, might share Mr. Snowden’s professed libertarian streak and skepticism of the government’s secret power. Intelligence bosses are keeping a closer eye on them now, hoping that there is not another self-appointed whistle-blower in their midst.

    June 30, 2013
    By SCOTT SHANE and DAVID E. SANGER

    Find this story at 30 June 2013

    © 2013 The New York Times Company

    Our Government has No Right to Hide Its Actions

    Postscript ||: Our Government has No Right to Hide Its Actions

    This is a guest post by Jesse Stavis, another one of the students at the NSA session. The first postscript by me (Madiha) available below.

    My name is Jesse Stavis. I’m a Ph.D. candidate in the Department of Slavic Languages and Literature at the University of Wisconsin-Madison, and I was the male student in the recording. Madiha has graciously invited me to share some final thoughts on our confrontation with the NSA. I’ll try to keep this brief:

    1. I have never been involved in anything that’s come anywhere close to receiving the exposure that this incident has. I will admit that it was exciting to see this story go quasi-viral. The fact that comments that were made in a room with perhaps twenty audience members eventually reached hundreds of thousands of people speaks to the power that the internet has as a tool for political and social advocacy. This should remind us of why it’s so important to protect the openness of the internet and the privacy of our communications on it.

    2. A few days after this story broke, my feelings of excitement and pride in what we had accomplished gave way to a lingering feeling of depression. To put it bluntly, this should not have been a big story. The big story should have been about congressional representatives asking tough questions of the people at the top levels of the NSA. We should have been reading about Lt. Gen. Clapper being investigated for perjury. The fact that a few graduate students peppering recruiters with tough questions received so much attention speaks to the utterly dysfunctional condition of our political system as a whole and of the Democratic Party in particular.

    3. While most people have been supportive of what we did, a number of commenters have suggested that we were wrong to confront low-level employees who were just doing their job. I want to make one thing clear: These were not low-level employees. They were what I would describe as upper mid-level managers. They told us that they had a combined fifty-five years of experience at the NSA. Without the support and consent of people like this, the surveillance machine could not exist. I don’t think that they are stupid people or evil people. I do think that they are people who have abdicated their moral agency and thus allowed for something very scary and very evil to come into existence. It’s our responsibility as educated citizens to remind these people that they do have the power to effect real change.

    4. A number of people have written that they wished that there were a video recording of this event. I’m not so sure that they would have liked what they would have seen. They would have seen three people aggressively challenging the recruiters while fifteen or twenty other people who were actually considering working at the NSA sat stone-faced and bored, waiting for this unfortunate interruption to end. They would have seen the high school teacher sitting next to me muttering through a clenched jaw about how indescribably rude we were being. They would have seen just how much more we have to accomplish when it comes to convincing our fellow citizens that our government has no right to hide its actions from its citizens.

    5. Finally, at the risk of stating the obvious, I want to make it clear that I take very little credit for anything that was accomplished at that meeting. Without someone as brave, informed, and articulate as Madiha Tahir, this wouldn’t have been a story at all. I am deeply, deeply impressed by her, and I hope that you are too.
    Tagged government, nsa, prism, surveillance

    Jul 07 2013
    32 Comments
    Multitudes, The Terror Wars
    Postscript: The Present through a PRISM

    See also guest post by Jesse Stavis

    Since I posted about our engagement with NSA recruiters who were visiting the campus at the Univ of

    Good Muslim anyone? (Internal flap of NSA brochure)

    Wisconsin, I’ve been inundated with hundreds upon hundreds of tweets, emails and messages from people, both Americans, but also folks from Germany, the UK, France, Pakistan and elsewhere. They have been overwhelmingly positive, heartfelt messages (with a few nastier comments thrown in, but I imagine that is par for the course). I’ve tried my best to keep up and respond to, and/or acknowledge the messages in some way, but once again: Thank you for all of your messages of support.

    It has been inspiring for us to hear from all of you!

    When we posed our questions to the NSA recruiters, we did not expect to go viral. But some time soon after tweeting out my post, my blog crashed. So did the blog PrivacySOS (follow @onekade!) who had posted about it. By next afternoon, Huffpo had picked it up. Numerous blogs, local sites and news sites also reported the story including: Business Insider, The Guardian, Firedoglake, Sueddeutsche Zeitung (the largest German-language daily in Germany), WORT Radio, NBC15 (Wisconsin’s local channel which also features Jesse Stavis @tolstoved. Means one who studies Tolstoy), one of the other students who spoke), WeAct Radio, Isthmus, Wisconsin Reporter, Wonkette, ActivistPost, Daily Kos and Truthdig, among others. There have been some Youtube videos posted as well.

    I’ve made the audio downloadable as per several requests.

    Here, I want to add some things I left out in my initial post (because I wasn’t expecting so many people to read it), make some corrections, and finally make some notes on a few things I thought were interesting:

    1. The recruiters in question were seasoned employees of the NSA, not newbies. They told us that together, they had 55 years of experience with the NSA. The female recruiter worked on South Asia and implied that she was in a senior position in that office. That was the impression others I’ve spoken with also had. The male recruiter worked on China and Korea.

    2. Anybody can be an “adversary.” That means foreign governments, allies, and American citizens. Anyone can become an adversary at any time as far as the American government is concerned. That means OWS anarchists, socialists, activists and leftists of various stripes, environmentalists or just stupid kids. That means Anwar al-Awlaki because his opinions were reprehensible, or his teenage son –also an American citizen– who was killed in a drone attack just because, or Tarek Mehanna, or Fahad Hashmi, or the Muslim Students’ Association, or Muslims generally, or me or you. As Atlantic Wire reported last month,

    And the NSA would never abuse its awesome surveillance power, right? Wrong. In 2008, NSA workers told ABC News that they routinely eavesdropped on phone sex between troops serving overseas and their loved ones in America. They listened in on both satellite phone calls and calls from the phone banks in Iraq’s Green Zone where soldiers call home. Former Navy Arab linguist, David Murfee Faulk described how a coworker would say, “Hey, check this out… there’s good phone sex or there’s some pillow talk, pull up this call, it’s really funny, go check it out.” Faulk explained they would gossip about the best calls during breaks. “It would be some colonel making pillow talk and we would say, ‘Wow, this was crazy.’”

    In a word: creepy. But, what’s more worrisome to me than the eavesdropping on the pillow talk of American troops is the differential burden that the surveillance state levies on the marginalized. For example, it is not accidental that the names on my little list above are largely Muslim. When bureaucrats or the government or the police are managing large populations, they narrow down categories of presumed suspects through racial profiling. That is why stop-and-frisk disproportionately

    Sent to me by dminkler.com

    affects African-Americans and Latinos. And, it’s the same reason why –when hunting for ‘terrorists’– American security forces obsess over Islam, and the mainstream media tends to present Muslims as the face of terror even though white hate groups are on the rise. In fact in 2009, conservatives so heavily criticized the Department of Homeland Security when it “reported that white supremacy is the US’s biggest threat for domestic terror” (ThinkProgress) that Janet Napolitano ended up withdrawing its report.

    So, there’s a racial politics to the surveillance state. The marginalized, poor and non-white are likely to bear the brunt of the state’s violence. But, in the end, it affects the entire social space. First of all, it has a chilling effect on dissent, particularly in these communities.

    Secondly, for the police or the FBI or the NSA or the drones to come for some of us requires that the rest of us agree or at least, remain silent. I think that silence is produced: through the jingoism of television whether it’s the evening news or shows like NCIS, 24, or Homeland as well as through attacks on education, research and dissent. Finally, there are all the smaller ways of disciplining people into silence, things we even do to each other. You are told it’s rude to ask questions. This is not the right time. This is not the right space. Those are not the right people. Shut up. Shut up. SHUT UP.

    That kind of social space kills independent thought. It produces thinking that is vehemently opposed to asking questions of NSA recruiters and by extension, the state. Such thinking is more angered by the whistle-blowing than what it reveals. To paraphrase a dead French guy badly, the surveillance state has to change people/populations into the kind of group that basically remains silent. That is what is needed first in order to make the unthinkable possible and finally, normal.

    This is why, when they come for some of us, they actually come for all of us.

    Therefore, a critical response can only succeed if it is able to understand the entire structure as a whole, that is, as long as we continue to draw distinctions between people that ought to be surveilled and those that should not be surveilled, we will fail. The point –and the real test– is learning to stand in solidarity with people who are not like you or me or us.

    3. “The globe is our playground.” A little nugget of honesty about the worldview of the intelligence and military community.

    4. They are just doing their jobs. I’m not sure why this is a defense. It didn’t work at Nuremberg. And, it shouldn’t work now. This is not to compare what is happening now as somehow equal to or better or worse than the German holocaust, but to underscore a philosophical point Hannah Arendt made about the nature of modern evil: It’s banal. That means it hasn’t got a pitchfork or horns sprouting out of its head. Rather, it is thousands of ordinary people just doing their jobs.

    The question of whether they are “good” people and love their families or “bad” people is irrelevant here. The routinization of such work into small tasks turns the victims of that work into an

    Sent to me by dminkler.com

    abstraction or a mathematical problem for the people-just-doing-their-jobs. (Thanks to a commenter at the Guardian, the prior link is to a discussion of how the NSA reconfigures issues into an abstract mathematical problem that is then handed over to its mathematicians –none of whom actually know the real-world ‘problem’ that they are working on or to what end their mathematical solutions will be applied. For another instance, take the discussion of drone attacks in Pakistan, Yemen and Somalia. In the mainstream media, it is a discussion that lacks imagination and has been reduced to counting up the dead and categorizing them as “civilian” or “militant” –effectively turning it into a numbers problem: are we killing more of the “bad” ones than the “good” ones or vice versa? Needless to say, this is a terrible, even a horrifying kind of question.)

    So, some people go on just doing their jobs and other people go on not asking questions for fear of appearing rude (Jesse talks about how the high school teacher sitting next to him during the session kept muttering about our ‘rudeness’), enraged, irrational, naive. This is how, together, we build monsters.

    What has struck me about the anti-war movement in America in these last few years –perhaps it is different elsewhere and perhaps it was different before– is generally how polite it has been. How ironic to chant, “Whose streets! Our streets!” while politely walking into pens and free speech zones. How strange to demand an end to the war while politely conceding to the demands of the NYPD that protesters not use Central Park, that they only march on these streets and not those streets so that order can be maintained, so that things can carry on as if there were no protest at all. I am not arguing for blind rage, but I think anger –articulate, politically engaged, critically minded anger that holds the line– can be a virtue in these times.

    5. Edward Snowden should’ve stuck it out instead of “running away.” This is interesting to me because I think this speaks to a kind of Christian imaginary: the hero as martyr, like Jesus, who should hang on the cross. That is apparently what will redeem the worth of these revelations. I am not saying that the people who make this claim are Christian; I am only observing that long after secularization, forms of Christian thought and habit hang around, and I think this is one of them. It is a very specific kind of typology for a hero, and one that only makes sense in a context where people (whether they be actually Christians or Muslims or Hindus or Jews or atheists or whatever) are habituated to the idea of Jesus’ martyrdom for our redemption. It’s out there in the social space. Hell, think about the end of Harry Potter.

    6. To the people telling me to grow up, I’m 5 ft 1.75 inches, and I’m pretty sure I’m not growing any taller. And to those wondering if I’m a “foreigner,” well, if I am one, so are you. I do get how my name trips up your black-and-white world though. If it helps, you can call me Maddie.

    Some links I thought were worth sharing:

    Prism Break

    Restore the Fourth

    Mass Surveillance in America: A Timeline

    Let’s not forget about the corporations who surveil us too.

    PRISM by the numbers

    Security Data-Mining and Other Forms of Witchcraft

    Finally, once again thank you so much for your messages. It has been inspiring for us.

    Onwards!
    Tagged europe, muslims, nsa, race, secrecy, surveillance

    Jul 02 2013
    336 Comments
    Multitudes, The Terror Wars
    The NSA Comes Recruiting

    Some students and I had an exchange with NSA recruiters today. The audio and a rough transcript below.

    The NSA came to recruit at a language program at the University of Wisconsin where I am spending my summer learning a language. Two recruiters, a redhead who looked more like a middle-aged mother (listed as “NSA_F” below) and a portly, balding man (“NSA_M”), began to go through slides explaining the NSA and its work.

    I had intended to go simply to hear how the NSA is recruiting at a moment when it’s facing severe challenges, what with the Edward Snowden and all. Dismayingly, however, a local high school teacher had thought it was good to bring 5 of his students to the session. They were smartly dressed, some of them even wearing ties as if there might be a job interview, young faces in a classroom of graduate students. They sat across from me at the roundtable. It was really their presence that goaded me–and I think a couple of other students–into an interaction with the recruiters.

    Roughly half an hour into the session, the exchange below began. I began by asking them how they understood the term “adversary” since the surveillance seems to be far beyond those the American state classifies as enemies, and their understanding of that ties into the recruiters’ earlier statement that “the globe is our playground.” I ended up asking them whether being a liar was a qualification for the NSA because:

    @Madi_Hatter a 2008 slideshow for college seniors considering CIA careers asked potential applicants: “Are you good at manipulating people?”

    — David Mehnert (@Savants) July 2, 2013

    The NSA’s instrumental understanding of language as well as its claustrophobic social world was readily apparent. One of the recruiters discussed how they tend to socialize after work, dressing up in costumes and getting drunk (referenced below). I can imagine that also exerts a lot of social pressure and works as a kind of social closure from which it would be difficult to escape. The last thing I want to point out –once again– their defense seems to be that it’s legal. What is legal is not just.

    Someone else happened to record it on an iPhone, hence the audio quality. It’s been edited mainly to cut garbled audio or audio that wouldn’t have made sense and edit out questions and comments from people who didn’t explicitly say it was ok to post their audio.You’ll hear the sound drop out for a second to mark the cuts.

    Rough Transcript

    Me: You said earlier that the two tasks that you do: one is tracking down the communications of your adversaries and the other is protecting the communications of officials. So, do you consider Germany and the countries the US has been spying on to be adversaries or are you, right now, not speaking the truth?

    Me: I mean do you consider European countries, etc, adversaries or are you, right now, not telling us the truth and lying when you say that actually you simply track – you keep focusing on that, but clearly the NSA is doing a lot more than that, as we know, so I’m just asking for a clarification.

    NSA_F: I’m focusing on what our foreign intelligence requires of [garbled] so, I mean you know, You can define adversary as enemy and clearly, Germany is not our enemy but would we have foreign
    national interest from an intelligence perspective on what’s going on across the globe. Yeah, we do. That’s our requirements that come to us as an intelligence community organization from the policymakers, from the military, from whoever –our global so–

    Me: So adversary –adversaries you actually mean anybody and everybody. There’s nobody then by your definition that is not an adversary. Is that correct?

    NSA_F: That is not correct.

    Me: Who is not an adversary?

    NSA_F: Well, ok. I can answer your questions but the reality is—

    Me: No, I’m just trying to get a clarification because you told us what the two nodes of your work are but it’s not clear to me what that encompasses and you’re being fairly unclear at the moment. Apparently it’s somebody who’s not just an enemy. It’s something broader than that. And yet, it doesn’t seem to encompass everyone.

    NSA_M: So for us, umm, our business is apolitical. Ok. We do not generate the intelligence requirements. They are levied on us so, if there is a requirement for foreign intelligence concerning this issue or this region or whatever then that is. If you wanna use the word adversary, you ca– we

    This is not a tampon.

    might use the word ‘target.’ That is what we are going after. That is the intelligence target that we are going after because we were given that requirement. Whether that’s adversary in a global war on terrorism sense or adversary in terms of national security interests or whatever – that’s for policymakers, I guess to make that determination. We respond to the requirements we are given, if that helps. And there’s a separation. As language analysts, we work on the SIG INT side of the house. We don’t really work on the information assurance (?) side of the house. That’s the guy setting up, protecting our communications.

    Me: I’m just surprised that for language analysts, you’re incredibly imprecise with your language. And it just doesn’t seem to be clear. So, adversary is basically what any of your so-called “customers” as you call them –which is also a strange term to use for a government agency– decide if anybody wants, any part of the government wants something about some country, suddenly they are now internally considered or termed an ‘adversary.’ That’s what you seem to be saying.

    [Pause]

    NSA_M: I’m saying you can think about it using that term.

    NSA_F: But the reality is it’s our government’s interest in what a foreign government or foreign country is doing.

    Me: Right. So adversary can be anyone.

    NSA_M: As long as they levy their requirement on us thru the right vehicle that exists for this and that it is defined in terms of a foreign intelligence requirement, there’s a national framework of foreign intelligence – what’s it called?

    NSA_F: nipa

    NSA_M: the national prioritization of intelligence framework or whatever that determines these are the issues that we are interested in, these are how they are prioritized.

    Me: Your slide said adversary. It might be a bit better to say “target” but it’s not just a word game. The problem is these countries are fairly –I think Afghanistan is probably not shocked to realize they’re on the list. I think Germany seems to be quite shocked at what has been going on. This is not just a word game and you understand that as well as I do. So, it’s very strange that you’re selling yourself here in one particular fashion when it’s absolutely not true.

    NSA_F: I don’t think we’re selling ourselves in an untrue fashion.

    Me: Well, this is a recruiting session and you are telling us things that aren’t true. We also know that the NSA took down brochures and fact sheets after the Snowden revelations because those brochures also had severe inaccuracies and untruths in them. So, how are we supposed to believe what you’re saying?

    [pause]

    Student A (female): I have a lifestyle question that you seem to be selling. It sounds more like a colonial expedition. You know the “globe is our playground” is the words you used, the phrasing that you used and you seem to be saying that you can do your work. You can analyze said documents for your so-called customers but then you can go and get drunk and dress up and have fun without thinking of the repercussions of the info you’re analyzing has on the rest of the world. I also want to know what are the qualifications that one needs to become a whistleblower because that sounds like a much more interesting job. And I think the Edward Snowdens and the Bradley Mannings and Julian Assanges of the world will prevail ultimately.

    NSA_M: I’m not sure what the –

    Me: The question here is do you actually think about the ramifications of the work that you do, which is deeply problematic, or do you just dress up in costumes and get drunk? [This is in reference to an earlier comment made by the recruiters in which NSA_F said: they do heady work and then they go down to the bar and dress up in costume and do karaoke. I tweeted it earlier.]

    NSA_M: That’s why, as I was saying, reporting the info in the right context is so important because the consequences of bad political decisions by our policymakers is something we all suffer from.

    Student A: And people suffer from the misinformation that you pass along so you should take responsibility as well.

    NSA_M: We take it very seriously that when we give info to our policy makers that we do give it to them in the right context so that they can make the best decision with the best info available.

    Student B: Is that what Clapper was doing when he perjured himself in front of Congress? Was he giving accurate information when he said we do not collect any intelligence on the US citizens that it’s only occasionally unintentionally or was he perjuring himself when he made a statement before Congress under oath that he later declared to be erroneous or at least, untruthful the least truthful answer? How do you feel personally having a boss whose comfortable perjuring himself in front of Congress?

    NSA_F: Our director is not general Clapper.

    Student B: General Alexander also lied in front of Congress.

    NSA_F: I don’t know about that.

    Student B: Probably because access to the Guardian is restricted on the NSA’s computers. I am sure they don’t encourage people like you to actually think about these things. Thank God for a man like Edward Snowden who your organization is now part of a manhunt trying to track down, trying to put him in a little hole somewhere for the rest of his life. Thank god they exist.

    Student A: and why are you denigrating anything else with language? We don’t do this; we don’t do that; we don’t read cultural artifacts, poetry? There are other things to do with language other than joining this group, ok. [last line of this comment was directed at the high school students.]

    NSA_M: This job is not for everybody. Academia is a great career for people with language.

    Me: So is this job for liars? Is this what you’re saying? Because, clearly, you’re not able to give us forthright answers. Given the way the way the NSA has behaved, given the fact that we’ve been lied to as Americans, given the fact that fact sheets have been pulled down because they clearly had untruths in them, given the fact that Clapper and Alexander lied to Congress — is that a qualification for being in the NSA? Do you have to be a good liar?

    NSA_F: I don’t consider myself to be a liar in any fashion and the reality is I mean, this was billed as if you are potentially interested in an NSA career come to our session. If you’re not, if this is your personal belief and you’re understanding of what has been presented then there is nothing that says you need to come and apply and work for us. We are not here — our role as NSA employees is not to represent NSA the things that are in the press right now about the NSA. That’s not our role at all. That’s not my area of expertise. I have not read–

    Me: Right, but you’re here recruiting so you’re selling the organization. I mean I’m less interested in what your specialized role is within in the NSA. I don’t care. The fact is you’re here presenting a public face for the NSA and you’re trying to sell the organization to people that are as young as high schoolers and trying to tell us that this is an attractive option in a context in which we clearly know that the NSA has been telling us complete lies. So, I’m wondering is that a qualification?

    NSA_F: I don’t believe the NSA is telling complete lies. And I do believe that you know, people can, you can read a lot of different things that are portrayed as fact and that doesn’t make them fact just because they’re in newspapers.

    Student A: Or intelligence reports.

    NSA_F: That’s not really our purpose here today and I think if you’re not interested in that. There are people here who are probably interested in a language career.

    Me: The trouble is we can’t opt out of NSA surveillance and we don’t get answers. It’s not an option. You’re posing it as a choice like ‘oh you know people who are interested can just sit here and those of us who are not interested can just leave.’ If I could opt out of NSA surveillance and it was no longer my business, that would be fine. But it is my business because all of us are being surveilled so we’re here.

    NSA_F: That is incorrect. That is not our job. That is not our business.

    Me: That doesn’t seem to be incorrect given the leaks. Right, and the NSA has not been able to actually put out anything that is convincing or contrary to that.

    [pause]

    Student A: I don’t understand what’s wrong with having some accountability.

    NSA_F: We have complete accountability and there is absolutely nothing that we can or have done without approval of the 3 branches of the government. The programs that we’re enacting–

    Student B: Did you read the NY Times? Did you read about the illegal wiretapping? Why are you lying?

    NSA_M: Did you read the Senate judiciary report that said there have only been 15 (?) instances, and they were all documented and done correctly by the FISA courts–

    Student B: I’d love to read the opinion of the FISA court that says that this program one of the NSA’s programs was violating the 4th amendment right of massive amounts of Americans, but it’s a big ‘ol secret and only people like you who will not talk with their wives when they get home about what they do all day are able to…[garbled]…protecting us from the ‘terrorist threat’, but let’s let everyone here hear more information about karaoke.

    Find this story at 8 July 2013

    NSA recruitment drive goes horribly wrong

    Staff from the National Security Agency got more than they bargained for when they attempted to recruit students to their organisation earlier this week …

    A demonstrator holds a sign with a photograph of Edward Snowden during 4 July celebrations in Boston, Massachusetts. Photograph: Brian Snyder/REUTERS

    On Tuesday, the National Security Agency called at the University of Wisconsin on a recruitment drive.

    Attending the session was Madiha R Tahir, a journalist studying a language course at the university. She asked the squirming recruiters a few uncomfortable questions about the activities of NSA: which countries the agency considers to be “adversaries”, and if being a good liar is a qualification for getting a job at the NSA.

    She has posted a recording of the session on Soundcloud, which you can hear above, and posted a rough transcript on her blog, The Mob and the Multitude. Here are some highlights.

    The session begins …

    Tahir: “Do you consider Germany and the countries that the NSA has been spying upon to be adversaries, or are you, right now, not speaking the truth?”

    Recruiter 1: “You can define adversary as ‘enemy’ and, clearly, Germany is not our enemy. But would we have foreign national interests from an intelligence perspective on what’s going on across the globe? Yeah, we do.”

    Tahir: “So by ‘adversaries’, you actually mean anybody and everybody. There is nobody, then, by your definition that is not an adversary. Is that correct?”

    Recruiter 1: “That is not correct.”

    Recruiter 2: “… for us, our business is apolitical, OK? We do not generate the intelligence requirements. They are levied on us … We might use the word ’target’.”

    Tahir: “I’m just surprised that for language analysts, you’re incredibly imprecise with your language. And it just doesn’t seem to be clear.”

    Later …

    Tahir: “… this is a recruiting session and you are telling us things that aren’t true. And we also know that the NSA took down brochures and factsheets after the Snowden revelations because those factsheets also had severe inaccuracies and untruths in them, right? So how are we supposed to believe what you’re saying?”

    Even later …

    Tahir: “I think the question here is do you actually think about the ramifications of the work that you do, which is deeply problematic, or do you just dress up in costumes and get drunk?” [A reference to an earlier comment the recruiter made about NSA employees working hard and going to the bar to do karaoke.]

    Recruiter 2: “… reporting the info in the right context is so important because the consequences of bad political decisions by our policymakers is something we all suffer from.”

    Unnamed female student: “And people suffer from the misinformation that you pass along so you should take responsibility as well.”

    Later still …

    Male student: “General Alexander [head of the NSA] also lied in front of Congress.”

    Recruiter 1: “I don’t believe that he did.”

    Male student: “Probably because access to the Guardian is restricted on the Department of Defence’s computers. I am sure they don’t encourage people like you to actually think about these things. Thank God for a man like Edward Snowden who your organisation is now part of a manhunt trying to track down, trying to put him in a little hole somewhere for the rest of his life. Thank God they exist.”

    And finally …

    Recruiter 2: “This job isn’t for everybody, you know …”

    Tahir: “So is this job for liars? Is this what you’re saying? Because, clearly, you’re not able to give us forthright answers. I mean, given the way the NSA has behaved, given the fact that we’ve been lied to as Americans, given the fact that factsheets have been pulled down because they clearly had untruths in them, given the fact that Clapper and Alexander lied to Congress – is that a qualification for being in the NSA? Do you have to be a good liar?”

    Recruiter 1: I don’t believe the NSA is telling complete lies. And I do believe that you know, I mean people can, you can read a lot of different things that are, um, portrayed as fact and that doesn’t make them fact just because they’re in newspapers.”

    Unnamed female student: “Or intelligence reports.”

    Recruiter 1: “That’s not really our purpose here today and I think if you’re not interested in that … there are people here who are probably interested in a language career.”

    Bim Adewunmi
    guardian.co.uk, Friday 5 July 2013 13.15 BST

    Find this story at 5 July 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Revelations on the French Big Brother

    If the revelations about the American espionage program Prism set off a chorus of indignation in Europe, France itself protested only weakly. For two excellent reasons: Paris already knew about it – and it”s doing exactly the same thing. Le Monde is able to disclose that the General Directorate of External Security (the DGSE, or special services) systematically collects the electromagnetic signals emitted by computers and telephones in France, and the flow of signals between France and countries abroad: the entirety of our communications are being spied on. All of our email messages, SMS messages, itemised phone bills and connections to FaceBook and Twitter are then stored for years.
    If this immense data base was used just by the DGSE, which operates only outside French borders, it would already be illegal. But the six other intelligence services – among them the Central Directorate of Internal Intelligence, the customs service and the Tracfin anti-money-laundering service – delve into this base daily for the data of interest to them. This takes place discreetly, on the margins of legality and and beyond any serious control. Politicians are perfectly aware of it, but secrecy is the rule.

    A CLANDESTINE SYSTEM

    This French Big Brother, a little brother of the American services, is clandestine. Yet its existence appears discreetly in parliamentary documents. In a report issued on April 30, the eight deputies and senators in the parliamentary intelligence delegation note that “progress has been made since 2008 in the mutualisation of capabilities, notably regarding intelligence of electromagnetic origin, effected by the DGSE for the benefit of the entire intelligence community.”

    The parliamentarians propose to go still further, to “reinforce the capabilities exploited by the DGSE” and to “consolidate the access of other services to the capabilities mutualised by the DGSE.”

    THE TARGET: “METADATA”

    The intelligence services are not looking for the content of the messages, but rather their context. It is more interesting to know who is speaking to whom than to record what they are saying. More than phone tapping, it”s the technical data – the “metadata” – that is being combed through.

    The DGSE thus collects the itemised telephone bills of millions of subscribers – the names of the callers and the called, the place, the date, the duration, the weight of the message. The same goes for email (with the possibility of reading the title of the message), SMS messages, faxes… And all activity on the Internet that takes place via Google, Facebook, Microsoft, Apple, Yahoo… It’s what the parliamentary intelligence delegation very aptly calls “intelligence of electromagnetic origin”, the equivalent of the NSA’s SigInt (signals intelligence).

    This metadata may be used to draw huge graphs of links among people based on their digital activity, and it’s been going on for years. The idea is to sketch out a kind of diary of each person’s activity on both telephone and computer. When an interesting group has been identified, it then becomes the responsibility of the intelligence services to use more intrusive techniques, like wire-tapping or police tails.

    A SUPERCOMPUTER ON BOULEVARD MORTIER IN PARIS

    This system is obviously of great value in the fight against terrorism. But it allows spying on anyone, any time. The DGSE collects billions of billions of units of data, which are compressed and stored on three floors in the basement of the DGSE headquarters on Boulevard Mortier in Paris.

    Bernard Barbier, technical director of the DGSE since 2006, has spoken publicly about this system on two occasions – in 2010 at a symposium on the security of information and communications technology, and to the Association of Reservists in Encryption and Information Security (Arsci). His comments were reported on a few specialised sites, including Bug Brother, a blog by Jean-Marc Manach on lemonde.fr. Mr. Barbier spoke of “the development of a calculator based on FPGA” – Field Programmable Gate Array, or an integrated circuit that may be programmed for logical functions – that is “probably the biggest data processing center in Europe after the English”, capable of managing dozens of petaoctets of data, in other words dozens of millions of gigaoctets. The heat emitted by the computers is sufficient to heat all the buildings of the DGSE…

    France is said to be among the Top 5 in computing capacity, after the United States, Britain, Israel and China. Mr. Barbier estimated the number of connections picked up by the system at 4 billion in 2013, with a flow of about 1 billion simultaneous communications. “Today, our targets are the networks of the public at large,” the director said at the time, “because they are used by terrorists.”

    The DGSE heads “the strongest team of crypto-mathematicians” in France, penetrates computer systems – and of course collects millions of units of personal data.

    “MUTUALISED” INTELLIGENCE

    The other French intelligence services have access to this gigantic data base, which is soberly called the “mutualisation infrastructure”. They include the DGSE of course, but also the Directorate of Military Intelligence (DRM); the Directorate of Protection and Security of Defense (DPSD); the Central Directorate of Internal Security (DCRI); the Directorate of National Intelligence and Customs Investigations (DNRED); Tracfin, the anti-money-laundering unit; and even the small intelligence service of the police headquarters in Paris.

    According to Senate reports, 80% of the resources of the technical management of the DGSE are used by these other intelligence services. Each supplies the name of the target of their investigation to the DGSE, which replies “hit” or “no hit” according to whether the target appears in the data base or not. Then the services of the DGSE make the metadata intelligible with the addition of classical intelligence.

    Requests for consultation go far beyond just terrorism and the defence of France’s economic property. The very vague wording – protection of national security – makes it possible notably to identify the entourage of politicians at the highest level of the state, whatever their position and the nature of the links under surveillance.

    ABSENCE OF MONITORING

    The system is perfectly illegal – or “a-legal”, as the chief of one of the intelligence agencies puts it. According to the National Commission for Information Technology and Freedom (CNIL), the French agency in charge of protecting personal data, “The legal system governing security interceptions forbids the establishment by the intelligence services of a procedure like Prism.” It adds : “Each request for the requisition or interception of data must be targeted and may not be carried out massively in terms of the quantity or the time period. Such practices thus have no legal foundation.” The CNIL can neither confirm or deny the existence of the French system – it moveover does not have access to the files of the DGSE or the DCRI.

    To be sure, there is a strict legal framework for security interceptions, which are to be authorised by the prime minister, on the recommendation of the National Consultative Commission for Security Interceptions, but this framework did not forecess the massive stocking of technical data by the secret services. “We’ve been operating is a zone of virtual autorisation for years”, confided a former chief of one of the services. “And each agency is quite content with this freedom, which is possible thanks to the legal vagueness surrounding metadata.” A parliamentarian confirmed that “a large portion of the electronic connections in France are effectively intercepted and stocked by the DGSE.” But, officially, the “mutualisation infrastructure” does not exist.

    (Translated by Meg Bortin)
    LE MONDE | 04.07.2013 à 17h06 • Mis à jour le 04.07.2013 à 17h24 |
    Par Jacques Follorou et Franck Johannès

    Find this story at 4 July 2013

    © Le Monde.fr

    Auch Frankreichs Geheimdienst zapft massenhaft Daten ab

    Die Briten tun es, die Amerikaner sowieso – und jetzt stellt sich heraus: Auch die Franzosen greifen laut “Le Monde” massenhaft Kommunikationsdaten ab. Der Auslandsgeheimdienst späht systematisch Telefonate, Mails und soziale Netzwerke aus.

    Paris – Frankreich hat womöglich seit Donnerstag seinen eigenen Datenskandal: Die Tageszeitung “Le Monde” berichtet auf ihrer Website, der französische Auslandsgeheimdienst DGSE greife in ähnlicher Art und Weise Kommunikationsdaten ab wie der US-Geheimdienst NSA. “Enthüllungen über den französischen Big Brother”, hat das Blatt seine Geschichte überschrieben.

    Der DGSE fange Signale von Computern und Telefonen in Frankreich ab, betroffen seien auch Verbindungen zwischen Frankreich und dem Ausland. Zwar würden nicht die Inhalte von Gesprächen ausgeforscht, heißt es in dem Bericht. Es gehe vielmehr darum, eine Übersicht, eine Art Karte zu erstellen, wer mit wem kommuniziere.

    Laut der Zeitung, die sich auf namentlich nicht genannte Geheimdienstquellen sowie offizielle Äußerungen von Geheimdienstmitarbeitern beruft, handelt es sich um illegale Eingriffe. E-Mails, SMS, Verbindungsdaten und die Nutzung von Facebook und Twitter etwa würden über Jahre gespeichert.

    Das Vorgehen ähnelt dem der NSA, das der SPIEGEL enthüllt hatte. Demnach überwacht die NSA in Deutschland monatlich rund eine halbe Milliarde Telefonate, E-Mails oder SMS – systematisch wird ein Großteil der Telefon- und Internetverbindungsdaten kontrolliert und gespeichert. Außerdem überwachen die Amerikaner offenbar gezielt EU-Vertretungen. Auch in Großbritannien sorgte ein ähnlicher Abhörskandal für Aufsehen.

    Eine Stellungnahme der DGSE gibt es bisher nicht. Laut “Le Monde” zweifelt die für die Kontrolle solcher Spionagemaßnahmen zuständige Kommission den Bericht allerdings an und versicherte, der Geheimdienst arbeite im Einklang mit den Gesetzen. Die einzige Einrichtung, die Kommunikationsdaten sammle, sei eine Regierungsstelle, die dem Premierminister unterstellt sei und deren Aufgabe es sei, Sicherheitslücken aufzuspüren.

    Die Vorwürfe in dem Zeitungsbericht sind allerdings sehr konkret. Der Dienst DGSE horte die Daten im Keller seines Hauptquartiers in Paris, schreibt “Le Monde”. Die Wärme, die das Rechenzentrum ausstrahle, reiche aus, um das gesamte Gebäude zu heizen.

    Die übrigen sieben französischen Geheimdienste, darunter Inlandsdienste, Experten für Geldwäsche und Zollfahnder, hätten Zugriff auf die Daten. Diesen anderen Diensten sei es dann freigestellt, sich in als verdächtig aufgefallene Kommunikation einzuklinken und etwa Gespräche abzuhören.

    ffr/Reuters/Mitarbeit: Valérie Wagner
    04. Juli 2013, 18:25 Uhr

    Find this story at 4 July 2013

    © SPIEGEL ONLINE 2013

    France ‘has vast data surveillance’ – Le Monde report

    France’s foreign intelligence service intercepts computer and telephone data on a vast scale, like the controversial US Prism programme, according to the French daily Le Monde.

    The data is stored on a supercomputer at the headquarters of the DGSE intelligence service, the paper says.

    The operation is “outside the law, and beyond any proper supervision”, Le Monde says.

    Other French intelligence agencies allegedly access the data secretly.

    It is not clear however whether the DGSE surveillance goes as far as Prism. So far French officials have not commented on Le Monde’s allegations.

    The DGSE allegedly analyses the “metadata” – not the contents of e-mails and other communications, but the data revealing who is speaking to whom, when and where.

    Connections inside France and between France and other countries are all monitored, Le Monde reports.

    The paper alleges the data is being stored on three basement floors of the DGSE building in Paris. The secret service is the French equivalent of Britain’s MI6.

    The operation is designed, say experts, to uncover terrorist cells. But the scale of it means that “anyone can be spied on, any time”, Le Monde says.

    There is a continuing international furore over revelations that the US has been systematically seizing vast amounts of phone and web data.

    The French government has sharply criticised the US spying, which allegedly included eavesdropping on official EU communications.

    The scale of surveillance by America’s National Security Agency (NSA) emerged from classified intelligence documents leaked by whistleblower Edward Snowden.

    The UK spy agency GCHQ is reported to run a similarly vast data collection operation, co-operating closely with the NSA.
    4 July 2013 Last updated at 14:11 GMT

    Find this story at 4 July 2013

    BBC © 2013 The BBC is not responsible for the content of external sites. Read more.

    Neue Snowden-Enthüllung; NSA-Verbindung bringt deutsche Dienste in Erklärungsnot

    Der deutsche Geheimdienst wusste mehr über die Umtriebe der NSA in Deutschland als bisher bekannt. “Die stecken unter einer Decke”, sagt Edward Snowden in einem Interview im SPIEGEL. Auch gegen die Briten erhebt der Whistleblower Vorwürfe.

    Seit Wochen hält Edward Snowden die Geheimdienstwelt mit immer neuen Enthüllungen in Atem. Ob die amerikanische NSA oder die GCHQ aus Großbritannien, Systeme wie Prism oder Tempora: Der Whistleblower lässt wohldosiert Skandalöses über die internationalen Schnüffeldienste durchsickern. In einem Interview, das der SPIEGEL in seiner neuen Ausgabe veröffentlicht, beschreibt Snowden die Nähe zwischen US- und deutschem Geheimdienst – und die Datensammelwut der britischen Spione.

    In Deutschland hatten die Berichte über die umfangreichen Spionage-Tätigkeiten der USA für Überraschung und Entsetzen gesorgt – auch unter Politkern. Die Version von der vollkommenen Unwissenheit der Deutschen will Snowden so nicht gelten lassen. Im Gegenteil: Die NSA-Leute steckten “unter einer Decke mit den Deutschen”, erklärte der Whistleblower dem amerikanischen Chiffrier-Experten Jacob Appelbaum und der Dokumentarfilmerin Laura Poitras mit Hilfe verschlüsselter E-Mails, kurz bevor er weltweit bekannt wurde.

    Snowden beschreibt die Zusammenarbeit der Geheimdienste detailliert. In der NSA gebe es für solche Kooperationen mit anderen Ländern eine eigene Abteilung, das sogenannte Foreign Affairs Directorate. Dabei enthüllt er ein bemerkenswertes Detail zum Schutz von Entscheidungsträgern: Die Zusammenarbeit werde so organisiert, dass Behörden anderer Länder “ihr politisches Führungspersonal vor dem ‘Backlash’ schützen” können, falls herauskommen sollte, wie “massiv die Privatsphäre von Menschen missachtet wird”, sagt der US-Amerikaner.

    Nach SPIEGEL-Recherchen ist die Zusammenarbeit zwischen der NSA und dem Bundesnachrichtendienst (BND) offenbar tatsächlich deutlich intensiver als bislang bekannt. So lieferte die NSA die Analyse-Tools für den Lauschangriff des BND auf ausländische Datenströme, die durch Deutschland führen. Im Fokus des BND steht unter anderem die Nahost-Strecke, über die Datenpakete etwa aus Krisenregionen verlaufen.

    BND-Chef Gerhard Schindler hat den Mitgliedern des Parlamentarischen Kontrollgremiums die Zusammenarbeit mit der NSA bestätigt. (Mehr zum Thema finden Sie hier)

    Doch nicht nur die Umtriebe des BND stehen im Fokus des Gesprächs mit Snowden. Auch über den britischen Geheimdienst Government Communications Headquarters (GCHQ) gibt der 30-Jährige weitere neue Details preis. So läuft in Großbritannien ein Versuch der Komplettdatenspeicherung. Das Tempora-System der Briten sei “der erste ‘ich speichere alles’-Ansatz (‘full take’) in der Geheimdienstwelt”, sagt Snowden.

    Daten bleiben drei Tage im Pufferspeicher

    Der Umfang dieses “Full Take”-Systems ist gewaltig. Im Rahmen von Tempora werden dem Whistleblower und dem “Guardian” zufolge Verbindungsdaten bis zu 30 Tage, aber auch alle Inhalte bis zu drei Tage lang gespeichert, in einem sogenannten Pufferspeicher. “Dieser Zwischenspeicher macht nachträgliche Überwachung möglich, ihm entgeht kein einziges Bit”.

    Auf Rückfrage, ob man dieser Totalerfassung aller Internetkommunikation entgehen könne, antwortet er: “Na ja, wenn man die Wahl hat, sollte man niemals Informationen durch britische Leitungen oder über britische Server schicken.”

    Entgehen könne man dem Zugriff durch die GCHQ nur, wenn man keine Informationen über britische Leitungen oder britische Server schicke, so Snowden. Deutsche Internet-Experten halten dies in der Praxis allerdings für kaum durchführbar.

    Metadaten liefern Orientierung im Datenmeer

    Der Versuch der Komplettdatenspeicherung ist bemerkenswert, war doch bisher im Zusammenhang mit den Abhörskandalen meist von Metadaten die Rede. Auch Snowden betont in der aktuellen Ausgabe des SPIEGEL noch einmal wie wichtig die Metadaten – etwa Telefonnummern, IP-Adressen und Verbindungszeiten – eigentlich sind. Und wie sie genutzt werden. Die Metadaten seien meist “wertvoller als der Inhalt der Kommunikation”, sagt Snowden.

    Wer die Metadaten hat, weiß, wer wann mit wem kommuniziert hat. Auf dieser Basis lässt sich dann entscheiden, welche Datensätze, welche Kommunikationsinhalte man sich genauer ansehen möchte. “Die Metadaten sagen einem, was man vom breiten Datenstrom tatsächlich haben will”, so Snowden im SPIEGEL.

    So wird nach und nach klar, wie die Überwachungsprogramme von NSA und GCHQ, Prism, Tempora und Boundless Informant zusammenwirken:

    Die Metadaten-Abfrage gibt Analysten Hinweise, für welche Kommunikationen und Inhalte sie sich vielleicht interessieren könnten, dann, sagt Snowden sinngemäß, lässt sich per Knopfdruck festlegen, dass von einer Person oder einer Gruppe alle verfügbaren Inhalte im Volltext mitgeschnitten oder anderweitig erfasst werden. Zum Zielobjekt könne man aber auch “aufgrund des eigenen Facebook-Profils oder der eigenen E-Mails” werden.

    07. Juli 2013, 19:31 Uhr

    Find this story at 7 July 2013

    © SPIEGEL ONLINE 2013

    Merkel: NSA spying aided our security

    Chancellor Angela Merkel confirmed German secret services profited from the spying and tapping operations of their USA colleagues. But whistleblower Edward Snowden says the extent of the cooperation was hidden from politicians.

    Der Spiegel magazine reported over the weekend that Snowden, currently hiding in a Moscow airport, had said the US secret service was “in bed with the Germans.”

    His assertion was confirmed by Merkel who said of the spying programme: “We as Germans got a lot of information.” Speaking to a Christian Democratic Union party conference on Saturday she said terrorist attacks in Germany had been foiled thanks to timely information from the Americans.

    “But this does not justify bugging each other’s embassies. And that is why I say bugging really doesn’t work between friends,” she added.

    Referring to Monday’s talks between the European Union and the US about free trade agreements, opposition Social Democratic Party’s parliamentary party leader Frank-Walter Steinmeier said he expected “clear and dependable guarantees that there will be no further spying operations – before the assumption of negotiations.”

    Snowden is in Moscow avoiding American authorities who want to prosecute him for leaking details of the National Security Agency (NSA) spying operation known as Prism, the exposure of which has caused international scandal.

    He told US cipher expert Jacob Appelbaum and documentary filmmaker Laura Poitras that security chiefs on both sides of the Atlantic had organized their cooperation so that they could protect their “political leadership from any backlash”, Der Spiegel reported.

    The pair had sent Snowden questions shortly before he revealed the Prism operation in early June, but his answers have only now been published.

    “We warn the others when someone who we want to get, uses one of their airports – and they deliver then to us,” said Snowden.

    “The other authorities don’t ask us where we have the evidence from, and we don’t ask them anything.” This protects politicians from having to take any responsibility should it be revealed how “massively the privacy of people is being abused,” he said.

    Published: 8 Jul 13 15:00 CET
    The Local/DPA/hc

    Find this story at 8 July 2013

    © www.thelocal.de

    << oudere artikelen  nieuwere artikelen >>