• Buro Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, de overheid in Nederland en Europa kritisch volgt. Een grond-rechten kollektief dat al 30 jaar publiceert over uitbreiding van repressieve wetgeving, publiek-private samenwerking, bevoegdheden, overheids-optreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.

  • Categorieën

  • Former CIA officer: ‘Absurd’ to link uncle of Boston suspects, Agency

    Retired CIA officer Graham Fuller confirmed to Al-Monitor Saturday that his daughter was previously married to an uncle of the suspects in the Boston Marathon attacks, but called rumors of any links between the uncle and the Agency “absurd.”

    Graham Fuller’s daughter, Samantha A. Fuller, was married to Ruslan Tsarnaev (now Tsarni) in the mid-1990s, and divorced in 1999, according to North Carolina public records. The elder Fuller had retired from the agency almost a decade before the brief marriage.

    “Samantha was married to Ruslan Tsarnaev (Tsarni) for 3-4 years, and they lived in Bishkek for one year where Samantha was working for Price Waterhouse on privatization projects,” Fulller, a former CIA officer in Turkey and vice chairman of the National Intelligence Council, told Al-Monitor by email Saturday. “They also lived in our house in [Maryland] for a year or so and they were divorced in 1999, I believe.”

    “I, of course, retired from CIA in 1987 and had moved on to working as a senior political scientist for RAND,” Fuller continued.

    Fuller said his former son in law was interesting but homesick, and moved back to Central Asia after the divorce.

    “Like all Chechens, Ruslan was very concerned about his native land, but I saw no particular involvement in politics, [although] he did try to contact other Chechens around,” Fuller continued. “He also felt homesick and eventually went back to Central Asia after the divorce. His English was shaky. (We always spoke Russian together).”

    A story on the Internet implying “possible connections between Ruslan and the Agency through me are absurd,” Fuller said.

    “I doubt [Ruslan] even had much to say of intelligence value other than talking about his own family’s sad tale of deportation from Chechnya by Stalin to Central Asia,” Fuller said. “Every Chechen family has such stories.”

    Fuller said he had made several visits to Central Asia to do research on post-Soviet political developments, and visited his daughter and Tsarni there. “Our visit is briefly mentioned in my recent memoir, Three Truths and a Lie, as well as their marriage celebration in [Maryland],” he wrote.

    A former Russian history and literature major at Harvard, Fuller said he had a long interest in Soviet minorities, and found Ruslan interesting.

    Ruslan Tsarni has said in media interviews that his family was estranged from his brother Aznor’s, over what Ruslan described as the growing religious fanaticism of Aznor’s wife, Zubeidat, and that the families had not spoken for several years. Aznor and Zubeidat’s sons Tamerlan, 26, and Dzhokhar, 19, are accused of carrying out the April 15th Boston Marathon bombings.

    Fuller said he thinks he met Aznor Tsarnaev once, fleetingly, in Kazakhstan. His daughter, he said, knew the family better, but when Tamerlan was just a toddler, and Dzhokhar not yet born.

    Posted on April 27, 2013 by Laura Rozen

    Find this story at 27 April 2013

    © 2013 AL-MONITOR

    Boston terror suspects uncle was married to CIA officer’s daughter and even shared a home with the agent

    An uncle of the Boston bombers was previously married to a CIA officer’s daughter for three years, it emerged today.

    Ruslan Tsarni, who publicly denounced his two terrorist nephews’ actions and called them ‘Losers’, even lived with his father-in-law agent Graham Fuller in his Maryland home for a year.

    Mr Fuller was forced to explain the relationship today as news of the family link emerged online.

    Son-in-law: Former CIA agent Graham Fuller, left, explained his relationship to the two Boston terror suspects’ uncle today. Ruslan Tsarni, right, was married for three years to his daughter, Samantha

    He told Al-Monitor that his daughter, Samantha, was married to Ruslan, whose surname was then Tsarnaev, for three to four years in the 1990s.

    The couple divorced in 1999 more than ten years after he left the agency in 1987.

    ‘Samantha was married to Ruslan Tsarnaev (Tsarni) for 3-4 years, and they lived in Bishkek for one year where Samantha was working for Price Waterhouse on privatization projects,’ Mr Fuller said.

    ‘They also lived in our house in [Maryland] for a year or so and they were divorced in 1999, I believe.

    ‘I, of course, retired from CIA in 1987 and had moved on to working as a senior political scientist for RAND.’

    He said his son-in-law showed no interest in the agency or politics but spoke generally about his family in Chechnya.

    He said any attempts to portray the relationship as a link between the security agency and the two terrorists was ‘absurd’.

    ‘Like all Chechens, Ruslan was very concerned about his native land, but I saw no particular involvement in politics,’ Fuller told Al-Monitor.

    ‘I doubt he even had much to say of intelligence value other than talking about his own family’s sad tale of deportation from Chechnya by Stalin to Central Asia. Every Chechen family has such stories.’

    Nephews: Tamerlan and Dzhokhar Tsarnaev could at one time count a CIA agent’s daughter as their aunt

    Outraged: Ruslan Tsarni made his feelings against his nephews actions known to the media in the aftermath of the Boston attacks

    Fuller visited his daughter and her husband in Bishek, as a former Russian history graduate himself interested in ‘Soviet minorities’.

    He said he may have met the terror suspects’ father, Aznor, there once and his daughter knew the Tsarnaev family when Tamerlan was a toddler and before his younger brother was born.

    ‘I for one was astonished at the events, and to find myself at two degrees of separation from them,’ he added.

    Ruslan Tsarni, who lives in Montgomery Village, Maryland, was thrust into the spotlight as the names of his two nephews emerged in connection to the Boston terror attack.

    He stood on his driveway and attacked the two men calling them ‘Losers’.

    He has since reported a rift between his family and that of his brother Aznor’s and said his older nephew Tamerlan had become increasingly extreme in his religious views.

    By Katie Davies

    PUBLISHED: 23:34 GMT, 27 April 2013 | UPDATED: 05:55 GMT, 28 April 2013

    Find this story at 27 April 2013

    © Associated Newspapers Ltd

    Anti-terror task force was warned of Tamerlan Tsarnaev’s long trip to Russia

    Nine months before the Boston Marathon bombing, a U.S. counterterrorism task force received a warning that a suspected militant had returned from a lengthy trip to Russia, U.S. officials said.

    The warning was delivered to a single U.S. Customs and Border Protection official assigned to Boston’s Joint Terrorism Task Force, a cell of specialists from federal and local law enforcement agencies. The task force was part of a network of multi-agency organizations set up across the country after the Sept. 11, 2001, attacks to make sure that clues and tips were shared.

    But officials said there is no indication that the unidentified customs officer provided the information to any other members of the task force, including FBI agents who had previously interviewed the militant.

    The man whose return from Russia went largely unnoticed was one of the two brothers who would later be accused of carrying out the April 15 bombing that killed three people and injured more than 250 others near the finish line of the Boston Marathon.

    The apparent failure to alert the FBI has emerged as a significant, if slender, missed opportunity to scrutinize Tamerlan Tsarnaev’s activities ahead of the Boston attack.

    A U.S. official, speaking on condition of anonymity, said there would not have been reason to scrutinize Tsarnaev further, even if the information on his travels had been shared more widely.

    “The FBI investigation into the individual in question had been closed six months prior to his departure from the United States and more than a year before his return,” the official said. “Since there was no derogatory information, there was no reason to suggest that additional action was warranted.”

    The disclosure — one of several to cause lawmakers to express concern about persistent gaps in U.S. counterterrorism procedures — came as U.S. officials revealed that the bombing suspects may have intended to carry out a follow-up attack in New York’s Times Square.

    Dzhokhar Tsarnaev, 19, who is still recovering at a Boston hospital from gunshot wounds, told FBI interrogators that he and his brother came up with the Times Square plan spontaneously three days after the marathon bombings, officials said. Investigators, however, have not found any evidence that operational plans were ever set in motion.

    The New York plot was derailed when the Tsarnaev brothers became the target of a manhunt by law enforcement. The older brother was killed, and the younger one captured, after a chaotic pursuit through neighborhoods of Watertown, Mass.

    “We don’t know if we would have been able to stop the terrorists had they arrived here from Boston,” New York Mayor Michael R. Bloomberg (I) said during a news conference at which the plot was outlined. “We’re just thankful that we didn’t have to find out that answer.”

    The criminal charges filed against Dzhokhar Tsarnaev indicate that the two brothers had at least a half-dozen explosive devices in addition to the two pressure-cooker bombs they are accused of detonating near the finish line of the marathon course.

    U.S. officials said that Dzhokhar Tsarnaev has ceased cooperating with authorities since being read his Miranda rights during an unusual, makeshift court session at his hospital bedside on Monday. Before that, investigators had questioned him for about 16 hours.

    The FBI opened an investigation of Tamerlan Tsarnaev in 2011 at the behest of Russian officials who expressed concern that he was becoming radicalized and could be planning an attack in Russia.

    The bureau set the inquiry aside after concluding that Tsarnaev posed no threat. But notice that he had returned from a seven-month trip to Russia might have provided the FBI with new reasons to question him. He had traveled to the strife-torn region of Dagestan, in the North Caucasus, where rebels have adopted the tactics and language of militant Islamists.

    After he returned to Boston, Tamerlan Tsarnaev began assembling an online library of jihadist videos and voiced anger in conversations with neighbors over the U.S. wars in Iraq and Afghanistan.

    Still, U.S. officials said it is not clear that the FBI would have reopened its inquiry after Tsarnaev’s return from Russia because no new information had surfaced to indicate he was a threat. A member of an anti-terrorism panel in Dagestan said in an interview this week that he wasn’t being observed there during his visit and had done nothing to attract notice.

    U.S. officials also said that the customs officer in Boston may have mentioned Tsarnaev’s return to FBI agents serving on the task force without creating a computer file to record the information had been shared.

    Director of National Intelligence James R. Clapper Jr. said during an appearance at a conference in Washington on Thursday that he has seen no evidence that U.S. agencies failed. “The dots were connected,” he said. He also called on the public “not to hyperventilate for a while before we get all the facts.”

    By Greg Miller,

    Find this story at 25 April 2013

    © The Washington Post Company

    FBI probed bomb suspect in 2011 after a warning from Russian intelligence

    THE Russian FSB intelligence security service told the FBI in early 2011 about information that Tamerlan Tsarnaev, one of the brothers suspected in the Boston marathon bombings, was a follower of radical Islam, two law enforcement officials say.

    Tamerlan Tsarnaev died in a shootout, and his younger brother Dzhokhar, 19, was captured alive.

    They were identified by authorities and relatives as ethnic Chechens from southern Russia who had been in the US for about a decade.

    According to an earlier FBI news release, a foreign government said that based on its information, Tsarnaev, 26, was a strong believer and that he had changed drastically since 2010 as he prepared to leave the US for travel to a region in that country to join unspecified underground groups.

    The FBI did not name the foreign government, but the two law enforcement officials identified the FSB as the provider of the information to one of the FBI’s field offices and also to FBI headquarters in Washington DC.

    The two officials spoke on condition of anonymity because they were not authorised to speak on the record about the matter.

    The FBI said that in response, it interviewed Tsarnaev and relatives, and did not find any domestic or foreign terrorism activity.

    The FBI said it provided the results in the summer of 2011.

    The FBI also said that it requested but did not receive more specific or additional information from the foreign government.

    The bureau added that in response to the request, it checked US government databases and other information to look for such things as derogatory telephone communications, possible use of online sites associated with the promotion of radical activity, associations with other persons of interest, travel history and plans and education history.

    Meanwhile a doctor involved in treating the fatally wounded Tamerlan Tsarnaev says he had injuries from head to toe but all limbs intact when he arrived at hospital.

    Dr David Schoenfeld said 26-year-old Tamerlan Tsarnaev was unconscious and had so many penetrating wounds when he arrived at Beth Israel Deaconess Medical Centre after a shootout with police that it isn’t clear which ones killed him, and a medical examiner will have to determine the cause of death.

    The older Tsarnaev’s clothes had been cut off by emergency responders at the scene, so if he had been wearing a vest with explosives, he wasn’t by the time he arrived at the hospital, the doctor said.

    AP

    Find this story at 21 April 2013

    © The Australian

    Hamid Karzai seeks to curb CIA operations in Afghanistan

    President believes battle in which 10 children and a US agent died was fought by illegal militia working for spy agency

    Afghan president Hamid Karzai’s campaign against CIA operations sets up a heated showdown with the US government. Photograph: S Sabawoon/EPA

    President Hamid Karzai is determined to curb CIA operations in Afghanistan after the death of a US agent and 10 Afghan children in a battle he believes was fought by an illegal militia working for the US spy agency.

    The campaign sets the Afghan leader up for another heated showdown with the US government, and will reignite questions about the CIA’s extensive but highly secretive operations in the country.

    Karzai’s spokesman Aimal Faizi said the CIA controlled large commando-like units, some of whom operated under the nominal stamp of the Afghan government’s intelligence agency, the National Directorate of Security (NDS), but were not actually under its control.

    “Some of them are said to be working with the NDS, but they are not armed by the NDS, not paid by the NDS, and not sent to operations by the NDS. Sometimes they only inform the NDS minutes before the operation,” Faizi said. “They are conducting operations without informing local authorities and when something goes wrong it is called a joint operation.”

    One of these groups was involved in a battle with insurgents in a remote corner of eastern Kunar province in early April that left several Afghan children dead, Faizi said. Karzai has fired the provincial head of intelligence in connection with the incident.

    The US citizen who died during the battle was advising the Afghan intelligence service, and the airstrike that killed the children is believed to have been called in after he was fatally injured.

    The US embassy declined to comment on CIA issues, but sources with knowledge of the battle said he was an agent, and his name has not been released, usually an indication of intelligence work.

    Bob Woodward in his 2010 book Obama’s Wars described a 3,000-strong Afghan militia working for the CIA, and Faizi said the Afghan government had little information about the teams. “There is a lack of clarity about their numbers and movement,” he said when asked how many men the CIA had on their payroll, or where these large teams might be based.

    Woodward said the unofficial commando units were known as counter-terrorism pursuit teams, and described them as “a paid, trained and functioning tool of the CIA”, authorised by President George W Bush.

    They were sent on operations to kill or capture insurgent leaders, but also went into lawless areas to try to pacify them and win support for the Afghan government and its foreign backers. Woodward said the units even conducted cross-border raids into Pakistan.

    In the wake of the Kunar battle, Karzai has also ordered his security officials to step up implementation of a presidential decree issued in late February abolishing “parallel structures”. Faizi said this order was aimed primarily at dismantling CIA-controlled teams.

    “The use of these parallel structures run by the CIA and US special forces is an issue of concern for the Afghan people and the Afghan government,” he said.

    Emma Graham-Harrison in Kabul
    The Guardian, Friday 19 April 2013 10.19 BST

    Find this story at 19 April 2013
    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Long-ago wiretap inspires a battle with the CIA for more information

    Paul Scott, the late syndicated columnist, was so paranoid about the CIA wiretapping his Prince George’s County home in the 1960s that he’d make important calls from his neighbor’s house. His teenage son Jim Scott figured his dad was either a shrewd reporter or totally nuts.

    Not until nearly 45 years later did the son learn that his father’s worries were justified. The insight came in 2007 when the CIA declassified a trove of documents popularly called “the family jewels.” The papers detailed the agency’s unlawful activities from long ago, including wiretapping the Scott home in District Heights. The operation even had a code name: “Project Mockingbird.”

    Jim was floored: The CIA really did eavesdrop on Dad.

    Now Jim, 64, a retired Navy public relations officer who lives in Anne Arundel County, is waging an operation of his own against the agency. For the past five years, he has sought to declassify and make public any documents Langley might still have on his father and why he was wiretapped.

    So far, the CIA has released to Jim a handful of intriguing documents. But Jim has been trying to compel the agency to cough up more. A federal declassification review panel is reviewing Jim’s case and could decide as soon as this month whether to direct the CIA to release more Mockingbird documents.

    “I don’t have any animosity for the CIA,” said Jim, whose father died at the age of 80 in 2001. “I respect what they do. But they make it extremely difficult for the average citizen to interact with them. It makes me wonder what they are still trying to hide about my father.”

    Not eager to share

    It’s not easy penetrating one of the world’s most secretive organizations.

    Tourists can’t just show up at its famous headquarters, let alone wander into its museum or browse the gift shop that sells CIA T-shirts and tchotchkes. Even former spies-turned-memoirists need agency approval for their manuscripts before publication and often can’t reveal seemingly harmless or boring details about their careers.

    For ordinary people — academics, journalists, relatives of former employees — extracting agency information can be tough. They can file Freedom of Information Act and Privacy Act requests or mandatory declassification review requests. But the CIA usually isn’t eager to part with much, said Steven Aftergood, director of the project on government secrecy at the Federation of American Scientists.

    “I have a number of requests with the CIA that are more than five years old,” said Aftergood, who has sued the agency a handful of times for documents.

    “The message they’re sending is, ‘If you want our attention, sue us,’ ” he said, calling it “a time-consuming and resource-demanding effort.” He usually loses.

    Todd Ebitz, an agency spokesman, said the agency received more than 5,400 Freedom of Information Act and Privacy Act requests, along with mandatory declassification review requests, in fiscal 2012 . The agency doesn’t keep track of how many of those requests come from ordinary citizens, rather than journalists, academics or nonprofit groups.

    Since 1995, he said, the CIA has released more than 10 million pages of declassified material. The agency also has used its discretion to release more than 100,000 pages of CIA material, including documents from the family jewels. But just because documents are old doesn’t mean they can be made public.

    “CIA information that is decades old may still be sensitive when it mentions methods, techniques or sources which, if they were revealed, could harm our nation’s security or place someone’s personal security at risk,” Ebitz said. “The agency works diligently to make public information no longer requiring protection, releasing what we can and withholding what we must in the interest of national security.”

    The CIA declined to comment on the specifics of Jim Scott’s case. But Tom Blanton, director of the George Washington University-based National Security Archive, questioned the agency’s refusal to release the documents about Jim Scott’s father: “There’s nothing truly secret about the wiretapping of Paul Scott now.”

    “What this is really about,” Blanton said, “is bureaucracy and power.”

    High-level wiretaps

    In June 2007, Jim read about the CIA’s decision to release the family jewels. The collection of long-secret documents revealed details about the agency’s activities from the 1960s and 1970s, including a failed assassination plan against Cuba’s Fidel Castro, a Watergate burglar’s search for an expert lock picker, and illegal wiretaps of reporters.

    To Jim’s shock, two of the wiretapped journalists were his father, Paul, and his writing partner, Robert S. Allen, who died in 1981. The men once wrote a syndicated column, the “Allen-Scott Report,” that appeared in 300 newspapers. Their column often contained national security scoops, including exclusives about Soviet aid to Cuba during the 1962 missile crisis.

    Jim called his mother about the wiretap revelations. She reminded him about the time he complained about hearing strangers’ voices on a phone call with a high school classmate.

    “I had heard some clicking in the background,” Jim said, laughing. “I heard someone say, ‘Don’t worry, it’s just two kids talking about homework assignments.’ As a teenager, you kinda just blow that stuff off.”

    Once the family jewels were posted online, “I couldn’t go to sleep that night, reading the documents,” Jim recalled. “What startled me was the level of seniority that approved this operation.”

    The wiretap on his father was described in only three released pages, each stamped with the words “SECRET” and “EYES ONLY.” Every sentence seemed more tantalizing than the next.

    Between March 12, 1963, and June 15, 1963, phone bugs were installed at the Allen and Scott homes and their Capitol Hill office. But this was no rogue operation: CIA Director John McCone approved the operation “under pressure,” the documents said, from Attorney General Robert F. Kennedy. And Kennedy planned it with Robert McNamara, the defense secretary and Vietnam War architect.

    The wiretap identified many of the reporting team’s sources: a dozen senators; six congressmen; 11 congressional staffers; 16 “government employees,” including a staff member at the White House and some at the vice president’s office; and “other well-placed individuals,” the documents said.

    The journalists actually got more classified information than they could use, the documents noted, and passed the leftovers along to rival reporters.

    But several pages were fully or partly redacted. Jim felt teased. Why, he wondered, did the CIA keep those pages secret after so many years? Are the names of all their sources hidden behind the redactions?

    “It felt like a half-written Vince Flynn or Michael Connelly novel,” Jim said. “I wondered how much my dad knew about being surveilled. What was going through his mind? He had to be fearful. It felt like this was a chapter in his life we knew little about, and the release of [more] documents could shed some light.”

    So, in 2008, the son filed his first Freedom of Information Act request with the CIA.

    Clues from the FBI

    Twelve months later, the agency mailed Jim a packet of partially redacted memos about Paul. None touched on the 1963 Mockingbird wiretap, though there was an intriguing account of a visit his father made to South Africa in 1968 to interview a captured Russian spy.

    “The CIA gave me stuff that I didn’t know even existed,” Jim said, “but I just wanted to know what articles triggered the wiretap.”

    In early 2009, Jim requested the wiretap documents for a second time. “Isn’t it safe to assume that most, if not all, of the key players complicit in this operation are deceased?” he asked in a letter to the CIA.

    That summer, the CIA rejected his appeal, ruling that the information still required secrecy.

    Meanwhile, Jim had pursued a second route: the FBI.

    To his surprise, the bureau was more than happy to play along. Throughout 2011, FBI documents arrived at Jim’s home in waves, packed with new revelations.

    Jim learned, according to one FBI memo, that his dad truly alarmed the government at a Feb. 6, 1963, news conference in which he asked Defense Secretary McNamara several questions about Cuban weapons. Paul used precisely the same information in his questions that was contained in secret Navy documents. And the Navy, according to the bureau memos, wanted the FBI to find out who his source was.

    But someone very senior at the bureau expressed reservations in a letter to Robert Kennedy that referred to his brother, President John F. Kennedy. Although the FBI official seemed alarmed by “Allen-Scott Report” pieces — published from December 1962 to February 1963 in, of all places, the now-defunct Northern Virginia Sun — he didn’t want the bureau involved.

    [A] covert investigation will become known and I understood the President does not want it to become known. [I]t would be far more effective to have the Defense agencies interview people in their own agencies rather than an outside civilian agency do it because there is always a certain amount of resentment . . .

    Very truly yours, JEH, John Edgar Hoover, Director

    “I was elated when I read all this. These are some heavyweight people,” Jim said. “I figured that I am getting this from the FBI, and it’ll just be a matter of time before the CIA sheds some light as well.

    Waiting for word on appeal

    But Jim never gained any traction with the CIA.

    By Ian Shapira, Published: March 3

    Find this story at 3 March 2013

    Related document

    © The Washington Post Company

    FBI agents caught sexting and dating drug dealers

    Dating drug dealers, harassing ex-boyfriends with naked pictures, and pointing guns at pet dogs: these were just a few of the offences committed recently by serving FBI agents, according to internal documents.
    Disciplinary files from the Bureau’s Office of Professional Responsibility record an extraordinary range of transgressions that reveal the chaotic personal lives of some of America’s top law enforcers.

    One male agent was sacked after police were called to his mistress’s house following reports of domestic incident. When officers arrived they found the agent “drunk and uncooperative” and eventually had to physically subdue him and wrestle away his loaded gun.

    A woman e-mailed a “nude photograph of herself to her ex-boyfriend’s wife” and then continued to harass the couple despite two warnings from senior officials. The Bureau concluded she was suffering from depression related to the break-up and allowed her to return to work after 10 days.
    But the sexually explicit picture was only one of what FBI assistant director Candice Will described to CNN as a “rash of sexting cases”. The network was the first to obtain the logs.

    Two other employees, whose genders were not specified, sent sexually explicit messages to fellow members of the Bureau, one a work Blackberry during office hours.

    The second employee included a nude photograph which “created office gossip and negatively impacted office operations”.

    By Raf Sanchez, Washington

    4:06AM GMT 22 Feb 2013

    Find this story at 22 February 2013

    © Copyright of Telegraph Media Group Limited 2013

    From a Mexican kingpin to an FBI informant

    After agents arrest a drug cartel chieftain named Jesus Audel Miramontes-Varela, he becomes one of the bureau’s most valuable sources of information, according to confidential interview reports.

    WASHINGTON — Police and federal agents pulled the car over in a suburb north of Denver. An FBI agent showed his badge. The driver appeared not startled at all. “My friend,” he said, “I have been waiting for you.”

    And with that, Jesus Audel Miramontes-Varela stepped out of his white 2002 BMW X5 and into the arms of the Federal Bureau of Investigation.

    Over the next several days at his ranch in Colorado and an FBI safe house in Albuquerque, the Mexican cartel chieftain — who had reputedly fed one of his victims to lions in Mexico — was transformed into one of the FBI’s top informants on the Southwest border.

    Around a dining room table in August 2010, an FBI camera whirring above, the 34-year-old Miramontes-Varela confessed his leadership in the Juarez cartel, according to 75 pages of confidential FBI interview reports obtained by The Times/Tribune Washington Bureau.

    He told about marijuana and cocaine routes to California, New York and the Great Lakes. He described the shooting deaths of 30 people at a horse track in Mexico, and a hidden mass grave with 20 bodies, including two U.S. residents.

    He told them about his African lions, which he had acquired as circus cubs. The story about feeding one of his enemies to them was false, he claimed, but he said he had seen plenty of “violence and suffering.” He told agents he was desperate to trade his knowledge for government protection. He wanted a new life for himself and his wife and three daughters.

    A week later Miramontes-Varela pleaded guilty in federal court in New Mexico to a minor felony as an illegal immigrant in possession of a firearm. Then he disappeared, almost certainly into the federal witness protection program.

    FBI officials in Arizona and Washington declined to comment about Miramontes-Varela, citing bureau policy against discussing informants. But the documents tell plenty.

    During the interview sessions, Miramontes-Varela “provided significant information about drug trafficking activity,” the documents said, leading to several successful unnamed law enforcement operations in the U.S. and Mexico.

    ***

    After Miramontes-Varela was stopped in Brighton, Colo., agents took him back to his ranch. They advised him and his wife, Mari, that he was “the subject of an FBI investigation for his involvement in drug trafficking, firearms trafficking, money laundering and the interstate transportation of stolen property.”

    In Spanish, they read him his Miranda rights. He called an attorney; they spoke quietly in Spanish. Miramontes-Varela hung up and turned to the agents. “Yes,” he said. “He told me to do as much as I can for you.”

    Miramontes-Varela signed the Miranda waiver and looked up at the agents. He asked, “Where do you want to start?”

    First, they said, any guns?

    Miramontes-Varela mentioned a black 9-millimeter semiautomatic Glock pistol he said he bought after being shot at in El Paso. The agents asked to see it. “Yes, yes, no problem,” he said. He walked to a floor safe in a far corner of the living room, unlocked it and handed the weapon over.

    Agents drove the couple to the FBI safe house in Albuquerque. Inside, they pointed to two cameras. One was in the master bedroom, where Miramontes-Varela and his wife would stay. Agents showed that that it was unplugged and that they had covered it with a white plastic bag. “Very nice,” Miramontes-Varela said.

    Miramontes-Varela talked to them around the dining room table. That is where the other camera was. It stayed on.

    ***

    His story poured out. He was born the third of 10 children in Terrero, Mexico, and grew up in Namiquipa, northern Mexico. He married when he was 18, his bride 15. They sneaked though Nogales, Ariz., coming to the U.S., he said, “to make money.”

    They settled in Denver. Miramontes-Varela installed drywall. But in the late 1990s a brother, Yovany, lost an arm in a tractor mishap, and Miramontes-Varela returned home. He grew apples and traded in cattle.

    In early 2002, he said, the Juarez cartel came to Namiquipa. Pedro Sanchez, known as El Tigre, controlled things. He offered Miramontes-Varela a job collecting a monthly $35,000 “tax” from marijuana growers.

    Every 15 days, growers carted 20 tons to a local warehouse. It was shipped north through El Paso, the proceeds funneled back to the cartel and the growers.

    One day the military arrived and gunfire ensued. “The mayor and town treasurer were killed,” Miramontes-Varela said. Later, El Tigre was arrested.

    In 2008, Miramontes-Varela said, he fled with his family to El Paso. When he failed to return, the cartel burned his ranch and stole his cattle, all 120 cows. He was done with the violence, he said.

    ***

    That part, according to the FBI, was not true. Miramontes-Varela shuffled between ranches in New Mexico and Colorado, they said, often in an armored car with bodyguards, and set up his own drug- and gun-smuggling operation.

    When a courier was arrested with 18 kilos of cocaine, Miramontes-Varela offered the man’s family the choice of one of his 16 homes in Mexico, including his “big house,” according to telephone wiretaps outlined in the documents.

    In March 2010, the FBI listed him as head of the “Miramontes-Varela Drug Trafficking Organization,” tied to the Juarez, Sinaloa and Los Zetas cartels. From two confidential sources and two wiretaps, agents learned that his organization had stolen tractors in the U.S. and driven them to Mexico as payment for lost loads. One debt alone reached $670,000. They learned that one of Miramontes-Varela’s bosses in Mexico, “Temoc,” was tortured and killed by the Sinaloans.

    The Bureau of Alcohol, Tobacco, Firearms and Explosives also wanted him arrested. It had tracked $250,000 in illegal gun purchases to Miramontes-Varela and his brother through its ill-fated Fast and Furious gun-smuggling surveillance operation in Arizona.

    FBI agents rigged a 24-hour pole camera outside his ranch near Santa Teresa, N.M. But Miramontes-Varela figured it out. Five of his men in two vehicles followed a surveillance agent for 90 minutes, then slashed his tire.

    richard.serrano@latimes.com

    By Richard A. Serrano, Los Angeles Times

    8:12 PM PDT, April 21, 2012Advertisement

    Find this story at 21 April 2012

    Copyright © 2013, Los Angeles Times

    License plate-reading devices fuel privacy debate

    Technology helps police respond to crimes, violations, but broad use, lack of regulations raise privacy worries

    CHELSEA — The high-speed cameras mounted on Sergeant Robert Griffin’s cruiser trigger a beeping alarm every time they read another license plate, automatically checking to see if each car is unregistered, uninsured, or stolen. In a single hour of near-constant beeps, Griffin runs 786 plates on parked cars without lifting a finger.

    The plate-reading cameras were introduced for police use in Massachusetts in 2008, and quickly proved their worth. The one on Griffin’s Chelsea cruiser repaid its $24,000 price tag in its first 11 days on the road. “We located more uninsured vehicles in our first month . . . using [the camera] in one cruiser than the entire department did the whole year before,” said Griffin.

    Now, automated license plate recognition technology’s popularity is exploding — seven Boston-area police departments will add a combined 21 new license readers during the next month alone — and with that expanded use has come debate on whether the privacy of law-abiding citizens is being violated.

    These high-tech license readers, now mounted on 87 police cruisers statewide, scan literally millions of license plates in Massachusetts each year, not only checking the car and owner’s legal history, but also creating a precise record of where each vehicle was at a given moment.
    Related
    Video: The watchful lens of the police
    Graphic: How license plate readers work

    The records can be enormously helpful in solving crimes — for example, Fitchburg police used the technology to catch a serial flasher — but they increasingly make privacy advocates uneasy.

    Use of the technology is outstripping creation of rules to prevent abuses such as tracking the movements of private citizens, or monitoring who visits sensitive places such as strip clubs, union halls, or abortion clinics.

    A survey of police departments that use automated license readers found that fewer than a third — just 17 out of 53 — have written policies, leaving the rest with no formal standards for who can see the records or how long they will be preserved.

    “The worst-case scenario — vast databases with records of movements of massive numbers of people — is already happening,” warns Kade Crockford of the American Civil Liberties Union of Massachusetts, which is pushing for a state law to regulate use of license plate scanners and limit the time departments can routinely keep the electronic records to 48 hours.

    But police fear that zeal to protect privacy could stifle the use of a promising law enforcement tool, especially if they are prevented from preserving and pooling license plate scans for use in detective work. Currently, all of the police departments keep their plate scans longer than two days, with data storage ranging from 14 days in Somerville and Brookline to 90 days in Boston and up to a year in Leicester, Malden, Pittsfield, and Worcester.

    Sergeant Griffin, whose own department has no written policy, agrees that there should be rules to prevent abuse, but thinks that these should be set by local departments rather than at the State House. He said that rather than restrict use of the scanners, the Legislature should “trust law enforcement to do the right thing.”

    The usefulness of the automated license plate reader as an investigative tool springs from the astounding number of license plates the units can scan and record. With an array of high-speed cameras mounted on police cruisers snapping pictures, these systems are designed to capture up to 1,800 plates per minute, even at high speeds and in difficult driving conditions.

    “I’ve had my [license plater reader] correctly scan plates on cars parked bumper-to-bumper when I’m driving full speed,” said Griffin, who caught three scofflaws owing a combined $1,900 in parking tickets from the 786 license plates his reader checked on a recent one-hour patrol. The devices misidentify plates often enough that scans have to be confirmed by an officer on the scene before writing a ticket. In this case, after confirming the parking tickets, and the money owed, police initiated the collection process. Griffin called headquarters to confirm that the vehicles still had unpaid tickets, and then arranged for them to be towed.

    Boston’s four scanner-equipped cars do 3,500 scans a day and more than 1 million per year, according to police data. Even smaller departments such as Fitchburg scan 30,000 plates per month with just one license-reading system, easily 10 times more than an officer could manually check.

    Most of the departments that deploy license plate readers use them primarily for traffic enforcement. But the scanners — sometimes called by the acronym ALPR — are also used for missing persons, AMBER alerts, active warrants, and open cases.

    “Every once in a while our detectives will use the ALPR database for retrospective searches,” said Griffin, adding that the technology has proved useful to scan vehicles in neighborhoods surrounding crime scenes.

    Griffin’s counterpart in Fitchburg, Officer Paul McNamara, said license scanner data played a crucial role in solving a string of indecent exposure incidents at Fitchburg State University in April 2011. At the request of the university police, McNamara entered the alleged flasher’s plate into his license-scan database. The system indicated that a suspect’s vehicle had passed the scanner just 10 minutes earlier, leading to a suspect’s arrest and later guilty plea to charges of indecent exposure and lewdness.

    McNamara said that there is no formal process when another police department requests a license inquiry of this kind into his unit’s database.

    “It can’t be a fishing expedition, though,” he said. “We look at it as a form of mutual aid, so it has to be a serious criminal matter for us to share data.”

    While law enforcement officials are enthusiastic, critics can point to alleged abuses:

    ■ In 2004, police tracked Canadian reporter Kerry Diotte via automated license scans after he wrote articles critical of the local traffic division. A senior officer admitted to inappropriately searching for the reporter’s vehicle in a license scan database in an attempt to catch Diotte driving drunk.

    ■ Plainclothes NYPD officers used readers to scan license plates of worshipers at a mosque in 2006 and 2007, the Associated Press reported, under a program that was partially funded by a federal drug enforcement grant.

    ■ In December, the Minneapolis Police Department released a USB thumb drive with 2.1 million license plate scans and GPS vehicle location tags in response to a public records request, raising fears that such releases might help stalkers follow their victims. A few days later, the Minneapolis mayor asked the state to classify license scan data as nonpublic.

    ACLU attorney Fritz Mulhauser warned last summer that, within a few years, police will be able to use license scan records to determine whether a particular vehicle “has been spotted at a specific church, union hall, bar, political party headquarters, abortion clinic, strip club, or any number of other locations a driver might wish to keep private.”

    But many law enforcement officials say they are just starting to tap the potential of license plate scanners.

    “If anything, we’re not using ALPR enough,” said Medford’s Chief Leo Sacco, who would like to deploy the scanners 24 hours a day on all of his cruisers.

    Massachusetts public safety officials are trying to create a central repository of license scans similar to a system in Maryland where all 262 scanner-equipped cruisers feed data to the state. In 2011, the Executive Office of Public Safety and Security handed out $750,000 in federal grants for 43 police departments to buy scanners with the understanding that all scan results would be shared.

    The bill introduced on Beacon Hill by Senator Cynthia Creem and Representative Jonathan Hecht would allow police to share scan results for law enforcement purposes, but it would require every agency to develop formal policies that protect privacy. It would also set statewide standards for preserving camera scanner data and require regular reports to the state on how departments are using their scanners.

    Currently, even the state Executive Office of Public Safety lacks a formal policy governing the use of its planned database, while 36 police departments out of the 53 using automated license readers have no written policies, the survey found. The Massachusetts State Police are currently developing a policy for the department’s 20 camera scanners.

    Even departments that do have formal license-reading policies differ widely on specifics such as whether the collected data must be released to the public in response to a written request; Wakefield and Revere say no; many others use vague language that leaves it unclear.

    Likewise, the police differ widely on how long they can retain license scans not connected to an ongoing investigation or law enforcement action, ranging from as little as 14 days in Somerville and Brookline to indefinitely in Milford.

    The town of Brookline, police, and selectmen have worked with the ACLU to develop perhaps the most detailed policies in the state.

    This investigation was done for the Globe in collaboration with MuckRock, a Boston-based company that specializes in obtaining government documents through records requests. It was supported by a grant from the Fund for Investigative Journalism. Shawn Musgrave can be reached at shawn@muckrock.com.

    By Shawn Musgrave | Globe Correspondent April 09, 2013

    Find this story at 9 April 2013

    © 2013 The New York Times Company

    How a Single Spy Helped Turn Pakistan Against the United States

    The burly American was escorted by Pakistani policemen into a crowded interrogation room. Amid a clatter of ringing mobile phones and cross talk among the cops speaking a mishmash of Urdu, Punjabi and English, the investigator tried to decipher the facts of the case.

    “America, you from America?”

    “Yes.”

    “You’re from America, and you belong to the American Embassy?”

    “Yes,” the American voice said loudly above the chatter. “My passport — at the site I showed the police officer. . . . It’s somewhere. It’s lost.”

    On the jumpy video footage of the interrogation, he reached beneath his checkered flannel shirt and produced a jumble of identification badges hanging around his neck. “This is an old badge. This is Islamabad.” He showed the badge to the man across the desk and then flipped to a more recent one proving his employment in the American Consulate in Lahore.

    “You are working at the consulate general in Lahore?” the policeman asked.

    “Yes.”

    “As a . . . ?”

    “I, I just work as a consultant there.”

    “Consultant?” The man behind the desk paused for a moment and then shot a question in Urdu to another policeman. “And what’s the name?”

    “Raymond Davis,” the officer responded.

    “Raymond Davis,” the American confirmed. “Can I sit down?”

    “Please do. Give you water?” the officer asked.

    “Do you have a bottle? A bottle of water?” Davis asked.

    Another officer in the room laughed. “You want water?” he asked. “No money, no water.”

    Another policeman walked into the room and asked for an update. “Is he understanding everything? And he just killed two men?”

    Hours earlier, Davis had been navigating dense traffic in Lahore, his thick frame wedged into the driver’s seat of a white Honda Civic. A city once ruled by Mughals, Sikhs and the British, Lahore is Pakistan’s cultural and intellectual capital, and for nearly a decade it had been on the fringes of America’s secret war in Pakistan. But the map of Islamic militancy inside Pakistan had been redrawn in recent years, and factions that once had little contact with one another had cemented new alliances in response to the C.I.A.’s drone campaign in the western mountains. Groups that had focused most of their energies dreaming up bloody attacks against India were now aligning themselves closer to Al Qaeda and other organizations with a thirst for global jihad. Some of these groups had deep roots in Lahore, which was why Davis and a C.I.A. team set up operations from a safe house in the city.

    But now Davis was sitting in a Lahore police station, having shot two young men who approached his car on a black motorcycle, their guns drawn, at an intersection congested with cars, bicycles and rickshaws. Davis took his semiautomatic Glock pistol and shot through the windshield, shattering the glass and hitting one of the men numerous times. As the other man fled, Davis got out of his car and shot several rounds into his back.

    He radioed the American Consulate for help, and within minutes a Toyota Land Cruiser was in sight, careering in the wrong direction down a one-way street. But the S.U.V. struck and killed a young Pakistani motorcyclist and then drove away. An assortment of bizarre paraphernalia was found, including a black mask, approximately 100 bullets and a piece of cloth bearing an American flag. The camera inside Davis’s car contained photos of Pakistani military installations, taken surreptitiously.

    More than two years later, the Raymond Davis episode has been largely forgotten in the United States. It was immediately overshadowed by the dramatic raid months later that killed Osama bin Laden — consigned to a footnote in the doleful narrative of America’s relationship with Pakistan. But dozens of interviews conducted over several months, with government officials and intelligence officers in Pakistan and in the United States, tell a different story: that the real unraveling of the relationship was set off by the flurry of bullets Davis unleashed on the afternoon of Jan. 27, 2011, and exacerbated by a series of misguided decisions in the days and weeks that followed. In Pakistan, it is the Davis affair, more than the Bin Laden raid, that is still discussed in the country’s crowded bazaars and corridors of power.

    Davis was taken to Kot Lakhpat prison, on the industrial fringes of Lahore, a jail with a reputation for inmates dying under murky circumstances. He was separated from the rest of the prisoners and held in a section of the decaying facility where the guards didn’t carry weapons, a concession for his safety that American officials managed to extract from the prison staff. The United States Consulate in Lahore had negotiated another safeguard: A small team of dogs was tasting Davis’s food, checking that it had not been laced with poison.

    For many senior Pakistani spies, the man sitting in the jail cell represented solid proof of their suspicions that the C.I.A. had sent a vast secret army to Pakistan, men who sowed chaos and violence as part of the covert American war in the country. For the C.I.A., the eventual disclosure of Davis’s role with the agency shed an unflattering light on a post–Sept. 11 reality: that the C.I.A. had farmed out some of its most sensitive jobs to outside contractors — many of them with neither the experience nor the temperament to work in the war zones of the Islamic world.

    The third child of a bricklayer and a cook, Davis grew up in a small clapboard house outside Big Stone Gap, a town of nearly 6,000 people in Virginia coal country. He became a football and wrestling star at the local high school, and after graduating in 1993, Davis enlisted in the Army and did a tour in Macedonia in 1994 as a United Nations peacekeeper. When his five-year hitch in the infantry was up, he re-enlisted, this time in the Army’s Third Special Forces Group based at Fort Bragg, N.C. He left the Army in 2003 and, like hundreds of other retired Navy SEALs and Green Berets, was hired by the private security firm Blackwater and soon found himself in Iraq working security for the C.I.A.

    Little is known about his work for Blackwater, but by 2006, Davis had left the firm and, together with his wife, founded a security company in Las Vegas. Soon he was hired by the C.I.A. as a private contractor, what the agency calls a “Green Badge,” for the color of the identification cards that contractors show to enter C.I.A. headquarters at Langley. Like Davis, many of the contractors were hired to fill out the C.I.A.’s Global Response Staff — bodyguards who traveled to war zones to protect case officers, assess the security of potential meeting spots, even make initial contact with sources to ensure that case officers wouldn’t be walking into an ambush. Officers from the C.I.A.’s security branch came under withering fire on the roof of the agency’s base in Benghazi, Libya, last September. The demands of the wars in Iraq and Afghanistan had so stretched the C.I.A.’s own cadre of security officers that the agency was forced to pay inflated sums to private contractors to do the security jobs. When Davis first deployed with the C.I.A. to Pakistan in 2008, he worked from the agency’s base in Peshawar, earning upward of $200,000 a year.

    By mid-February 2011, with Davis still sitting in prison, anti-American passions were fully inflamed, and daily street protests and newspaper editorials demanded that the government not cave to Washington’s demands for Davis’s release but instead sentence him to death. The evidence at the time indicated that the men Davis killed had carried out a string of petty thefts that day, but there was an added problem: the third man killed by the unmarked American S.U.V. fleeing the scene. Making matters even worse for Davis was the fact that he was imprisoned in Lahore, where the family of Nawaz Sharif dominated the political culture. The former leader of the country made no secret about his intentions to once again run Pakistan, making him the chief antagonist to President Asif Ali Zardari and his political machine in Islamabad, a four-hour drive away. As the American Embassy in Islamabad leaned on Zardari’s government to get Davis released from jail, the diplomats soon realized that Zardari had little influence over the police officers and judges in the city of the president’s bitter rival.

    But the most significant factor ensuring that Davis would languish in jail was that the Obama administration had yet to tell Pakistan’s government what the Pakistanis already suspected, and what Raymond Davis’s marksmanship made clear: He wasn’t just another paper-shuffling American diplomat. Davis’s work in Pakistan was much darker, and it involved probing an exposed nerve in the already-hypersensitive relationship between the C.I.A. and Pakistan’s military intelligence service, the Directorate for Inter-Services Intelligence, or I.S.I.

    Ever since the Pakistani militant group Lashkar-e-Taiba (the Army of the Pure) dispatched teams of assassins to lay siege to luxury hotels and other sites in Mumbai, India, in November 2008, killing and wounding more than 500 people over four days of mayhem, C.I.A. analysts had been warning that the group was seeking to raise its global profile by carrying out spectacular attacks beyond South Asia. This spurred the agency to assign more of its expanding army of operatives in Pakistan toward gathering intelligence about Lashkar’s operations — a decision that put the interests of the C.I.A. and the I.S.I. in direct conflict. It was one thing for American spies to be lurking around the tribal areas, hunting for Al Qaeda figures; it was quite another to go into Pakistani cities on espionage missions against a group that the I.S.I. considered a valuable proxy force in its continuing battle with India.

    The I.S.I. had nurtured the group for years as a useful asset against India, and Lashkar’s sprawling headquarters outside Lahore housed a radical madrassa, a market, a hospital, even a fish farm. The group’s charismatic leader, Hafiz Muhammad Saeed, had been put under house arrest at various times, but in 2009 the Lahore High Court quashed all terrorism charges against him and set him free. A stocky man with a wild beard, Saeed preached out in the open on many Fridays, flanked by bodyguards and delivering sermons to throngs of his followers about the imperialism of the United States, India and Israel. Even after the U.S. offered a $10 million reward for evidence linking Saeed to the Mumbai attacks, he continued to move freely in public, burnishing his legend as a Pakistani version of Robin Hood.

    By the time Raymond Davis moved into a safe house with a handful of other C.I.A. officers and contractors in late 2010, the bulk of the agency’s officers in Lahore were focused on investigating the growth of Lashkar. To get more of its spies into Pakistan, the C.I.A. had exploited the arcane rules in place for approving visas for Americans. The State Department, the C.I.A. and the Pentagon all had separate channels to request visas for their personnel, and all of them led to the desk of Husain Haqqani, Pakistan’s pro-American ambassador in Washington. Haqqani had orders from Islamabad to be lenient in approving the visas, because many of the Americans coming to Pakistan were — at least officially — going to be administering millions of dollars in foreign-aid money. By the time of the Lahore killings, in early 2011, so many Americans were operating inside Pakistan under both legitimate and false identities that even the U.S. Embassy didn’t have accurate records of their identities and whereabouts.

    The American Embassy in Islamabad is essentially a fortress within a fortress, a pile of buildings enclosed by walls topped with razor wire and surveillance cameras and then encircled by an outer ring of walls that separates a leafy area, called the Diplomatic Enclave, from the rest of the city. Inside the embassy, the work of diplomats and spies is kept largely separate, with the C.I.A. station occupying a warren of offices in its own wing, accessed only through doors with coded locks.

    After Davis was picked up by the Lahore police, the embassy became a house divided by more than mere geography. Just days before the shootings, the C.I.A. sent a new station chief to Islamabad. Old-school and stubborn, the new chief did not come to Pakistan to be friendly with the I.S.I. Instead, he wanted to recruit more Pakistani agents to work for the C.I.A. under the I.S.I.’s nose, expand electronic surveillance of I.S.I. offices and share little information with Pakistani intelligence officers.

    That hard-nosed attitude inevitably put him at odds with the American ambassador in Islamabad, Cameron Munter. A bookish career diplomat with a Ph.D. in history, Munter had ascended the ranks of the State Department’s bureaucracy and accepted several postings in Iraq before ultimately taking over the American mission in Islamabad, in late 2010. The job was considered one of the State Department’s most important and difficult assignments, and Munter had the burden of following Anne W. Patterson, an aggressive diplomat who, in the three years before Munter arrived, cultivated close ties to officials in the Bush and Obama administrations and won praise from the C.I.A. for her unflinching support for drone strikes in the tribal areas.

    Munter saw some value to the drone program but was skeptical about the long-term benefits. Arriving in Islamabad at a time when relations between the United States and Pakistan were quickly deteriorating, Munter wondered whether the pace of the drone war might be undercutting relations with an important ally for the quick fix of killing midlevel terrorists. He would learn soon enough that his views about the drone program ultimately mattered little. In the Obama administration, when it came to questions about war and peace in Pakistan, it was what the C.I.A. believed that really counted.

    With Davis sitting in prison, Munter argued that it was essential to go immediately to the head of the I.S.I. at the time, Lt. Gen. Ahmad Shuja Pasha, to cut a deal. The U.S. would admit that Davis was working for the C.I.A., and Davis would quietly be spirited out of the country, never to return again. But the C.I.A. objected. Davis had been spying on a militant group with extensive ties to the I.S.I., and the C.I.A. didn’t want to own up to it. Top C.I.A. officials worried that appealing for mercy from the I.S.I. might doom Davis. He could be killed in prison before the Obama administration could pressure Islamabad to release him on the grounds that he was a foreign diplomat with immunity from local laws — even those prohibiting murder. On the day of Davis’s arrest, the C.I.A. station chief told Munter that a decision had been made to stonewall the Pakistanis. Don’t cut a deal, he warned, adding, Pakistan is the enemy.

    The strategy meant that American officials, from top to bottom, had to dissemble both in public and in private about what exactly Davis had been doing in the country. On Feb. 15, more than two weeks after the shootings, President Obama offered his first comments about the Davis affair. The matter was simple, Obama said in a news conference: Davis, “our diplomat in Pakistan,” should be immediately released under the “very simple principle” of diplomatic immunity. “If our diplomats are in another country,” said the president, “then they are not subject to that country’s local prosecution.”

    Calling Davis a “diplomat” was, technically, accurate. He had been admitted into Pakistan on a diplomatic passport. But there was a dispute about whether his work in the Lahore Consulate, as opposed to the American Embassy in Islamabad, gave him full diplomatic immunity under the Vienna Convention on Diplomatic Relations. And after the shootings in Lahore, the Pakistanis were not exactly receptive to debating the finer points of international law. As they saw it, Davis was an American spy who had not been declared to the I.S.I. and whom C.I.A. officials still would not admit they controlled. General Pasha, the I.S.I. chief, spoke privately by phone and in person with Leon Panetta, then the director of the C.I.A., to get more information about the matter. He suspected that Davis was a C.I.A. employee and suggested to Panetta that the two spy agencies handle the matter quietly. Meeting with Panetta, he posed a direct question.

    Was Davis working for the C.I.A.? Pasha asked. No, he’s not one of ours, Panetta replied. Panetta went on to say that the matter was out of his hands, and that the issue was being handled inside State Department channels. Pasha was furious, and he decided to leave Davis’s fate in the hands of the judges in Lahore. The United States had just lost its chance, he told others, to quickly end the dispute.

    That the C.I.A. director would be overseeing a large clandestine network of American spies in Pakistan and then lie to the I.S.I. director about the extent of America’s secret war in the country showed just how much the relationship had unraveled since the days in 2002, when the I.S.I. teamed with the C.I.A. in Peshawar to hunt for Osama bin Laden in western Pakistan. Where had it gone so wrong?

    While the spy agencies had had a fraught relationship since the beginning of the Afghan war, the first major breach came in July 2008, when C.I.A. officers in Islamabad paid a visit to Gen. Ashfaq Parvez Kayani, the Pakistani Army chief, to tell him that President Bush had signed off on a set of secret orders authorizing a new strategy in the drone wars. No longer would the C.I.A. give Pakistan advance warning before launching missiles from Predator or Reaper drones in the tribal areas. From that point on, the C.I.A. officers told Kayani, the C.I.A.’s killing campaign in Pakistan would be a unilateral war.

    The decision had been made in Washington after months of wrenching debate about the growth of militancy in Pakistan’s tribal areas; a highly classified C.I.A. internal memo, dated May 1, 2007, concluded that Al Qaeda was at its most dangerous since 2001 because of the base of operations that militants had established in the tribal areas. That assessment became the cornerstone of a yearlong discussion about the Pakistan problem. Some experts in the State Department warned that expanding the C.I.A. war in Pakistan would further stoke anti-American anger on the streets and could push the country into chaos. But officials inside the C.I.A.’s Counterterrorism Center argued for escalating the drone campaign without the I.S.I.’s blessing. Since the first C.I.A. drone strike in Pakistan in 2004, only a small number of militants on the C.I.A.’s list of “high-value targets” had been killed by drone strikes, and other potential strikes were scuttled at the last minute because of delays in getting Pakistani approval, or because the targets seemed to have been tipped off and had fled.

    So, in July 2008, when the C.I.A.’s director, Michael Hayden, and his deputy, Stephen Kappes, came to the White House to present the agency’s plan to wage a unilateral war in the mountains of Pakistan, it wasn’t a hard sell to a frustrated president. That began the relentless, years-long drone assault on the tribal areas that President Obama continued when he took office. And as the C.I.A.’s relationship with the I.S.I. soured, Langley sent station chiefs out to Islamabad who spent far less time and energy building up good will with Pakistani spies than their predecessors had. From 2008 on, the agency cycled a succession of seasoned case officers through Islamabad, and each left Pakistan more embittered than the last. One of them had to leave the country in haste when his identity was revealed in the Pakistani press. The C.I.A. suspected the leak came from the I.S.I.

    Even many of the operations that at first seemed likely to signal a new era of cooperation between the C.I.A. and the I.S.I. ended in recriminations and finger-pointing. In January 2010, a clandestine team of C.I.A. officers and American special-operations troops working in Karachi traced a cellphone to a house in Baldia Town, a slum in the western part of the sprawling city. The C.I.A. did not conduct unilateral operations inside large Pakistani cities, so the Americans notified the I.S.I. about the intelligence. Pakistani troops and policemen launched a surprise raid on the house.

    Although the C.I.A. didn’t know in advance, hiding inside the house was Mullah Abdul Ghani Baradar, a man considered to be the Afghan Taliban’s military commander and the second in command to Mullah Muhammad Omar, the leader of the Taliban. Only after suspects in the house were arrested and questioned did the C.I.A. learn that Baradar was among the detainees. The I.S.I. took him to a detention facility in an industrial section of Islamabad and refused the C.I.A. access to him. “At that point, things got really complicated,” one former C.I.A. officer said.

    Was the entire episode a setup? Rumors had circulated inside Pakistan that Baradar wanted to cut a deal with the Americans and bring the Taliban to the negotiating table in Afghanistan. Had the I.S.I. somehow engineered the entire arrest, feeding intelligence to the C.I.A. so that Baradar could be taken off the street and the nascent peace talks spoiled? Had the I.S.I. played the C.I.A.? Months later, senior C.I.A. officials at Langley still couldn’t answer those questions. Today, more than three years later, Mullah Baradar remains in Pakistani custody.

    As Davis languished in the jail cell in Lahore, the C.I.A. was pursuing its most promising lead about the whereabouts of Osama bin Laden since 2001, when he escaped from Tora Bora, in Afghanistan, and fled across the border into Pakistan. A small group of officers inside the agency’s Counterterrorism Center had become convinced that Bin Laden was hiding in a large compound in Abbottabad, a quiet hamlet north of Islamabad. For months, Panetta had been pushing clandestine officers to find a shred of hard proof that Bin Laden was hiding in the compound. The intelligence-gathering operating in Abbottabad had become the highest priority for the C.I.A. in Pakistan.

    It was therefore more than a bit inconvenient that one of its undercover officers was sitting in a jail in Lahore facing a double murder charge. Pakistan’s Islamist parties organized street protests and threatened violent riots if Raymond Davis was not tried and hanged for his crimes. American diplomats in Lahore regularly visited Davis, but the Obama administration continued to stonewall Pakistan’s government about the nature of Davis’s work in the country.

    And then the episode claimed another victim. On Feb. 6, the grieving widow of one of Davis’s victims swallowed a lethal amount of rat poison and was rushed to the hospital in Faisalabad, where doctors pumped her stomach. The woman, Shumaila Faheem, was certain that the United States and Pakistan would quietly broker a deal to release her husband’s killer from prison, a view she expressed to her doctors from her hospital bed. “They are already treating my husband’s murderer like a V.I.P. in police custody, and I am sure they will let him go because of international pressure,” she said. She died shortly afterward and instantly became a martyr for anti-American groups inside Pakistan.

    The furor over the Davis incident was quickly escalating, threatening to shut down most C.I.A. operations in the country and derail the intelligence-gathering operation in Abbottabad. But the C.I.A. stood firm and sent top officials to Islamabad, who told Ambassador Munter to stick to the strategy.

    By then, though, Munter had decided that the C.I.A.’s strategy wasn’t working, and eventually even high-level officials in the agency began to realize that stonewalling the Pakistanis was only causing the I.S.I. to dig in. After discussions among White House, State Department and C.I.A. officials in Washington, Munter approached General Pasha, the I.S.I. chief, and came clean. Davis was with the C.I.A., he said, and the United States needed to get him out of the country as quickly as possible. Pasha was fuming that Leon Panetta had lied to him, and he was going to make the Americans squirm by letting Davis sit in jail while he considered — on his own timetable — the best way to resolve the situation.

    Back in Washington, Ambassador Haqqani was summoned to C.I.A. headquarters on Feb. 21 and taken into Panetta’s spacious office overlooking the agency’s campus in Langley, Va. Sitting around a large conference table, Panetta asked Haqqani for his help securing Davis’s release.

    “If you’re going to send a Jason Bourne character to Pakistan, he should have the skills of a Jason Bourne to get away,” Haqqani shot back, according to one person who attended the meeting.

    More than a week later, General Pasha came back to Ambassador Munter to discuss a new strategy. It was a solution based on an ancient tradition that would allow the matter to be settled outside the unpredictable court system. The issue had already been discussed among a number of Pakistani and American officials, including Ambassador Haqqani in Washington. The reckoning for Davis’s actions would come in the form of “blood money,” or diyat, a custom under Shariah law that compensates the families of victims for their dead relatives. The matter would be handled quietly, and Davis would be released from jail.

    Pasha ordered I.S.I. operatives in Lahore to meet the families of the three men killed during the January episode and negotiate a settlement. Some of the relatives initially resisted, but the I.S.I. negotiators were not about to let the talks collapse. After weeks of discussions, the parties agreed on a total of 200 million Pakistani rupees, approximately $2.34 million, to offer “forgiveness” to the jailed C.I.A. officer.

    Only a small group of Obama administration officials knew of the talks, and as they dragged on, Lahore’s high court was preparing to rule on whether Davis would be granted diplomatic immunity, a decision the C.I.A. expected to go against the United States and worried might set a precedent for future cases in Pakistan.

    Davis remained in the dark about all of this. When he arrived for his court appearance on March 16, he was fully expecting to hear that the trial would proceed and that the judge would issue a new court date. He was escorted into the courtroom, his wrists cuffed in front of him, and locked inside an iron cage near the judge’s bench. According to one person’s account, General Pasha sat in the back of the courtroom, his cellphone out. He began sending out a stream of nervous text messages to Ambassador Munter, updating him about the court proceedings. Pasha was one of the most powerful men in Pakistan, and yet the I.S.I. had little control over the mercurial courts in Lahore, and he wasn’t entirely sure that things would proceed according to plan.

    The first part of the hearing went as everyone expected. The judge, saying that the case would go ahead, noted that his ruling on diplomatic immunity would come in a matter of days. Pakistani reporters frantically began filing their stories about how this seemed a blow to the American case, and that it appeared that Davis would not be released from jail anytime soon. But then the judge ordered the courtroom cleared, and General Pasha’s secret plan unfolded.

    Through a side entrance, 18 relatives of the victims walked into the room, and the judge announced that the civil court had switched to a Shariah court. Each of the family members approached Davis, some of them with tears in their eyes or sobbing outright, and announced that he or she forgave him. Pasha sent another text message to Munter: The matter was settled. Davis was a free man. In a Lahore courtroom, the laws of God had trumped the laws of man.

    The drama played out entirely in Urdu, and throughout the proceeding, a baffled Davis sat silently inside the cage. He was even more stunned when I.S.I. operatives whisked him out of the courthouse through a back entrance and pushed him into a waiting car that sped to the Lahore airport.

    The move had been choreographed to get Davis out of the country as quickly as possible. American officials, including Munter, were waiting for Davis at the airport, and some began to worry. Davis had, after all, already shot dead two men he believed were threatening him. If he thought he was being taken away to be killed, he might try to make an escape, even try to kill the I.S.I. operatives inside the car. When the car arrived at the airport and pulled up to the plane ready to take Davis out of Pakistan, the C.I.A. operative was in a daze. It appeared to the Americans waiting for him that Davis realized only then that he was safe.

    The Davis affair led Langley to order dozens of covert officers out of Pakistan in the hope of lowering the temperature in the C.I.A. – I.S.I. relationship. Ambassador Munter issued a public statement shortly after the bizarre court proceeding, saying he was “grateful for the generosity” of the families and expressing regret for the entire incident and the “suffering it caused.”

    But the secret deal only fueled the anger in Pakistan, and anti-American protests flared in major cities, including Islamabad, Karachi and Lahore. Demonstrators set tires ablaze, clashed with Pakistani riot police and brandished placards with slogans like “I Am Raymond Davis, Give Me a Break, I Am Just a C.I.A. Hit Man.”

    The entire episode — and bin Laden’s killing in Abbottabad later that spring — extinguished any lingering productive relations between the United States and Pakistan. Leon Panetta’s relationship with General Pasha, the I.S.I. chief, was poisoned, and the already small number of Obama officials pushing for better relations between Washington and Islamabad dwindled even further. Munter was reporting daily back to Washington about the negative impact of the armed-drone campaign and about how the C.I.A. seemed to be conducting a war in a vacuum, oblivious to the ramifications that the drone strikes were having on American relations with Pakistan’s government.

    The C.I.A. had approval from the White House to carry out missile strikes in Pakistan even when the agency’s targeters weren’t certain about exactly whom they were killing. Under the rules of so-called “signature strikes,” decisions about whether to fire missiles from drones could be made based on patterns of activity deemed suspicious. For instance, if a group of young “military-age males” were observed moving in and out of a suspected militant training camp and were thought to be carrying weapons, they could be considered legitimate targets. American officials admit it is nearly impossible to judge a person’s age from thousands of feet in the air, and in Pakistan’s tribal areas, adolescent boys are often among militant fighters. Using such broad definitions to determine who was a “combatant” and therefore a legitimate target allowed Obama administration officials at one point to claim that the escalation of drone strikes in Pakistan had not killed any civilians for a year. It was something of a trick of logic: in an area of known militant activity, all military-age males could be considered enemy fighters. Therefore, anyone who was killed in a drone strike there was categorized as a combatant.

    The perils of this approach were laid bare on March 17, 2011, the day after Davis was released from prison and spirited out of the country. C.I.A. drones attacked a tribal council meeting in the village of Datta Khel, in North Waziristan, killing dozens of men. Ambassador Munter and some at the Pentagon thought the timing of the strike was disastrous, and some American officials suspected that the massive strike was the C.I.A. venting its anger about the Davis episode. More important, however, many American officials believed that the strike was botched, and that dozens of people died who shouldn’t have.

    Other American officials came to the C.I.A.’s defense, saying that the tribal gathering was in fact a meeting of senior militants and therefore a legitimate target. But the drone strike unleashed a furious response in Pakistan, and street protests in Lahore, Karachi and Peshawar forced the temporary closure of American consulates in those cities.

    Munter said he believed that the C.I.A. was being reckless and that his position as ambassador was becoming untenable. His relationship with the C.I.A. station chief in Islamabad, already strained because of their disagreements over the handling of the Davis case, deteriorated even further when Munter demanded that the C.I.A. give him the chance to call off specific missile strikes. During one screaming match between the two men, Munter tried to make sure the station chief knew who was in charge, only to be reminded of who really held the power in Pakistan.

    “You’re not the ambassador!” Munter shouted.

    “You’re right, and I don’t want to be the ambassador,” the station chief replied.

    This turf battle spread to Washington, and a month after Bin Laden was killed, President Obama’s top advisers were arguing in a National Security Council meeting over who really was in charge in Pakistan. At the June 2011 meeting, Munter, who participated via secure video link, began making his case that he should have veto power over specific drone strikes.

    Panetta cut Munter off, telling him that the C.I.A. had the authority to do what it wanted in Pakistan. It didn’t need to get the ambassador’s approval for anything.

    “I don’t work for you,” Panetta told Munter, according to several people at the meeting.

    But Secretary of State Hillary Clinton came to Munter’s defense. She turned to Panetta and told him that he was wrong to assume he could steamroll the ambassador and launch strikes against his approval.

    “No, Hillary,” Panetta said, “it’s you who are flat wrong.”

    There was a stunned silence, and National Security Adviser Tom Donilon tried to regain control of the meeting. In the weeks that followed, Donilon brokered a compromise of sorts: Munter would be allowed to object to specific drone strikes, but the C.I.A. could still press its case to the White House and get approval for strikes even over the ambassador’s objections. Obama’s C.I.A. had, in essence, won yet again.

    As for Raymond Davis, he tried to settle back into his life in the United States after being flown out of Pakistan. He found work as a firearms instructor, but in the end he couldn’t stay out of trouble. On Oct. 1, 2011, just seven months after his abrupt departure from Pakistan, Davis was eyeing a parking spot in front of a bagel shop in Highlands Ranch, Colo., a suburb of Denver. So was Jeffrey Maes, a 50-year-old minister who was driving with his wife and two young daughters. When Maes beat Davis to the spot, Davis shouted profanities through his open window. Then he jumped out of his car and confronted Maes, telling the minister that he had been waiting for the parking spot.

    According to an affidavit given by Maes, he told Davis to “relax and quit being stupid.”

    Davis struck Maes in the face, knocking him to the pavement. Maes said in court that when he stood up from the fall, Davis continued to hit him. The minister’s wife, later recalling the episode, said she had never in her life seen a man so full of rage. Just last month, after protracted legal proceedings, Davis pleaded guilty to a charge of third-degree misdemeanor assault and was sentenced to two years of probation. A judge ordered him to pay restitution and attend anger-management classes.

    April 9, 2013
    By MARK MAZZETTI
    Editor: Joel Lovell

    Find this story at 9 April 2013

    © 2013 The New York Times Company

    U.S. secret: CIA collaborated with Pakistan spy agency in drone war

    Even as its civilian leaders publicly decried U.S. drone attacks as breaches of sovereignty and international law, Pakistan’s premier intelligence agency secretly worked for years with the CIA on strikes that killed Pakistani insurgent leaders and scores of suspected lower-level fighters, according to classified U.S. intelligence reports.

    Dozens of civilians also reportedly died in the strikes in the semi-autonomous tribal region of Pakistan bordering Afghanistan that is a stronghold of al Qaida, Afghan militants, other foreign jihadists and a tangle of violent Pakistani Islamist groups.

    Copies of top-secret U.S. intelligence reports reviewed by McClatchy provide the first official confirmation of joint operations involving drones between the U.S. spy agency and Pakistan’s powerful army-run Inter-Services Intelligence Directorate, or ISI, as well as previously unknown details of that cooperation. The review takes on important significance as the administration reportedly is preparing to expand the use of drones in Afghanistan and North Africa amid a widespread debate over the legality of the strikes in Pakistan.

    The documents show that while the ISI helped the CIA target al Qaida, the United States used drone strikes to aid the Pakistani military in its battle against the Taliban Movement of Pakistan, or TTP – assistance that the Obama and Bush administrations never explicitly acknowledged or legally justified.

    The White House did not respond immediately to a request for a comment on McClatchy’s findings. The Pakistani government denied there was ever any cooperation on drone strikes.

    The partnership was so extensive during the Bush administration that the Pakistani intelligence agency selected its own targets for drone strikes. Until mid-2008, the CIA had to obtain advanced approval before each attack, and under both administrations, the Pakistanis received briefings and videos of the strikes.

    The U.S. intelligence reports illustrate how the Pakistani army retained its grip on national security policy after 2008 elections ended the nation’s fourth bout of military rule and brought to power a civilian government, which condemned drone strikes as violations of Pakistan’s sovereignty and international law. The strikes killed hundreds of civilians and produced new recruits for Islamist extremist groups, charged the government, which resigned last month in advance of May 11 parliamentary voting.

    What remains unclear is the degree to which the government under President Asif Ali Zardari, which tried unsuccessfully to wrest control of the ISI from the military, acquiesced in the CIA-ISI collaboration.

    The ISI is a domestic and international spy and paramilitary service that officially reports to Pakistan’s prime minister. In reality, however, the agency answers to the chief of staff of the army, which has ruled Pakistan for most of its 66 years. Former Prime Minister Yousuf Raza Gilani in 2011 called the army a “state within a state.”

    Traditionally commanded by an army general and mostly staffed by military officers, the ISI has an ominous reputation as the Pakistani army’s instrument for rigging elections and crushing internal dissent. It has been accused of directing proxy wars and terrorist attacks by Islamist extremists in India and on civilians and U.S.-led troops in Afghanistan.

    The CIA-ISI cooperation on drones reflects one of the major contradictions that have long infected relations between the United States and Pakistan.

    The United States has regularly praised the ISI for helping to capture and kill key al Qaida operatives, including those behind the Sept. 11, 2001, attacks. But senior U.S. officials also have charged that elements in the ISI support the Afghan Taliban and allied insurgents fighting U.S.-led forces in Afghanistan. Neither the ISI nor the army high commander were told in advance of the raid that killed Osama bin Laden, for fear he’d be tipped off and escape. At the same time, the U.S. has provided billions to Pakistan in military aid and assistance to stabilize democracy and help secure its nuclear weapons.

    For their part, Pakistani officials deny that the ISI supports Afghan insurgents. For years, the Pakistani army has spurned U.S. demands that it close their sanctuaries, contending that its counterterrorism cooperation with the United States has cost the lives of tens of thousands of security forces and civilians. And the army has declared its support for the civilian leadership’s position on drone strikes.

    “As far as drone attacks are concerned, (the) army has repeatedly conveyed to all concerned that these are not acceptable under any circumstances. There is no room for ambiguity in this regard,” the military’s top commanders said in a June 9, 2011, statement.

    A spokesman for the Pakistani Embassy in Washington said, “We forcefully contest” that there was any collaboration between the ISI and CIA on drone strikes.

    In its limited disclosures about the secret drone program, the Obama administration has said drones only are used to eliminate confirmed “senior operational leaders” of al Qaida and “associated groups” involved in the Sept. 11, 2001, attacks on the U.S. who are plotting “imminent” violent attacks on Americans and can’t be captured.

    The U.S. intelligence reports reviewed by McClatchy covered most – though not all – of the drone strikes in 2006-2008 and 2010-2011. Several listed casualty estimates as well as the names of targeted militant groups. Most were against al Qaida. But they also targeted the Haqqani network of Afghan insurgents, several factions of the Pakistani Taliban and groups identified only as “foreign fighters” and “other militants.”

    While the Pakistani Taliban works closely with al Qaida, it wasn’t formed until 2007. Also, many U.S. officials never took seriously its occasional threats to stage attacks inside the United States, and the group is not known to have initiated any operations against the U.S. homeland. It did provide perfunctory training and funds to a Pakistani American who staged a failed car-bombing in New York’s Times Square on May 2, 2010, but he admitted seeking them out.

    The Pakistani government, which resigned last month in advance of May 11 national elections, for years publicly insisted that it opposed U.S. drone strikes, and it frequently delivered official and unofficial protests to the United States.

    In a statement after a March 11-13 visit to Pakistan, Ben Emmerson, a British lawyer who is leading a U.N. investigation into civilian casualties caused by drones, said that the Pakistani government “emphasized its consistently stated position that drone strikes on its territory are counterproductive, contrary to international law, a violation of Pakistan’s sovereignty and territorial integrity, and that they should cease immediately.”

    Emmerson, who didn’t meet military leaders, quoted Pakistani officials as saying there have been at least 330 drone strikes that have killed an estimated 2,200 people, including as many as 600 civilians.

    On Feb. 5, Pakistan’s ambassador to the United States, Sherry Rehman, told reporters in Washington that drone strikes are “an anomaly that we are constantly addressing in all conversations with the United States, and it’s certainly not a part of our playbook to have drone operations carry on. It never was and we don’t see it as the future and we don’t want our engagement with the United States to be defined by that or our operations to devolve to this kind of low.”

    According to two former U.S. officials, however, it was accepted in Washington and Islamabad that the Pakistani government publicly would denounce the strikes to hide the ISI’s role in order to shield civilian and military leaders from angry popular backlashes over the strikes and civilian casualties.

    “There was an understanding on both sides of the kabuki dance that . . . the Pakistani military had to be perceived as not being a participant,” said one of the former U.S. officials. Both requested anonymity to discuss the issue because of its sensitivity.

    Secret U.S. diplomatic cables made public by the Wikileaks online whistle-blowing group corroborate the former U.S. officials’ assertions. In an Aug. 23, 2008, cable, Anne Patterson, then the U.S. ambassador to Pakistan, reported that in a meeting with former Prime Minister Gilani, Gilani “brushed aside” his interior minister’s suggestion that the strikes stop and told Patterson, “I don’t care if they (the CIA) do it as long as they get the right people. We’ll protest in the National Assembly and then ignore it.”

    Finally, it was an open secret that the drones were launched from within Pakistan itself.

    For years, CIA drones were based at Shamsi, a remote airfield in southwestern Baluchistan province once used by Gulf Arab sheikhs for hawking expeditions. They continued flying from there until December 2011, when the CIA was evicted after U.S. troops in Afghanistan, under fire from Pakistan’s side of the border, called in a NATO airstrike that killed 24 Pakistani troops. CIA drone strikes into Pakistan have since continued from bases in Afghanistan at a much lower rate.

    Cooperation between the U.S. and Pakistani spy agencies on drone strikes began in 2004 during the rule of the former dictator, retired Army Gen. Pervez Musharraf, and extended at least through June 2010, according to the U.S. intelligence reports.

    The first confirmed CIA drone strike took place on June 17, 2004. It killed Nek Mohammad, a Pakistani Islamist who’d fought for the Afghan Taliban regime that was ousted by the 2001 U.S. invasion. At the time of his death, he was leading an uprising in the South Waziristan agency. The New York Times reported on Sunday that the strike was a joint CIA-ISI operation.

    The documents that reveal the most about the CIA-ISI cooperation covered drone strikes that took place in 2006 to 2008 and in a 20-month period ending in September 2011. During that period, at least 50 strikes were launched against non-al Qaida targets.

    The CIA sought ISI approval for seven strikes in 2006, according to the U.S. intelligence reports. The ISI approved four attacks and rejected three. But it eventually relented under CIA cajoling and agreed to one “forced approval.” The documents said that the ISI requested a single strike in 2006.

    “We wouldn’t win every argument. But they would help us and support us,” said a former senior U.S. intelligence official, who spoke on condition of anonymity because of the sensitivity of the issue.

    The documents didn’t identify the 2006 targets, but Pakistani and international news media reported only two confirmed strikes that year. Several former U.S. officials, however, noted that in the early years, the Pakistani army took credit for attacks that actually were CIA strikes.

    The 2006 strikes included a Jan. 13 attack on a compound in the Bajour agency that triggered what appears to have been Pakistan’s first official denunciation of the drone operations.

    Al Qaida’s then-No. 2 leader, Ayman Zawahiri, was thought to have been in the compound, although U.S. officials later acknowledged that he wasn’t there. At least 18 civilians were killed, however, igniting violent protests around the country. The Foreign Ministry summoned then-U.S. Ambassador Ryan Crocker to deliver an official protest, and the Pakistani government vowed that it would “not allow such incidents to reoccur.”

    In 2007, the CIA sought ISI approval for 15 strikes, received prompt approval for three and a single “forced approval,” according to the documents, which said that the ISI asked the CIA to strike five targets.

    One ISI-requested strike occurred on May 22, 2007, and was against an insurgent training camp in the North Waziristan agency after a Pakistani army assault on the compound was repulsed, the documents said. The Pakistani army sought the strike even though it had been told that drones wouldn’t be used to support Pakistani troops in combat, said an individual familiar with the episode. He requested anonymity because of the sensitive nature of the issue.

    Pakistani and international news media reported five drone strikes in 2007, but they didn’t include a May 22 attack.

    The following year saw a major escalation in drone strikes, with 35 recorded in one U.S. intelligence report. Independent studies based almost exclusively on news media reports put the number at 38.

    The increase came as the Bush administration began winding down the war in Iraq and redirecting U.S. funds, personnel and hardware to halting the expanding Pakistan-based insurgency in Afghanistan. It also sought to re-energize a flagging hunt for Osama bin Laden, who was believed to be hiding in Pakistan’s tribal area, and U.S. officials were growing alarmed over the stability of nuclear-armed Pakistan as the Pakistani Taliban insurgency exploded.

    Another reason for the escalation, said a former administration official, was that U.S. officials worried about an increasing threat to the United States following a series of plots in Europe by al Qaida-linked extremists who’d been trained in Pakistan’s tribal area.

    “There was a growing chorus of threat reporting to the homeland,” said the former official, who spoke on condition of anonymity because of the sensitivity of the issue. “This was about European tracking of people migrating through Turkey (to Pakistan) and back to Europe and particularly to here (the United States). The agency (CIA) was tracking that down. They would not be left holding the bag if there was another 9/11.”

    McClatchy Washington Bureau

    Posted on Tue, Apr. 09, 2013
    U.S. secret: CIA collaborated with Pakistan spy agency in drone war
    By Jonathan S. Landay | McClatchy Newspapers

    last updated: April 10, 2013 05:09:02 AM
    WASHINGTON — ]

    Find this story at 9 April 2013

    © mcclatchydc.com

    Obama’s drone war kills ‘others,’ not just al Qaida leaders

    Contrary to assurances it has deployed U.S. drones only against known senior leaders of al Qaida and allied groups, the Obama administration has targeted and killed hundreds of suspected lower-level Afghan, Pakistani and unidentified “other” militants in scores of strikes in Pakistan’s rugged tribal area, classified U.S. intelligence reports show.

    The administration has said that strikes by the CIA’s missile-firing Predator and Reaper drones are authorized only against “specific senior operational leaders of al Qaida and associated forces” involved in the Sept. 11, 2001, terror attacks who are plotting “imminent” violent attacks on Americans.

    “It has to be a threat that is serious and not speculative,” President Barack Obama said in a Sept. 6, 2012, interview with CNN. “It has to be a situation in which we can’t capture the individual before they move forward on some sort of operational plot against the United States.”

    Copies of the top-secret U.S. intelligence reports reviewed by McClatchy, however, show that drone strikes in Pakistan over a four-year period didn’t adhere to those standards.

    The intelligence reports list killings of alleged Afghan insurgents whose organization wasn’t on the U.S. list of terrorist groups at the time of the 9/11 strikes; of suspected members of a Pakistani extremist group that didn’t exist at the time of 9/11; and of unidentified individuals described as “other militants” and “foreign fighters.”

    In a response to questions from McClatchy, the White House defended its targeting policies, pointing to previous public statements by senior administration officials that the missile strikes are aimed at al Qaida and associated forces.

    Micah Zenko, an expert with the Council on Foreign Relations, a bipartisan foreign policy think tank, who closely follows the target killing program, said McClatchy’s findings indicate that the administration is “misleading the public about the scope of who can legitimately be targeted.”

    The documents also show that drone operators weren’t always certain who they were killing despite the administration’s guarantees of the accuracy of the CIA’s targeting intelligence and its assertions that civilian casualties have been “exceedingly rare.”

    McClatchy’s review is the first independent evaluation of internal U.S. intelligence accounting of drone attacks since the Bush administration launched America’s secret aerial warfare on Oct. 7, 2001, the day a missile-carrying Predator took off for Afghanistan from an airfield in Pakistan on the first operational flight of an armed U.S. drone.

    The analysis takes on additional significance because of the domestic and international debate over the legality of drone strikes in Pakistan amid reports that the administration is planning to broaden its use of targeted killings in Afghanistan and North Africa.

    The U.S. intelligence reports reviewed by McClatchy covered most – although not all – of the drone strikes in 2006-2008 and 2010-2011. In that later period, Obama oversaw a surge in drone operations against suspected Islamist sanctuaries on Pakistan’s side of the border that coincided with his buildup of 33,000 additional U.S. troops in southern Afghanistan. Several documents listed casualty estimates as well as the identities of targeted groups.

    McClatchy’s review found that:

    – At least 265 of up to 482 people who the U.S. intelligence reports estimated the CIA killed during a 12-month period ending in September 2011 were not senior al Qaida leaders but instead were “assessed” as Afghan, Pakistani and unknown extremists. Drones killed only six top al Qaida leaders in those months, according to news media accounts.

    Forty-three of 95 drone strikes reviewed for that period hit groups other than al Qaida, including the Haqqani network, several Pakistani Taliban factions and the unidentified individuals described only as “foreign fighters” and “other militants.”

    During the same period, the reports estimated there was a single civilian casualty, an individual killed in an April 22, 2011, strike in North Waziristan, the main sanctuary for militant groups in Pakistan’s tribal areas.

    – At other times, the CIA killed people who only were suspected, associated with, or who probably belonged to militant groups.

    To date, the Obama administration has not disclosed the secret legal opinions and the detailed procedures buttressing drone killings, and it has never acknowledged the use of so-called “signature strikes,” in which unidentified individuals are killed after surveillance shows behavior the U.S. government associates with terrorists, such as visiting compounds linked to al Qaida leaders or carrying weapons. Nor has it disclosed an explicit list of al Qaida’s “associated forces” beyond the Afghan Taliban.

    The little that is known about the opinions comes from a leaked Justice Department white paper, a half-dozen or so speeches, some public comments by Obama and several top lieutenants, and limited open testimony before Congress.

    “The United States has gone far beyond what the U.S. public – and perhaps even Congress – understands the government has been doing and claiming they have a legal right to do,” said Mary Ellen O’Connell, a Notre Dame Law School professor who contends that CIA drone operations in Pakistan violate international law.

    The documents McClatchy has reviewed do not reflect the entirety of the killings associated with U.S. drone attacks in Pakistan, which independent reports estimate at between 1,990 and 3,581.

    But the classified reports provide a view into how drone strikes were carried out during the most intense periods of drone warfare in Pakistan’s remote tribal area bordering Afghanistan. Specifically, the documents reveal estimates of deaths and injuries; locations of militant bases and compounds; the identities of some of those targeted or killed; the movements of targets from village to village or compound to compound; and, to a limited degree, the rationale for unleashing missiles.

    The documents also reveal a breadth of targeting that is complicated by the culture in the restive region of Pakistan where militants and ordinary tribesmen dress the same, and carrying a weapon is part of the centuries-old tradition of the Pashtun ethnic group.

    The Haqqani network, for example, cooperates closely with al Qaida for philosophical and tactical reasons, and it is blamed for some of the bloodiest attacks against civilians and U.S.-led forces in Afghanistan. But the Haqqani network wasn’t on the U.S. list of international terrorist groups at the time of the strikes covered by the U.S. intelligence reports, and it isn’t known to ever have been directly implicated in a plot against the U.S. homeland.

    Other groups the documents said were targeted have parochial objectives: the Pakistani Taliban seeks to topple the Islamabad government; Lashkar i Jhangvi, or Army of Jhangvi, are outlawed Sunni Muslim terrorists who’ve slaughtered scores of Pakistan’s minority Shiites and were blamed for a series of attacks in Pakistan and Afghanistan, including a 2006 bombing against the U.S. consulate in Karachi that killed a U.S. diplomat. Both groups are close to al Qaida, but neither is known to have initiated attacks on the U.S. homeland.

    “I have never seen nor am I aware of any rules of engagement that have been made public that govern the conduct of drone operations in Pakistan, or the identification of individuals and groups other than al Qaida and the Afghan Taliban,” said Christopher Swift, a national security law expert who teaches national security affairs at Georgetown University and closely follows the targeted killing issue. “We are doing this on a case-by-case, ad hoc basis, rather than a systematic or strategic basis.”

    The administration has declined to reveal other details of the program, such as the intelligence used to select targets and how much evidence is required for an individual to be placed on a CIA “kill list.” The administration also hasn’t even acknowledged the existence of so-called signature strikes, let alone discussed the legal and procedural foundations of the attacks.

    Leaders of the Senate and House intelligence committees say they maintain robust oversight over the program. Senate Intelligence Committee Chairwoman Diane Feinstein, D-Calif., disclosed in a Feb. 13 statement that the panel is notified “with key details . . . shortly after” every drone strike. It also reviews videos of strikes and considers “their effectiveness as a counterterrorism tool, verifying the care taken to avoid deaths to non-combatants and understanding the intelligence collection and analysis that underpins these operations.”

    But until last month, Obama had rebuffed lawmakers’ repeated requests to see all of the classified Justice Department legal opinions on the program, giving them access to only two dealing with the president’s powers to order targeted killings. It then allowed the Senate committee access to all opinions pertaining to the killing of U.S. citizens to clear the way for the panel’s March 7 confirmation of John Brennan, the former White House counterterrorism chief and the key architect of the targeted killings program, as the new CIA director. But it continues to deny access to other opinions on the grounds that they are privileged legal advice to the president.

    Moreover, most of the debate in the United States has focused on the deaths of four Americans – all killed in drone strikes in Yemen, but only one intentionally targeted – and not the thousands of others who’ve been killed, the majority of whom have been hit in Pakistan.

    Obama and his top aides say the United States is in an “armed conflict” with al Qaida and the Afghan Taliban, and the targeted killing program complies with U.S. and international laws, including an “inherent” right to self-defense and the international laws of war. Obama also derives his authority to order targeted killings from the Constitution and a Sept. 14, 2001, congressional resolution empowering the president to use “all necessary and appropriate force” against those who perpetrated 9/11 and those who aided them, they say.

    Time and again, the administration has defined the drone targets as operational leaders of al Qaida, the Afghan Taliban and associated groups plotting imminent attacks on the American homeland. Occasionally, however, officials have made oblique references to undefined associated forces and threats against unidentified Americans and U.S. facilities.

    On April 30, 2012, Brennan gave the most detailed explanation of Obama’s drone program. He referred to al Qaida 73 times, the Afghan Taliban three times and mentioned no other group by name.

    “We only authorize a particular operation against a specific individual if we have a high degree of confidence that the individual being targeted is indeed the terrorist we are pursuing,” Brennan said.

    To be sure, America’s drone program has killed militants without risk to the nation’s armed forces.

    The administration argues that drones – in Brennan’s words – are a “wise choice” for fighting terrorists. Over the years, the aircraft have battered al Qaida’s Pakistan-based core leadership and crippled its ability to stage complex attacks. And officials note it has been done without sending U.S. troops into hostile territory or causing civilian casualties “except in the rarest of circumstances.”

    “Any actions we take fully comport to our law and meet the standards that I think . . . the American people expect of us as far as taking actions we need to protect the American people, but at the same time ensuring that we do everything possible before we need to resort to lethal force,” Brennan said at his Feb. 7 Senate Intelligence Committee confirmation hearing.

    Caitlin Hayden, national security spokeswoman for the White House, said late Tuesday that the Brennan speech is broad enough to cover strikes against others who are not al Qaida or the Afghan Taliban. While she did not cite any authority for broader targeting, Hayden said: “You should not assume he is only talking about al Qaida just because he doesn’t say ’al Qaida, the Taliban, and associated forces’ at every reference.”

    Some legal scholars and human rights organizations, however, dispute the program’s legality.

    Obama, they think, is misinterpreting international law, including the laws of war, which they say apply only to the uniformed military, not the civilian CIA, and to traditional battlefields like those in Afghanistan, not to Pakistan’s tribal area, even though it may be a sanctuary for al Qaida and other violent groups. They argue that Obama also is strengthening his executive powers with an excessively broad application of the September 2001 use-of-force resolution.

    The administration’s definition of “imminent threat” also is in dispute. The Justice Department’s leaked white paper argues the United States should be able “to act in self-defense in circumstances where there is evidence of further imminent attacks by terrorist groups even if there is no specific evidence of where such an attack will take place or of the precise nature of the attack.” Legal scholars counter that the administration is using an exaggerated definition of imminence that doesn’t exist in international law.

    “I’m thankful that my doctors don’t use their (the administration’s) definition of imminence when looking at imminent death. A head cold could be enough to pull the plug on you,” said Morris Davis, a Howard University Law School professor and former Air Force lawyer who served as chief prosecutor of the Guantanamo Bay terrorism trials.

    Since 2004, drone program critics say, the strikes have killed hundreds of civilians, fueling anti-U.S. outrage, boosting extremist recruiting, and helping to destabilize Pakistan’s U.S.-backed government. And some experts warn that the United States may be setting a new standard of international conduct that other countries will grasp to justify their own targeted killings and to evade accountability.

    Other governments “won’t just emulate U.S. practice but (will adopt) America’s justification for targeted killings,” said Zenko of the Council on Foreign Relations. “When there is such a disconnect between who the administration says it kills and who it (actually) kills, that hypocrisy itself is a very dangerous precedent that other countries will emulate.”

    A special U.N. human rights panel began a nine-month investigation in January into whether drone strikes, including the CIA operations in Pakistan, violate international law by causing disproportionate numbers of civilian casualties. The panel’s head, British lawyer Ben Emmerson, declared after a March 11-13 visit to Pakistan that the U.S. drone campaign “involves the use of force on the territory of another state without its consent and is therefore a violation of Pakistan’s sovereignty.”

    The administration asserts that drones are used to hit specific individuals only after their names are added to a “list of active terrorists,” following a process of “extraordinary care and thoughtfulness” that confirms their identities as members of al Qaida or “associated forces” and weighs the strategic value of killing each one.

    Yet the U.S. intelligence reports show that 43 out of the 95 strikes recorded in reports for the year ending in September 2011 were launched against groups other than al Qaida. Prominent among them were the Haqqani network and the Taliban Movement of Pakistan.

    The Haqqani network is an Afghan Taliban-allied organization that operates in eastern Afghanistan and whose leaders are based in Pakistan’s adjacent North Waziristan tribal agency. The United States accuses the group of staging some of the deadliest terrorist attacks in Kabul, including on the Indian and U.S. embassies, killing civilians, and attacking U.S.-led forces in Afghanistan. But the Obama administration didn’t officially designate the network as a terrorist group until September 2012.

    Its titular head is Jalaluddin Haqqani, an aging former anti-Soviet guerrilla who served as a minor minister and top military commander in the Taliban regime that sheltered al Qaida until both were driven into Pakistan by the 2001 U.S. intervention in Afghanistan. U.S. officials allege that the group, whose operational chief is Haqqani’s son, Sirajuddin, closely works with al Qaida and is backed by elements of the Pakistani army-led Inter-Services Intelligence spy service, a charge denied by Islamabad.

    At least 15 drone strikes were launched against the Haqqani network or locations where its fighters were present during the one-year period ending in September 2011, according to the U.S. intelligence reports. They estimated that up to 96 people – or about 20 percent of the total for that period – were killed.

    One report also makes clear that during the Bush administration, the agency killed Haqqani family women and children.

    According to the report, an undisclosed number of Haqqani subcommanders, unnamed Arabs and unnamed “members of the extended Haqqani family” died in a Sept. 8, 2008, strike. News reports on the attack in the North Waziristan village of Dandey Darapakhel said that among as many as 25 dead were an Arab who was chief of al Qaida’s operations in Pakistan, and eight of Jalaluddin Haqqani’s grandchildren, one of his wives, two nieces and a sister.

    The U.S. intelligence reports estimated that as many as 31 people were killed in at least nine strikes on the Pakistani Taliban or on locations that the group shared with others between January 2010 and September 2011. While U.S. officials say the Taliban Movement of Pakistan works closely with al Qaida, its goal is to topple the Pakistani government through suicide bombings, assaults and assassinations, not attacking the United States. The group wasn’t founded until 2007, and some of the strikes in the U.S. intelligence reports occurred before the administration designated it a terrorist organization in September 2010.

    McClatchy Washington Bureau

    Posted on Tue, Apr. 09, 2013
    Obama’s drone war kills ‘others,’ not just al Qaida leaders
    By Jonathan S. Landay | McClatchy Newspapers

    last updated: April 10, 2013 05:09:02 AM
    WASHINGTON — ]

    Find this story at 10 April 2013

    © McClatchyDC.com

    Drone Strikes Don’t Just Target al-Qaida Leaders

    Members of Grandmothers Against the War, Granny Peace Brigade, the Raging Grannies, and other groups hoist a model of a drone in the air as they protest the U.S. military’s use of drones during an “April Days of Action” demonstration, April 3, 2013, in New York. Photo by Don Emmert/AFP/Getty Images

    According to a new investigative report by McClatchy, the Obama administration doesn’t stick to their own standards on drone use in the Middle East.

    The news may not come as a surprise to some, given the number of deaths attributed to drones since 9/11. Those numbers—as many as 3,581 killed in Pakistan, including as many as 884 civilians and 197 children, according to the Bureau of Investigative Journalism—stand in contrast to the administration’s very strict official standards for drone attacks. The administration, as a refresher, has previously said that the CIA’s Predator and Reaper drones are only used against “specific senior operational leaders of al-Qaida and associated forces” involved in 9/11, and currently plotting attacks on Americans.
    “Copies of the top-secret U.S. intelligence reports reviewed by McClatchy … list killings of alleged Afghan insurgents whose organization wasn’t on the U.S. list of terrorist groups at the time of the 9/11 strikes; of suspected members of a Pakistani extremist group that didn’t exist at the time of 9/11; and of unidentified individuals described as ‘other militants’ and ‘foreign fighters.’ ”

    Posted Wednesday, April 10, 2013, at 10:40 AM Slate.com

    Find this story at 11 April 2013

    © 2013 The Slate Group, LLC.

    US drones target low-level militants who pose no threat: Top secret documents show that half of those killed in a year were ‘unknown extremists’

    The US government was accused of hiding the truth about its drone programme after leaked intelligence files revealed that it was targeting unidentified militants who posed no immediate threat to the United States.

    Despite President Barack Obama’s public promise that the CIA’s armed Predators and Reapers were only firing on those suspected of plotting against America, top-secret documents show that in one year alone almost half of those killed were simply listed as “unknown extremists”.

    The documents, obtained by US news agency McClatchy, also reveal Pakistan’s intelligence agency was co-operating with the US at the same time as its government was condemning drone strikes on its soil.

    “There is now mounting evidence that the Obama administration is misleading the American public – and the world at large – about the drone war it is waging in Pakistan,” said Jennifer Gibson, a lawyer working with the British human rights charity Reprieve.

    “The reports show a significant number of the strikes have nothing to do with al-Qa’ida. Instead, they may have been a quid pro quo exchange between two countries’ spy agencies. The result is that the US often doesn’t know who it is killing.”

    The US has come under increasing international pressure to open up its decision-making process to scrutiny following claims that the drone programme has killed hundreds of civilians among an estimated death toll of 2,500, predominantly in Pakistan and Yemen. Preparations are in place to transfer more control of the programme from the CIA to the Pentagon, in a move said to herald greater transparency.

    Terri Judd
    Wednesday, 10 April 2013

    Find this story at 10 April 2013

    © independent.co.uk

    ‘Kissinger Cables’ Offer Window Into Indian Politics of the 1970s

    The “Kissinger Cables,” a collection of U.S. diplomatic cables released on Monday by WikiLeaks, contain some fascinating revelations about the political scenario in India in the 1970s. Here are the five great insights about India in the WikiLeaks release:

    India’s first nuclear test was possibly motivated by political considerations:

    According to this cable, sent from New Delhi to the Department of State, India’s first nuclear test on May 18, 1974, was motivated by domestic politics. The cable says that the nuclear test had been done at a time when the Indian government was tackling an economic slowdown, increasing discontent and rising political unrest.

    “We are inclined to believe that this general domestic gloom and uncertainty weighed significantly in the balance of India’s nuclear decision,” reads the cable sent on the date of the nuclear test. “The need for a psychological boost, the hope of recreated atmosphere of exhilaration and nationalism that swept the country after 1971 – contrary to our earlier expectation – may have tipped the scales.”

    The cable adds that the U.S. Embassy was not aware of any recent military pressure on the Indian government, and that the decision to demonstrate nuclear capability may also have been driven by a need to regain its position in international politics, where India “has felt it had been relegated to the sidelines with its significance ignored and its potential role downplayed.”

    Rajiv Gandhi might have acted as the middleman for a Swedish airplane manufacturer:

    During his stint as an Indian Airlines pilot, Rajiv Gandhi might have acted as a middleman for the Swedish company Saab-Scania, which was trying to persuade the Indian Air Force to buy its Viggen fighter aircraft. This cable, dated Oct. 21, 1975, says that a Swedish Embassy official had informed the U.S. Embassy that the “main Indian negotiator” for Saab-Scania is Rajiv Gandhi while the French company Dassault’s chief negotiator was the son-in-law of the then Indian air marshal, Om Prakash Mehra. The cable added that Indira Gandhi did not want to purchase the British Jaguar because of “her prejudices against the British.” The Swedish diplomat “expressed irritation at the way Mrs. Gandhi is personally dominating negotiations, without involvement of Indian Air Force officers.”

    “The Swedes here have also made it quite clear they understand the importance of family influences in the final decision in the fighter sweepstakes,” said another cable, dated Feb. 6, 1976. “Offhand we would have thought a transport pilot not the best expert to rely upon in evaluating a fighter plane, but then we are speaking of a transport pilot who has another and perhaps more relevant qualification.”

    In 1974 India returned 195 prisoners of war to Pakistan, originally wanted by Bangladesh for war crimes trials:

    This cable sent from Islamabad on May 17, 1974, reveals that after the Bangladesh-India-Pakistan agreement signed on April 9, 1974, India returned the last Pakistani prisoners of war from India, including 195 prisoners originally wanted by Bangladesh for war crimes trials. “Bhutto and Minstate Aziz Ahmed have hailed the April 9 agreement as a major move toward a durable peace with India, but the continuing drumfire of anti-India comment in the media reflects the strong emotional suspicion of India still prevalent here,” the cable reads. The cable adds that even in the top leadership in the Pakistani government, there is “exasperation” over what they perceived as India’s continuous efforts to hamper Pakistan from obtaining military supplies. While the U.S. diplomat foretold a thawing of relations between the two countries, he said “continuing mutual suspicion” would hinder diplomatic efforts.

    Indira Gandhi said she was proud that she “resisted pressures to destroy Pakistan in 1971″

    In an analysis of India-Pakistan relations after the 1971 war, a cable sent from the U.S. Department of State says that Indira Gandhi felt that she showed restraint during the war. “Mrs. Gandhi was proud, and we believe sincere, in explaining she resisted pressures to destroy Pakistan in 1971,” reads this cable, dated March 1, 1974. “We believe that she wants détente on the subcontinent and she feels she made concessions at Simla to achieve this. She also insists – plausibly we think – that further disintegration of Pakistan would not be in India’s interest.” The cable says that while Pakistan’s recognition of Bangladesh improves the short-term prospects for better India-Pakistan relations, there is continued suspicion on both sides. The document argues that while India feels that Pakistan must “adjust to Indian power and influence” there is little likelihood of that happening in the near future.

    April 8, 2013, 7:07 am
    By NEHA THIRANI BAGRI

    Find this story at 8 April 2013

    Copyright 2013 The New York Times Company

    “The Kissinger Cables”: Three Years After “Collateral Murder,” WikiLeaks Explores U.S. Diplomacy

    The whistleblowing website WikiLeaks has just published “the Kissinger Cables,” 1.7 million U.S. diplomatic and intelligence documents from 1973 to 1976 that include many once-secret memos written by former Secretary of State Henry Kissinger. While the documents have been available to the public at the National Archives, WikiLeaks has created a searchable online database to allow anyone in the world to quickly search them. WikiLeaks founder and editor Julian Assange reportedly did most of the work creating the database from his refuge in Ecuador’s embassy in London. WikiLeaks spokesperson Kristinn Hrafnsson joins us to discuss the documents’ release. Hrafnsson also comments on the recent anniversary of the release of the “Collateral Murder” military video, which shows U.S. forces killing 12 people in the Iraqi suburb of New Baghdad — including two Reuters employees, Saeed Chmagh and Namir Noor-Eldeen. After WikiLeaks obtained the video, Hrafnsson met with family members of the victims in Iraq. [includes rush transcript]
    Transcript

    This is a rush transcript. Copy may not be in its final form.

    AMY GOODMAN: The whistleblowing website WikiLeaks is back in the news today. The website has just published 1.7 million U.S. diplomatic and intelligence documents from 1973 to 1976. The project is being dubbed the “Kissinger Cables.”

    While the documents have been available to the public at the National Archives, WikiLeaks has created a searchable online database to allow anyone in the world to quickly search through the trove of documents. The archive includes many once-secret memos written by former Secretary of State Henry Kissinger.

    The release has already made front-page news in India. One document posted online by WikiLeaks indicates former Indian Prime Minister Rajiv Gandhi acted as a middleman in the ’70s for a Swedish company that was looking to sell fighter jets to the Indian air force.

    WikiLeaks posted the documents in a new database called the Public Library of U.S. Diplomacy, or PLUSD. WikiLeaks founder and editor Julian Assange reportedly did most of the work creating the database from his refuge in Ecuador’s embassy in London, where he is holed up seeking to stop his extradition to Sweden because he’s concerned about then being extradited to the United States.

    To talk about the significance of the latest trove of documents, we go to Washington, D.C., to talk to Kristinn Hrafnsson, a spokesperson for WikiLeaks. He’s a former investigative journalist who was named Icelandic journalist of the year three times.

    We welcome you to Democracy Now!, Kristinn. You are about, as we go to broadcast, to hold a news conference at the National Press Club. Talk about what you are announcing and what this trove of documents is all about.

    KRISTINN HRAFNSSON: Well, this is a very important trove of documents, the 1.7 million documents that you mentioned in your introduction, that we have merged together with the 250,000 embassy cables that we published previously under—in the Cablegate project. This is a—these new documents are from the period 1973 to 1976. You said these documents were already accessible, but they are actually quite difficult to get to for the general public. And anybody that can go online and try to find these documents will find out quickly that it’s very hard to access them. So, in our view, the inaccessibility and the difficulty of accessing them is a form of secrecy, in a way, so we found it important to get it to the general public in a good searchable database, and that’s what we have done in this project. It covers a very interesting and turbulent period in our contemporary history and is shedding a light on foreign relations in the Kissinger era.

    AMY GOODMAN: Now, Kristinn, if you could explain—as you said, these are not documents that haven’t been available to the public, so that’s different than the other troves of documents that WikiLeaks released—you know, the [Iraq] War Logs, as well as Afghanistan, as well as what is called the State Department cables—but most people don’t have a way of really going through them. You’re talking about 1.7 million documents. So explain what it is that Julian Assange and WikiLeaks did.

    KRISTINN HRAFNSSON: Well, what we have is created a database which is easily searchable, and people can access them—the general public, as well as journalists and academics—without any problems. It has shown the credibility that we have in handling huge databases. This is what we’ve been working on for quite some time now. This is a part of our commitment to make accessible historical documents that are hard to find for the general public.

    One element of all this is to keep in mind that there has been a trend in the last decade and a half to reverse previously declassified policy. A policy set out, for example, by Clinton in the mid-’90s was, a few years later under Bush, reversed. It was revealed in 2006, for example, that over 55,000 documents that were previously available had been reclassified by the demand of the CIA and other agencies. And it is known that this program continued at least until 2009. So, it is very worrying when the government actually starts taking back into behind the veil of secrecy what was previously available. It doesn’t really increase the trust in government. So, now at least you have all these documents available, and they will be available in the future.

    AMY GOODMAN: Now, talk about—you’re an investigative journalist—what you found most significant about these documents, the content of the documents. You know, in the United States, when talking about either Bradley Manning or Julian Assange or WikiLeaks, it’s always about the process or what they did, but rarely, unlike other countries which have, you know, front-page news, like, for example, in India right now, Rajiv Gandhi, what the documents show about him acting as a middleman for a Swedish military company. Talk about these revelations in the documents, Kristinn.

    KRISTINN HRAFNSSON: Well, the revelations are coming out as we speak and will come out in the next few days. We did cooperate with 18 media organizations around the world in analyzing these documents, and they found terrific stories. I hesitate to steal their headlines before they publish it. It will come out in the next hours and days. There are documents there that shed light on the U.S. relation regarding—with regard to dictatorships in Latin America. I just talked yesterday with a Brazilian journalist who had been diving into this, and it is extremely important what is revealed there. Keep in mind that just recently the Brazilians decided to come to terms with their period of dictatorship after President Dilma set up a truth commission. So, there’s a lot of things from this period that has not been reconciled with and come to terms with, and these documents are really helping this effort in these countries.

    AMY GOODMAN: During Bradley Manning’s pretrial hearing earlier this year, he spoke about the so-called collateral video—”Collateral Murder” video of an Apache helicopter attack in Iraq that occurred on July 12th, 2007. He admitted for the first time being the source of the leaked tape. Bradley Manning described the video as “war porn” and said the crew’s lack of concern for human life and concern for injured children at the scene greatly bothered him. This is the video shot in July 2007 that Manning referenced. It shows U.S. forces killing 12 people, including two Reuters employees, Saeed Chmagh and Namir Noor-Eldeen. This is video that was taken, not by peace activists on the ground, but by the Apache helicopter itself, the video on board the helicopter.

    U.S. SOLDIER 1: I have individuals with weapons.

    U.S. SOLDIER 2: You’re clear.

    U.S. SOLDIER 1: Alright, firing.

    U.S. SOLDIER 3: Let me know when you’ve got them.

    U.S. SOLDIER 2: Let’s shoot. Light ’em all up.

    U.S. SOLDIER 1: Come on, fire!

    U.S. SOLDIER 2: Keep shootin’. Keep shootin’. Keep shootin’. Keep shootin’.

    U.S. SOLDIER 4: Hotel, Bushmaster two-six, Bushmaster two-six, we need to move, time now!

    U.S. SOLDIER 2: Alright, we just engaged all eight individuals.

    AMY GOODMAN: Reuters driver Saeed Chmagh, who was 40 years old and has four children, survived that initial attack. He’s seen in the video trying to crawl away as the helicopter flies overhead after the first attack. U.S. forces again open fire when they notice a van pulling up to evacuate the wounded Saeed Chmagh.

    U.S. SOLDIER 2: The bodies.

    U.S. SOLDIER 1: Where’s that van at?

    U.S. SOLDIER 2: Right down there by the bodies.

    U.S. SOLDIER 1: OK, yeah.

    U.S. SOLDIER 2: Bushmaster, Crazy Horse. We have individuals going to the scene, looks like possibly picking up bodies and weapons.

    U.S. SOLDIER 1: Let me engage. Can I shoot?

    U.S. SOLDIER 2: Roger. Break. Crazy Horse one-eight, request permission to engage.

    U.S. SOLDIER 3: Picking up the wounded?

    U.S. SOLDIER 1: Yeah, we’re trying to get permission to engage. Come on, let us shoot!

    U.S. SOLDIER 2: Bushmaster, Crazy Horse one-eight.

    U.S. SOLDIER 1: They’re taking him.

    U.S. SOLDIER 2: Bushmaster, Crazy Horse one-eight.

    U.S. SOLDIER 4: This is Bushmaster seven, go ahead.

    U.S. SOLDIER 2: Roger. We have a black SUV—or Bongo truck picking up the bodies. Request permission to engage.

    U.S. SOLDIER 4: Bushmaster seven, roger. This is Bushmaster seven, roger. Engage.

    U.S. SOLDIER 2: One-eight, engage. Clear.

    U.S. SOLDIER 1: Come on!

    U.S. SOLDIER 2: Clear. Clear.

    U.S. SOLDIER 1: We’re engaging.

    U.S. SOLDIER 2: Coming around. Clear.

    U.S. SOLDIER 1: Roger. Trying to—

    U.S. SOLDIER 2: Clear.

    U.S. SOLDIER 1: I hear ’em—I lost ’em in the dust.

    U.S. SOLDIER 3: I got ’em.

    U.S. SOLDIER 2: Should have a van in the middle of the road with about 12 to 15 bodies.

    U.S. SOLDIER 1: Oh yeah, look at that. Right through the windshield! Ha ha!

    AMY GOODMAN: That, again, the video that was taken that was on board the Apache helicopter. It was July 12th, 2007, released three years ago, on April 5th, 2010, released by WikiLeaks and dubbed the “Collateral Murder” video. Kristinn Hrafnsson, you went to Iraq afterwards. Can you talk about what you did there?

    KRISTINN HRAFNSSON: Well, I went to Iraq before we released this video. I thought it was very important that we would be able to analyze the situation on the ground, locate the victims and identify them. And so, after working by remote for a little, short period, I did fly to Baghdad with my producer and cameraman, and we arrived about three days before the release of the video, on April 5th, 2010. We were able to establish that the driver of the minivan, Matasher Salah Tomal, a 42-year-old father of four, was simply passing by the scene, driving his two children to a special tutoring. We interviewed his widow. We met with the children, Sayad and Doaha, who were eight and 12 at the time, who were still bearing the scars from this attack and, of course, the trauma of losing their father in the incident. In my mind, this attack on the minivan is a clear war crime. But it has never been investigated as such. And it should be, because the people on the ground there, those killed and the families of the victims, still have not seen any justice because of this incident.

    AMY GOODMAN: Of course, right now Julian Assange is holed up in the London embassy of Ecuador. Kristinn Hrafnsson, you’re an investigative journalist. Can you talk about the significance of what is happening to him now? Clearly, he is very productive there. If he steps foot outside, he’ll be arrested by British authorities and sent to Sweden. But can you talk very briefly—and we’re going to talk about this with our next guest, as well—but as you got off to the National Press Club to hold your news conference, talk about both Julian Assange and Bradley Manning.

    KRISTINN HRAFNSSON: Well, Julian Assange has been in the embassy since June 19th, so it’s been quite a time. We are still hoping that there will be some progress very soon. And there is some indication that he will be freed, and I hope that happens very soon. Meanwhile, he is in a fairly good spirit and is still, of course, working as a leader of our team, and working on a new project, as the one that we are releasing today.

    With reference to Bradley Manning, of course it’s appalling that he has been held in pretrial confinement for 1,048 days. No soldier in our contemporary history has been held in such a long period of time without trial, and it’s unheard of. Of course, you mentioned that he recently plead that he was the source of this information, which, of course, I cannot confirm, because it’s our policy that the best way to guard our sources is not knowing them. But it is interesting that even though he has—has this plea, the prosecution is still going ahead with very serious charges of treason, basically aiding the enemy, which carries the maximum of the death penalty, which, in my mind, is an indication that this is a persecution, rather than a prosecution, against Bradley Manning.

    AMY GOODMAN: I know that you have to leave to go to the news conference to speak to the press. Are you concerned, Kristinn, coming to this country, that you, too, could be arrested? And have you been questioned by the grand jury that we understand is impaneled in Virginia to investigate WikiLeaks and Julian Assange, that others have been called before?

    KRISTINN HRAFNSSON: I have not been questioned, and I have not been harassed in any way, but I assume that information has been gathered about me. This investigation is unheard of in scope. More than 40,000 documents have been gathered in the investigation. A lot of our people have been harassed at the borders here, and they have been spied upon. We know that. We have confirmation on that. So, this is a very serious, ongoing investigation.

    AMY GOODMAN: Kristinn, the Kissinger Cables that you have now—that you’re announcing the release of, at least a documented database form of them, one of the reports in the Indian paper that have already been published, so you can discuss it, is about Rajiv Gandhi, the former prime minister of India, being a middleman for a Swedish military company. Talk about the significance of this. What exactly did he do?

    KRISTINN HRAFNSSON: I have to admit that I’m not familiar with the details of that story, so I don’t want to go into that in much details.

    AMY GOODMAN: OK.

    KRISTINN HRAFNSSON: And I should be actually going to the National Press Club to host the conference.

    AMY GOODMAN: Yes, the last question, the last question. The quote of Henry Kissinger: “The illegal we do immediately; the unconstitutional takes a little longer.”

    KRISTINN HRAFNSSON: That is a quote from a meeting, minutes from a meeting in Turkey, where he was talking to his Turkish counterpart. And it is a quite interesting quote and shows maybe the spirit of how he was conducting the foreign policy of this country.

    AMY GOODMAN: Why don’t we end on that quote one more time? It was a quote of the former Secretary of State Henry Kissinger, March 10th, 1975: “The illegal we do immediately; the unconstitutional takes a little longer.” Kristinn Hrafnsson, I want to thank you for being with us. We will cover your news conference in the National Press Club and hope to speak to you again soon.

    KRISTINN HRAFNSSON: Thanks for having me.

    AMY GOODMAN: Spokesperson for WikiLeaks. This is Democracy Now!, democracynow.org, The War and Peace Report. But we’re staying on this subject. When we come back, we’ll be joined by Birgitta Jónsdóttir, a member of the Icelandic Parliament who played a critical role in WikiLeaks. She has now come to this country to speak about both WikiLeaks and Bradley Manning. Stay with us.

    Monday, April 8, 2013

    Find this story at 8 April 2013

    WIKILEAKS SPECIAL PROJECT K: THE KISSINGER CABLES

    ‘Investigative journalism has never been this effective!’ – Publico

    The Kissinger Cables are part of today’s launch of the WikiLeaks Public Library of US Diplomacy (PlusD), which holds the world’s largest searchable collection of United States confidential, or formerly confidential, diplomatic communications. As of its launch on April 8, 2013 it holds 2 million records comprising approximately 1 billion words.

    WikiLeaks’ publisher Julian Assange stated: “The collection covers US involvements in, and diplomatic or intelligence reporting on, every country on Earth. It is the single most significant body of geopolitical material ever published.”
    THE KISSINGER CABLES

    “The illegal we do immediately; the unconstitutional takes a little longer.” — Henry A. Kissinger, US Secretary of State, March 10, 1975: http://wikileaks.org/plusd/cables/P860114-1573_MC_b.html#efmCS3CUB

    The Kissinger Cables comprise more than 1.7 million US diplomatic records for the period 1973 to 1976, including 205,901 records relating to former US Secretary of State Henry A. Kissinger. Dating from January 1, 1973 to December 31, 1976 they cover a variety of diplomatic traffic including cables, intelligence reports and congressional correspondence. They include more than 1.3 million full diplomatic cables and 320,000 originally classified records. These include more than 227,000 cables classified as “CONFIDENTIAL” and 61,000 cables classified as “SECRET”. Perhaps more importantly, there are more than 12,000 documents with the sensitive handling restriction “NODIS” or ‘no distribution’, and more than 9,000 labelled “Eyes Only”.

    At around 700 million words, the Kissinger Cables collection is approximately five times the size of WikiLeaks’ Cablegate. The raw PDF data is more than 380 Gigabytes in size and is the largest WikiLeaks publication to date.

    WikiLeaks’ media partners will be reporting throughout the week on their findings. These include significant revelations about US involvements with fascist dictatorships, particularly in Latin America, under Franco’s Spain (including about the Spanish royal family) and in Greece under the regime of the Colonels.

    The documents also contain hourly diplomatic reporting on the 1973 war between Israel, Egypt and Syria (the “Yom Kippur war”). While several of these documents have been used by US academic researchers in the past, the Kissinger Cables provides unparalled access to journalists and the general public.

    Most of the records were reviewed by the United States Department of State’s systematic 25-year declassification process. At review, the records were assessed and either declassified or kept classified with some or all of the metadata records declassified. Both sets of records were then subject to an additional review by the National Archives and Records Administration (NARA). Once believed to be releasable, they were placed as individual PDFs at the National Archives as part of their Central Foreign Policy Files collection. Despite the review process supposedly assessing documents after 25 years there are no diplomatic records later than 1976. The formal declassification and review process of these extremely valuable historical documents is therefore currently running 12 years late.

    The form in which these documents were held at NARA was as 1.7 million individual PDFs. To prepare these documents for integration into the PlusD collection, WikiLeaks obtained and reverse-engineered all 1.7 million PDFs and performed a detailed analysis of individual fields, developed sophisticated technical systems to deal with the complex and voluminous data and corrected a great many errors introduced by NARA, the State Department or its diplomats, for example harmonizing the many different ways in which departments, capitals and people’s names were spelt. All our corrective work is referenced and available from the links in the individual field descriptions on the PlusD text search interface: https://search.wikileaks.org/plusd
    RECLASSIFICATION ATTEMPTS THWARTED

    The CIA and other agencies have attempted to reclassify or withhold sections of the US National Archives. Detailed minutes of US State Department meetings show that these attempts, which originated under the Bush II administration, have continued on through until at least 2009. A 2006 analysis by the US National Security Archives, an independent non-governmental research institute and library located at George Washington University, found that 55,000 pages had been secretly reclassified.

    The censorship of the US National Archives was thrown into stark relief in November last year when the Archive censored all searches for ‘WikiLeaks’ from its records. See http://dissenter.firedoglake.com/2012/11/03/us-national-archives-has-blocked-searches-for-wikileaks/

    Julian Assange, WikiLeaks’ publisher, said: “The US administration cannot be trusted to maintain the history of its interactions with the world. Fortunately, an organisation with an unbroken record in resisting censorship attempts now has a copy.”

    Sun Apr 7, 2013 21:00 EST

    Find this story at 7 April 2013

    Find the search engine at

    CIA must admit existence of drone programme, appeals court rules

    US court rules that CIA must give fuller response to ACLU’s lawsuit seeking access to records on drone attacks
    Reuters

    The civil liberties group brought its suit under the 1966 Freedom of Information Act. Photograph: Eric Gay/AP

    In a rebuke of government secrecy, a federal appeals court ruled on Friday that the CIA must give a fuller response to a lawsuit seeking the spy agency’s records on drone attacks.

    The CIA’s claim that it could neither confirm nor deny whether it has any drone records was inadequate, because the government, including Barack Obama himself, has clearly acknowledged a drone programme, the court said.

    The ruling was unanimous from a three-judge panel of the court of appeals for the District of Columbia circuit.

    However, the American Civil Liberties Union is likely a long way from getting access to CIA records. Its lawsuit now heads back to a trial court, where the CIA could invoke other defenses against the records request.

    The civil liberties group brought its suit under the 1966 Freedom of Information Act.

    Obama and his senior advisers call the aerial drone programme essential to US attacks on al-Qaida militants in countries such as Yemen. The strikes have at times ignited local anger and frayed diplomatic relations.

    Initially, the CIA said security concerns prevented it from even acknowledging the existence of records. The ACLU countered that government officials had already acknowledged the drone programme in public statements from 2009 to 2012.

    The question became whether the statements by Obama, former CIA director Leon Panetta and former counter-terrorism adviser John Brennan, now the CIA chief, amounted to an official acknowledgment.

    Judge Merrick Garland wrote for the appeals court that it would be a fiction to pretend otherwise.

    guardian.co.uk, Friday 15 March 2013 16.56 GMT

    Find this story at 15 March 2013 
    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Obama’s secrecy fixation causing Sunshine Week implosion

    Even the most loyal establishment Democrats are now harshly denouncing the president for his war on transparency

    During Sunshine Week, Democratic loyalists attack president Obama over his excessive secrecy Photograph: Bbc

    When Barack Obama ran for president in 2008, his pledges of openness and transparency were not ancillary to his campaign but central to it. He repeatedly denounced the Bush administration as “one of the most secretive administrations in our nation’s history”, saying that “it is no coincidence” that such a secrecy-obsessed presidency “has favored special interests and pursued policies that could not stand up to the sunlight.” He vowed: “as president, I’m going to change that.” In a widely heralded 2007 speech on transparency, he actually claimed that this value shaped his life purpose:

    “The American people want to trust in our government again – we just need a government that will trust in us. And making government accountable to the people isn’t just a cause of this campaign – it’s been a cause of my life for two decades.”

    His campaign specifically vowed to protect whistleblowers, hailing them as “the best source of information about waste, fraud, and abuse in government” and saying that “such acts of courage and patriotism. . . should be encouraged rather than stifled.” Transparency groups were completely mesmerized by these ringing commitments. “We have a president-elect that really gets it,” gushed Charles Davis, executive director of the National Freedom of Information Coalition, in late 2008; “the openness community will expect a complete repudiation of the Ashcroft doctrine.” Here’s just one of countless representative examples of Obama bashing Bush for excessive secrecy – including in the realm of national security and intelligence – and vowing a fundamentally different course:

    Literally moments after he was inaugurated, the White House declared that “President Obama has committed to making his administration the most open and transparent in history”. Obama continues even now to parade around as a historically unprecedented champion of openness. In a 2010 speech, he said “I will not stop fighting to open up government” and then praised himself this way: “we have put in place the toughest transparency rules in history: in history.” Right this very minute, on the White House website, Obama is quoted this way: “My Administration is committed to creating an unprecedented level of openness in Government” because “transparency promotes accountability and provides information for citizens about what their Government is doing.”

    This week is Sunshine Week, created by transparency and civil liberties groups and media outlets as “a national initiative to promote a dialogue about the importance of open government and freedom of information”. The White House blog on Wednesday said that “we celebrate Sunshine Week – an appropriate time to discuss the importance of open government and freedom of information” and quoted the president this way: “Openness will strengthen our democracy, and promote efficiency and effectiveness in Government.”

    Along with others, I’ve spent the last four years documenting the extreme, often unprecedented, commitment to secrecy that this president has exhibited, including his vindictive war on whistleblowers, his refusal to disclose even the legal principles underpinning his claimed war powers of assassination, and his unrelenting, Bush-copying invocation of secrecy privileges to prevent courts even from deciding the legality of his conduct (as a 2009 headline on the Obama-friendly TPM site put it: “Expert Consensus: Obama Mimics Bush On State Secrets”). Just this week, the Associated Press conducted a study proving that last year, the Obama administration has rejected more FOIA requests on national security grounds than in any year since Obama became president, and quoted Alexander Abdo, an ACLU staff attorney for its national security project, as follows:

    “We’ve seen a meteoric rise in the number of claims to protect secret law, the government’s interpretations of laws or its understanding of its own authority. In some ways, the Obama administration is actually even more aggressive on secrecy than the Bush administration.”

    Re-read that last sentence in italics. Most of those policies have been covered here at length, and I won’t repeat them here. But what is remarkable is that this secrecy has become so oppressive and extreme that even the most faithful Democratic operatives are now angrily exploding with public denunciations.

    Let’s begin with John Podesta, who was previously the chief of Obama’s transition team as well as Chief of Staff in the Clinton White House, and now runs the highly Obama-loyal Center for American Progress. During that 2008 transition, Podesta vowed that the Obama administration would be “the most open and transparent transition in history.” Perhaps out of embarrassment that his own vows have been so flagrantly disregarded, Podesta has an amazingly scathing Op-Ed in the Washington Post this morning about Obama’s refusal to release even the legal memoranda purporting to vest him with assassination powers. This language is striking indeed given Podesta’s central role in the Democratic establishment:

    “The Obama administration is wrong to withhold these documents from Congress and the American people. I say this as a former White House chief of staff who understands the instinct to keep sensitive information secret and out of public view . . . But protecting technical means, human sources, operational details and intelligence methods cannot be an excuse for creating secret law to guide our institutions. . . .

    “In refusing to release to Congress the rules and justifications governing a program that has conducted nearly 400 unmanned drone strikes and killed at least three Americans in the past four years, President Obama is ignoring the system of checks and balances that has governed our country from its earliest days. And in keeping this information from the American people, he is undermining the nation’s ability to be a leader on the world stage and is acting in opposition to the democratic principles we hold most important. . . .

    “The law that directs our government’s activities should not be kept secret. All branches of the people’s government have the right to know the rules and standards under which the other branches act. Congress has the power to oversee the conduct of the executive branch, and lawmakers must be permitted to use it. As Woodrow Wilson wrote: ‘The informing function of Congress should be preferred even to its legislative function.’ . . . .

    “[W]e cannot lead if the American people are kept in the dark. We cannot lead if the world does not know the principles and laws that guide us, or if others can credibly say that our commitment to a government of the people, by the people and for the people is simply window-dressing, or that we sacrifice our constitutional principles when it is expedient.”

    Meanwhile, Politico this morning reports on an acrimonious meeting between Obama and various Democratic senators in which they accused Obama of adopting the secrecy obsession of the Bush administration. Apparently, the charge was led by Jay Rockefeller, one of the Senate’s most faithful advocates of the National Security State and the rampant secrecy behind which it operates; Obama’s secrecy, evidently, is too much even for him:

    “Two Obama administration officials, who asked not to be named, confirmed Rockefeller raised the drone oversight issue with the president at the session. . . . While Obama defended his handling of the issue, he told his former Senate colleagues he understood their concerns about being left out of the loop on such sensitive decisions, senators said. The president noted that he would have ‘probably objected’ over the White House’s handling of this issue if he were still a senator, they said. But, according to the sources, he noted his viewpoint changed now that he occupies the Oval Office — not a room in a Senate office building. . . .

    “During a Senate Select Committee on Intelligence hearing Tuesday just before the meeting with Obama, the senior senator from West Virginia railed against the administration’s secrecy and publicly charged that it amounted to a return to the Bush approach. . . . ‘It’s a terrible situation,’ a clearly irritated Rockefeller said during the annual hearing focusing on global threats to the US. . . . Rockefeller also charged that after Brennan was confirmed, the administration clammed up again and ‘went directly back to the way they were from 2001-2 to 2007’. As for the legal memos shared after two years of requests, Rockefeller said there was ‘nothing in them which is a threat to anybody.'”

    To justify his conduct, Obama “tried to assure his former colleagues that his administration is more open to oversight than that of President George W. Bush”, saying: “This is not Dick Cheney we’re talking about here.” This excuse Obama used – I used to object to these things when I was a Senator but see it differently now that I’m president – is one that is frequently heard from his followers, but more important, is what Bush supporters always said would happen once a Democrat became president: that, with the secret information you get in the Oval Office and the need to Keep Us Safe™, a Democratic president would realize that Bush and Cheney were right all along about many of the policies which Democrats spent eight years so harshly denouncing. Given that Obama himself is now expressly saying this (“he noted his viewpoint changed now that he occupies the Oval Office”), doesn’t he and his party – as I’ve asked many times before – owe a heartfelt and sincere public apology to Bush and Cheney for bashing them so harshly for policies which Obama now not only adopts but has come to explicitly defend?

    Then we come to this morning’s New York Times Op-Ed by the always-great Harvard law professor Yochai Benkler and Floyd Abrams, the self-proclaimed First Amendment champion who represented the New York Times in fighting off the Nixon administration’s attempts to prevent publication of the Pentagon Papers leaked by Daniel Ellsberg. While Benkler has been a vocal defender of WikiLeaks and Bradley Manning, Abrams has been a critic of both. Nonetheless, those two united to warn the nation of the grave dangers posed to whistleblowing and a free press from the wildly excessive prosecution of Manning:

    “If successful, the prosecution will establish a chilling precedent: national security leaks may subject the leakers to a capital prosecution or at least life imprisonment. Anyone who holds freedom of the press dear should shudder at the threat that the prosecution’s theory presents to journalists, their sources and the public that relies on them.

    “You don’t have to think that WikiLeaks is the future of media, or Private Manning a paragon of heroic whistle-blowing, to understand the threat. . . . [W]hat could be more destructive to an informed citizenry than the threat of the death penalty or life imprisonment without parole for whistle-blowers?

    “So yes, we continue to disagree about what to make of Private Manning and WikiLeaks. But we agree that WikiLeaks is part of what the Fourth Estate is becoming, that the leaks included important disclosures and that their publication is protected by the First Amendment no less than the publication of the Pentagon Papers was.

    “Private Manning’s guilty plea gives the prosecution an opportunity to rethink its strategy. The extreme charges remaining in this case create a severe threat to future whistle-blowers, even when their revelations are crystal-clear instances of whistle-blowing. We cannot allow our concerns about terrorism to turn us into a country where communicating with the press can be prosecuted as a capital offense.”

    So here we have not Republicans but the most loyal establishment Democrats denouncing Obama’s secrecy obsession in the harshest of terms. “President Obama is ignoring the system of checks and balances that has governed our country from its earliest days.” He is “acting in opposition to the democratic principles we hold most important”. “The administration clammed up again and went directly back to the way they were from 2001-2 to 2007.” “What could be more destructive to an informed citizenry than the threat of the death penalty or life imprisonment without parole for whistle-blowers?”

    This hardly means that Democrats are now ready to pose meaningful challenges to Obama’s radical policies: to release the OLC memos would be simply to disclose the White House’s claimed justification for the powers it has seized, and would not mean there would be meaningful opposing to those powers. Still, secrecy is the linchpin of abuse of power and transparency is a necessary (though not sufficient) antidote; as Thomas Jefferson wrote in an 1804 letter to John Tyler: “Our first object should therefore be, to leave open to him all the avenues of truth. The most effectual hitherto found, is freedom of the press. It is therefore, the first shut up by those who fear the investigation of their actions.”

    Glenn Greenwald
    guardian.co.uk, Thursday 14 March 2013 13.41 GMT

    Find this story at 14 March 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Book review: ‘The Way of the Knife: The CIA, a Secret Army, and a War at the Ends of the Earth’ By Mark Mazzetti

    On May 1, 2011, CIA Director Leon Panetta was in command of the single most important U.S. military operation since the attacks of Sept. 11, 2001: the Navy SEAL Team 6 assault on a mysterious compound in Abbottabad, Pakistan, where Osama bin Laden was suspected to be hiding. The SEALs were sneaking into Pakistan without the permission of its government on a covert “deniable” mission in a country that was supposedly allied to the United States. Because U.S. law forbids the military to do this kind of work, the SEALs were turned over to the control of the CIA and were “sheep-dipped” to become, in effect, spies under Panetta’s nominal control.

    Yet isn’t the CIA’s real job to steal other countries’ secrets, rather than to carry out targeted killings?

    A few years before the bin Laden operation, Lt. Gen. Stanley A. McChrystal, then the head of Joint Special Operations Command, had turned the Army’s Delta Force and Navy SEAL Team 6 into a fighting machine in Iraq and Afghanistan that increasingly mounted operations to gather intelligence — what McChrystal termed “a fight for knowledge.”

    Yet aren’t Special Operations forces the “door kickers” whom you send in to kill or capture terrorists rather than the guys who collect intelligence?

    Since the 9/11 attacks, a dramatic shift has occurred in the way the United States deploys its military and intelligence forces. In his new book, “The Way of the Knife,” Mark Mazzetti documents the militarization of the CIA and the stepped-up intelligence focus of Special Operations forces. As Mazzetti observes in his deeply reported and crisply written account, over the past decade “the CIA’s top priority was no longer gathering intelligence on foreign governments and their countries, but man hunting.” The bin Laden operation was far from the only deadly mission that Panetta presided over.

    Panetta’s tenure at CIA, Mazzetti writes, was known for its “aggressive — some would come to believe reckless — campaign of targeted killings.” He authorized 216 CIA drone strikes in Pakistan that killed at least 1,196 people, mostly militants, but also a smaller number of civilians, according to a count by the New America Foundation. Panetta, a devout Catholic, observed that he had “said more Hail Marys in the last two years than I have in my whole life.”Conversely, Defense Secretary Donald H. Rumsfeld was deeply irritated when the CIA rather than the military led the ground operation in late 2001 that ejected the Taliban from power in Afghanistan. He came to the conclusion that “the only answer was to make the Pentagon more like the CIA.”

    The emergence of a “military-intelligence complex” has proved devastating to al-Qaeda and its affiliates. The CIA drone campaign in Pakistan has killed much of the terror network’s leaders and largely eliminated Pakistan’s tribal regions as the key training ground for the group; as a result, al-Qaeda hasn’t been able to mount a successful assault on the West since the suicide attacks on the London transportation system in 2005.

    Meanwhile, the Joint Special Operations Command (JSOC) not only killed bin Laden, but also largely destroyed the vicious leadership of al-Qaeda’s Iraqi affiliate, which had precipitated the civil war in Iraq by its numerous attacks on the Shia community. JSOC’s campaign against al-Qaeda played a key role in tamping down the Iraqi civil war and helped enable a steady decline in violence in Iraq since 2007.

    Until recently this history had not been well understood because units like SEAL Team 6 that make up Joint Special Operations Command aren’t even officially acknowledged. McChrystal’s recent authoritative memoir, “My Share of the Task,” has done much to illuminate this important chapter in the evolution of American military operations.

    If there is an “Obama doctrine,” it is to fight the war against al-Qaeda and its allies with drone strikes in Pakistan and Yemen and with small numbers of clandestine Special Operations forces on the ground in countries such as Somalia. This new kind of fighting gives Mazzetti the title of his book, “The Way of the Knife.” It’s a form of warfare that avoids “messy, costly wars that topple governments and require years of American occupation.”

    The benefits of the way of the knife are obvious: Few Americans are put at risk, and the costs are relatively low in a time of budgetary constraints. But as Mazzetti points out, this type of knife fighting is not as surgical as some of its proponents think, for it “creates enemies just as it has obliterated them.” It also has “lowered the bar for waging war, and it is now easier for the United States to carry out killing operations at the ends of the earth than at any other time in its history.”

    CIA drone strikes are emblematic of this point. In Pakistan, a country with nuclear weapons, drone attacks are deeply unpopular, angering many of the 180 million Pakistanis. This is a high cost to pay. In 2010, a record 122 strikes occurred in Pakistan, yet few of the victims were leaders of al-Qaeda, suggesting that this tactic was being used without much thought for the larger strategic picture. The CIA drone program, which was conceived of as a way to kill the leaders of militant groups, had evolved into a counterinsurgency air force that killed mostly lower-level members of the Taliban in Pakistan.

    But some big payoffs emerge from the blending of the roles of the military and the CIA that are well illustrated by the execution of the bin Laden raid. The first 15 minutes of the raid were consumed in killing bin Laden’s two bodyguards, his son and the al-Qaeda leader himself. But during the next 23 minutes, the SEALs picked up every computer, thumb drive and file they could lay their hands on in bin Laden’s compound. More than half of the time that the SEALs were on the ground in Pakistan they were performing what is known among intelligence professionals as SSE, or sensitive site exploitation.

    As a result, the CIA was able to launch drone strikes — presided over by Panetta, not the military — that killed a number of al-Qaeda leaders, such as Atiyah Abd al-Rahman, who had appeared prominently in the documents the SEALs had recovered at the Abbottabad compound. The documents revealed that Rahman was not the middle-tier al-Qaeda official he had originally been pegged, but bin Laden’s chief of staff.

    While the “The Way of the Knife” recounts the important shifts in the architecture of the U.S. military and intelligence communities, it also reveals the many eccentric characters who emerged during this era of shifting portfolios and illustrates another important theme of the book: the privatization of intelligence operations, which were traditionally a core government function.

    In this new environment, ambitious individuals take on outsize roles. Consider Michele Ballarin, a former Republican candidate for Congress and socialite living on a 100-acre farm in Virginia’s horse country who became obsessed with Somalia at the same time that the CIA and JSOC were increasingly focusing on the rise of al-Shabab, a Somali al-Qaeda affiliate that had taken control of much of the country. Simultaneously, al-Shabab was recruiting dozens of U.S. citizens, predominately from the Somali diaspora in Minnesota.

    Following a chance meeting with a group of Somali Americans, Ballarin became intrigued by their country and soon was traveling regularly to Somalia, outfitted in Gucci and toting Louis Vuitton bags, and so dazzling that the Somalis dubbed her “Amira,” Arabic for princess. Soon the Virginia socialite was embroiled in hostage negotiations with Somali pirates who had seized a ship carrying clandestine cargo of Russian tanks worth many millions. And Ballarin was put on the Pentagon’s payroll to provide intelligence about Somalia’s many armed groups, although it is unclear from Mazzetti’s account whether she discovered anything very useful.

    Duane “Dewey” Clarridge, a CIA legend who had played a starring role during the Iran-contra scandal, also seized an opportunity in the new world of government-sponsored private intelligence collection. In 2009, the 77-year-old Clarridge, long retired and dismissive of the CIA as risk-averse, was running his own private spying operation along the Afghan-Pakistani border. He hatched a plan to dig up evidence that Afghan President Hamid Karzai was a heroin addict, a rumor that was floating around Kabul. Under the scheme, Clarridge would insert an agent into Karzai’s palace to collect his beard trimmings and then would run drug tests on them. He dropped the plan when it became obvious that the Obama administration had no intention of pushing Karzai from power.

    Working the phones late at night from his home in the San Diego suburbs, Clarridge maintained a network of spies who were gathering information on Taliban groups such as the Haqqani network. Through a Pentagon contract overseen by Lockheed Martin, Clarridge and his team were paid $22 million for their work and filed “hundreds of intelligence reports to military commanders in Afghanistan.” The CIA had always been unhappy about Clarridge’s freelance spying operation, and his contract was not renewed in 2010. He was angry that his former employer “seemed to be the reason that the operation had been shut down.”

    Mazzetti, a national security correspondent for the New York Times, asserts that the “war on terror” has damaged the CIA’s ability to understand the really important political developments in the Muslim world, such as the Arab Spring. As a senior Obama official explained, noting the agency’s emphasis on drone strikes and hunting down al-Qaeda leaders: “The CIA missed Tunisia. They missed Egypt. They missed Libya.”

    THE WAY OF THE KNIFE The CIA, a Secret Army, and a War at the Ends of the Earth By Mark Mazzetti Penguin Press. 381 pp. $29.95

    By Peter Bergen, Published: April 5

    Find this story at 5 April 2013

    © The Washington Post Company

    Arundhati Roy on Iraq War’s 10th: Bush May Be Gone, But “Psychosis” of U.S. Foreign Policy Prevails

    On the eve of the 10th anniversary of the U.S. invasion of Iraq, the global justice activist and author Arundhati Roy joins us to discuss the war’s legacy. Roy is the author of many books, including “The God of Small Things,” “Walking with the Comrades,” and “Field Notes on Democracy: Listening to Grasshoppers.” Roy argues the imperial mentality that enabled the United States to invade Iraq continues today unabated across the world. “We are being given lessons in morality [by world leaders] while tens of thousands are being killed, while whole countries are shattered, while whole civilizations are driven back decades, if not centuries,” Roy says. “And everything continues as normal.” [includes rush transcript]
    Transcript

    This is a rush transcript. Copy may not be in its final form.

    AMY GOODMAN: March 19th marks the 10th anniversary of the U.S. invasion of Iraq. According to a new report by Brown University, a decade of war led to the deaths of roughly 134,000 Iraqi civilians and potentially contributed to the deaths of many hundreds of thousands more. According to the report, the Iraq War has cost the U.S. more than $2 trillion, including half-a-trillion dollars in benefits owed to veterans. The report says the war has devastated rather than helped Iraq, spurring militant violence, setting back women’s rights and hurting the healthcare system. Most of the more than $200 billion supposedly set aside for reconstruction in Iraq was actually used for security or lost amid rampant fraud and waste. Many in Iraq continue to suffer the consequences of the invasion. This is Basma Najem, whose husband was shot dead by U.S. forces in Basra in 2011.

    BASMA NAJEM: [translated] We expected that we would live in a better situation when the occupation forces, the U.S. forces, came to Iraq. We expected that the situation would be improved. But contrary to our expectation, the situation deteriorated. And at the end, I lost my husband. I have no breadwinner in this world now, and I have six kids. I could not imagine my life would be changed like this. I do not know how it happened.

    AMY GOODMAN: The consequences of the war are still visible here in the United States, as well. Military veterans continue to face extremely high levels of unemployment, traumatic brain injury, PTSD and homelessness. Almost a quarter of recent veterans come home injured either physically or emotionally, and an estimated 18 veterans commit suicide every day. This is Ed Colley, whose son, Army Private Stephen Colley, took his own life in 2007.

    EDWARD COLLEY: We lost our son shortly after he returned from Iraq. He had asked for help, but he didn’t get the help that he needed. And clearly, he was trying to do what he could for himself and could think of no other cure, obviously, than to take his own life.

    AMY GOODMAN: To talk more about this 10th anniversary, we’re joined by the award-winning writer and activist Arundhati Roy, one of the most vocal critics of the Iraq War. In a moment, she’ll join us from Chicago. But first let’s go back to 2003 to a speech she gave at Riverside Church here in New York.

    ARUNDHATI ROY: When the United States invaded Iraq, a New York Times/CBS News survey estimated that 42 percent of the American public believed that Saddam Hussein was directly responsible for the September 11th attacks on the World Trade Center and the Pentagon. And an ABC News poll said that 55 percent of Americans believed that Saddam Hussein directly supported al-Qaeda. None of this opinion is based on evidence, because there isn’t any. All of it is based on insinuation or to suggestion and outright lies circulated by the U.S. corporate media, otherwise known as the “free press,” that hollow pillar on which contemporary American democracy rests. Public support in the U.S. for the war against Iraq was founded on a multitiered edifice of falsehood and deceit, coordinated by the U.S. government and faithfully amplified by the corporate media.

    Apart from the invented links between Iraq and al-Qaeda, we had the manufactured frenzy about Iraq’s weapons of mass destruction. George Bush the Lesser went to the extent—went to the extent of saying it would be suicidal for Iraq—for the U.S. not to attack Iraq. We once again witnessed the paranoia that a starved, bombed, besieged country was about to annihilate almighty America. Iraq was only the latest in a succession of countries. Earlier, there was Cuba, Nicaragua, Libya, Granada, Panama. But this time it wasn’t just your ordinary brand of friendly neighborhood frenzy. It was frenzy with a purpose. It ushered in an old doctrine in a new bottle: the doctrine of preemptive strike, also known as the United States can do whatever the hell it wants, and that’s official. The war against Iraq has been fought and won, and no weapons of mass destruction have been found, not even a little one.

    AMY GOODMAN: Arundhati Roy, speaking in October of 2003 at Riverside Church here in New York, seven months after the U.S. invasion of Iraq. Arundhati has written many books, including The God of Small Things, which won the Booker Prize. Her other books include Walking with the Comrades and Field Notes on Democracy: Listening to Grasshoppers, among others. She now joins us from Chicago.

    Arundhati Roy, welcome to Democracy Now! As you watch yourself 10 years ago and reflect back 10 years ago to this week when the U.S. invaded Iraq, your thoughts today?

    ARUNDHATI ROY: Well, Amy, before that, we remember how—I think it was 50 million people across the world who marched against the war in Iraq. It was perhaps the biggest display of public morality in the world—you know, I mean, before the war happened. Before the war happened, everybody knew that they were being fed lies. I remember saying, you know, it’s just the quality of the lies that is so insulting, because we are being—used to being lied to.

    But, unfortunately, now, all these years later, we have to ask ourselves two questions. One is: Who benefited from this war? You know, we know who paid the price. I heard—I heard you talking about that, so I won’t get into that again. But who benefited from this war? Did the U.S. government? Did the U.S. people benefit? Did they get the oil contracts that they wanted, in the way that they wanted? The answer is no. And yet, today you hear Dick Cheney saying he would do it all over again in a second.

    So, unfortunately, we are dealing with psychosis. We are dealing with a psychopathic situation. And all of us, including myself, we can’t do anything but keep being reasonable, keep saying what needs to be said. But that doesn’t seem to help the situation, because, of course, as we know, after Iraq, there’s been Libya, there’s Syria, and the rhetoric of, you know, democracy versus radical Islam. When you look at the countries that were attacked, none of them were Wahhabi Islamic fundamentalist countries. Those ones are supported, financed by the U.S., so there is a real collusion between radical Islam and capitalism. What is going on is really a different kind of battle.

    And, you know, most people are led up a path which keeps them busy. And in a way, all of us are being kept busy, while the real business at the heart of it—I mean, apart from the people who suffered during the war. Let’s not forget the sanctions. Let’s not forget Madeleine Albright saying that a million children dying in Iraq because of the sanctions was a hard price but worth it. I mean, she was the victim, it seems, of the sanctions; you know, her softness was called upon, and she had to brazen herself to do it. And today, you have the Democrats bombing Pakistan, destroying that country, too. So, just in this last decade, Afghanistan, Pakistan, Iraq, Libya, Syria—all these countries have been—have been shattered.

    You know, we heard a lot about why—you know, the war in Afghanistan was fought for feminist reasons, and the Marines were really on this feminist mission. But today, all the women in all these countries have been driven back into medieval situations. Women who were liberated, women who were doctors and lawyers and poets and writers and—you know, pushed back into this Shia set against Sunnis. The U.S. is supporting al-Qaeda militias all over this region and pretending that it’s fighting Islam. So we are in a situation of—it is psychopathic.

    And while anyone who resisted is being given moral lessons about armed struggle or violence or whatever it is, at the heart of this operation is an immorality and a violence and a—as I keep using this word—psychopathic violence, which even the people in the United States are now suffering for. You know, there is a connection, after all, between all these wars and people being thrown out of their homes in this country. And yet, of course we know who benefits from these wars. May not be the oil contracts, but certainly the weapons industry on which this economy depends for—you know, for a great part. So, all over, even between India and Pakistan now, people are advocating war. And the weapons industry is in with the corporations in India.

    So, we are really being made fools of. You know, this is what is so insulting. We are being, you know, given lessons in morality while tens of thousands are being killed, while whole countries are shattered, while whole civilizations are driven back decades, if not centuries. And everything continues as normal. And you have—you have people, like criminals, really, like Cheney, saying, “I’ll do it again. I’ll do it again. I won’t think about it. I’ll do it again.” And so that’s the situation we are in now.

    AMY GOODMAN: Arundhati, a decade after the invasion of Iraq, former British Prime Minister Tony Blair stood by his decision to go to war, saying it saved Iraq from a fate worse than Syria’s at the moment.

    TONY BLAIR: I think if we’d—if we’d backed off and we’d left him in power, you just imagine, with what is happening in Syria now, if you’d left Saddam in charge of Iraq, you would have had carnage on an even worse scale in Syria and with no end in sight. So, you know, this was the most difficult decision I ever took and the most balanced decision. But I still—personally, I still believe we were better to remove him than leave him.

    AMY GOODMAN: That was British Prime Minister Tony Blair, former prime minister. Arundhati Roy, your response?

    ARUNDHATI ROY: Well, you know, I don’t know. Maybe they need to be put into a padded cell and given some real news to read, you know? I mean, how can you say this, after creating a situation in Iraq where no—I mean, every day people are being blown up? There are—you know, mosques are being attacked. Thousands are being killed. People have been made to hate each other. In Iraq, women were amongst the most liberated women in the world, and they have been driven back into having to wear burqas and be safe, because of the situation. And this man is saying, “Oh, we did such a wonderful thing. We saved these people.” Now, isn’t that like—isn’t it insane? I mean, I don’t know how to respond to something like that, because it’s like somebody looking at somebody being slaughtered and saying, “Oh, he must be enjoying it. We are really helping him,” you know? So, how do you argue rationally against these people?

    AMY GOODMAN: Can you—

    ARUNDHATI ROY: We just have to think about what we need to do, you know? But we can’t have a conversation with them in this—at this point.

    AMY GOODMAN: Do you see President Obama going in a different direction?

    ARUNDHATI ROY: Of course not. I don’t see him going in a different direction at all. I mean, the real question to ask is: When was the last time the United States won a war? You know, it lost in Vietnam. It’s lost in Afghanistan. It’s lost in Iraq. And it will not be able to contain the situation. It is hemorrhaging. It is now—you know, of course you can continue with drone attacks, and you can continue these targeted killings, but on the ground, a situation is being created which no army—not America, not anybody—can control. And it’s just, you know, a combination of such foolishness, such a lack of understanding of culture in the world.

    And Obama just goes on, you know, coming out with these smooth, mercurial sentences that are completely meaningless. I was—I remember when he was sworn in for the second time, and he came on stage with his daughters and his wife, and it was all really nice, and he said, you know, “Should my daughters have another dog, or should they not?” And a man who had lost his entire family in the drone attacks just a couple of weeks ago said, “What am I supposed to think? What am I supposed to think of this exhibition of love and family values and good fatherhood and good husbandhood?” I mean, we’re not morons, you know? It’s about time that we stopped acting so reasonable. I just don’t feel reasonable about this anymore.

    AMY GOODMAN: We’re going to break and then come back and talk about what’s happening in Kashmir, a place you’ve been focusing on recently, Arundhati. Arundhati Roy is the award-winning writer, renowned global justice activist. Among her books, The God of Small Things, her most recent book, Walking with the Comrades, and Field Notes on Democracy: Listening to Grasshoppers. This is Democracy Now! We’ll be back in a minute.

    Display full version
    Monday, March 18, 2013

    Find this story at 18 March 2013

    CIA director faces a quandary over clandestine service appointment

    As John Brennan moved into the CIA director’s office this month, another high-level transition was taking place down the hall.

    A week earlier, a woman had been placed in charge of the CIA’s clandestine service for the first time in the agency’s history. She is a veteran officer with broad support inside the agency. But she also helped run the CIA’s detention and interrogation program after the Sept. 11, 2001, attacks and signed off on the 2005 decision to destroy videotapes of prisoners being subjected to treatment critics have called torture.

    The woman, who remains undercover and cannot be named, was put in the top position on an acting basis when the previous chief retired last month. The question of whether to give her the job permanently poses an early quandary for Brennan, who is already struggling to distance the agency from the decade-old controversies.

    Brennan endured a bruising confirmation battle in part over his own role as a senior CIA official when the agency began using water-boarding and other harsh interrogation methods. As director, he is faced with assembling the CIA’s response to a report by the Senate Intelligence Committee that documents abuses in the interrogation program and accuses the agency of misleading the White House and Congress over its effectiveness.

    To help navigate the sensitive decision on the clandestine service chief, Brennan has taken the unusual step of assembling a group of three former CIA officials to evaluate the candidates. Brennan announced the move in a previously undisclosed notice sent to CIA employees last week, officials said.

    “The director of the clandestine service has never been picked that way,” said a former senior U.S. intelligence official.

    The move has led to speculation that Brennan is seeking political cover for a decision made more difficult by the re-emergence of the interrogation controversy and the acting chief’s ties to that program.

    She “is highly experienced, smart and capable,” and giving her the job permanently “would be a home run from a diversity standpoint,” the former senior U.S. intelligence official said. “But she was also heavily involved in the interrogation program at the beginning and for the first couple of years.”

    The former official, who spoke on the condition of anonymity in discussing internal agency matters, said that Brennan “is obviously hesitating” at making the chief permanent.

    CIA officials disputed that characterization. “Given the importance of the position of the director of the National Clandestine Service, Director Brennan has asked a few highly respected former senior agency officers to review the candidates he’s considering for the job,” said Preston Golson, a CIA spokesman.

    The group’s members were identified as former senior officials John McLaughlin, Stephen Kappes and Mary Margaret Graham.

    Golson said Brennan will make the decision but added that “asking former senior agency officers to review the candidates will undoubtedly aid the selection process by making sure the director has the benefit of the additional perspectives from these highly experienced and respected intelligence officers.”

    Other candidates to run the clandestine service include a former station chief in Pakistan and the director of the CIA’s Counterterrorism Center . Neither person can be named because they are undercover.

    The service is the most storied part of the CIA. It sends spies overseas and carries out covert operations including running the agency’s ongoing drone campaign.

    The service has also long been perceived as a male bastion that has blocked the career paths of women even while female officers have ascended to the top posts in other divisions, including the directors of analysis and science.

    No woman has held the job of CIA director or led the clandestine service until now.

    The acting chief, who according to public records is in her 50s, is part of a generation that over the past two decades has pushed through many obstacles confronting women. The CIA refused to comment on her background, but former colleagues said she mastered several languages and served multiple tours in Moscow and other cities overseas. She also held senior posts at CIA headquarters.

    After the Sept. 11 attacks, she took on a senior assignment at the Counterterrorism Center, which put her in the chain of command on the interrogation and detention program, former officials said.

    In a fateful decision, the CIA set up a video camera at its secret prison in Thailand shortly after it opened in the months after the attacks. The agency recorded more than 90 tapes of often-brutal interrogations, footage that became increasingly worrisome to officials as the legal basis for the program began to crumble.

    When the head of the Counterterrorism Center, Jose Rodriguez, was promoted to head of the clandestine service in 2004, he took the female officer along as his chief of staff. According to former officials, the two repeatedly sought permission to have the tapes destroyed but were denied.

    In 2005, instructions to get rid of the recordings went out anyway. Former officials said the order carried just two names: Rodriguez and his chief of staff.

    The officer went on to hold top positions in London and New York before returning to Langley as deputy chief of the clandestine service. She became acting director on Feb. 28, when the previous head of the service, John Bennett, retired.

    The Justice Department has twice investigated the tapes’ destruction and brought no charges against anyone at the CIA.

    Former senior CIA officials said that outcome should clear any obstacles to the acting director getting the job permanently. But the seemingly dormant controversy over the interrogation program was revived by Brennan’s nomination and completion of a 6,000-page report from the Senate Intelligence Committee that accuses the agency of exaggerating the program’s results.

    The acting director is mentioned in several passages of the report, according to officials familiar with its contents, although they declined to provide more details.

    Amid calls for the public release of the report, Brennan faces having to devise a response that doesn’t alienate his workforce or the lawmakers who confirmed him for his job.

    By Greg Miller and Julie Tate, Published: March 27

    Find this story at 27 March 2013

    © The Washington Post Company

    Symbols of Bush-era Lawlessness Flourish Under Obama Guantanamo Bay prison plans expansion, while CIA official linked to torture cover-up gets promoted

    During the George W. Bush years, two of the most controversial elements of what was then called the Global War on Terror were the CIA’s rendition, detention and interrogation (RDI) program and the creation of the prison camps at Guantanamo Bay. The RDI program included waterboarding and other forms of torture, as well as so-called black site prisons where detainees were held incommunicado after being abducted by the CIA, and sometimes tortured by members of the host country’s security forces.

    Guantanamo Bay and the RDI program are both back in the news now, each for their own unsavory reasons, and their reemergence should be a reminder of how fully the Obama administration has embraced the logic underpinning the Bush regime’s response to 9/11. The Pentagon is now requesting nearly $200 million for Guantanamo Bay infrastructure upgrades, including $49 million for a new unit for “special” prisoners – likely the so-called high-value detainees currently housed at Camp 7, which include self-proclaimed 9/11 mastermind Khalid Sheikh Mohammed. The Pentagon’s reasoning is that neither the president nor Congress have any plans to close the prison anytime soon, so these repairs are necessary.

    This massive capital request comes as detainees are engaged in an increasingly dire hunger strike to protest their indefinite detention and to signal their lack of hope for transfer or release. Instead of closing Guantanamo Bay, the Obama administration stands poised to do the very opposite – pour more money into what is already the country’s most expensive prison.

    Meanwhile, participation in the CIA’s controversial RDI program has resulted for at least one person not in prosecution or professional sanctions, but rather in a promotion. For the last several weeks, an unnamed woman has been acting director of the National Clandestine Service – the part of the CIA that runs spying and covert operations, including the CIA’s drone program – as first reported by the Washington Post. This is the first time a woman has held that position. But this particular woman was a major figure in the RDI program, once ran a black site prison, and has been linked to the destruction of interrogation tapes that almost certainly documented the CIA’s use of torture.

    In 2005, the unnamed woman was chief of staff for Jose Rodriguez, then the acting director for the clandestine service. Rodriguez ordered the destruction of at least 92 tapes CIA agents made of the interrogations of two high-value detainees, Abu Zubayah and Abd Al-Rahim Al-Nashiri – at least some of which included waterboarding, which is widely regarded as a form of torture. The New York Times reported that the woman “and Jose were the two main drivers for years for getting the tapes destroyed” – an anonymous quote they attributed to a “former senior CIA officer.” In his memoir, Rodriguez said that the woman drafted the cable allowing the destruction of the tapes after meeting with CIA lawyers.

    by John Knefel
    APRIL 02, 2013

    Find this story at 2 April 2013

    Copyright ©2013 Rolling Stone

    Obama’s Visit to Israel Renews Effort to Free Spy

    JERUSALEM — When President Obama lands here on Wednesday, he may encounter some Israelis staging a hunger strike in support of Jonathan Jay Pollard, the American serving a life term in a North Carolina prison for spying for Israel.

    But the call for Mr. Pollard’s release will not be restricted to the strident, right-wing protests that have previously greeted American officials.

    Instead, it will come from Israel’s dovish president, Shimon Peres, and some of the country’s most respected public figures: Nobel Prize-winning scientists, retired generals, celebrated authors and intellectuals who have signed, along with more than 175,000 other citizens, an online petition appealing for clemency for Mr. Pollard.

    After years of being viewed as a somewhat marginal and divisive issue here, the campaign to free Mr. Pollard has become a mainstream crusade. Prominent Israelis are shedding the shame long felt over the affair, one of the most damaging, painful episodes in the annals of the American-Israeli relationship, and recasting it as a humanitarian issue ready to be resolved.

    The effort has gathered momentum, and many Israelis consider Mr. Obama’s visit to be the perfect opportunity for a gesture of good will.

    “I will sum it up in three words: enough is enough,” said Amnon Rubinstein, a law professor at the Interdisciplinary Center in Herzliya, Israel, and a former minister of education. “It is not humane to keep him in jail any longer.”

    A main factor behind the shift, Israelis supporting the campaign say, is the time that Mr. Pollard, 58, who is said to be ailing, has already served — 28 years. Advocates for his release say that is unprecedented among Americans convicted of spying for an ally.

    Another factor is the growing number of former officials in the United States who have called for clemency in recent years, including two former secretaries of state, George P. Shultz and Henry A. Kissinger, and a former director of the C.I.A., R. James Woolsey.

    Mr. Woolsey, who has firsthand knowledge of the case and strongly opposed clemency for Mr. Pollard during his tenure at the C.I.A., told Israel’s Army Radio last week that three other spies for friendly countries who were tried and convicted in the United States were each sentenced to less than five years in prison.

    Such voices have given the advocates for Mr. Pollard a new level of respectability and have allowed more Israelis to speak out.

    Amos Yadlin, the former director of Israeli military intelligence who now runs the Institute for National Security Studies in Tel Aviv, recently appeared on Israeli television to appeal for Mr. Pollard’s release.

    “Clemency for Pollard, given his health situation, is a humanitarian issue that we can put behind us as our two countries face extraordinary challenges in 2013,” Mr. Yadlin said.

    Yair Lapid, the new centrist force in Israeli politics, also signed the petition, as did Gilad Shalit, a former soldier who was held captive by Hamas militants for five years. Veteran campaigners have also changed their tone. After Israel refused to recognize Mr. Pollard as a “prisoner of Zion” in 2005, his wife, Esther, called the government’s attitude “petty and meanspirited.”

    Now, Mrs. Pollard is taking a more stately approach. Lawrence J. Korb, who was an assistant secretary of defense in the Reagan administration and is now pushing for clemency for Mr. Pollard, has accompanied Mrs. Pollard to meetings with Israeli leaders in recent years.

    Last week on Israeli television, Mrs. Pollard said that she and her husband felt “profound remorse and sorrow for what has happened” and begged Mr. Obama for mercy.

    Mr. Pollard, a former United States Navy intelligence analyst, began spying for Israel after he approached an Israeli officer in 1984. When he was discovered 18 months later, he sought refuge in the Israeli Embassy in Washington but was refused entry. He pleaded guilty and was sentenced to life in prison.

    At first, Israel disowned Mr. Pollard, saying that he was an actor in a rogue operation. But he was granted Israeli citizenship in 1995, and Prime Minister Benjamin Netanyahu, during his first term in office in the late 1990s, officially recognized Mr. Pollard as an Israeli agent.

    Many details of the case remain classified. But recently declassified documents from a 1987 C.I.A. damage assessment stated that Mr. Pollard’s instructions were primarily to provide Israel with American intelligence on Israel’s Arab adversaries and the military support they received from the Soviet Union, including information on Arab chemical and biological weapons.

    Mr. Pollard’s supporters note that he was not asked to spy on the United States per se.

    Mr. Pollard delivered suitcases full of copies of classified documents to the Israelis every two weeks. The copious disclosures posed multiple risks to American intelligence sources and methods, and to American foreign policy interests, the C.I.A. assessment stated.

    In the past, Mr. Netanyahu pushed for Mr. Pollard’s release to balance concessions he was being pressed to make in Middle East peace negotiations.

    But Sallai Meridor, Israel’s ambassador to the United States from 2006 to 2009, said that a “strong nucleus of people” within the United States defense establishment had adamantly opposed Mr. Pollard’s release, “exerting a lot of influence over others.”

    “None of us know all the details,” Mr. Meridor said. “But assuming he did something really bad, the very worst that you could anticipate in this realm, 28 years is more than enough.”

    March 17, 2013
    By ISABEL KERSHNER

    Find this story at 17 March 2013

    Copyright The New York Times Company

    US defence contractor accused of passing on nuclear secrets

    Ex-army officer Benjamin Pierce Bishop charged with communicating national defence information to Chinese woman

    Benjamin Pierce Bishop, who works for a defence contractor at US Pacific Command in Oahu, Hawaii, was arrested on Friday . Photograph: Alamy

    A US defence contractor in Hawaii has been arrested on charges of passing national military secrets, including classified information about nuclear weapons, to a Chinese woman with whom he was romantically involved, authorities have said.

    Benjamin Pierce Bishop, 59, a former US army officer who works as a civilian employee of a defence contractor at US Pacific Command in Oahu, was arrested on Friday and made his first appearance in federal court on Monday, said the US attorney’s office for the District of Hawaii.

    He is charged with one count of willfully communicating national defence information to a person not entitled to receive it and one count of unlawfully retaining documents related to national defence. If convicted Bishop faces a maximum of 20 years in prison.

    Bishop met the woman – a 27-year-old Chinese national referred to as Person 1 – in Hawaii during a conference on international military defence issues, according to the affidavit.

    He had allegedly been involved in a romantic relationship since June 2011 with the woman, who was living in the US on a visa and had no security clearance.

    From May 2011 until December 2012 he allegedly passed national defence secrets to her including classified information about nuclear weapons and the planned deployment of US strategic nuclear systems.

    Reuters
    guardian.co.uk, Tuesday 19 March 2013 07.13 GMT

    Find this story at 19 March 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    James Steele: America’s mystery man in Iraq – video

    A 15-month investigation by the Guardian and BBC Arabic reveals how retired US colonel James Steele, a veteran of American proxy wars in El Salvador and Nicaragua, played a key role in training and overseeing US-funded special police commandos who ran a network of torture centres in Iraq. Another special forces veteran, Colonel James Coffman, worked with Steele and reported directly to General David Petraeus, who had been sent into Iraq to organise the Iraqi security services

    • Watch a five-minute edited version of this film narrated by Dearbhla Molloy

    • Revealed: Pentagon’s link to Iraqi torture centres

    Find this story at 6 March 2013

    Revealed: Pentagon’s link to Iraqi torture centres

    Exclusive: General David Petraeus and ‘dirty wars’ veteran behind commando units implicated in detainee abuse

    The Pentagon sent a US veteran of the “dirty wars” in Central America to oversee sectarian police commando units in Iraq that set up secret detention and torture centres to get information from insurgents. These units conducted some of the worst acts of torture during the US occupation and accelerated the country’s descent into full-scale civil war.

    Colonel James Steele was a 58-year-old retired special forces veteran when he was nominated by Donald Rumsfeld to help organise the paramilitaries in an attempt to quell a Sunni insurgency, an investigation by the Guardian and BBC Arabic shows.

    After the Pentagon lifted a ban on Shia militias joining the security forces, the special police commando (SPC) membership was increasingly drawn from violent Shia groups such as the Badr brigades.

    A second special adviser, retired Colonel James H Coffman, worked alongside Steele in detention centres that were set up with millions of dollars of US funding.

    Coffman reported directly to General David Petraeus, sent to Iraq in June 2004 to organise and train the new Iraqi security forces. Steele, who was in Iraq from 2003 to 2005, and returned to the country in 2006, reported directly to Rumsfeld.

    The allegations, made by US and Iraqi witnesses in the Guardian/BBC documentary, implicate US advisers for the first time in the human rights abuses committed by the commandos. It is also the first time that Petraeus – who last November was forced to resign as director of the CIA after a sex scandal – has been linked through an adviser to this abuse.

    Coffman reported to Petraeus and described himself in an interview with the US military newspaper Stars and Stripes as Petraeus’s “eyes and ears out on the ground” in Iraq.

    “They worked hand in hand,” said General Muntadher al-Samari, who worked with Steele and Coffman for a year while the commandos were being set up. “I never saw them apart in the 40 or 50 times I saw them inside the detention centres. They knew everything that was going on there … the torture, the most horrible kinds of torture.”

    Additional Guardian reporting has confirmed more details of how the interrogation system worked. “Every single detention centre would have its own interrogation committee,” claimed Samari, talking for the first time in detail about the US role in the interrogation units.

    “Each one was made up of an intelligence officer and eight interrogators. This committee will use all means of torture to make the detainee confess like using electricity or hanging him upside down, pulling out their nails, and beating them on sensitive parts.”

    There is no evidence that Steele or Coffman tortured prisoners themselves, only that they were sometimes present in the detention centres where torture took place and were involved in the processing of thousands of detainees.

    The Guardian/BBC Arabic investigation was sparked by the release of classified US military logs on WikiLeaks that detailed hundreds of incidents where US soldiers came across tortured detainees in a network of detention centres run by the police commandos across Iraq. Private Bradley Manning, 25, is facing a prison sentence of up to 20 years after he pleaded guilty to leaking the documents.

    Samari claimed that torture was routine in the SPC-controlled detention centres. “I remember a 14-year-old who was tied to one of the library’s columns. And he was tied up, with his legs above his head. Tied up. His whole body was blue because of the impact of the cables with which he had been beaten.”

    Gilles Peress, a photographer, came across Steele when he was on assignment for the New York Times, visiting one of the commando centres in the same library, in Samarra. “We were in a room in the library interviewing Steele and I’m looking around I see blood everywhere.”

    The reporter Peter Maass was also there, working on the story with Peress. “And while this interview was going on with a Saudi jihadi with Jim Steele also in the room, there were these terrible screams, somebody shouting: ‘Allah, Allah, Allah!’ But it wasn’t kind of religious ecstasy or something like that, these were screams of pain and terror.”

    The pattern in Iraq provides an eerie parallel to the well-documented human rights abuses committed by US-advised and funded paramilitary squads in Central America in the 1980s. Steele was head of a US team of special military advisers that trained units of El Salvador’s security forces in counterinsurgency. Petraeus visited El Salvador in 1986 while Steele was there and became a major advocate of counterinsurgency methods.

    Steele has not responded to any questions from the Guardian and BBC Arabic about his role in El Salvador or Iraq. He has in the past denied any involvement in torture and said publicly he is “opposed to human rights abuses.” Coffman declined to comment.

    An official speaking for Petraeus said: “During the course of his years in Iraq, General Petraeus did learn of allegations of Iraqi forces torturing detainees. In each incident, he shared information immediately with the US military chain of command, the US ambassador in Baghdad … and the relevant Iraqi leaders.”

    The Guardian has learned that the SPC units’ involvement with torture entered the popular consciousness in Iraq when some of their victims were paraded in front of a TV audience on a programme called “Terrorism In The Hands of Justice.”

    SPC detention centres bought video cameras, funded by the US military, which they used to film detainees for the show. When the show began to outrage the Iraqi public, Samari remembers being in the home of General Adnan Thabit – head of the special commandos – when a call came from Petraeus’s office demanding that they stop showing tortured men on TV.

    “General Petraeus’s special translator, Sadi Othman, rang up to pass on a message from General Petraeus telling us not to show the prisoners on TV after they had been tortured,” said Samari. “Then 20 minutes later we got a call from the Iraqi ministry of interior telling us the same thing, that General Petraeus didn’t want the torture victims shown on TV.”

    Othman, who now lives in New York, confirmed that he made the phone call on behalf of Petraeus to the head of the SPC to ask him to stop showing the tortured prisoners. “But General Petraeus does not agree with torture,” he added. “To suggest he does support torture is horseshit.”

    Thabit is dismissive of the idea that the Americans he dealt with were unaware of what the commandos were doing. “Until I left, the Americans knew about everything I did; they knew what was going on in the interrogations and they knew the detainees. Even some of the intelligence about the detainees came to us from them – they are lying.”

    Just before Petraeus and Steele left Iraq in September 2005, Jabr al-Solagh was appointed as the new minister of the interior. Under Solagh, who was closely associated with the violent Badr Brigades militia, allegations of torture and brutality by the commandos soared. It was also widely believed that the units had evolved into death squads.

    The Guardian has learned that high-ranking Iraqis who worked with the US after the invasion warned Petraeus of the consequences of appointing Solagh but their pleas were ignored.

    The long-term impact of funding and arming this paramilitary force was to unleash a deadly sectarian militia that terrorised the Sunni community and helped germinate a civil war that claimed tens of thousands of lives. At the height of that sectarian conflict, 3,000 bodies a month were strewn on the streets of Iraq.
    CV: James Steele

    Vietnam

    Jim Steele’s first experience of war was in Vietnam, where from 1965 to 1975 US combat units were deployed against the communist North Vietnamese government and Viet Cong. 58,000 Americans were killed, dealing a blow to the nation’s self-esteem and leading to a change in military thinking for subsequent conflicts.

    El Salvador

    A 1979 military coup plunged the smallest country in Central America into civil war and drew in US training and funding on the side of the rightwing government. From 1984 to 1986 Steele – a “counterinsurgency specialist” – was head of the US MilGroup of US special forces advisers to frontline battalions of the Salvadorean military, which developed a fearsome international reputation for its death-squad activities. Prof Terry Karl, an expert at Stanford University on El Salvador’s civil war, said that Steele’s main aim was to shift the fight from so-called total war, which then meant the indiscriminate murder of thousands of civilians, to a more “discriminate” approach. One of his tasks was to put more emphasis on “human intelligence” and interrogation.

    Nicaragua

    Mona Mahmood, Maggie O’Kane, Chavala Madlena and Teresa Smith
    The Guardian, Wednesday 6 March 2013 20.04 GMT

    Find this story at 6 March 2013
    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Exclusive: Court Docs Reveal Blackwater’s Secret CIA Past

    It was the U.S. military’s most notorious security contractor—but it may also have been a virtual extension of the CIA. Eli Lake reports.

    Last month a three-year-long federal prosecution of Blackwater collapsed. The government’s 15-felony indictment—on such charges as conspiring to hide purchases of automatic rifles and other weapons from the Bureau of Alcohol, Tobacco, Firearms, and Explosives—could have led to years of jail time for Blackwater personnel. In the end, however, the government got only misdemeanor guilty pleas by two former executives, each of whom were sentenced to four months of house arrest, three years’ probation, and a fine of $5,000. Prosecutors dropped charges against three other executives named in the suit and abandoned the felony charges altogether.

    via office of the King of Jordan

    But the most noteworthy thing about the largely failed prosecution wasn’t the outcome. It was the tens of thousands of pages of documents—some declassified—that the litigation left in its wake. These documents illuminate Blackwater’s defense strategy—and it’s a fascinating one: to defeat the charges it was facing, Blackwater built a case not only that it worked with the CIA—which was already widely known—but that it was in many ways an extension of the agency itself.

    Founded in 1997 by Erik Prince, heir to an auto-parts family fortune, Blackwater had proved especially useful to the CIA in the early 2000s. “You have to remember where the CIA was after 9/11,” says retired Congressman Pete Hoekstra, who served as the Republican chairman of the House Permanent Select Committee on Intelligence from 2004 to 2006 and later as the ranking member of the committee. “They were gutted in the 1990s. They were sending raw recruits into Afghanistan and other dangerous places. They were looking for skills and capabilities, and they had to go to outside contractors like Blackwater to make sure they could accomplish their mission.”

    But according to the documents Blackwater submitted in its defense—as well as an email exchange I had recently with Prince—the contractor’s relationship with the CIA was far deeper than most observers thought. “Blackwater’s work with the CIA began when we provided specialized instructors and facilities that the Agency lacked,” Prince told me recently, in response to written questions. “In the years that followed, the company became a virtual extension of the CIA because we were asked time and again to carry out dangerous missions, which the Agency either could not or would not do in-house.”

    A prime example of the close relationship appears to have unfolded on March 19, 2005. On that day, Prince and senior CIA officers joined King Abdullah of Jordan and his brothers on a trip to Blackwater headquarters in Moyock, North Carolina, according to lawyers for the company and former Blackwater officials. After traveling by private jet from Washington to the compound, Abdullah (a former Jordanian special-forces officer) and Prince (a former Navy SEAL) participated in a simulated ambush, drove vehicles on a high-speed racetrack, and raided one of the compound’s “shoot houses,” a specially built facility used to train warriors in close-quarters combat with live ammo, Prince recalls.

    At the end of the day, company executives presented the king with two gifts: a modified Bushmaster AR-15 rifle and a Remington shotgun, both engraved with the Blackwater logo. They also presented three Blackwater-engraved Glock pistols to Abdullah’s brothers. According to Prince, the CIA asked Blackwater to give the guns to Abdullah “when people at the agency had forgotten to get gifts for him.”

    Three years later, the ATF raided the Moyock compound. In itself, this wasn’t unusual; the ATF had been conducting routine inspections of the place since 2005, when Blackwater informed the government that two of its employees had stolen guns and sold them on the black market. Typically, agents would show up in street clothes, recalled Prince. “They knew our people and our processes.”

    But the 2008 visit, according to Prince, was different. “ATF agents had guns drawn and wore tactical jackets festooned with the initials ATF. It was a cartoonish show of force,” he said. (Earl Woodham, a spokesman for the Charlotte field division of the ATF, disputes this characterization. “This was the execution of a federal search warrant that requires they be identified with the federal agency,” he says. “They had their firearms covered to execute a federal search warrant. To characterize this as anything other than a low-key execution of a federal search warrant is inaccurate.”)

    During the raid, the ATF seized 17 Romanian AK-47s and 17 Bushmaster AR-13 rifles the bureau claimed were purchased illegally through the sheriff’s office in Camden County, North Carolina. It also alleged that Blackwater illegally shortened the barrels of rifles and then exported them to other countries in violation of federal gun laws. Meanwhile, in the process of trying to account for Blackwater’s guns, the ATF discovered that the rifles and pistols presented in 2005 to King Abdullah and his brothers were registered to Blackwater employees. Prosecutors would subsequently allege that Gary Jackson—the former president of Blackwater and one of the two people who would eventually plead guilty to a misdemeanor—had instructed employees to falsely claim on ATF forms that the guns were their own personal property and not in the possession of Jordanian royalty.

    In all of these instances—the purchase of the rifles through the Camden County sheriff, the shipment of the guns to other countries, and the gifts to Abdullah—Blackwater argued that it was acting on behalf of the U.S. government and the CIA. All of these arguments, obviously, were very much in Blackwater’s legal interest. That said, it provided the court with classified emails, memoranda, contracts, and photos. It also obtained sealed depositions from top CIA executives from the Directorate of Operations, testifying that Blackwater provided training and weapons for agency operations. (A CIA spokesman declined to comment for this story.)

    One document submitted by the defense names Jose Rodriguez, the former CIA chief of the Directorate of Operations, and Buzzy Krongard, the agency’s former executive director, as among those CIA officers who had direct knowledge of Blackwater’s activities, in a section that is still partially redacted. This document is the closest Blackwater has come to acknowledging that Prince himself was a CIA asset, something first reported in 2010 by Vanity Fair. One of the names on the list of CIA officers with knowledge of Blackwater’s work in the document is “Erik P”—with the remaining letters whited out.

    This document made Blackwater’s defense clear: “the CIA routinely used Blackwater in missions throughout the world,” it said. “These efforts were made under written and unwritten contracts and through informal requests. On many occasions the CIA paid Blackwater nothing for its assistance. Blackwater also employed CIA officers and agents, and provided cover to CIA agents and officers operating in covert and clandestine assignments. In many respects, Blackwater, or at least portions of Blackwater, was an extension of the CIA.”

    When I asked Prince why Blackwater would often work for free, he responded, “I agreed to provide some services gratis because, in the wake of 9/11, I felt it my patriotic duty. I knew that I had the tools and resources to help my country.”

    Moreover, according to still-sealed testimony described to The Daily Beast, the agency had its own secure telephone line and a facility for handling classified information within Blackwater’s North Carolina headquarters. CIA officers trained there and used an area—fully shielded from view inside the rest of the Blackwater compound by 20-foot berms—to coordinate operations.

    Sara D. Davis/AP

    In the wake of the major charges being dropped, the U.S. attorney who prosecuted the case against Blackwater, Thomas Walker, told me that it would be wrong to dismiss the prosecution as a waste of time. “The company looks completely different now than before the investigation,” he said. “For example, in 2009, Erik Prince was the sole owner. This company now has a governing board that is accountable.”

    In 2010 Prince sold Blackwater, which is now known as Academi, for an estimated $200 million. Prince retains control of numerous companies that were part of Blackwater before he sold it, but he told me that he had “ceased providing any services” to the U.S. government.

    Walker would not discuss Blackwater’s relationship with the CIA. But he did say the defense that the company was acting for the government did not excuse any violations of federal law. “Our evidence showed there was a mentality at the company that they considered themselves above the law,” Walker said. “That is a slippery slope. There came a time when there had to be accountability at Blackwater.”

    by Eli Lake Mar 14, 2013 4:45 AM EDT

    Find this story at 14 March 2013

    © 2013 The Newsweek/Daily Beast Company LLC

    overheid werkt(e) met besmet beveiligingsbedrijf

    Ondanks de voorkennis omtrent gruwelijke misdragingen door veiligheidsagenten van Blackwater, ging het KLPD en de AIVD in 2009 voor een training van (geheim) agenten in zee met dit obscure Amerikaanse particuliere beveiligingsbedrijf.

    “Op 17 november 2009 vertrok ik samen met de majoors Edwin en Mark naar Afghanistan. Wij maken deel uit van de nieuwe missie NTM-A” (Nato Training Mission – Afghanistan), schrijft Kees Poelma (Kmar) op zijn weblog.

    “In mijn vorige functie had ik hele goede contacten opgebouwd met mensen van XE-Services (beter bekend als het voormalige Blackwater)”, zo vervolgt Poelma zijn relaas. “Misschien is ‘beter’ niet het juiste woord, maar daarvoor moet je Blackwater maar eens googelen. Sinds Irak zijn ze namelijk zodanig ‘verstoken van gunsten’ dat ze hun naam maar eens moesten veranderen. XE leidt de Afghan Border Police op en dat doen ze op vier verschillende trainingsites in Afghanistan.”

    Poelma werd uitgenodigd door XE-Services om hun trainingsites te bekijken. Het bedrijf heeft haar naam ondertussen opnieuw gewijzigd in Academi. Zoals Poelma opmerkt is het bedrijf besmet. Het is dan ook opmerkelijk dat het Nederlandse leger en politie ‘hele goede contacten’ onderhouden met de ‘private contractor’.

    Contract

    Op 24 februari 2010 verklaarde de democratische voorzitter Carl Levin van de Armed Services Committee van de Amerikaanse Senaat dat de PEO STRI (Program Executive Office for Simulation, Training and Instrumentation) van het Amerikaanse leger het volgende: “relied on a Dutch officer to act as a Technical Officer Representative to oversee the contract.”

    Het contract waar Levin op duidt, betreft een afspraak met Paravant LLC, een dochteronderneming van XE-Services, voor de training van de Afghan National Army Troops. De hoorzitting vond plaats in verband met diefstal, moord en andere vergrijpen door medewerkers van Paravant in Afghanistan.

    De Nederlandse officier zou werkzaam zijn geweest op het CSTC-A, de plaats waar de trainingen van de Afghaanse politie en het leger worden gecoördineerd. Welke rol de Nederlandse officier bij CSTC-A heeft gespeeld in het verwerven van het contract, en welke relatie de officier met Paravant/Blackwater had, is onduidelijk.

    Blackwater werd in 1997 opgericht door oud Navy Seals man Erik Prince. Voorafgaande de oorlogen in Afghanistan en vooral Irak deed het bedrijf voornamelijk kruimelwerk. De invasie in Irak van 20 maart 2003 betekende een flinke boost voor het bedrijf. De private beveiligingsbedrijven die zowel persoons- als transportbeveiliging uitvoeren, misdroegen zich echter op grote schaal.

    De onvrede onder De Irakese bevolking bouwde zich na de invasie in sneltreinvaart op en kwam tot uitbarsting bij de aanslag op vier medewerkers van Blackwater in Fallujah, maart 2004. De wereld beschuldigde meteen Al Qaeda of de rebellen van de lynchpartij, maar de aanslag was een reactie op het opereren van de ‘private contractors’.

    Gewelddadig optreden

    Hoe de medewerkers van Blackwater zich bijvoorbeeld gedroegen in Irak toont Harper’s Magazine met de publicatie The Warrior Class, geschreven door Charles Glass (april 2012). Het artikel is eigenlijk gebaseerd op een verzameling video’s die Glass van medewerkers van Blackwater heeft gekregen http://harpers.org/archive/2012/04/hbc-90008515. Op de beelden is te zien dat mensen worden overreden, auto’s van de weg worden gereden, er willekeurig wordt geschoten op voorbijgangers en auto’s, dat er wordt gescholden en dat de schending van alle basale rechten van Irakezen met voeten worden getreden.

    Veel beelden waren er nog niet voorhanden, maar de verhalen van schandalig optreden wel degelijk. Februari 2005 schoot een beveiligingsteam van Blackwater machinegeweren leeg op een auto in Bagdad. Dit incident kwam naar buiten omdat Blackwater op dat moment een lid van het Amerikaanse State Department beveiligde. Veel incidenten komen niet aan het licht omdat medewerkers van Blackwater na een incident gewoon doorrijden, zoals de videobeelden laten zien.

    De wetteloosheid van medewerkers van Blackwater vindt zijn dieptepunt op 16 september 2007 op het Nisour Square in Bagdad. Een beveiliger van het bedrijf schoot een bestuurder van een rijdende auto dood, die tengevolge niet tot stilstand kwam. Wat volgde was een bloedbad, waarbij de medewerkers van Blackwater op alles schoten wat bewoog. Bij deze slachting kwamen 17 mensen om het leven.

    Het bedrijf ontkende dat zij verantwoordelijk was voor de moordpartij en dat de beveiligingsagenten slechts reageerden op schoten die op hen afgevuurd werden. De verdachten werden uiteindelijk Irak uit gesmokkeld. Naar aanleiding van de schietpartij op het Nisour Square schreef Jeremy Scahill Blackwater: The Rise of the World’s Most Powerful Mercenary Army (2007), een boek dat de aard, omvang en gedrag van het bedrijf uit de doeken doet.

    Goede contacten

    Kees Poelma van de Koninklijke Marechaussee beschrijft op zijn weblog de goede contacten die hij onderhoudt met ‘mensen van XE-Services’. Over welke contacten heeft hij het? Op 12 januari 2005 sluiten de ‘Dutch Special Forces’ en Blackwater USA een contract voor het gebruik van het Blackwater Training Center, tegenwoordig bekent onder de naam United States Training Center.

    Minister Rosenthal beantwoordt op 14 december 2010 vragen van de Kamerleden Van Bommel en Van Dijk ten aanzien van Blackwater. “Het Korps Commando Troepen heeft van 10 t/m 23 februari 2005 met 60 personen getraind op het Blackwater trainingscomplex in North Carolina. Gedurende deze trainingsperiode is alleen gebruik gemaakt van faciliteiten. Trainingen zijn uitsluitend door eigen instructeurs verzorgd.”

    Het contract vermeldt tevens: ‘Blackwater Training Center welcomes the opportunity to provide range rental for your continuing firearms training.’ Hoewel het Korps Commando Troepen zijn eigen instructeurs heeft meegenomen volgens de minister, wordt in proposal #226 wel een ‘number of personnel 57’ opgevoerd. Of dit slaat op de 60 mariniers is onduidelijk. Waarschijnlijk wel, maar het blijft onduidelijk of Blackwater geen instructeurs heeft geleverd.

    De folder van Blackwater Training Center prijst haar eigen instructeurs op allerlei manieren aan. ‘On over 6000 acres of private land, we have trained and hosted over 50.000 Law Enforcement, Military and civilian personnel. […] Our instructors are ranked the best in the world and our facilities are second to none.’

    De minister zegt dat de “trainingen uitsluitend door eigen instructeurs zijn verzorgd”, maar de aantallen, ook die voor de lunch en het diner, roepen vragen op over de aanwezigheid van Blackwater-instructeurs. ‘Lunch for 75 persons for 11 days and dinner for 75 persons for 11 days.’

    De Sales Coordinator van Blackwater voegt daar op 12 januari 2005 nog aan toe dat ’the houses are not intended to practice charge calculations. They are designed to practice techniques involved in breaching placement of charges, placement of shooters in relation to the charge and command and control and detonation the charge.’ Het schrijven van 12 januari 2005 lijkt op een set huisregels van Blackwater.

    Voorkennis

    De training vond in februari 2005 plaats, dezelfde maand waarin Blackwater-medewerkers een willekeurige auto in Bagdad onder vuur namen, waarvan het lot van de inzittenden onduidelijk is. Of het ministerie van Defensie op de hoogte was van dit incident valt te betwijfelen. In een voorblad zonder datum met de titel contract Blackwater wordt vermeld dat ‘het gerucht dat de firma Blackwater onder de USNAVY valt en dat het schietterrein van de USNAVY is wil ik bij deze ook heel snel ontkrachten.’

    Het voorblad is opgesteld door de eerste verwerver, een kapitein van de C-Logistiek Brigade/Divisie Logistiek Commando uit Apeldoorn. Opvallend aan het voorblad is de expliciete vermelding dat er geen gebruik wordt gemaakt van instructeurs van de firma Blackwater. Dit wordt vermeld onder het kopje ‘marktverkenning’ dat begint met de zin ‘er is geen concurrentie mogelijk, het betreft hier een monopolist. Het betreft hier een privé onderneming op privéterrein. Wel dienen er vergunningen aangevraagd te worden, indien er gebruik wordt gemaakt van instructeurs van de firma Blackwater.’

    De verwarring van de eerste verwerver over de relatie tussen Blackwater en de USNAVY viel misschien in 2005 nog te begrijpen, na het Nisour Square incident in september 2007 was dat niet langer mogelijk. De status en de rol van Blackwater was toen duidelijk. De kritiek op het bedrijf ook. Het is dan ook onbegrijpelijk dat ruim een jaar later er contact wordt opgenomen met Total Intelligence Solutions LLC voor het bestellen van een Mirror Image Training Program.

    Daar tegenover kan worden opgemerkt dat de Department of Special Interventions (DSI) van het KLPD niet wist dat Total Intelligence Solutions LLC onderdeel uitmaakte van de Prince Group van Erik Prince, de toenmalige CEO van Blackwater, maar het adres in Arlington in de Verenigde Staten zal toch op zijn minst enkele bellen hebben doen rinkelen? Nu staat de DSI niet bekend om haar doortastendheid – zie de wijze waarop een belwinkel in Rotterdam op kerstavond 2010 werd vernield door leden van het team – maar enige background check van bedrijven die worden ingehuurd zou er toch moeten zijn.

    Duidelijkheid

    De Washington Post besteedde op 3 november 2007, twee maanden na de slachting op Nisour Square, een artikel aan Total Intelligence Solutions (TIS) onder de kop ‘Blackwaters Owner Has Spies for Hire’. Het is dus onwaarschijnlijk dat het de overheid is ontgaan dat er een contract met Blackwater werd afgesloten. En hoe staat een contract met Blackwater in verhouding met het principe van duurzaam inkopen dat de overheid hanteert?

    In de overeenkomst met de KLPD die Total Intelligence Solutions LLC op 17 november 2008 opstuurt, worden dan ook naast TIS de bedrijven EP Investments LLC, Terrorism Research Center INC en Blackwater Lodge and Training Center INC vermeld. Het lijken aparte bedrijven, maar vallen allemaal onder Blackwater, later XE Services genoemd, zoals blijkt uit amendment no 1 van 8 juni 2009. In dat amendment is de naam van de Blackwater Lodge ondertussen ook gewijzigd in U.S. Training Center. Al met al was het duidelijk dat Blackwater in het spel was.

    Ook de status van het bedrijf was duidelijk. Op 7 november 2007 beantwoordden de ministers van Defensie en Buitenlandse Zaken, Middelkoop en Verhagen, vragen van kamerlid Pechtold. De ministers verzekeren dat ‘Nederland nooit Blackwater in dienst heeft gehad. De ministeries van Buitenlandse Zaken en Defensie werken wel samen met andere particuliere beveiligingsbedrijven’.

    In het antwoord van de regering komt het huren van de trainingsfaciliteiten van Blackwater door het Korps Commando Troepen niet aan de orde. Opvallend omdat voor de minister van Defensie toch duidelijk moet zijn geweest hoe gevoelig de zaak lag. Pechtold onderstreepte nota bene de onrust door de slachting op Nisour Square.

    Een maand later beschreef de Adviesraad Internationale Vraagstukken in het rapport ‘De inhuur van private militaire bedrijven’ de zorgen over Blackwater. ‘De affaire Blackwater heeft de grote risico’s die aan de inzet van PMC’s zijn verbonden nog eens onderstreept. Het roekeloze en onverantwoordelijke optreden van sommige PMC’s, vooral de veiligheidsbedrijven onder hen, die in Irak immuniteit voor de lokale rechtsmacht genieten, brengt het winnen van de hearts and minds en daarmee zelfs van de hele counter-insurgency in gevaar.’

    Het 59ste advies gaat verder door te stellen dat ‘het in opspraak gekomen Amerikaanse bedrijf Blackwater een negatieve uitstraling op de hele bedrijfstak heeft.’ Extra voorzichtig zijn dus bij het inhuren of gebruiken van diensten van het bedrijf.

    Mirror Image Training

    Een jaar later sluiten de Dienst Speciale interventies (DSI) en Blackwater een overeenkomst voor een Mirror Image Training, verzorgd door het Terrorism Research Center (TRC). TRC maakt deel uit van Total Intel, dat op haar beurt sinds februari 2007 weer onderdeel uitmaakt van Blackwater sinds februari 2007. Voorafgaande de overeenkomst had Blackater al een strategisch partnership met het centrum.

    De Mirror Image Training was er op gericht om in de huid van de terrorist te kruipen. ‘Hierdoor is de deelnemer in staat om zichzelf ook daadwerkelijk als terrorist te zien en door diens ogen de zwakke punten binnen de eigen werkomgeving te herkennen en te begrijpen, die men zelf vaak over het hoofd ziet’, vermeldt de doelstelling van het reisverslag Mirror Image Training in Moyock, NC.

    De laatste zin van de doelstelling is veelzeggend, gelet op het gedrag van Blackwater-medewerkers, maar ook dat van de DSI-medewerkers in gedachten: ‘Met deze inzichten op zak zijn deelnemers na het afronden van de training beter in staat te anticiperen, te voorkomen en te reageren op terroristische dreigingen.’

    Om een beeld te krijgen waar de Nederlandse commando’s en leden van de KLPD en AIVD hun training hebben gekregen, hier een beschrijving van Moyock door Nathan Lodge. In zijn artikel Blackwater: Lawyers, guns and Money van 6 april 2007 probeert Lodge de omvang van het terrein te omschrijven. http://www.wired.com/dangerroom/2007/04/inside_the_bell/

    Lodge: ‘It’s hard to understate how massive the Moyock facility is. The place has 34 shooting ranges, three driving tracks and an airfield. It boasts several ‘shoot houses’ (for indoor shooting drills), a maritime training facility (for hostile boarding practice) and a breaching facility (for breaking down doors), as well as a full armory. It’s like a military base – without the golf course.’

    Mindset

    De cursus voor de leden van de KLPD gaat over het creëren van een ‘mindset’ waarbij ‘de rol van de radicale islam van groot belang is. Dit komt onder andere naar voren tijdens de dagelijkse gebeden en de lessen over de geschiedenis van de islam. Daarnaast wordt ook inzicht geboden in vormen van westers terrorisme, waaronder de IRA.’

    De mindset kan vertaald worden naar de ‘situatie in tal van regio’s, waaronder Afghanistan, Irak, Colombia, Gaza en de West Bank evenals stedelijke gebieden en verschillende terroristische groeperingen.’ De mindset wordt vooral bepaald door ‘contraterroristische technieken gebaseerd op Britse en Israëlische ervaringen’, vermeldt het reisverslag van de training.

    Nu kan het zo zijn dat de Israëliërs veel ervaring hebben met de oorlog in het Midden-Oosten, maar tegelijkertijd roepen hun acties ook veel vragen op. De laatste operatie in de Gaza, Cast Lead, is door verschillende zijden veroordeeld. Ook de Europese Unie is zeer kritisch over de wijze waarop de Israëliërs regelmatig huishouden in de bezette gebieden.

    De Britten zijn overigens ook weer niet het beste voorbeeld van omgang met de opstand in Noord-Ierland. De IRA pleegde regelmatig aanslagen, maar de Britten hebben in de loop van de strijd regelmatig zelf vele slachtoffers gemaakt door infiltratie, informanten, valse beschuldigingen en andere schendingen van mensenrechten.

    Hoewel de training misschien interessant kan zijn, moet een land dat vaak zijn vingertje opsteekt over de mensenrechten in andere landen toch grote zorgvuldigheid in acht nemen als het gaat om samenwerking met bedrijven waar een zweem omheen hangt van strafbare feiten en onoorbaar optreden.

    Laten we daarom nog even een andere mindset van het bedrijf Blackwater bekijken. Naast het wild om zich heen schieten, heeft het bedrijf ook een nogal verwrongen beeld van recht en orde. Het programma Countdown van MSNBC besteedt op 6 augustus 2009 aandacht aan het gebruik van hoeren door leden van Blackwater. http://www.rawstory.com/rawreplay/2009/08/blackwater-provided-child-prostitutes-to-contractors-lawsuit/

    ‘Keith Olbermann (van MSNBC) quoted on Thursday from the employees sworn declarations that Blackwater was guilty of using child prostitutes at its compound in Baghdads fortified Green Zone. The declarations describe Blackwater as having young girls provide oral sex to Enterprise members in the Blackwater Man Camp in exchange for one American dollar.’

    Nu is het zo dat het programma van MSNBC vier maanden na de training van de DSI werd uitgezonden, maar de mindset is wel degelijk belangrijk. Verantwoordelijken binnen de KLPD en als laatste verantwoordelijke, de minister van Veiligheid en Justitie, hadden gezien de status van het bedrijf vraagtekens moeten zetten bij een training door Blackwater.

    Vraagtekens die al in de reactie van het ministerie van Defensie en Buitenlandse Zaken expliciet worden gezet in een reactie op het advies ‘Inhuur civiele dienstverleners in operatiegebieden’. Adviesraad Internationale Vraagstukken in april 2008. ‘De groei van de inzet van particuliere beveiligingsbedrijven in operatiegebieden is niet onomstreden. De recente ophef over het optreden van de firma Blackwater in Irak is aanleiding geweest voor vele kritische vragen.’

    Lofuitingen

    Terug naar de training. De DSI besloot om zich door personeel van Blackwater te laten opleiden. Waarschijnlijk werden ze op positieve wijze beïnvloed door het artikel van David Crane uit oktober 2003. Zijn verhaal ‘Blackwater Training Center Tactical Training For Professionals and Civilians’ in Defense Review is één grote loftuiting op de kwaliteiten van het bedrijf.

    Rick Skwiot doet het in de PortFolio Weekly dunnetjes over onder de titel ‘On the Firing Line The Blackwater Training Center’. ‘The Blackwater Training Center in Moyock teaches soldiers, cops and ordinary citizens how to keep their edge in an increasingly dangerous world.’ En: ‘The most dangerous creatures lurking in The Great Dismal Swamp that spans the Virginia-North Carolina line are not the 600-pound black bears, rattlesnakes or water moccasins. Rather, they’re the men and women—soldiers, sailors, SWAT teams and civilians—taking aim with live ammo in the 5,200-acre Blackwater Training Center.’

    De training van de DSI vond plaats van 27 maart 2009 tot en met 6 april 2009. Niet alleen de DSI doet aan de training mee. Volgens de minister gaat het om vijftien medewerkers van de KLPD. De dienstreizen formulieren die openbaar zijn gemaakt, vermelden vier leden van de DSI, twee leden van de DKDB, twee leden van de DSRT, twee leden van de DNR van de verschillende KLPD onderdelen en twee leden van de AIVD, de inlichtingendienst. Het totaal komt op twaalf.

    Ook op het bestel-aanvraagformulier is sprake van twaalf tickets naar Norfolk in de Verenigde Staten, voor de overnachtingen betreft het twaalf personen. De DSI overnacht het langst, tien dagen, de medewerkers van de AIVD het kortst, twee dagen. Bij de vouchers voor de overnachtingen is het aantal van 27 maart 2009 tot en met 29 maart 2009 ook twaalf. De voucher-nummers van de overige overnachtingen zijn niet vrijgegeven.

    De eerste trainingsdag van 27 maart werd besteed aan het ontwikkelen van het concept mirror image training. ‘Course to be conducted should be designed to replicate terrorism recruitment training, techniques and operational methodology in order to better prepare students to fight the War on Terror. Course of instruction should look towards placing students into simulated terrorist cells in order to receive insight into the mindset and rationale of the terrorist through hands on experience. Cells shall be comprised of approximately eight students per cell with an assigned instructor per cell. Instructors shall have strong backgrounds in unconventional warfare. For instructions and presentations addressing terrorism, contractor shall provide personnel who are high level experts in their field. (CIA, FBI, Department of State, etc…)’, schrijft agent Yvonne C. Frederico over een training van the Naval Special Warfare Group One in juni 2008.

    William J. Henry van het National Guard Bureau is nog explicieter: ‘This training is an intensive, one week classroom and field training program, designed to realistically simulate terrorist recruiting, training techniques and operational tactics. This is a total-immersion course that places the student inside a terrorist organization in order to better teach him how to think and operate like a terrorist. This course includes lodging and meals tailored to simulate living as a terrorist cell.’

    Celadviseur

    De training van de DSI zal er niet zoveel van afwijken omdat de Nederlanders het terrein deelden met Belgische, Amerikaanse en Canadese militairen, politieambtenaren en leden van inlichtingendiensten. Het enige dat de minister van Veiligheid en Justitie los wil laten over die eerste dag is dat ‘na de les de cellen een celadviseur toegewezen krijgen en een operatie werd voorbereid.’

    Op maandagochtend 28 maart werd de operatie uitgevoerd na ‘het ochtendgebed, gevolgd door een les over de geschiedenis van de islam en in het bijzonder de scheiding tussen de sjiieten en soennieten.’ Over de operatie laat de minister angstvallig niets los, maar wel over de lunch ‘bestaande uit een plat broodje, een plak kaas, een bakje humus, fruit en thee of water.’ Maandag stond voor de rest in het teken van HUMINT ‘human intelligence’, informanten en infiltranten en werd ‘de mindset binnen een terroristische cel’ besproken waar ‘bij nieuwe leden van een cel op wordt gelet.’

    Evan Wright beschrijft in ‘Camp Jihad, A ragtag army of cops, soldiers, and G.I. Joe wannabes play terrorist for a week in a counterintuitive counterterrorism program’ (New York Magazine, 21 mei 2005) om wat voor operaties het zou kunnen gaan. De gespeelde cel waar Wright deel van uitmaakte moet een ongelovige vrouw ontvoeren. ‘When I spot the approaching SUVs, I frantically signal LDR. Gunshots start to crackle. A Marine in our cell charges the lead SUV, screaming, Allah akbar!’

    De cel van Wright slaagde in haar opzet, misschien ook de Nederlandse DSI/AIVD terroristencel, want dinsdagochtend ‘volgde een presentatie over middelen tot overwinning.’ De rest van de dag stond in het teken van interne veiligheid en de financiering van de terreur. Na het avondeten kwam een gastspreker een lezing houden.

    De Nederlanders hebben de ontvoering ook nagespeeld, want laat die avond werd er gesproken over losgeld. ‘De groepering die hem had ontvoerd, wilde losgeld van de […] Geld was ook het motief van deze ontvoering. Er was geen sprake van een religieus uitgangspunt’, vermeldt pagina 8 van het dossier dat de minister van Veiligheid en Justitie openbaar heeft gemaakt.

    Woensdag 1 april is ‘net als voorgaande dagen’, vermeldt het verslag. ‘Ochtendgebed, les in de Arabische taal en …’ iets dat geheim blijft. Wright die de training heeft meegemaakt, beschrijft in zijn artikel Camp Jihad dat deze leek op een ‘Renaissance Faire’, zoals de Elf Fantasy Fair in slot Haarzuilens bij Utrecht.

    Wright: ‘Whether a week spent wearing Arab head garb and shooting AK-47s will actually help cops and soldiers plumb the complexities of our enemies’ hearts and minds is an open question. […] But when I first witness my fellow students donning their scarves, some of them shouting, for comic effect, ‘Praise Allah!’ in their best Ali G accents, I momentarily feel as if I’ve entered a weird, terrorist-camp version of a suburban Renaissance Faire.’

    Andrew Garfield

    De training had echter niet alleen een speels karakter, er moest de deelnemers ook wat bijgebracht worden. Naast de lezing op dinsdagavond volgde woensdagmiddag een gedragswetenschapper die een lezing hield over de ‘mindset in het Midden-Oosten’. De minister schrijft, in antwoord op een bezwaarprocedure in het kader van de Wet Openbaarheid van Bestuur (Wob), dat de naam van deze wetenschapper niet meer te achterhalen valt.

    Gedurende de training waar Wright echter aan deelnam, kwam Andrew Garfield, een oud Britse inlichtingenfunctionaris, als spreker opdraven die in het kader van de Terrorist Fair leuk meespeelde in de creatie van het cel-denken. ‘Our Jihad is succeeding beyond our wildest expectations. Look at how the Americans are blundering around in Iraq, filling our ranks with new recruits.’

    Garfield duidde in zijn rol als ’terroristen-expert’ op het lompe gedrag van de Amerikanen in Afghanistan, Irak en elders. De boodschap van Garfield bij de Mirror Image training was enigszins surrealistisch. Zo zei hij tegen Wright dat ‘killing terrorists or insurgents will not kill the movement.’ Waarom is de training er dan opgericht om terroristen nader te begrijpen om hen te bestrijden?

    Gezien het respectloze gedrag van Blackwater-medewerkers in Irak en Afghanistan, waarbij slachtoffers vielen, is de grote vraag of het bedrijf überhaupt wel in staat is om de ‘mindset in het Midden-Oosten’ te beschrijven. Het kan al niet eens normaal omgaan met burgers, zoals blijkt uit de films die Harper’s Magazine online heeft geplaatst.

    Het feit dat het bedrijf in de afgelopen jaren talrijke naamsveranderingen heeft ondergaan – Blackwater, Xe Services, Paravant LLC, Greystone Limited, XPG, Raven, Constellation, Total Intelligence Solutions, EP Investments, US Training Center, GSD manufacturing, Presidenial Airlines, Select PTC, Academi, R2, Reflex Responses etc. – duidt er tevens op dat het haar naam niet wil verbeteren, maar de aandacht wil afleiden van de vele mensenrechtenschendingen en andere vergrijpen van haar medewerkers. De mindset van Blackwater is het probleem, en daarmee de Mirror Image training.

    De een na laatste dag van de training stond in het teken van de finale. Woensdagavond werd het ‘plan voorgelegd aan een militaire raad’ en donderdag was ‘het de bedoeling om het getrainde in wedstrijdvorm in praktijk te brengen.’ Die dag verliep een beetje rommelig, want naast de wedstrijd gaat het ook over de ‘zelfmoordaanslagen in de metro van Londen op 7 juli 2005’, ‘de politieactie van 22 juli 2005 op metrostation Stockwell’ (het doodschieten van de Braziliaan Jean Charles de Menezes), ‘een blik op de toekomst’, de ‘documentaire Meeting Resistance’ en als afsluiting het ‘martelaarsfeest’.

    Geheime conclusies

    Veel informatie werd via de Wob-procedure niet vrij gekregen omdat er anders er een mirror mirror image training kon worden georganiseerd om de training van de KLPD’ers en de AIVD’ers te spiegelen. De conclusies worden ons volledig onthouden, maar het beeld van de training dat op basis van verschillende artikelen boven komt drijven, is dat van het spel ‘vlag veroveren plus’, met veel testosteron.

    Misschien verklaart de training wel de aanpak van de inval van het belhuis in Rotterdam op Kerstavond 2010. Vraag is alleen of dit iets te maken heeft met het winnen van hearts and minds of het slechten van de oorlog tegen de terreur. Misschien is dat laatste echter in het geheel niet de bedoeling.

    Wright sprak een van de mirror image trainers Frank Willoughby, specialist in hinderlagen en Improvised Explosive Devices, geïmproviseerde bommen. Willoughby staat symbool voor de vercommercialisering van oorlog. ‘The prospect of mounting chaos seems, frankly, to excite some instructors. At times, Frank Willoughby is unable to conceal how glad he is that the war on terrorism promises to be endless. […] Punching his fist into his hand, he adds, ‘Soon as they hit us 9/11′, I told my wife, ’the game is on!’, schrijft Wright in Camp Jihad.

    Blackwater’s verderfelijke reputatie is een reden om niet met het bedrijf in zee te gaan. Maar een belangrijkere conclusie van dit verhaal is dat de belangen van de private sector niet gericht zijn op vrede. Zij willen oorlog en chaos creëren, omdat dat nu eenmaal de voorwaarden zijn om geld mee te verdienen. Een politiedienst die in deze voetsporen treedt, roept bij elke deur die nutteloos wordt opengetrapt, net als Willoughby, the game is on.

    Find this story at 19 June 2012

    Curveball

    boek van Bob Drogin
    Ook verschenen in het Nederland als Codenaam Curveball

    Erg Amerikaans boek, de tekst schreeuwt je tegemoet wat gaandeweg begint tegen te staan. Toch is het een verdienstelijk boek. Minutieus brengt Drogin het functioneren van geheime diensten in beeld tegen het licht van een menselijke bron. Curveball is de man die de bron was van de informatie over de chemische fabrieken op wielen van Saddam Hussein. De hele wereld kreeg ze te zien toen Colin Powell beelden van deze diepladers tijdens een praatje bij de Veiligheidsraad vertoonde. Ze bleken echter niet te bestaan. De informant of beter gezegd overloper, Curveball, wordt afgeschilderd als een leugenaar, maar eigenlijk is hij een klokkenluider. Geheime diensten deugen niet doordat alles geheim is en daarmee ook te manipuleren. Het boek van Drogin geeft inzicht in het gebrek aan samenwerking tussen diverse geheime diensten zowel nationaal als internationaal, de politieke sturing van diensten, de tunnelvisie en het wishful thinking.
    Curveball is een voormalig taxichauffeur uit Irak die in Duitsland asiel aanvraagt. Hij presenteert zich als een politiek vluchteling die aan een super geheim biologisch wapenprogramma in Irak heeft meegewerkt. Bij zijn asielaanvraag zegt hij niet direct dat hij dat werk deed, maar in de loop der tijd spint hij een verhaal met behulp van informatie die hij vindt op het internet. De BND, de Duitse geheime dienst voor buitenlandse aangelegenheden, wordt volledig om de tuin geleid, hoewel zij twijfels blijven houden omdat ze zijn verhaal niet kunnen checken. De Engelsen voegen er wat feiten aan toe en een van de vele inlichtingen en veiligheidsdiensten in de Verenigde Staten denken de bron te hebben gevonden voor het bestaan van het biologische en chemische wapenprogramma van Saddam Hussein. De stunt van Curveball is hilarisch, maar ook tragisch. De oorlog in Irak was er misschien ook zonder hem wel gekomen, maar hij heeft het een schijn van legitimatie gegeven. Men dacht dat Irak chemische en biologische wapen had, wat ook logisch was, want ongeveer alle apparatuur en grondstoffen waren door het Westen geleverd en Saddam Hussein had ze tot twee keer toe gebruikt. Na de eerste wapeninspectie ronde, waarbij een groot deel van deze wapens waren vernietigd begin jaren negentig, bleef vooral de Verenigde Staten, maar ook andere staten Irak hardnekkig beschuldigen van de productie van biologische en chemische wapens. Het bewijs ontbrak echter. Curveball stapte begin 1999 in deze status quo en reconstrueerde met behulp van de rapporten van de wapeninspecties van Verenigde Naties die hij van het internet plukte een verhaal van mobiele laboratoria. Bij zijn verhaal gebruikte hij zowel feiten als fictie, maar doordat het verhaal aansloot bij de veronderstelling van veel diensten dat Irak over faciliteiten beschikte, kon het wortel schieten in de inlichtingen gemeenschap. Alle feiten die zijn verhaal tegenspraken werden gaandeweg weggemoffeld en het bestaan van mobiele laboratoria was een vaststaand feit. Zoals bij de Schiedammer parkmoord tunnelvisie leidde tot de veroordeling van een onschuldige werd mede door toedoen van Curveball Irak in een tunnelvisie ervan beticht chemische en biologische wapens te produceren. Niet dat het Irakese regime nu een stel lieverdjes waren, maar de beschuldigingen waren ongegrond. Er moest worden ingegrepen. Een tunnelvisie die leidde tot een straf, maar niet alleen voor Hussein en zijn staf. Het gehele Irakese volk moest boeten. De oorlog heeft op dit moment het leven gekost van tussen de 80.000 en de 400.000 Irakezen en een ware exodus ontketend. En zullen de schuldigen van dit drama terecht staan? Nee, dat past niet in een rechtstaat die beweert het altijd bij het rechte eind te hebben. Saddam Hussein was een wrede dictator die hoe dan ook een keer weg moest. Met of zonder Curveball.

    Find this story at 2 April 2008

    MI6 and CIA were told before invasion that Iraq had no active WMD

    BBC’s Panorama reveals fresh evidence that agencies dismissed intelligence from Iraqi foreign minister and spy chief

    Tony Blair’s claims about Iraq’s weapons of mass destruction are challenged again in Monday’s Panorama. Photograph: Dominic Lipinski/PA

    Fresh evidence has been revealed about how MI6 and the CIA were told through secret channels by Saddam Hussein’s foreign minister and his head of intelligence that Iraq had no active weapons of mass destruction.

    Tony Blair told parliament before the war that intelligence showed Iraq’s nuclear, chemical, and biological weapons programme was “active”, “growing” and “up and running”.

    A special BBC Panorama programme aired on Monday night details how British and US intelligence agencies were informed by top sources months before the invasion that Iraq had no active WMD programme, and that the information was not passed to subsequent inquiries.

    It describes how Naji Sabri, Saddam’s foreign minister, told the CIA’s station chief in Paris at the time, Bill Murray, through an intermediary that Iraq had “virtually nothing” in terms of WMD.

    Sabri said in a statement that the Panorama story was “totally fabricated”.

    However, Panorama confirms that three months before the war an MI6 officer met Iraq’s head of intelligence, Tahir Habbush al-Tikriti, who also said that Saddam had no active WMD. The meeting in the Jordanian capital, Amman, took place days before the British government published its now widely discredited Iraqi weapons dossier in September 2002.

    Lord Butler, the former cabinet secretary who led an inquiry into the use of intelligence in the runup to the invasion of Iraq, tells the programme that he was not told about Sabri’s comments, and that he should have been.

    Butler says of the use of intelligence: “There were ways in which people were misled or misled themselves at all stages.”

    When it was suggested to him that the body that probably felt most misled of all was the British public, Butler replied: “Yes, I think they’re, they’re, they got every reason think that.”

    The programme shows how the then chief of MI6, Sir Richard Dearlove, responded to information from Iraqi sources later acknowledged to be unreliable.

    • The Spies Who Fooled the World, BBC Panorama Special, BBC1, Monday, 18 March, 10.35pm

    Richard Norton-Taylor
    guardian.co.uk, Monday 18 March 2013 06.00 GMT

    Find this story at 18 March 2013 
    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Iraq: The spies who fooled the world

     

    The lies of two Iraqi spies were central to the claim – at the heart of the UK and US decision to go to war in Iraq – that Saddam Hussein had weapons of mass destruction. But even before the fighting started, intelligence from highly-placed sources was available suggesting he did not, Panorama has learned.

    Six months before the invasion, the then Prime Minister Tony Blair warned the country about the threat posed by Saddam Hussein’s weapons of mass destruction (WMD).

    “The programme is not shut down,” he said. “It is up and running now.” Mr Blair used the intelligence on WMD to justify the war.

    That same day, 24 September 2002, the government published its controversial dossier on the former Iraqi leader’s WMD.

    The BBC has learned that two key pieces of intelligence, which could have prevented the Iraq war, were either dismissed or used selectively

    Designed for public consumption, it had a personal foreword by Mr Blair, who assured readers Saddam Hussein had continued to produce WMD “beyond doubt”.

    But, while it was never mentioned in the dossier, there was doubt. The original intelligence from MI6 and other agencies, on which the dossier was based, was clearly qualified.

    The intelligence was, as the Joint Intelligence Committee noted in its original assessments, “sporadic and patchy” and “remains limited”.

    The exclusion of these qualifications gave the dossier a certainty that was never warranted.
    Intelligence failure

    Much of the key intelligence used by Downing Street and the White House was based on fabrication, wishful thinking and lies.

    Lord Butler says he was unaware of some intelligence that Saddam Hussein did not have WMD

    As Gen Sir Mike Jackson, then head of the British Army, says, “what appeared to be gold in terms of intelligence turned out to be fool’s gold, because it looked like gold, but it wasn’t”.

    There was other intelligence, but it was less alarming.

    Lord Butler, who after the war, conducted the first government inquiry into WMD intelligence, says Mr Blair and the intelligence community “misled themselves”.

    Lord Butler and Sir Mike agree Mr Blair did not lie, because they say he genuinely believed Saddam Hussein had WMD.

    The most notorious spy who fooled the world was the Iraqi defector, Rafid Ahmed Alwan al-Janabi.

    His fabrications and lies were a crucial part of the intelligence used to justify one of the most divisive wars in recent history. And they contributed to one of the biggest intelligence failures in living memory.

    He became known as Curveball, the codename given to him by US intelligence that turned out to be all too appropriate.
    Continue reading the main story

    Start Quote

    I thought we’d produced probably the best intelligence that anybody produced in the pre-war period”
    Bill Murray
    Former CIA Paris station head

    Mr Janabi arrived as an Iraqi asylum seeker at a German refugee centre in 1999 and said he was a chemical engineer, thus attracting the attention of the German intelligence service, the BND.

    He told them he had seen mobile biological laboratories mounted on trucks to evade detection.

    The Germans had doubts about Mr Janabi which they shared with the Americans and the British.

    MI6 had doubts too, which they expressed in a secret cable to the CIA: “Elements of [his] behaviour strike us as typical of individuals we would normally assess as fabricators [but we are] inclined to believe that a significant part of [Curveball’s] reporting is true.”

    The British decided to stick with Curveball, as did the Americans. He later admitted being a fabricator and liar.

    There appeared to be corroborative intelligence from another spy who fooled the world.
    Continue reading the main story
    Panorama: Find out more
    Peter Taylor presents Panorama: The Spies Who Fooled the World
    BBC One, Monday 18 March at 22:35 GMT
    Then available in the UK on the BBC iPlayer

    He was an Iraqi former intelligence officer, called Maj Muhammad Harith, who said it had been his idea to develop mobile biological laboratories and claimed he had ordered seven Renault trucks to put them on.

    He made his way to Jordan and then talked to the Americans.

    Muhammad Harith apparently made up his story because he wanted a new home. His intelligence was dismissed as fabrication 10 months before the war.

    MI6 also thought they had further corroboration of Curveball’s story, when a trusted source – codenamed Red River – revealed he had been in touch with a secondary source who said he had seen fermenters on trucks. But he never claimed the fermenters had anything to do with biological agents.

    After the war, MI6 decided that Red River was unreliable as a source.
    Handmade suit

    But not all the intelligence was wrong. Information from two highly-placed sources close to Saddam Hussein was correct.

    Both said Iraq did not have any active WMD.

    The CIA’s source was Iraq’s foreign minister, Naji Sabri.

    Tahir Jalil Habbush Al-Tikriti said Saddam Hussein had no active WMD

    Former CIA man Bill Murray – then head of the agency’s station in Paris – dealt with him via an intermediary, an Arab journalist, to whom he gave $200,000 (£132,000) in cash as a down payment.

    He said Naji Sabri “looked like a person of real interest – someone who we really should be talking to”.

    Murray put together a list of questions to put to the minister, with WMD at the top.

    The intermediary met Naji Sabri in New York in September 2002 when he was about to address the UN – six months before the start of the war and just a week before the British dossier was published.

    The intermediary bought the minister a handmade suit which the minister wore at the UN, a sign Mr Murray took to mean that Naji Sabri was on board.

    Mr Murray says the upshot was intelligence that Saddam Hussein “had some chemical weapons left over from the early 90s, [and] had taken the stocks and given them to various tribes that were loyal to him. [He] had intentions to have weapons of mass destruction – chemical, biological and nuclear – but at that point in time he virtually had nothing”.

    The CIA insists the intelligence report from the “source” indicated the former Iraqi president did have WMD programmes because, the agency says, it mentioned that, “Iraq was currently producing and stockpiling chemical weapons” and “as a last resort had mobile launchers armed with chemical weapons”.

    Mr Murray disputes this account.

    The second highly-placed source was Iraq’s head of intelligence, Tahir Jalil Habbush Al-Tikriti – the jack of diamonds in America’s “most wanted” deck of cards which rated members of Saddam Hussein’s government.

    A senior MI6 officer met him in Jordan in January 2003 – two months before the war.

    Bill Murray says the “best intelligence” was not used

    It was thought Habbush wanted to negotiate a deal that would stop the imminent invasion. He also said Saddam Hussein had no active WMD.

    Surprisingly, Lord Butler – who says Britons have “every right” to feel misled by their prime minister – only became aware of the information from Habbush after his report was published.

    “I can’t explain that,” says Lord Butler.

    “This was something which I think our review did miss. But when we asked about it, we were told that it wasn’t a very significant fact, because SIS [MI6] discounted it as something designed by Saddam to mislead.”

    Lord Butler says he also knew nothing about the intelligence from Naji Sabri.

    Ex-CIA man Bill Murray was not happy with the way the intelligence from these two highly-placed sources had been used.

    “I thought we’d produced probably the best intelligence that anybody produced in the pre-war period, all of which came out – in the long run – to be accurate. The information was discarded and not used.”

    Panorama: The Spies Who Fooled the World, BBC One, Monday 18 March at 22:35 GMT and then available in the UK on the BBC iPlayer.

    18 March 2013 Last updated at 00:43 GMT
    By Peter Taylor
    BBC News

    Find this story at 18 March 2013

    Watch the episode online

    BBC © 2013

    Telecoms firm hails ‘significant victory’ as judge blocks FBI’s data demands

    Credo Mobile speaks out after judge orders US government to stop issuing ‘national security letters’ to access citizens’ data

    Judge Susan Illston declared the NSLs unconstitutional as they breached the first amendment rights of the parties being served the orders. Photograph: Frank Polich/Reuters

    The Californian telecoms company thought to be behind a stunning court victory that has blown a hole in the FBI’s highly secretive system for collecting US citizens’ private data has hailed the “significant” legal breakthrough.

    Credo, based in San Francisco, spoke out after a federal judge ordered the US government to stop issuing what are called “national security letters” – demands for data that contain in-built gagging clauses that prevent the recipients disclosing even the existence of the orders or their own identity.

    In a carefully worded release, the firm fell short of revealing itself as the instigator of the legal action that resulted in Friday’s development. But it is understood by the Guardian that the telecommunications firm was indeed the unnamed litigant behind the action.

    Michael Kieschnick, chief executive of Credo Mobile, hailed the judge’s order as “the most significant court victory for our constitutional rights since the dark day when George W Bush signed the Patriot Act”.

    It is extremely rare for a telecoms company to challenge the system of national security letters, or NSLs, which have mushroomed since 9/11 under the Patriot Act. Credo, a subsidiary of Working Assets Inc, that directs some of its profits to support civil liberties groups, has been a long-standing advocate for reform of the NSL.

    It is believed to be the company behind a May 2011 lawsuit in which the FBI was sued for breach of its rights after the company was served with a federal demand for private data belonging to its customers. The FBI shot back by counter-suing the company.

    The lawsuit was made anonymously, with the name of the company redacted from court papers made available to the media. But last July the Wall Street Journal conducted an analysis of the likely telecoms companies that could have brought the legal action, and concluded that the litigant was probably Credo.

    In her ruling, Judge Susan Illston declared the NSLs unconstitutional as they breached the first amendment rights of the parties being served the orders.

    Kieschnick said: “This decision is notable for its clarity and depth. From this day forward, the US government’s unconstitutional practice of using national security letters to obtain private information without court oversight and its denial of the first amendment rights of national security letter recipients have finally been stopped by our courts.”

    NSLs have been an increasingly important part of the US government’s approach to counter-terrorism, though their growing use has been matched by mounting unease on the party of civil libertarians.

    Last year the FBI sent out more than 16,000 of the letters relating to the private data – mainly financial, internet or phone records – of more than 7,000 Americans.

    Previous court action has led to the FBI being accused of abusing its powers under the NSL statute by issuing the letters far more extensively than in the limited counter-terrorism situations for which they were devised.

    The letters are among the most secretive tools of any deployed by the US state. The demand for data comes with a gagging order attached – meaning that the recipient of the NSL is not allowed even to discuss the letter in public.

    • This article has been amended since publication.

    Ed Pilkington in New York
    guardian.co.uk, Saturday 16 March 2013 19.30 GMT

    Find this story at 16 March 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    WikiLeaks Whistleblower Bradley Manning Says He Wanted to Show the Public the “True Costs of War”

    For the first time, 25-year-old U.S. Army Private Bradley Manning has admitted to being the source behind the largest leak of state secrets in U.S. history. More than a thousand days after he was arrested, Manning testified Thursday before a military court. He said he leaked the classified documents to the whistleblowing website WikiLeaks in order to show the American public the “true costs of war.” Reading for more than an hour from a 35-page statement, Manning said: “I believed that if the general public, especially the American public, had access to the information … this could spark a domestic debate on the role of the military and our foreign policy in general.” At the pretrial hearing at Fort Meade military base in Maryland, Manning pleaded guilty to reduced charges on 10 counts, which carry a maximum sentence of 20 years in prison. But even if the judge accepts the plea, prosecutors can still pursue a court-martial on the remaining 12 charges. The most serious of those is “aiding the enemy” and carries a possible life sentence. We are joined by Michael Ratner, president emeritus of the Center for Constitutional Rights and a lawyer to Julian Assange and WikiLeaks. He just returned from attending Manning’s hearing. [includes rush transcript]

    Guest:

    Michael Ratner, president emeritus of the Center for Constitutional Rights and a lawyer to Julian Assange and WikiLeaks. He returned last night from attending the pretrial hearing for Bradley Manning.

    This transcript is available free of charge. However, donations help us provide closed captioning for the deaf and hard of hearing on our TV broadcast. Thank you for your generous contribution. Donate >
    Transcript

    AMY GOODMAN: For the first time, 25-year-old U.S. Army Private Bradley Manning has admitted to being the source behind the largest leak of state secrets in U.S. history. More than a thousand days after he was arrested, Manning testified Thursday before a military court. He said he leaked the classified documents to the whistleblowing website WikiLeaks in order to show the American public the “true costs of war.”

    Reading for over an hour from a 35-page statement, Manning said, quote, “I believed that if the general public, especially the American public, had access to the information … this could spark a domestic debate on the role of the military and our foreign policy in general.” He added, quote, “I believed that these cables would not damage the United States. However, I believed these cables would be embarrassing.” He said he took the information to WikiLeaks only after he was rebuffed by The Washington Post and The New York Times.

    At the pretrial hearing at Fort Meade military base in Maryland, Manning pleaded guilty to reduced charges on 10 counts, which carry a maximum sentence of 20 years in prison. But even if the judge accepts the plea, prosecutors can still pursue a court-martial on the remaining 12 charges. The most serious of those is aiding the enemy and carries a possible life sentence.

    Over the course of the hearing, Bradley Manning took responsibility for leaking the so-called “Collateral Murder” video of an Apache helicopter attack in Iraq; some U.S. diplomatic cables, including one of the early WikiLeaks publications, the Reykjavik cable; portions of the Iraq and Afghanistan war logs; some of the files on detainees in Guantánamo; and two intelligence memos.

    For more, we’re joined by Michael Ratner, president emeritus of the Center for Constitutional Rights, lawyer for Julian Assange and WikiLeaks. He has just returned from attending that pretrial hearing last night for Bradley Manning.

    Michael Ratner, welcome back to Democracy Now! Well, this is explosive. Bradley Manning stands in court and accepts responsibility for releasing the documents, says he is guilty of doing that.

    MICHAEL RATNER: It was one of the more moving days I’ve ever spent in a courtroom. You’ve heard from Bradley Manning once before, which was when he testified about the torture that happened to him. I was crying through that. This was amazing. I mean, he actually didn’t stand; he sat at the defense table. And he read his 35-page statement, which, sadly, we do not have a copy of, even though there’s nothing classified about that statement. And hopefully we’ll get it, because that is something that should be taught in every school in America.

    He went through each of the releases that he took responsibility for, that you mentioned on the air, and he told us why he did it. And in each case, you saw a 22-year-old, a 23-year-old, a person of incredible conscience, saying, “What I’m seeing the United States do is utterly wrong. It’s immoral. The way they’re killing people in Iraq, targeting people for death, rather than working with the population, this is wrong.” And in each of these—each of these statements tells you about how he was doing it politically.

    AMY GOODMAN: Remind us of how he did this. He was actually serving in Iraq as a soldier.

    MICHAEL RATNER: Yes, he was a soldier. He was in—and he goes through that in his statement. He’s an intelligence analyst. And one of the things he worked with, what were called “significant activities reports,” which are the daily logs of what’s happening in Iraq and, attached to it, of course, in Afghanistan. And as he read those, I think he became appalled by what he saw: the killings, the targeted assassinations, the fact that people didn’t want the United States there, the fact that we weren’t really helping the country or helping individuals. And he said he wanted to lift the fog of war from it. And he got in touch with various organizations, including WikiLeaks. And that, he talks about. He talks about that. And—

    AMY GOODMAN: Explain. He actually said he didn’t go to WikiLeaks first.

    MICHAEL RATNER: No, that’s correct. He first—he had these documents on a disk that he eventually took out of—took out of the special secure room. He actually came to the United States with it. That’s the Iraq war logs and the Afghan war logs. And he tried to get it to The New York Times and The Washington Post. He calls up The Washington Post, has a five-minute discussion with somebody there.

    AMY GOODMAN: Does he know who?

    MICHAEL RATNER: He doesn’t recall who, or at least didn’t say it. He doesn’t take it—he said they don’t take him seriously, and then he feels he can’t get that. He calls the public editor at The New York Times and leaves a message on the answering machine of the public editor and doesn’t get a call back. He’s then thinking about: “How am I going to get this critical information out? Because I think what the U.S. is doing should be debated in the United States. We’re killing people without cause, essentially.”

    And then, he has already known about WikiLeaks, because he was aware of WikiLeaks in part because of their release of the text messages or the SMSes from the World Trade Center phones that were there on 9/11. So he’s aware of WikiLeaks. He’s in some communication, by chat or otherwise, with WikiLeaks. And they point him to a site where he can upload, upload the documents.

    One interesting point on that is what he mentions about WikiLeaks. Some papers have reported that he said he believes he was in communication with Julian Assange. He actually says it could have been Julian Assange, it could have been someone he calls “Daniel Schmitt,” which is probably Daniel Domscheit-Berg from Germany. And he says—and it also says it could have been someone high up in WikiLeaks. He really doesn’t know. And he says, “Whatever I did in this case, I did because I wanted to do it. I was not pressured to do it. I made the decision to do it.” So he tries these other media, and ultimately he sees that WikiLeaks has a way of uploading documents that’s anonymous, that he doesn’t know who’s on the other end, and they don’t know who’s on his end.

    AMY GOODMAN: He also said he was motivated by the Reuters FOIAs, right? Freedom of the Information Act requests to get the—what came to be known as the “Collateral Murder” video.

    MICHAEL RATNER: I mean, when we can get the transcript and put out the quotes of what he said, on that “Collateral Murder” video, which he saw the Reuters journalists killed, then he saw them attack the van that was trying to rescue people, in which children were injured, and he said, “What I heard them say in that helicopter as they were shooting was incredible bloodlust.” “Bloodlust,” that’s what he said.

    AMY GOODMAN: During that pretrial hearing on Wednesday, let’s talk about this, Michael. Bradley Manning spoke about the “Collateral Murder” video of an Apache helicopter attack in Iraq and admitted for the first time being the source of the leaked tape. Manning said, quote, “The most alarming aspect of the video to me was the seemingly delightful bloodlust the aerial weapons team happened to have.” He added, the soldiers’ actions, quote, “seemed similar to a child torturing ants with a magnifying glass,” describing the video as “war porn,” saying the crew’s “lack of concern for human life” and “concern for injured children at the scene” greatly bothered him. So, this is the video—it was shot July 12th, 2007—that Manning referenced. It shows U.S. forces killing 12 people, including two Reuters employees. Now, this video is taken by the U.S. military Apache helicopter. It is the camera that’s mounted within the helicopter. You hear the soldiers in the helicopter joking, cursing. And it is showing a target on the men who are walking in an area of Baghdad known as New Baghdad below. Among them, an up-and-coming Reuters videographer named Namir Noor-Eldeen and his driver, Saeed Chmagh.

    U.S. SOLDIER 1: I have individuals with weapons.

    U.S. SOLDIER 2: You’re clear.

    U.S. SOLDIER 1: Alright, firing.

    U.S. SOLDIER 3: Let me know when you’ve got them.

    U.S. SOLDIER 2: Let’s shoot. Light ’em all up.

    U.S. SOLDIER 1: Come on, fire!

    U.S. SOLDIER 2: Keep shootin’. Keep shootin’. Keep shootin’. Keep shootin’.

    U.S. SOLDIER 4: Hotel, Bushmaster two-six, Bushmaster two-six, we need to move, time now!

    U.S. SOLDIER 2: Alright, we just engaged all eight individuals.

    AMY GOODMAN: Reuters driver Saeed Chmagh survived that initial attack. He’s seen trying to crawl away as the helicopter flies overhead. U.S. forces open fire again when they see a van pulling up. The van comes to evacuate the wounded, like Saeed Chmagh.

    U.S. SOLDIER 2: The bodies.

    U.S. SOLDIER 1: Where’s that van at?

    U.S. SOLDIER 2: Right down there by the bodies.

    U.S. SOLDIER 1: OK, yeah.

    U.S. SOLDIER 2: Bushmaster, Crazy Horse. We have individuals going to the scene, looks like possibly picking up bodies and weapons.

    U.S. SOLDIER 1: Let me engage. Can I shoot?

    U.S. SOLDIER 2: Roger. Break. Crazy Horse one-eight, request permission to engage.

    U.S. SOLDIER 3: Picking up the wounded?

    U.S. SOLDIER 1: Yeah, we’re trying to get permission to engage. Come on, let us shoot!

    U.S. SOLDIER 2: Bushmaster, Crazy Horse one-eight.

    U.S. SOLDIER 1: They’re taking him.

    U.S. SOLDIER 2: Bushmaster, Crazy Horse one-eight.

    U.S. SOLDIER 4: This is Bushmaster seven, go ahead.

    U.S. SOLDIER 2: Roger. We have a black SUV—or Bongo truck picking up the bodies. Request permission to engage.

    U.S. SOLDIER 4: Bushmaster seven, roger. This is Bushmaster seven, roger. Engage.

    U.S. SOLDIER 2: One-eight, engage. Clear.

    U.S. SOLDIER 1: Come on!

    U.S. SOLDIER 2: Clear. Clear.

    U.S. SOLDIER 1: We’re engaging.

    U.S. SOLDIER 2: Coming around. Clear.

    U.S. SOLDIER 1: Roger. Trying to—

    U.S. SOLDIER 2: Clear.

    U.S. SOLDIER 1: I hear ’em—I lost ’em in the dust.

    U.S. SOLDIER 3: I got ’em.

    U.S. SOLDIER 2: Should have a van in the middle of the road with about 12 to 15 bodies.

    U.S. SOLDIER 1: Oh yeah, look at that. Right through the windshield! Ha ha!

    AMY GOODMAN: That is the video that WikiLeaks, when releasing it, dubbed “Collateral Murder,” of the July 12, 2007, attack. In that van, by the way, were two children who were critically wounded. Saeed Chmagh was killed. That is the video that we played first when it was released and also interviewed Julian Assange at the time here in the United States, interestingly. Michael Ratner with us, who is Julian Assange’s attorney. So this video Bradley Manning got in downloading, because it’s a U.S. military video, that Reuters, which had asked repeatedly for it, never got until WikiLeaks released it, to know the last seconds of their employees’ lives.

    MICHAEL RATNER: Not only did Reuters never get it, Amy, CENTCOM, which is I guess the central part of the Army, basically said, “We don’t think we have the video.” And yet, everybody that was in the room with Bradley Manning, everybody knew about the video. It was one of many, many videos. He says in this video—and he said it in court—he said, “What was amazing is, when they—after they hurt these children in the van,” he said, “they showed no remorse for the children. And when they saw someone crawling on the ground, they said, ‘I hope he picks up a gun,’ essentially, ‘because we can kill him then.'” So, these people—this was really here a 22- or 23-year-old man watching this. Most people would have said, “Well, I’ll just get through the Army, and that’ll be it.” He didn’t, and he’s a hero for that, because what he did is he acted on his moral conscience, and he exposed what the—the war crimes the U.S. was doing.

    AMY GOODMAN: So, what does this mean right now? Bradley Manning has pleaded guilty to uploading the largest trove of state secrets in U.S. history to WikiLeaks, which then released them. What does he face exactly?

    MICHAEL RATNER: Well, he faces a possible 20 years in prison. But the problem here, military is different than our regular courts in the U.S., which is to say that the plea does not have to be accepted by the government or by the judge—

    AMY GOODMAN: So why would he have agreed to plead guilty?

    MICHAEL RATNER: —or by the prosecutor, really. He did what’s called a “naked plea.” His hope, I think, is that when the government sees this and also the support he’ll get for acknowledging what he did and also the reasons and the moral reasons why he did it and the political reasons he did it, that the government won’t go on and try and prove aiding the enemy and the more serious espionage charges. What he really pleaded to was doing actions that were prejudicial to the good order and discipline of the military, by giving documents to someone not authorized or a group not authorized to get them. So he faces 20 years. I think he did it because he was otherwise facing, and he still could be facing, life imprisonment, if not the death penalty. So they’re trying to figure out—

    AMY GOODMAN: Because? Life imprisonment for?

    MICHAEL RATNER: For espionage, as well as the death penalty.

    AMY GOODMAN: Well, what about this charge, aiding the enemy?

    MICHAEL RATNER: Well, that’s the—

    AMY GOODMAN: What is the case for it?

    MICHAEL RATNER: Well, that’s the craziest. I mean, that’s just saying, because he gave documents to WikiLeaks and they were published by WikiLeaks — and they were published by The New York Times, I should say, and The Guardian and Der Spiegel — that al-Qaeda read those documents, and therefore WikiLeaks was essentially the transmittal means he used to get documents to al-Qaeda. So that the enemy there is al-Qaeda; some would say the enemy is even WikiLeaks, according to the U.S. government. But that’s the claim. It seems like a completely spurious, ridiculous claim. You can go after The New York Times for that every time it publishes and someone from a, quote, “terrorist” group reads those documents. So it’s a nonsensical claim.

    But he was facing life. And he made this statement that—you know, I just want to say that whatever people’s images were of Bradley Manning from the newspapers, which have reported on this, you know, disturbed human being, this disturbed individual, this man gave a political statement that should be read, I think, by every American and should certainly be taught in every one of our schools on what the moral obligations are of people in the military to stop, really, a killing machine of the United States.

    AMY GOODMAN: And what does this mean for Julian Assange? You’re his attorney. You were just recently there once again in London in the Ecuadorean embassy, where he is holed up and granted political asylum by Ecuador but can’t leave the embassy or Britain, the British authorities, will arrest him. The significance of this, Julian Assange, who believes the grand jury empaneled here could indict him for espionage and is afraid of being extradited here?

    MICHAEL RATNER: Well, there are two things that came out. One is, I would say that Bradley Manning’s testimony put WikiLeaks and Julian Assange in the same place that The New York Times would be or The Guardian, which is to say he gave documents or uploaded them to a website that is the equivalent of—you know, with The New York Times getting information about warrantless wiretapping from someone in the U.S. National Security Agency. So I think, in that sense, it tells us that the U.S. should get off his back, that Julian Assange should be getting the support of The New York Times and The Guardian and Der Spiegel, which used all of these—which used all of these documents. So I think it’s actually, in that sense, helpful to Julian Assange.

    On the other hand, there were two people who were identified to me as members—as lawyers on the grand jury that’s sitting in—that’s sitting in Virginia. Two of the prosecuting attorneys were there in the court.

    AMY GOODMAN: Yesterday, at the pretrial hearing of Bradley Manning.

    MICHAEL RATNER: Yes, yes, yes.

    AMY GOODMAN: So they’re there, and you’re there, Assange’s attorney.

    MICHAEL RATNER: They’re there, and I’m there. I didn’t have a chance to meet them, because they don’t come out and mix with the rest of us. They’re on the government’s side with—surrounded by camouflaged people. But they were there. And so, that tells us that that grand jury is still active and going on, and that they are still after Julian Assange and WikiLeaks. When I say “they,” the U.S. government. But for some reason, they’re thinking they can distinguish that from The New York Times and The Guardian. I don’t think they can. And I think it’s—you know, to me, it’s outrageous that The New York Times and The Guardian have not supported one of the people they worked with in revealing these documents.

    AMY GOODMAN: Well, Michael Ratner, I want to thank you for being with us, president emeritus of the Center for Constitutional Rights, lawyer for Julian Assange and WikiLeaks, returned last night from attending the pretrial hearing for Bradley Manning, who has been in detention now for more than 1,000 days.

    This is Democracy Now!, democracynow.org, The War and Peace Report. When we come back, Salt Sugar Fat: How the Food Giants Hooked Us. Stay with us.

    Find this story at 1 March 2013

    The Dangerous Logic of the Bradley Manning Case

    After 1,000 days in pretrial detention, Private Bradley Manning yesterday offered a modified guilty plea for passing classified materials to WikiLeaks. But his case is far from over—not for Manning, and not for the rest of the country. To understand what is still at stake, consider an exchange that took place in a military courtroom in Maryland in January.

    The judge, Col. Denise Lind, asked the prosecutors a brief but revealing question: Would you have pressed the same charges if Manning had given the documents not to WikiLeaks but directly to the New York Times?

    The prosecutor’s answer was simple: “Yes Ma’am.”

    The question was crisp and meaningful, not courtroom banter. The answer, in turn, was dead serious. I should know. I was the expert witness whose prospective testimony they were debating. The judge will apparently allow my testimony, so if the prosecution decides to pursue the more serious charges to which Manning did not plead guilty, I will explain at trial why someone in Manning’s shoes in 2010 would have thought of WikiLeaks as a small, hard-hitting, new media journalism outfit—a journalistic “Little Engine that Could” that, for purposes of press freedom, was no different from the New York Times. The prosecutor’s “Yes Ma’am,” essentially conceded that core point of my testimony in order to keep it out of the trial. That’s not a concession any lawyer makes lightly.

    The charge of “aiding the enemy” is vague. But it carries the death penalty—and could apply to civilians as well as soldiers.

    But that “Yes Ma’am” does something else: It makes the Manning prosecution a clear and present danger to journalism in the national security arena. The guilty plea Manning offered could subject him to twenty years in prison—more than enough to deter future whistleblowers. But the prosecutors seem bent on using this case to push a novel and aggressive interpretation of the law that would arm the government with a much bigger stick to prosecute vaguely-defined national security leaks, a big stick that could threaten not just members of the military, but civilians too.

    A
    country’s constitutional culture is made up of the stories we tell each other about the kind of nation we are. When we tell ourselves how strong our commitment to free speech is, we grit our teeth and tell of Nazis marching through Skokie. And when we think of how much we value our watchdog press, we tell the story of Daniel Ellsberg. Decades later, we sometimes forget that Ellsberg was prosecuted, smeared, and harassed. Instead, we express pride in a man’s willingness to brave the odds, a newspaper’s willingness to take the risk of publishing, and a Supreme Court’s ability to tell an overbearing White House that no, you cannot shut up your opponents.

    Whistleblowers play a critical constitutional role in our system of government, particularly in the area of national security. And they do so at great personal cost. The executive branch has enormous powers over national security and the exercise of that power is not fully transparent. Judicial doctrines like the “state secrets” doctrine allow an administration to limit judicial oversight. Congress’ oversight committees have also tended to leave the executive relatively free of constraints. Because the materials they see are classified, there remains little public oversight. Consider the Senate Intelligence Committee’s report on the interrogation torture practices during the immediate post 9/11 years: Its six thousand pages, according to Senator Dianne Feinstein, are “one of the most significant oversight efforts in the history of the United States Senate.” But they are unavailable to the public.

    Freedom of the press is anchored in our constitution because it reflects our fundamental belief that no institution can be its own watchdog. The government is full of well-intentioned and quite powerful inspectors general and similar internal accountability mechanisms. But like all big organizations, the national security branches of government include some people who aren’t purely selfless public servants. Secrecy is necessary and justified in many cases. But as hard-earned experience has shown us time and again, it can be—and often is—used to cover up failure, avarice, or actions that simply will not survive that best of disinfectants, sunlight.

    That’s where whistleblowers come in. They offer a pressure valve, constrained by the personal risk whistleblowers take, and fueled by whatever moral courage they can muster. Manning’s statement in court yesterday showed that, at least in his motives, he was part of that long-respected tradition. But that’s also where the Manning prosecution comes in, too. The prosecution case seems designed, quite simply, to terrorize future national security whistleblowers. The charges against Manning are different from those that have been brought against other whistleblowers. “Aiding the enemy” is punishable by death. And although the prosecutors in this case are not seeking the death penalty against Manning, the precedent they are seeking to establish does not depend on the penalty. It establishes the act as a capital offense, regardless of whether prosecutors in their discretion decide to seek the death penalty in any particular case.

    Hard cases, lawyers have long known, make bad law. The unusual nature of Manning’s case has led some to argue that his leaks are different than those we now celebrate as a bedrock component of accountability journalism: Daniel Ellsberg leaked specific documents that showed massive public deception in the prosecution of the Vietnam War. Deep Throat leaked specific information about presidential corruption during the Watergate investigation. Manning, though, leaked hundreds of thousands of documents, many of which were humdrum affairs; perhaps, some have argued, the sheer scope raises the risks. But in the three years since the leaks began, there has still been no public evidence that they in fact caused significant damage. The prosecutors say they will introduce evidence of harm in secret sessions; one of these bits of evidence is reportedly going to be that they will show that several of the files published were found on Osama Bin Laden’s computer. Does that mean that if the Viet Cong had made copies of the Pentagon Papers, Ellsberg would have been guilty of “aiding the enemy?”

    If the Viet Cong photocopied the Pentagon Papers, could Daniel Ellsberg have been prosecuted for aiding the enemy?

    It is also important to understand that although the number of leaked items was vast, it was not gratuitously so; some of the most important disclosures came precisely from sifting through the large number of items. Certainly, some of the important revelations from the leaks could have been achieved through a single “smoking gun” document, such as the chilling operational video from a U.S. helicopter attack that killed two Reuters’ cameramen, and shot at a van trying to offer relief to the injured, wounding two children who were in the van. But many of the most important insights only arise from careful analysis of the small pieces of evidence. This type of accountability analysis showed that the military had substantially understated the scale of civilian casualties in Iraq; and that U.S. forces were silently complicit in abuses by allied Iraqi government forces; it uncovered repeated abuses by civilian contractors to the military. The war logs have become the most important spin-free source of historical evidence about the Iraq and Afghanistan wars.

    The reputation that WikiLeaks has been given by most media outlets over the past two and a half years, though, obscures much of this—it just feels less like “the press” than the New York Times. This is actually the point on which I am expected to testify at the trial, based on research I did over the months following the first WikiLeaks disclosure in April 2010. When you read the hundreds of news stories and other materials published about WikiLeaks before early 2010, what you see is a young, exciting new media organization. The darker stories about Julian Assange and the dangers that the site poses developed only in the latter half of 2010, as the steady release of leaks about the U.S. triggered ever-more hyperbolic denouncements from the Administration (such as Joe Biden’s calling Assange a “high-tech terrorist”), and as relations between Assange and his traditional media partners soured.

    In early 2010, when Manning did his leaking, none of that had happened yet. WikiLeaks was still a new media phenom, an outfit originally known for releasing things like a Somali rebel leader’s decision to assassinate government officials in Somalia, or a major story exposing corruption in the government of Daniel Arap Moi in Kenya. Over the years WikiLeaks also exposed documents that shined a light on U.S. government practices, such as operating procedures in Camp Delta in Guantanamo or a draft of a secretly negotiated, highly controversial trade treaty called the Anti-Counterfeiting Trade Agreement. But that was not the primary focus. To name but a few examples, it published documents that sought to expose a Swiss Bank’s use of Cayman accounts to help rich clients avoid paying taxes, oil related corruption in Peru, banking abuses in Iceland, pharmaceutical company influence peddling at the World Health Organization, and extra-judicial killings in Kenya. For its work, WikiLeaks won Amnesty International’s New Media award in 2009 and the Freedom of Expression Award from the British magazine, Index of Censorship, in 2008.

    No one would have thought at the time that WikiLeaks had the gravitas of the Times. But if you roll back to the relevant time frame, it is clear that any reasonable person would have seen WikiLeaks as being in the same universe as we today think of the range of new media organizations in the networked investigative journalism ecosystem, closer probably to ProPublica or the Bureau of Investigative Journalism than to Huffington Post or the Daily Beast. If leaking classified materials to a public media outlet can lead to prosecution for aiding the enemy, then it has to be under a rule that judges can apply evenhandedly to the New York Times or the Guardian no less than to ProPublica, the Daily Beast, or WikiLeaks. No court will welcome a rule where culpability for a capital offense like aiding the enemy depends on the judge’s evaluation of the quality of the editorial practices, good faith, or loyalty of the media organization to which the information was leaked. Nor could a court develop such a rule without severely impinging on the freedom of the press. The implications of Manning’s case go well beyond Wikileaks, to the very heart of accountability journalism in a networked age.

    T
    he prosecution will likely not accept Manning’s guilty plea to lesser offenses as the final word. When the case goes to trial in June, they will try to prove that Manning is guilty of a raft of more serious offenses. Most aggressive and novel among these harsher offenses is the charge that by giving classified materials to WikiLeaks Manning was guilty of “aiding the enemy.” That’s when the judge will have to decide whether handing over classified materials to ProPublica or the New York Times, knowing that Al Qaeda can read these news outlets online, is indeed enough to constitute the capital offense of “aiding the enemy.”

    Aiding the enemy is a broad and vague offense. In the past, it was used in hard-core cases where somebody handed over information about troop movements directly to someone the collaborator believed to be “the enemy,” to American POWs collaborating with North Korean captors, or to a German American citizen who was part of a German sabotage team during WWII. But the language of the statute is broad. It prohibits not only actually aiding the enemy, giving intelligence, or protecting the enemy, but also the broader crime of communicating—directly or indirectly—with the enemy without authorization. That’s the prosecution’s theory here: Manning knew that the materials would be made public, and he knew that Al Qaeda or its affiliates could read the publications in which the materials would be published. Therefore, the prosecution argues, by giving the materials to WikiLeaks, Manning was “indirectly” communicating with the enemy. Under this theory, there is no need to show that the defendant wanted or intended to aid the enemy. The prosecution must show only that he communicated the potentially harmful information, knowing that the enemy could read the publications to which he leaked the materials. This would be true whether Al Qaeda searched the WikiLeaks database or the New York Times’. Hence the prosecutor’s “Yes Ma’am.”

    This theory is unprecedented in modern American history. The prosecution claims that there is, in fact precedent in Civil War cases, including one from 1863 where a Union officer gave a newspaper in occupied Alexandria rosters of Union units, and was convicted of aiding the enemy and sentenced to three months. But Manning’s defense argues that the Civil War cases involved publishing coded messages in newspapers and personals, not leaking for reporting to the public at large. The other major source that the prosecution uses is a 1920 military law treatise. Even if the prosecutors are correct in their interpretations of these two sources, which is far from obvious, the fact that they need to rely on these old and obscure sources underscores how extreme their position is in the twenty-first century.

    In fact, neither side disagrees with this central critique: That for 150 years, well before the rise of the modern First Amendment, the invention of muckraking journalism, or the modern development of the watchdog function of the press in democratic society, no one has been charged with aiding the enemy simply for leaking information to the press for general publication. Perhaps it was possible to bring such a charge before the first amendment developed as it did in the past hundred years, before the Pentagon Papers story had entered our national legend. But before Rosa Parks and Brown vs. Board of Education there was also a time when prosecutors could enforce the segregation laws of Jim Crow. Those times have passed. Read in the context of American constitutional history and the practice of at least a century and a half (if not more) of “aiding the enemy” prosecutions, we should hope and expect that the court will in fact reject the prosecution’s novel and aggressive interpretation of that crime.

    But as long as the charge remains live and the case undecided, the risk that a court will accept this expansive and destructive interpretation is very real.

    That’s especially true when you consider that “aiding the enemy” could be applied to civilians. Most provisions of the Uniform Code of Military Justice apply only to military personnel. But Section 104, the “aiding the enemy” section, applies simply to “any person.” To some extent, this makes sense—a German-American civilian in WWII could be tried by military commission for aiding German saboteurs under this provision. There has been some back and forth in military legal handbooks, cases, and commentary about whether and to what extent Section 104 in fact applies to civilians. Most recently, Justice Stevens’ opinion in the Supreme Court case of Hamdan implies that Section 104 may in fact apply to civilians and be tried by military commissions. But this is not completely settled. Because the authorities are unclear, any competent lawyer today would have to tell a prospective civilian whistleblower that she may well be prosecuted for the capital offense of aiding the enemy just for leaking to the press.

    Yochai Benkler is a professor at Harvard Law School and co-Director of the Berkman Center for Internet and Society at Harvard.

    BY YOCHAI BENKLER

    Find this story at 1 March 2013

    COPYRIGHT 2013 © THE NEW REPUBLIC

    Manning plea statement: Americans had a right to know ’true cost of war’

    After admitting guilt in 10 of 22 charges, soldier reveals how he came to share classified documents with WikiLeaks and talks of ‘bloodlust’ of US helicopter crew
    • Glenn Greenwald: Bradley Manning – the face of heroism

    Manning’s statement recounted how he had first become aware of WikiLeaks in 2009. Photograph: Jim Watson/AFP/Getty Images

    Bradley Manning, the soldier accused of the biggest unauthorised disclosure of state secrets in US history, has pleaded guilty to being the source of the leak, telling a military court that he passed the information to a whistleblowing website because he believed the American people had a right to know the “true costs of war”.

    At a pre-trial hearing on a Maryland military base, Manning, 25, who faces spending the rest of his life in military custody, read out a 35-page statement in which he gave an impassioned account of his motives for transmitting classified documents and videos he had obtained while working as an intelligence analyst outside Baghdad.

    Sitting at the defence bench in a hushed courtroom, Manning said he was sickened by the apparent “bloodlust” of a helicopter crew involved in an attack on a group in Baghdad that turned out to include Reuters correspondents and children.

    He believed the Afghan and Iraq war logs published by the WikiLeaks website, initially in association with a consortium of international media organisations that included the Guardian, were “among the more significant documents of our time revealing the true costs of war”. The decision to pass the classified information to a public website was motivated, he told the court, by his depression about the state of military conflict in which the US was mired.

    Manning said: “We were obsessed with capturing and killing human targets on lists and ignoring goals and missions. I believed if the public, particularly the American public, could see this it could spark a debate on the military and our foreign policy in general [that] might cause society to reconsider the need to engage in counter-terrorism while ignoring the human situation of the people we engaged with every day.”

    Reading on mobile? See the investigative film produced by the Guardian here

    In a highly unusual move for a defendant in such a serious criminal prosecution, Manning pleaded guilty to 10 lesser charges out of his own volition – not as part of a plea bargain with the prosecution. He admitted to having possessed and willfully communicated to an unauthorised person – probably Julian Assange – all the main elements of the WikiLeaks disclosure.

    That covered the so-called “Collateral Murder” video of an Apache helicopter attack in Iraq; some US diplomatic cables including one of the early WikiLeaks publications the Reykjavik cable; portions of the Iraq and Afghanistan war logs; some of the files on detainees in Guantánamo; and two intelligence memos.

    The charges to which the soldier pleaded guilty carry a two-year maximum sentence each, committing Manning to a possible upper limit of 20 years in military prison.

    But the plea does not avoid a long and complex trial for the soldier, that is currently scheduled to begin on 3 June. Manning pleaded not guilty to 12 counts which relate to the major offences of which he is accused by the US government.

    Specifically, he denied he had been involved in “aiding the enemy” – the idea that he knowingly gave help to al-Qaida and caused secret intelligence to be published on the internet, aware that by doing so it would become available to the enemy.

    As he read his statement, Manning was flanked by his civilian lawyer, David Coombs, on one side and two military defence lawyers on the other. Wearing full uniform, the soldier read out the document at high speed, occasionally stumbling over the words and at other points laughing at his own comments.

    He recounted how he had first become aware of WikiLeaks in 2009. He was particularly impressed by its release in November that year of more than 500,000 text messages sent on the day of the 9/11 terrorist attacks.

    He had originally copied the war logs as a good housekeeping measure to have quick access to the information. But the more he read into the data, he said, the more he was concerned about what it was uncovering.

    He decided to take a copy of the data on a memory stick when he went back from Iraq to the US on leave in January 2010. There, having failed to interest the Washington Post and the New York Times in the stash of information, he turned to WikiLeaks.

    On his return to Iraq, he encountered a video that showed an Apache helicopter attack from 2007 in which a group of people in Baghdad came under US fire. The group was later found to have included civilians, children and two Reuters correspondents who died.

    Manning said he was “troubled” by the resistance of the military authorities to releasing the video to Reuters, and a claim from on high that it might not still exist. When he looked through the video on a secure military database he was also troubled by the attitude of the aerial weapons team in the Apache – “the bloodlust they seemed to have, they seemed not to value human life”.

    The soldier related that in the video a man who has been hit by the US forces is seen crawling injured through the dust, at which point one of the helicopter crew is heard wishing the man would pick up a weapon so that they could kill him. “For me that was like a child torturing an ant with a magnifying glass.”

    After he had uploaded the video to WikiLeaks, which then posted it as the now notorious “Collateral Murder” video, Manning said he was approached by a senior WikiLeaks figure codenamed “Ox”. He assumed the individual was probably Julian Assange, and gave him his own codename – Nathaniel Frank – after the author of a book he had recently read.

    Of the largest portion of the WikiLeaks disclosures – the 250,000 US diplomatic cables – Manning said he was convinced the documents from embassies around the world would embarrass but not damage the US. “I thought these cables were a prime example of the need for more diplomacy. In many ways they were a collection of cliques and gossip,” he said.

    After reading his statement, Manning entered into several hours of questions from the trial judge, Colonel Denise Lind, who has the duty of ensuring that the accused made his guilty plea voluntarily and in full knowledge of its implications. Lind found Manning made his plea without coercion and in knowledge of its impact, and accepted it.

    In the course of the questioning, Lind tried to get to the bottom of an apparent contradiction in Manning’s comments. In his statement, he expressed strong moral reasons for his actions that suggested he was justified in leaking confidential information for the greater good.

    Ed Pilkington at Fort Meade, Maryland
    The Guardian, Thursday 28 February 2013 22.21 GMT

    Find this story at 28 February 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Pfc. Bradley E. Manning’s Statement for the Providence Inquiry

    For more information on the lack of public and press access to United States v. Pfc. Manning, visit the Center for Constitutional Rights, which filed a petition requesting the Army Court of Criminal Appeals (ACCA) “to order the Judge to grant the public and press access to the government’s motion papers, the court’s own orders, and transcripts of proceedings, none of which have been made public to date.”

    The statement below was read by Private First Class Bradley E. Manning at the providence inquiry for his formal plea of guilty to one specification under Article 92 with a substituted time frame for the offense, and nine specifications for lesser included offenses under Article 134. He pled not guilty to 12 other specifications. This transcript was taken by journalist Alexa O’Brien at the Article 39(a) session of United States v. Pfc. Bradley Manning on February 28, 2013 at Fort Meade, MD, USA.

    UPDATE

    Judge Lind: Pfc. Manning you may read your statement.

    Pfc. Bradley Manning: Yes, your Honor. I wrote this statement in the confinement facility. Start now. The following facts are provided in support of the providence inquiry for my court martial, United States v. Pfc. Bradley E. Manning.

    Personal Facts.

    I am a twenty-five year old Private First Class in the United States Army currently assigned to Headquarters and Headquarters Company, HHC, US Army Garrison (USAG), Joint Base Myer, Henderson Hall, Fort Meyer, Virginia.

    My [exodus?] assignment I was assigned to HHC, 2nd Brigade Combat Team, 10th Mountain Division at Fort Drum, NY. My primary military occupational specialty or MOS is 35 Foxtrot intelligence analyst. I entered active duty status on 2 October 2007. I enlisted with the hope of obtaining both real world experience and earning benefits under the GI Bill for college opportunities.

    Facts regarding my position as an intelligence analyst.

    In order to enlist in the Army I took the Standard Armed Services Aptitude Battery or [ASVAB?]. My score on this battery was high enough for me to qualify for any enlisted MOS position. My recruiter informed me that I should select an MOS that complimented my interests outside the military. In response, I told him that I was interested in geopolitical matters and information technology. He suggested that I consider becoming an intelligence analyst.

    After researching the intelligence analyst position, I agreed that this would be a good fit for me. In particular, I enjoyed the fact that an analyst could use information derived from a variety of sources to create work products that informed the command of its available choices for determining the best course of action or COA’s. Although the MOS required working knowledge of computers, it primarily required me to consider how raw information can be combined with other available intelligence sources in order to create products that assisted the command in its situational awareness or SA.

    I accessed that my natural interest in geopolitical affairs and my computer skills would make me an excellent intelligence analyst. After enlisting I reported to the Fort Meade military entrance processing station on 1 October 2007. I then traveled to and reported at Fort Leonard Wood, Missouri on 2 October 2007 to begin basic combat training or BCT.

    Once at Fort Leonard Wood I quickly realized that I was neither physically nor mentally prepared for the requirements of basic training. My BCT experience lasted six months instead of the normal ten weeks. Due to medical issues, I was placed on a hold status. A physical examination indicated that I sustained injuries to my right soldier and left foot.

    Due to those injuries I was unable to continue ‘basic’. During medical hold, I was informed that I may be out processed from the Army, however, I resisted being chaptered out because I felt that I could overcome my medical issues and continue to serve. On 2[8 or 20?] January 2008, I returned to basic combat training. This time I was better prepared and I completed training on 2 April 2008.

    I then reported for the MOS specific Advanced Individual Training or AIT on 7 April 2008. AIT was an enjoyable experience for me. Unlike basic training where I felt different from the other soldiers, I fit in and did well. I preferred the mental challenges of reviewing a large amount of information from various sources and trying to create useful or actionable products. I especially enjoyed the practice of analysis through the use of computer applications and methods that I was familiar with.

    I graduated from AIT on 16 August 2008 and reported to my first duty station, Fort Drum, NY on 28 August 2008. As an analyst, Significant Activities or SigActs were a frequent source of information for me to use in creating work products. I started working extensively with SigActs early after my arrival at Fort Drum. My computer background allowed me to use the tools of organic to the Distributed Common Ground System-Army or D6-A computers to create polished work products for the 2nd Brigade Combat Team chain of command.

    The non-commissioned officer in charge, or NCOIC, of the S2 section, then Master Sergeant David P. Adkins recognized my skills and potential and tasked me to work on a tool abandoned by a previously assigned analyst, the incident tracker. The incident tracker was viewed as a back up to the Combined Information Data Network Exchange or CIDNE and as a unit, historical reference to work with.

    In the months preceding my upcoming deployment, I worked on creating a new version of the incident tracker and used SigActs to populate it. The SigActs I used were from Afghanistan, because at the time our unit was scheduled to deploy to the Logar and Wardak Provinces of Afghanistan. Later my unit was reassigned to deploy to Eastern Baghdad, Iraq. At that point, I removed the Afghanistan SigActs and switched to Iraq SigActs.

    As and analyst I viewed the SigActs as historical data. I believed this view is shared by other all-source analysts as well. SigActs give a first look impression of a specific or isolated event. This event can be an improvised explosive device attack or IED, small arms fire engagement or SAF, engagement with a hostile force, or any other event a specific unit documented and recorded in real time.

    In my perspective the information contained within a single SigAct or group of SigActs is not very sensitive. The events encapsulated within most SigActs involve either enemy engagements or causalities. Most of this information is publicly reported by the public affairs office or PAO, embedded media pools, or host nation (HN) media.

    As I started working with SigActs I felt they were similar to a daily journal or log that a person may keep. They capture what happens on a particular day in time. They are created immediately after the event, and are potentially updated over a period of hours until final version is published on the Combined Information Data Network Exchange. Each unit has its own Standard Operating Procedure or SOP for reporting and recording SigActs. The SOP may differ between reporting in a particular deployment and reporting in garrison.

    In garrison, a SigAct normally involves personnel issues such as driving under the influence or DUI incidents or an automobile accident involving the death or serious injury of a soldier. The reports starts at the company level and goes up to the battalion, brigade, and even up to the division level.

    In deployed environment a unit may observe or participate in an event and a platoon leader or platoon sergeant may report the event as a SigAct to the company headquarters and through the radio transmission operator or RTO. The commander or RTO will then forward the report to the battalion battle captain or battle non-commissioned officer or NCO. Once the battalion battle captain or battle NCO receives the report they will either (1) notify the battalion operations officer or S3; (2) conduct an action, such as launching a quick reaction force; or (3) record the event and report– and further report it up the chain of command to the brigade.

    The reporting of each event is done by radio or over the Secret Internet Protocol Router Network or SIPRNet, normally by an assigned soldier, usually junior enlisted E-4 and below. Once the SigAct is recorded, the SigAct is further sent up the chain of command. At each level, additional information can either be added or corrected as needed. Normally within 24 to 48 hours, the updating and reporting or a particular SigAct is complete. Eventually all reports and SigActs go through the chain of command from brigade to division and division to corps. At corps level the SigAct is finalized and [missed word].

    The CIDNE system contains a database that is used by thousands of Department of Defense– DoD personnel– including soldiers, civilians, and contractors support. It was the United States Central Command or CENTCOM reporting tool for operational reporting in Iraq and Afghanistan. Two separate but similar databases were maintained for each theater– CIDNE-I for Iraq and CIDNE-A for Afghanistan. Each database encompasses over a hundred types of reports and other historical information for access. They contain millions of vetted and finalized directories including operational intelligence reporting.

    CIDNE was created to collect and analyze battle-space data to provide daily operational and Intelligence Community (IC) reporting relevant to a commander’s daily decision making process. The CIDNE-I and CIDNE-A databases contain reporting and analysis fields for multiple disciplines including Human Intelligence or HUMINT reports, Psychological Operations or PSYOP reports, Engagement reports, Counter Improvised Explosive Device or CIED reports, SigAct reports, Targeting reports, Social and Cultural reports, Civil Affairs reports, and Human Terrain reporting.

    As an intelligence analyst, I had unlimited access to the CIDNE-I and CIDNE-A databases and the information contained within them. Although each table within the database is important, I primarily dealt with HUMINT reports, SigAct reports, and Counter IED reports, because these reports were used to create a work product I was required to published as an analyst.

    In working on an assignment I looked anywhere and everywhere for information. As an all-source analyst, this was something that was expected. The D6-A systems had databases built in, and I utilized them on a daily basis. This simply was– the search tools available on the D6-A systems on SIPRNet such as Query Tree and the DoD and Intellink search engines.

    Primarily, I utilized the CIDNE database using the historical and HUMINT reporting to conduct my analysis and provide a back up for my work product. I did statistical analysis on historical data including SigActs to back up analysis that were based on HUMINT reporting and produce charts, graphs, and tables. I also created maps and charts to conduct predictive analysis based on statistical trends. The SigAct reporting provided a reference point for what occurred and provided myself and other analysts with the information to conclude possible outcome.

    Although SigAct reporting is sensitive at the time of their creation, their sensitivity normally dissipates within 48 to 72 hours as the information is either publicly released or the unit involved is no longer in the area and not in danger.

    It is my understanding that the SigAct reports remain classified only because they are maintained within CIDNE– because it is only accessible on SIPRnet. Everything on CIDNE-I and CIDNE-A to include SigAct reporting was treated as classified information.

    Facts regarding the storage of SigAct Reports.

    As part of my training at Fort Drum, I was instructed to ensure that I create back ups of my work product. The need to create back ups was particularly acute given the relative instability and reliability of the computer systems we used in the field during deployment. These computer systems included both organic and theater provided equipment (TPE) D6-A machines.

    The organic D6-A machines we brought with us into the field on our deployment were Dell [missed word] laptops and the TPE D6-A machines were Alienware brand laptops. The [M90?] D6-A laptops were the preferred machine to use as they were slightly faster and had fewer problems with dust and temperature than the theater provided Alienware laptops. I used several D6-A machines during the deployment due to various technical problems with the laptops.

    With these issues several analysts lost information, but I never lost information due to the multiple backups I created. I attempted to backup as much relevant information as possible. I would save the information so that I or another analyst could quickly access it whenever a machine crashed, SIPRnet connectivity was down, or I forgot where the data was stored.

    When backing up information I would do one or all of the following things based on my training:

    [(1)] Physical back up. I tried to keep physical back up copies of information on paper so that the information could be grabbed quickly. Also, it was easier to brief from hard copies of research and HUMINT reports.

    (2) Local drive back up. I tried to sort out information I deemed relevant and keep complete copies of the information on each of the computers I used in the Temporary Sensitive Compartmented Information Facility or T-SCIF, including my primary and secondary D6-A machines. This was stored under my user profile on the desktop.

    [(3)] Shared drive backup. Each analyst had access to a ‘T’ drive– what we called ‘T’ drive shared across the SIPRnet. It allowed others to access information that was stored on it. S6 operated the ‘T’ drive.

    [(4)] Compact disk rewritable or CD-RW back up. For larger datasets I saved the information onto a re-writable disk, labeled the disks, and stored them in the conference room of the T-SCIF. This redundancy permitted us the ability to not worry about information loss. If the system crashed, I could easily pull the information from a my secondary computer, the ‘T’ drive, or one of the CD-RWs.

    If another analyst wanted to access my data, but I was unavailable she could find my published products directory on the ‘T’ drive or on the CD-RWs. I sorted all of my products or research by date, time, and group; and updated the information on each of the storage methods to ensure that the latest information was available to them.

    During the deployment I had several of the D6-A machines crash on me. Whenever one of the a computer crashed, I usually lost information but the redundancy method ensured my ability to quickly restore old backup data and add my current information to the machine when it was repaired or replaced.

    I stored the backup CD-RW with larger datasets in the conference room of the T-SCIF or next to my workstation. I marked the CD-RWs based on the classification level and its content. Unclassified CD-RWs were only labeled with the content type and not marked with classification markings. Early on in the deployment, I only saved and stored the SigActs that were within or near our operational environment.

    Later I thought it would be easier to just to save all of the SigActs onto a CD-RW. The process would not take very long to complete and so I downloaded the SigActs from CIDNE-I onto a CD-RW. After finishing with CIDNE-I, I did the same with CIDNE-A. By retrieving the CIDNE-I and CIDNE-A SigActs I was able to retrieve the information whenever I needed it, and not rely upon the unreliable and slow SIPRnet connectivity needed to pull. Instead, I could just find the CD-RW and open up a pre-loaded spreadsheet.

    This process began in late December 2009 and continued through early January 2010. I could quickly export one month of the SigAct data at a time and download in the background as I did other tasks.

    The process took approximately a week for each table. After downloading the SigAct tables, I periodically updated them, by pulling only the most recent SigActs and simply copying them and pasting them into the database saved on the CD-RW. I never hid the fact that I had downloaded copies of both the SigAct tables from CIDNE-I and CIDNE-A. They were stored on appropriately labeled and marked CD-RWs, stored in the open.

    I viewed the saved copies of the CIDNE-I and CIDNE-A SigAct tables as being for both for my use and the use of anyone within the S2 section during the SIPRnet connectivity issues.

    In addition to the SigAct tables, I had a large repository of HUMINT reports and Counter IED reports downloaded from CIDNE-I. These contained reports that were relevant to the area in and around our operational environment in Eastern Baghdad and the Diyala Province of Iraq.

    In order to compress the data to fit onto a CD-RW, I used a compression algorithm called ‘bzip2’. The program used to compress the data is called ‘WinRAR’. WinRAR is an application that is free, and can be easily downloaded from the internet via the Non-Secure Internet Relay Protocol Network or NIPRnet. I downloaded WinRAR on NIPRnet and transferred it to the D6-A machine user profile desktop using a CD-RW. I did not try to hide the fact that I was downloading WinRAR onto my SIPRnet D6-A machine or computer.

    With the assistance of the bzip2 compression algorithm using the WinRAR program, I was able to fit all of the SigActs onto a single CD-RW and relevant HUMINT and Counter IED reports onto a separate CD-RW.

    Facts regarding my knowledge of the WikiLeaks Organization or WLO.

    I first became vaguely aware of the WLO during my AIT at Fort Huachuca, Arizona, although I did not fully pay attention until the WLO released purported Short Messaging System or SMS messages from 11 September 2001 on 25 November 2009. At that time references to the release and the WLO website showed up in my daily Google news open source search for information related to US foreign policy.

    The stories were about how WLO published about approximately 500,000 messages. I then reviewed the messages myself and realized that the posted messages were very likely real given the sheer volume and detail of the content.

    After this, I began conducting research on WLO. I conducted searches on both NIPRnet and SIPRnet on WLO beginning in late November 2009 and early December 2009. At this time I also began to routinely monitor the WLO website. In response to one of my searches in December 2009, I found the United States Army Counter Intelligence Center or USACIC report on the WikiLeaks organization. After reviewing the report, I believed that this report was possibly the one that my AIT referenced in early 2008.

    I may or may not have saved the report on my D6-A workstation. I know I reviewed the document on other occasions throughout early 2010, and saved it on both my primary and secondary laptops. After reviewing the report, I continued doing research on WLO. However, based upon my open-source collection, I discovered information that contradicted the 2008 USACIC report including information that indicated that similar to other press agencies, WLO seemed to be dedicated to exposing illegal activities and corruption.

    WLO received numerous award and recognition for its reporting activities. Also, in reviewing the WLO website, I found information regarding US military SOPs for Camp Delta at Guantanamo Bay, Cuba and information on the then outdated rules of engagement for ROE in Iraq for cross-border pursuits of former members of Saddam Hussein [missed word] government.

    After seeing the information available on the WLO website, I continued following it and collecting open source information from it. During this time period, I followed several organizations and groups including wire press agencies such as the Associated Press and Reuters and private intelligence agencies including Strategic Forecasting or Stratfor. This practice was something I was trained to do during AIT, and was something that good analysts were expected to do.

    During the searches of WLO, I found several pieces of information that I found useful in my work product– in my work as an analyst, specifically I recall WLO publishing documents related to weapons trafficking between two nations that affected my OP. I integrated this information into one or more of my work products.

    In addition to visiting the WLO website, I began following WLO using Instant Relay Chat or IRC Client called ‘XChat’ sometime in early January 2010.

    IRC is a protocol for real time internet communications by messaging and conferencing, colloquially referred to as chat rooms or chats. The IRC chat rooms are designed for group communication discussion forums. Each IRC chat room is called a channel– similar to a television where you can tune in or follow a channel– so long as it is open and does not require an invite.

    Once you joining a specific IRC conversation, other users in the conversation can see that you have joined the room. On the Internet there are millions of different IRC channels across several services. Channel topics span a range of topics covering all kinds of interests and hobbies. The primary reason for following WLO on IRC was curiosity– particularly in regards to how and why they obtained the SMS messages referenced above. I believed that collecting information on the WLO would assist me in this goal.

    Initially I simply observed the IRC conversations. I wanted to know how the organization was structured, and how they obtained their data. The conversations I viewed were usually technical in nature but sometimes switched to a lively debate on issues the particular individual may have felt strongly about.

    Over a period of time I became more involved in these discussions especially when conversations turned to geopolitical events and information technology topics, such as networking and encryption methods. Based on these observations, I would describe the WL organization as almost academic in nature. In addition to the WLO conversations, I participated in numerous other IRC channels across at least three different networks. The other IRC channels I participated in normally dealt with technical topics including with Linux and Berkley Secure Distribution BSD operating systems or OS’s, networking, encryption algorithms and techniques, and other more political topics, such as politics and [missed word].

    I normally engaged in multiple IRC conversations simultaneously– mostly publicly, but often privately. The XChat client enabled me to manage these multiple conversations across different channels and servers. The screen for XChat was often busy, but its screens enabled me to see when something was interesting. I would then select the conversation and either observe or participate.

    I really enjoyed the IRC conversations pertaining to and involving the WLO, however, at some point in late February or early March of 2010, the WLO IRC channel was no longer accessible. Instead, regular participants of this channel switched to using the Jabber server. Jabber is another internet communication [missed word] similar but more sophisticated than IRC.

    The IRC and Jabber conversations, allowed me to feel connected to others even when alone. They helped me pass the time and keep motivated throughout the deployment.

    Facts regarding the unauthorized storage and disclosure of the SigActs.

    As indicated above I created copies of the CIDNE-I and CIDNE-A SigAct tables as part of the process of backing up information. At the time I did so, I did not intend to use this information for any purpose other than for back up. However, I later decided to release this information publicly. At that time, I believe and still believe that these tables are two of the most significant documents of our time.

    On 8 January 2010, I collected the CD-RW I stored in the conference room of the T-SCIF and placed it into the cargo pocket of my ACU or Army Combat Uniform. At the end of my shift, I took the CD-RW out of the T-SCIF and brought it to my Containerized Housing Unit of CHU. I copied the data onto my personal laptop. Later at the beginning of my shift, I returned the CD-RW back to the conference room of the T-SCIF. At the time I saved the SigActs to my laptop, I planned to take them with me on mid-tour leave and decide what to do with them.

    At some point prior to my mid-tour leave, I transferred the information from my computer to a Secure Digital memory card from for my digital camera. The SD card for the camera also worked on my computer and allowed me to store the SigAct tables in a secure manner for transport.

    I began mid-tour leave on 23 January 2010, flying from Atlanta, Georgia to Reagan National Airport in Virginia. I arrived at the home of my aunt, Debra M. Van Alstyne, in Potomac, Maryland and quickly got into contact with my then boyfriend, Tyler R. Watkins. Tyler, then a student at Brandeis University in Waltham, Massachusetts, and I made plans for me to visit him [the] Boston, Massachusetts area.

    I was excited to see Tyler and planned on talking to Tyler about where our relationship was going and about my time in Iraq. However, when I arrived in the Boston area Tyler and I seemed to become distant. He did not seem very excited about my return from Iraq. I tried talking to him about our relationship but he refused to make any plans.

    I also tried to raising the topic of releasing the CIDNE-I and CIDNE-A SigAct tables to the public. I asked Tyler hypothetical questions about what he would do if he had documents that he thought the public needed access to. Tyler really didn’t really have a specific answer for me. He tried to answer the questions and be supportive, but seemed confused by the question in this and its context.

    I then tried to be more specific, but he asked too many questions. Rather than try to explain my dilemma, I decided to just to drop the conversation. After a few days in Waltham, I began to feel really bad feeling that I was over staying my welcome, and I returned to Maryland. I spent the remainder of my time on leave in the Washington, DC area.

    During this time a blizzard bombarded the mid-atlantic, and I spent a significant period of time essentially stuck in my aunt’s house in Maryland. I began to think about what I knew and the information I still had in my possession. For me, the SigActs represented the on the ground reality of both the conflicts in Iraq and Afghanistan.

    I felt that we were risking so much for people that seemed unwilling to cooperate with us, leading to frustration and anger on both sides. I began to become depressed with the situation that we found ourselves increasingly mired in year after year. The SigActs documented this in great detail and provide a context of what we were seeing on the ground.

    In attempting to conduct counter-terrorism or CT and counter-insurgency COIN operations we became obsessed with capturing and killing human targets on lists and not being suspicious of and avoiding cooperation with our Host Nation partners, and ignoring the second and third order effects of accomplishing short-term goals and missions. I believe that if the general public, especially the American public, had access to the information contained within the CIDNE-I and CIDNE-A tables this could spark a domestic debate on the role of the military and our foreign policy in general as well as it related to Iraq and Afghanistan.

    I also believed the detailed analysis of the data over a long period of time by different sectors of society might cause society to reevaluate the need or even the desire to even to engage in counterterrorism and counterinsurgency operations that ignore the complex dynamics of the people living in the effected environment everyday.

    At my aunt’s house I debated what I should do with the SigActs– in particular whether I should hold on to them– or expose them through a press agency. At this point I decided that it made sense to try to expose the SigAct tables to an American newspaper. I first called my local newspaper, The Washington Post, and spoke with a woman saying that she was a reporter. I asked her if The Washington Post would be interested in receiving information that would have enormous value to the American public.

    Although we spoke for about five minutes concerning the general nature of what I possessed, I do not believe she took me seriously. She informed me that The Washington Post would possibly be interested, but that such decisions were made only after seeing the information I was referring to and after consideration by the senior editors.

    I then decided to contact the largest and most popular newspaper, The New York Times. I called the public editor number on The New York Times website. The phone rang and was answered by a machine. I went through the menu to the section for news tips. I was routed to an answering machine. I left a message stating I had access to information about Iraq and Afghanistan that I believed was very important. However, despite leaving my Skype phone number and personal email address, I never received a reply from The New York Times.

    I also briefly considered dropping into the office for the Political Commentary blog, Politico, however the weather conditions during my leave hampered my efforts to travel. After these failed efforts I had ultimately decided to submit the materials to the WLO. I was not sure if the WLO would actually publish these the SigAct tables [missed a few words]. I was also concerned that they might not be noticed by the American media. However, based upon what I read about the WLO through my research described above, this seemed to be the best medium for publishing this information to the world within my reach.

    At my aunt’s house I joined in on an IRC conversation and stated I had information that needed to be shared with the world. I wrote that the information would help document the true cost of the wars in Iraq and Afghanistan. One of the individuals in the IRC asked me to describe the information. However, before I could describe the information another individual pointed me to the link for the WLO website’s online submission system. After ending my IRC connection, I considered my options one more time. Ultimately, I felt that the right thing to do was to release the SigActs.

    On 3 February 2010, I visited the WLO website on my computer and clicked on the submit documents link. Next I found the submit your information online link and elected to submit the SigActs via the onion router or TOR anonymizing network by a special link. TOR is a system intended to provide anonymity online. The software routes internet traffic through a network of servers and other TOR clients in order to conceal the user’s location and identity.

    I was familiar with TOR and had it previously installed on a computer to anonymously monitor the social media websites of militia groups operating within central Iraq. I followed the prompts and attached the compressed data files of CIDNE-I and CIDNE-A SigActs. I attached a text file I drafted while preparing to provide the documents to The Washington Post. It provided rough guidelines saying ‘It’s already been sanitized of any source identifying information. You might need to sit on this information– perhaps 90 to 100 days to figure out how best to release such a large amount of data and to protect its source. This is possibly one of the more significant documents of our time removing the fog of war and revealing the true nature of twenty-first century asymmetric warfare. Have a good day.’

    After sending this, I left the SD card in a camera case at my aunt’s house in the event I needed it again in the future. I returned from mid-tour leave on 11 February 2010. Although the information had not yet been publicly published by the WLO, I felt this sense of relief by them having it. I felt I had accomplished something that allowed me to have a clear conscience based upon what I had seen and read about and knew were happening in both Iraq and Afghanistan everyday.

    Facts regarding the unauthorized storage and disclosure of 10 Reykjavik 13.

    I first became aware of the diplomatic cables during my training period in AIT. I later learned about the Department of State or DoS Net-centric Diplomacy NCD portal from the 2/10 Brigade Combat Team S2, Captain Steven Lim. Captain Lim sent a section wide email to the other analysts and officers in late December 2009 containing the SIPRnet link to the portal along with the instructions to look at the cables contained within them and to incorporate them into our work product.

    Shortly after this I also noticed the diplomatic cables were being reported to in products from the corps level US Forces Iraq or USF-I. Based upon Captain Lim’s direction to become familiar with its contents, I read virtually every published cable concerning Iraq.

    I also began scanning the database and reading other random cables that piqued my curiosity. It was around this time– in early to mid-January of 2010, that I began searching the database for information on Iceland. I became interested in Iceland due to the IRC conversations I viewed in the WLO channel discussing an issue called Icesave. At this time I was not very familiar with the topic, but it seemed to be a big issue for those participating in the conversation. This is when I decided to investigate and conduct a few searches on Iceland and find out more.

    At the time, I did not find anything discussing the Icesave issue either directly or indirectly. I then conducted an open source search for Icesave. I then learned that Iceland was involved in a dispute with the United Kingdom and the Netherlands concerning the financial collapse of one or more of Iceland’s banks. According to open source reporting much of the public controversy involved the United Kingdom’s use of anti-terrorism legislation against Iceland in order to freeze Icelandic access assets for payment of the guarantees for UK depositors that lost money.

    Shortly after returning from mid-tour leave, I returned to the Net Centric Diplomacy portal to search for information on Iceland and Icesave as the topic had not abated on the WLO IRC channel. To my surprise, on 14 February 2010, I found the cable 10 Reykjavik 13, which referenced the Icesave issue directly.

    The cable published on 13 January 2010 was just over two pages in length. I read the cable and quickly concluded that Iceland was essentially being bullied diplomatically by two larger European powers. It appeared to me that Iceland was out viable options and was coming to the US for assistance. Despite the quiet request for assistance, it did not appear that we were going to do anything.

    From my perspective it appeared that we were not getting involved due to the lack of long term geopolitical benefit to do so. After digesting the contents of 10 Reykjavik 13 I debated on whether this was something I should send to the WLO. At this point the WLO had not published or acknowledged receipt of the CIDNE-I and CIDNE-A SigAct tables. Despite not knowing that if the SigActs were a priority for the WLO, I decided the cable was something that would be important and I felt that I would I might be able to right a wrong by having them publish this document. I burned the information onto a CD-RW on 15 February 2010, took it to my CHU, and saved it onto my personal laptop.

    I navigated to the WLO website via a TOR connection like before and uploaded the document via the secure form. Amazingly, when WLO published 10 Reykjavik 13 within hours, proving that the form worked and that they must have received the SigAct tables.

    Facts regarding the unauthorized storage and disclosure of the 12 July 2007 aerial weapons team or AW team video.

    During the mid-February 2010 time frame the 2nd Brigade Combat Team, 10th Mountain Division targeting analyst , then Specialist Jihrleah W. Showman and others discussed a video that Ms. Showman had found on the ‘T’ drive.

    The video depicted several individuals being engaged by an aerial weapons team. At first I did not consider the video very special, as I have viewed countless other war porn type videos depicting combat. However, the recording of audio comments by the aerial weapons team crew and the second engagement in the video of an unarmed bongo truck troubled me.

    As Showman and a few other analysts and officers in the T-SCIF commented on the video and debated whether the crew violated the rules of engagement or ROE in the second engagement, I shied away from this debate, instead conducting some research on the event. I wanted to learn what happened and whether there was any background to the events of the day that the event occurred, 12 July 2007.

    Using Google I searched for the event by its date by its and general location. I found several news accounts involving two Reuters employees who were killed during the aerial weapon team engagement. Another story explained that Reuters had requested for a copy of the video under the Freedom of Information Act or FOIA. Reuters wanted to view the video in order to be able to understand what had happened and to improve their safety practices in combat zones. A spokesperson for Reuters was quoted saying that the video might help avoid the reoccurrence of the tragedy and believed there was a compelling need for the immediate release of the video.

    Despite the submission of the FOIA request, the news account explained that CENTCOM replied to Reuters stating that they could not give a time frame for considering a FOIA request and that the video might no longer exist. Another story I found written a year later said that even though Reuters was still pursuing their request, they still did not receive a formal response or written determination in accordance with FOIA.

    The fact neither CENTCOM or Multi National Forces Iraq or MNF-I would not voluntarily release the video troubled me further. It was clear to me that the event happened because the aerial weapons team mistakenly identified Reuters employees as a potential threat and that the people in the bongo truck were merely attempting to assist the wounded. The people in the van were not a threat but merely ‘good samaritans’. The most alarming aspect of the video to me, however, was the seemly delightful bloodlust they appeared to have.

    They dehumanized the individuals they were engaging and seemed to not value human life by referring to them as quote “dead bastards” unquote and congratulating each other on the ability to kill in large numbers. At one point in the video there is an individual on the ground attempting to crawl to safety. The individual is seriously wounded. Instead of calling for medical attention to the location, one of the aerial weapons team crew members verbally asks for the wounded person to pick up a weapon so that he can have a reason to engage. For me, this seems similar to a child torturing ants with a magnifying glass.

    While saddened by the aerial weapons team crew’s lack of concern about human life, I was disturbed by the response of the discovery of injured children at the scene. In the video, you can see that the bongo truck driving up to assist the wounded individual. In response the aerial weapons team crew– as soon as the individuals are a threat, they repeatedly request for authorization to fire on the bongo truck and once granted they engage the vehicle at least six times.

    Shortly after the second engagement, a mechanized infantry unit arrives at the scene. Within minutes, the aerial weapons team crew learns that children were in the van and despite the injuries the crew exhibits no remorse. Instead, they downplay the significance of their actions, saying quote “Well, it’s their fault for bringing their kid’s into a battle” unquote.

    The aerial weapons team crew members sound like they lack sympathy for the children or the parents. Later in a particularly disturbing manner, the aerial weapons team crew verbalizes enjoyment at the sight of one of the ground vehicles driving over a body– or one of the bodies. As I continued my research, I found an article discussing the book, The Good Soldiers, written by Washington Post writer David Finkel.

    In Mr. Finkel book, he writes about the aerial weapons team attack. As, I read an online excerpt in Google Books, I followed Mr. Finkel’s account of the event belonging to the video. I quickly realize that Mr. Finkel was quoting, I feel in verbatim, the audio communications of the aerial weapons team crew.

    It is clear to me that Mr. Finkel obtained access and a copy of the video during his tenure as an embedded journalist. I was aghast at Mr. Finkel’s portrayal of the incident. Reading his account, one would believe the engagement was somehow justified as ‘payback’ for an earlier attack that lead to the death of a soldier. Mr. Finkel ends his account of the engagement by discussing how a soldier finds an individual still alive from the attack. He writes that the soldier finds him and sees him gesture with his two forefingers together, a common method in the Middle East to communicate that they are friendly. However, instead of assisting him, the soldier makes an obscene gesture extending his middle finger.

    The individual apparently dies shortly thereafter. Reading this, I can only think of how this person was simply trying to help others, and then he quickly finds he needs help as well. To make matter worse, in the last moments of his life, he continues to express his friendly gesture– his friendly intent– only to find himself receiving this well known gesture of unfriendliness. For me it’s all a big mess, and I am left wondering what these things mean, and how it all fits together , and it burdens me emotionally.

    I saved a copy of the video on my workstation. I searched for and found the rules of engagement, the rules of engagement annexes, and a flow chart from the 2007 time period– as well as an unclassified Rules of Engagement smart card from 2006. On 15 February 2010 I burned these documents onto a CD-RW, the same time I burned the 10 Reykjavik 13 cable onto a CD-RW. At the time, I placed the video and rules for of engagement information onto my personal laptop in my CHU. I planned to keep this information there until I redeployed in Summer of 2010. I planned on providing this to the Reuters office in London to assist them in preventing events such as this in the future.

    However, after the WLO published 10 Reykjavik 13 I altered my plans. I decided to provide the video and the rules of engagement to them so that Reuters would have this information before I re-deployed from Iraq. On about 21 February 2010, I as described above, I used the WLO submission form and uploaded the documents. The WLO released the video on 5 April 2010. After the release, I was concern about the impact of the video and how it would be received by the general public.

    I hoped that the public would be as alarmed as me about the conduct of the aerial weapons team crew members. I wanted the American public to know that not everyone in Iraq and Afghanistan are targets that needed to be neutralized, but rather people who were struggling to live in the pressure cooker environment of what we call asymmetric warfare. After the release I was encouraged by the response in the media and general public, who observed the aerial weapons team video. As I hoped, others were just as troubled– if not more troubled that me by what they saw.

    At this time, I began seeing reports claiming that the Department of Defense and CENTCOM could not confirm the authenticity of the video. Additionally, one of my supervisors, Captain Casey Fulton, stated her belief that the video was not authentic. In her response, I decided to ensure that the authenticity of the video would not be questioned in the future. On 25 February 2010, I emailed Captain Fulton a link to the video that was on our ‘T’ drive, and a copy of the video published by WLO that was collected by the Open Source Center, so she could compare them herself.

    Around this time frame, I burned a second CD-RW containing the aerial weapons team video. In order to made it appear authentic, I placed a classification sticker and wrote Reuters FOIA REQ on its face. I placed the CD-RW in one of my personal CD cases containing a set of ‘Starting Out in Arabic’ CD’s. I planned on mailing out the CD-RW to Reuters after our I re-deployed , so they could have a copy that was unquestionably authentic.

    Almost immediately after submitting the aerial weapons team video and the rules of engagement documents I notified the individuals in the WLO IRC to expect an important submission. I received a response from an individual going by the handle of ‘ox’ ‘office’– at first our conversations were general in nature, but over time as our conversations progressed, I accessed assessed this individual to be an important part of the WLO.

    Due to the strict adherence of anonymity by the WLO, we never exchanged identifying information. However, I believe the individual was likely Mr. Julian Assange [he pronounced it with three syllables], Mr. Daniel Schmidt, or a proxy representative of Mr. Assange and Schmidt.

    As the communications transferred from IRC to the Jabber client, I gave ‘ox’ ‘office’ and later ‘pressassociation’ the name of Nathaniel Frank in my address book, after the author of a book I read in 2009.

    After a period of time, I developed what I felt was a friendly relationship with Nathaniel. Our mutual interest in information technology and politics made our conversations enjoyable. We engaged in conversation often. Sometimes as long as an hour or more. I often looked forward to my conversations with Nathaniel after work.

    The anonymity that was provided by TOR and the Jabber client and the WLO’s policy allowed me to feel I could just be myself, free of the concerns of social labeling and perceptions that are often placed upon me in real life. In real life, I lacked a closed friendship with the people I worked with in my section, the S2 section.

    In my section, the S2 section and supported battalions and the 2nd Brigade Combat Team as a whole. For instance, I lacked close ties with my roommate to his discomfort regarding my perceived sexual orientation. Over the next few months, I stayed in frequent contact with Nathaniel. We conversed on nearly a daily basis and I felt that we were developing a friendship.

    Conversations covered many topics and I enjoyed the ability to talk about pretty much everything anything, and not just the publications that the WLO was working on. In retrospect I realize that that these dynamics were artificial and were valued more by myself than Nathaniel. For me these conversations represented an opportunity to escape from the immense pressures and anxiety that I experienced and built up through out the deployment. It seems that as I tried harder to fit in at work, the more I seemed to alienate my peers and lose the respect, trust, and support I needed.

    Facts regarding the unauthorized storage and disclosure of documents related to the detainments by the Iraqi Federal Police or FP, and the Detainee Assessment Briefs, and the USACIC United States Army Counter Intelligence Center report.

    On 27 February 2010, a report was received from a subordinate battalion. The report described an event in which the Federal Police or FP detained 15 individuals for printing anti-Iraqi literature. On 2 March 2010, I received instructions from an S3 section officer in the 2nd Brigade Combat Team, 10th Mountain Division Tactical Operation Center or TOC to investigate the matter, and figure out who these quote ‘bad guys’ unquote were and how significant this event was for the Federal Police.

    Over the course of my research I found that none of the individuals had previous ties to anti-Iraqi actions or suspected terrorist militia groups. A few hours later, I received several photos from the scene– from the subordinate battalion. They were accidentally sent to an officer on a different team on than the S2 section and she forwarded them to me.

    These photos included picture of the individuals, pallets of unprinted paper and seized copies of the final printed material or the printed document; and a high resolution photo of the printed material itself. I printed up one [missed word] copy of a high resolution photo– I laminated it for ease of use and transfer. I then walked to the TOC and delivered the laminated copy to our category two interpreter.

    She reviewed the information and about a half an hour later delivered a rough written transcript in English to the S2 section. I read the transcript and followed up with her, asking her for her take on the content. She said it was easy for her to transcribe verbatim, since I blew up the photograph and laminated it. She said the general nature of the document was benign. The documentation, as I had sensed as well, was merely a scholarly critique of the then current Iraqi Prime Minister Nouri al-Maliki.

    It detailed corruption within the cabinet of al-Maliki’s government and the financial impact of his corruption on the Iraqi people. After discovering this discrepancy between the Federal Police’s report and the interpreter’s transcript, I forwarded this discovery to the top OIC and the battle NCOIC. The top OIC and the overhearing battle captain informed me that they didn’t need or want to know this information anymore. They told me to quote “drop it” unquote and to just assist them and the Federal Police in finding out, where more of these print shops creating quote “anti-Iraqi literature” unquote.

    I couldn’t believe what I heard and I returned to the T-SCIF and complained to the other analysts and my section NCOIC about what happened. Some were sympathetic, but no one wanted to do anything about it.

    I am the type of person who likes to know how things work. And, as an analyst, this means I always want to figure out the truth. Unlike other analysts in my section or other sections within the 2nd Brigade Combat Team, I was not satisfied with just scratching the surface and producing canned or cookie cutter assessments. I wanted to know why something was the way it was, and what we could to correct or mitigate a situation.

    I knew that if I continued to assist the Baghdad Federal Police in identifying the political opponents of Prime Minister al-Maliki, those people would be arrested and in the custody of the Special Unit of the Baghdad Federal Police and very likely tortured and not seen again for a very long time– if ever.

    Instead of assisting the Special Unit of the Baghdad Federal Police, I decided to take the information and expose it to the WLO, in the hope that before the upcoming 7 March 2010 election, they could generate some immediate press on the issue and prevent this unit of the Federal Police from continuing to crack down on political opponents of al-Maliki.

    On 4 March 2010, I burned the report, the photos, the high resolution copy of the pamphlet, and the interpreter’s hand written transcript onto a CD-RW. I took the CD-RW to my CHU and copied the data onto my personal computer. Unlike the times before, instead of uploading the information through the WLO website’s submission form. I made a Secure File Transfer Protocol or SFTP connection to a file drop box operated by the WLO.

    The drop box contained a folder that allowed me to upload directly into it. Saving files into this directory, allowed anyone with log in access to the server to view and download them. After uploading these files to the WLO, on 5 March 2010, I notified Nathaniel over Jabber. Although sympathetic, he said that the WLO needed more information to confirm the event in order for it to be published or to gain interest in the international media.

    I attempted to provide the specifics, but to my disappointment, the WLO website chose not to publish this information. At the same time, I began sifting through information from the US Southern Command or SOUTHCOM and Joint Task Force Guantanamo, Cuba or JTF-GTMO. The thought occurred to me– although unlikely, that I wouldn’t be surprised if the individuals detainees detained by the Federal Police might be turned over back into US custody– and ending up in the custody of Joint Task Force Guantanamo.

    As I digested through the information on Joint Task Force Guantanamo, I quickly found the Detainee Assessment Briefs or DABs. I previously came across the documents before in 2009 but did not think much about them. However, this time I was more curious in during this search and I found them again.

    The DABs were written in standard DoD memorandum format and addressed the commander US SOUTHCOM. Each memorandum gave basic and background information about a specific detainee held at some point by Joint Task Force Guantanamo. I have always been interested on the issue of the moral efficacy of our actions surrounding Joint Task Force Guantanamo. On the one hand, I have always understood the need to detain and interrogate individuals who might wish to harm the United States and our allies, however, I felt that’s what we were trying to do at Joint Task Force Guantanamo.

    However, the more I became educated on the topic, it seemed that we found ourselves holding an increasing number of individuals indefinitely that we believed or knew to be innocent, low level foot soldiers that did not have useful intelligence and would be released if they were still held in theater.

    I also recall that in early 2009 the, then newly elected president, Barack Obama, stated that he would close Joint Task Force Guantanamo, and that the facility compromised our standing over all, and diminished our quote ‘moral authority’ unquote.

    After familiarizing myself with the Detainee Assessment Briefs, I agree. Reading through the Detainee Assessment Briefs, I noticed that they were not analytical products, instead they contained summaries of tear line versions of interim intelligence reports that were old or unclassified. None of the DABs contained the names of sources or quotes from tactical interrogation reports or TIR’s. Since the DABs were being sent to the US SOUTHCOM commander, I assessed that they were intended to provide a very general background information on each of the detainees and not a detailed assessment.

    In addition to the manner in which the DAB’s were written, I recognized that they were at least several years old, and discussed detainees that were already released from Joint Task Force Guantanamo. Based on this, I determined that the DABs were not very important from either an intelligence or a national security standpoint. On 7 March 2010, during my Jabber conversation with Nathaniel, I asked him if he thought the DABs were of any use to anyone.

    Nathaniel indicated, although he did not believe that they were of political significance, he did believe that they could be used to merge into the general historical account of what occurred at Joint Task Force Guantanamo. He also thought that the DAB’s might be helpful to the legal counsel of those currently and previously held at JTF-GTMO.

    After this discussion, I decided to download the data DABs. I used an application called Wget to download the DABs. I downloaded Wget off of the NIPRnet laptop in the T-SCIF, like other programs. I saved that onto a CD-RW, and placed the executable in my ‘My Documents’ directory on of my user profile, on the D6-A SIPRnet workstation.

    On 7 March 2010, I took the list of links for the Detainee Assessment Briefs, and Wget downloaded them sequentially. I burned the data onto a CD-RW, and took it into my CHU, and copied them to my personal computer. On 8 March 2010, I combined the Detainee Assessment Briefs with the United States Army Counterintelligence Center report on the WLO, into a compressed [missed word] IP or zip file. Zip files contain multiple files which are compressed to reduce their size.

    After creating the zip file, I uploaded the file onto their cloud drop box via Secure File Transfer Protocol. Once these were uploaded, I notified Nathaniel that the information was in the ‘x’ directory, which had been designated for my own use. Earlier that day, I downloaded the USACIC report on WLO.

    As discussed about above, I previously reviewed the report on numerous occasions and although I saved the document onto the work station before, I could not locate it. After I found the document again, I downloaded it to my work station, and saved it onto the same CD-RW as the Detainee Assessment Briefs described above.

    Although my access included a great deal of information, I decided I had nothing else to send to WLO after sending the Detainee Assessment Briefs and the USACIC report. Up to this point I had sent them the following: the CIDNE-I and CIDNE-A SigActs tables; the Reykjavik 13 Department of State Cable; the 12 July 2007 aerial weapons team video and the 2006-2007 rules of engagement documents; the SigAct report and supporting documents concerning the 15 individuals detained by the Baghdad Federal Police; the USSOUTHCOM and Joint Task Force Guantanamo Detainee Assessment Briefs; a USACIC report on the WikiLeaks organization website.

    Over the next few weeks I did not send any additional information to the WLO. I continued to converse with Nathaniel over the Jabber client and in the WLO IRC channel. Although I stopped sending documents to WLO, no one associated with the WLO pressured me into giving more information. The decisions that I made to send documents and information to the WLO and the website were my own decisions, and I take full responsibility for my actions.

    Facts regarding the unauthorized storage and disclosure of other Government documents.

    One 22 March 2010, I downloaded two documents. I found these documents over the course of my normal duties as an analyst. Based on my training and the guidance of my superiors, I look at as much information as possible.

    Doing so provided me with the ability to make connections that others might miss. On several occasions during the month of March, I accessed information from a government entity. I read several documents from a section within this government entity. The content of two of these documents upset me greatly. I had difficulty believing what this section was doing.

    On 22 March 2010, I downloaded the two documents that I found troubling. I compressed them into a zip file named blah.zip and burned them onto a CD-RW. I took the CD-RW to my CHU and saved the file to my personal computer.

    I uploaded the information to the WLO website using the designated prompts.

    Facts regarding the unauthorized storage and disclosure of the Net Centric Diplomacy Department of State cables.

    In late March of 2010, I received a warning over Jabber from Nathaniel, that the WLO website would be publishing the aerial weapons team video. He indicated that the WLO would be very busy and the frequency and intensity of our Jabber conversations decrease significantly. During this time, I had nothing but work to distract me.

    I read more of the diplomatic cables published on the Department of State Net Centric Diplomacy server. With my insatiable curiosity and interest in geopolitics I became fascinated with them. I read not only the cables on Iraq, but also about countries and events that I found interesting.

    The more I read, the more I was fascinated with by the way that we dealt with other nations and organizations. I also began to think that the documented backdoor deals and seemingly criminal activity that didn’t seem characteristic of the de facto leader of the free world.

    Up to this point, during the deployment, I had issues I struggled with and difficulty at work. Of the documents release, the cables were the only one I was not absolutely certain couldn’t harm the United States. I conducted research on the cables published on the Net Centric Diplomacy, as well as how Department of State cables worked in general.

    In particular, I wanted to know how each cable was published on SIRPnet via the Net Centric Diplomacy. As part of my open source research, I found a document published by the Department of State on its official website.

    The document provided guidance on caption markings for individual cables and handling instructions for their distribution. I quickly learned the caption markings clearly detailed the sensitivity level of the Department of State cables. For example, NODIS or No Distribution was used for messages at the highest sensitivity and were only distributed to the authorized recipients.

    The SIPDIS or SIPRnet distribution caption was applied only to recording of other information messages that were deemed appropriate for a release for a wide number of individuals. According to the Department of State guidance for a cable to have the SIPDIS [missed word] caption, it could not include other captions that were intended to limit distribution.

    The SIPDIS caption was only for information that could only be shared with anyone with access to SIPRnet. I was aware that thousands of military personnel, DoD, Department of State, and other civilian agencies had easy access to the tables. The fact that the SIPDIS caption was only for wide distribution made sense to me, given that the vast majority of the Net Centric Diplomacy Cables were not classified.

    The more I read the cables, the more I came to the conclusion that this was the type of information that– that this type of information should become public. I once read a and used a quote on open diplomacy written after the First World War and how the world would be a better place if states would avoid making secret pacts and deals with and against each other.

    I thought these cables were a prime example of a need for a more open diplomacy. Given all of the Department of State cables information that I read, the fact that most of the cables were unclassified, and that all the cables have a SIPDIS caption, I believe that the public release of these cables would not damage the United States; however, I did believe that the cables might be embarrassing, since they represented very honest opinions and statements behind the backs of other nations and organizations.

    In many ways these cables are a catalogue of cliques and gossip. I believed exposing this information might make some within the Department of State and other government entities unhappy. On 22 March 2010, I began downloading a copy of the SIPDIS cables using the program Wget, described above.

    I used instances of the Wget application to download the Net Centric Diplomacy cables in the background. As I worked on my daily tasks, the Net Centric Diplomacy cables were downloaded from 28 March 2010 to 9 April 2010. After downloading the cables, I saved them onto a CD-RW.

    These cables went from the earliest dates in Net Centric Diplomacy to 28 February 2010. I took the CD-RW to my CHU on 10 April 2010. I sorted the cables on my personal computer, compressed them using the bzip2 compression algorithm described above, and uploaded them to the WLO via designated drop box described above.

    On 3 May 2010, I used Wget to download and update of the cables for the months of March 2010 and April 2010 and saved the information onto a zip file and burned it to a CD-RW. I then took the CD-RW to my CHU and saved those to my computer. I later found that the file was corrupted during the transfer. Although I intended to re-save another copy of these cables, I was removed from the T-SCIF on 8 May 2010 after an altercation.

    Facts regarding the unauthorized storage and disclosure of Garani, Farah Province Afghanistan 15-6 Investigation and Videos.

    [NB Pfc. Manning plead ‘not guilty’ to the Specification 11, Charge II for the Garani Video as charged by the government, which alleged as November charge date. Read more here.]

    In late March 2010, I discovered a US CENTCOM directly on a 2009 airstrike in Afghanistan. I was searching CENTCOM for information I could use as an analyst. As described above, this was something that myself and other analysts and officers did on a frequent basis. As I reviewed the documents I recalled the incident and what happened. The airstrike occurred in the Garani village in the Farah Province, Northwestern Afghanistan. It received worldwide press coverage during the time as it was reported that up to 100 to 150 Afghan civilians– mostly women and children– were accidentally killed during the airstrike.

    After going through the report and the [missed word] annexes, I began to review the incident as being similar to the 12 July 2007 aerial weapons team engagements in Iraq. However, this event was noticeably different in that it involved a significantly higher number of individuals, larger aircraft and much heavier munitions. Also, the conclusions of the report are even more disturbing than those of the July 2007 incident.

    I did not see anything in the 15-6 report or its annexes that gave away sensitive information. Rather, the investigation and its conclusions helped explain how this incident occurred, and were– what those involved should have done, and how to avoid an event like this from occurring again.

    After investigating the report and its annexes, I downloaded the 15-6 investigation, PowerPoint presentations, and several other supporting documents to my D6-A workstation. I also downloaded three zip files containing the videos of the incident. I burned this information onto a CD-RW and transferred it to the personal computer in my CHU. I did later that day or the next day– I uploaded the information to the WLO website this time using a new version of the WLO website submission form.

    Unlike other times using the submission form above, I did not activate the TOR anonymizer. Your Honor, this concludes my statement and facts for this providence inquiry.

    __________

    UPDATE: On March 2, 2013, I went through each line of the rush transcript published here on March 1 to check it for accuracy and inadvertent typos or misspellings.

    Since multiple news outlets have printed the rush transcript that was originally published here; every single amendment made during this review– including non-substantive typos– are noted with a strike-through and/or highlighted.

    When I first published the rush transcript of Manning’s statement, I had noted under “Facts regarding the unauthorized storage and disclosure of the 12 July 2007 aerial weapons team or AW team video” that the handle of the individual who Manning said he interacted with was ‘office’ and not ‘ox’.

    When Guardian journalist, Ed Pilkington, approached me to ask for permission to publish the rush transcript on the guardian.co.uk, we had a quick conversation concerning the fact that both he and a Wired journalist had noted the handle was ‘ox’ and not ‘office’.

    Because of the overriding need to publish Manning’s statement as soon as possible, and my being back in Court at Fort Meade during our exchange after having worked through the night to get a rush transcript completed and published, I quickly deferred to consensus and amended ‘office’ to ‘ox’.

    After reviewing my rush transcript line-by-line, however, I stand by my original notation of the handle as ‘office’, and not ‘ox’. I have amended the transcript above to reflect that determination.
    Categories: Bradley Manning, WikiLeaks

    By Alexa O’Brien on February 28, 2013 11:59 AM |

    Find this story at 28 February 2013

    Bradley Manning Gets No Love From The New York Times

    Last week, in a Grisham-like courtroom scene, Bradley Manning—the Army private charged with leaking hundreds of thousands of classified war logs and State Department cables to WikiLeaks—testified publicly for the first time since his arrest in May of 2010. For more than five hours, Manning described the two months he spent in a “cage” inside a dark tent in Kuwait and the nine months that followed in 23-hours-a-day solitary confinement on a Marine Corps Brig in Quantico, Virginia. In one theatrical moment, Manning got up from the stand and paced inside a 6 by 8 tape outline on the courtroom floor to demonstrate the size of his prison cell. In another, he donned the suicide smock he had to wear.

    Manning’s testimony was the climax of a week of pre-trial hearings about his experience at Quantico, which, his lawyer argued, was illegal and grounds for dropping the charges against him. The details about Manning’s captors revealed in the hearings—they called his underwear, which they removed at night so he wouldn’t hang himself by the waistband, “panties”; penned a poem about his presumed suicidal tendencies inspired by Dr. Seuss’s Green Eggs and Ham (“I can wear them in a box / I can wear them with a fox / I can wear them in the day / I can wear them so I say / But I can’t wear them at night / My comments gave the staff a fright”); and ignored a psychiatrist’s recommendations for fewer restrictions—made dispatches read more like a scene from The Lives of Others than a court proceeding in the United States.

    There was, however, a notable absence in the courtroom: The New York Times. The paper did not cover the hearings, picking up only one dispatch from the Associated Press. This is odd, especially considering the Times benefited as much as anyone from the material that Manning leaked. After partnering with WikiLeaks to release the cables in July 2010, the Times continued to rely on the documents Manning leaked to Assange in its reporting. In April 2011, an analysis in The Atlantic Wire showed that 54, or nearly half, of the newspaper’s 115 issues so far that year, had contained stories that “relied on WikiLeaks documents as sources.”

    “It’s really crazy,” says Michael Ratner, a human rights lawyer from the Center for Constitutional Rights who has been defending Julian Assange. “[T]he key leaker in U.S. history in the last decade, and they don’t cover his treatment? He’s the one whose materials they used and they don’t cover it? I don’t get it. [T]hey had to make a decision not to do it.”

    The Times has covered Manning’s trial to some degree–in early November, the paper published a story about Manning’s plans to plead guilty to some charges and the Times’ editorialized against Manning’s poor treatment at Quantico back in March of 2011. But last week’s hearing, with Manning’s direct testimony, seemed especially newsworthy–outlets including CNN, The Washington Post, The New Yorker, and New York Magazine covered it. The Guardian, another newspaper that collaborated with Wikileaks and the Times, sent veteran reporter Ed Pilkington, the chief reporter for Guardian U.S. and a former national and international editor for the paper. Pilkington called his decision to cover the hearings in depth “pure news judgement,” when we spoke.

    Like thorough, unbiased reporting that challenges your way of thinking? Subscribe to The New Republic for $3.99/month.

    The Times has always had a rocky relationship with WikiLeaks, Manning, and other leakers of state secrets. After publishing the cables, Bill Keller, the Times executive editor at the time, wrote an 8,000-word New York Times Magazine story in which he compared Julian Assange to a “bag lady.” “We regarded Assange throughout as a source, not as a partner or collaborator,” he wrote. The Guardian, on the other hand, sought “partnership between a mainstream newspaper and WikiLeaks: a new model of cooperation aimed at publishing the world’s biggest leak,” as Yochai Benkler described it in the Harvard Civil-Rights Civil-Liberties Law Review. (My emails to Times executive editor Jill Abramson, Washington bureau chief David Leonhardt, and Keller, were not answered.)

    The Times’ attitude towards Assange and Manning is, at least, consistent with its treatment of leakers in the past. Even though the Times had to defend itself in court for publishing the Pentagon Papers, Daniel Ellberg told me over the phone that the paper’s lawyers refused to offer him even the smalles amount of help with his criminal case (which was eventually dismissed). In Ellsberg’s telling, A.M. Rosenthal, then the editor-in-chief of the Times, told him there was no policy at the paper regarding prosecutions of sources: Ellsberg was, after all, the first person ever prosecuted for leaking classified government documents to the press.

    “Editors and reporters have a good deal of ambivalence towards their sources, especially in the national security field,” Ellsberg told me. “They all thought I had broken the law, and a lot of them may have thought I was a traitor even though they used the material.” When Assange expressed his shock to Ellsberg over a critical profile the Times published about him, Ellsberg told him “don’t take it personally, they didn’t treat me any better.”

    DECEMBER 5, 2012
    BY ELIZA GRAY

    Find this story at 5 December 2013

    COPYRIGHT 2013 © THE NEW REPUBLIC

    Inside the Terror Factory; Award-winning journalist Trevor Aaronson digs deep into the FBI’s massive efforts to create fake terrorist plots.

    Editor’s note: This story is adapted from The Terror Factory [1], Trevor Aaronson’s new book documenting how the Federal Bureau of Investigation has built a vast network of informants to infiltrate Muslim communities and, in some cases, cultivate phony terrorist plots. The book grew from Aaronson’s award-winning [2] Mother Jones cover story “The Informants [3]” and his research in the Investigative Reporting Program at the University of California-Berkeley.

    Quazi Mohammad Nafis was a 21-year-old student living in Queens, New York, when the US government helped turn him into a terrorist.

    His transformation began on July 5, when Nafis, a Bangladeshi citizen who’d come to the United States on a student visa that January, shared aspirations with a man he believed he could trust. Nafis told this man in a phone call that he wanted to wage jihad in the United States, that he enjoyed reading Al Qaeda propaganda, and that he admired “Sheikh O,” or Osama bin Laden. Who this confidant was and how Nafis came to meet him remain unclear; what we know from public documents is that the man told Nafis he could introduce him to an Al Qaeda operative.

    Our Yearlong Investigation Into the Program to Spy on America’s Muslim Communities [3]
    How the Bureau Enlists Foreign Regimes to Detain and Interrogate US Citizens [4]
    When Did Lefty Darling Brandon Darby Turn Government Informant? [5]
    Charts from Our Terror Trial Database [6]
    Watch an FBI Surveillance Video [7]
    Documents: FBI Spies and Suspects, in Their Own Words [8]
    It was a hot, sunny day in Central Park on July 24 when Nafis met with Kareem, who said he was with Al Qaeda. Nafis, who had a slight build, mop of black hair, and a feebly grown beard, told Kareem that he was “ready for action.”

    “What I really mean is that I don’t want something that’s, like, small,” Nafis said. “I just want something big. Something very big. Very, very, very, very big, that will shake the whole country.”

    Nafis said he wanted to bomb the New York Stock Exchange, and with help from his new Al Qaeda contact, he surveilled the iconic building at 11 Wall Street. “We are going to need a lot of TNT or dynamite,” Nafis told Kareem. But Nafis didn’t have any explosives, and, as court records indicate, he didn’t know anyone who could sell him explosives, let alone have the money to purchase such materials. His father, a banker in Bangladesh, had spent his entire life savings to send Nafis to the United States after his son, who was described to journalists as dim by people who knew him in his native country, had flunked out of North South University in Bangladesh.

    Kareem suggested they rent a storage facility to stash the material they’d need for a car bomb. He said he’d put up the money for it, and get the materials. Nafis dutifully agreed, and suggested a new target: the Federal Reserve Bank of New York. Nafis later met Kareem at a storage facility, where Nafis poured the materials Kareem had brought into trash bins, believing he was creating a 1,000-pound car bomb that could level a city block.

    In truth, the stuff was inert. And Kareem was an undercover FBI agent, tipped off by the man who Nafis had believed was a confidant—an FBI informant. The FBI had secretly provided everything Nafis needed for his attack: not only the storage facility and supposed explosives, but also the detonator and the van that Nafis believed would deliver the bomb.

    On the morning of October 17, Nafis and Kareem drove the van to Lower Manhattan and parked it in front of the Federal Reserve Bank on Liberty Street. Then they walked to a nearby hotel room, where Nafis dialed on his cellphone the number he believed would trigger the bomb, but nothing happened. He dialed again, and again. The only result was Nafis’ apprehension by federal agents.

    “The defendant thought he was striking a blow to the American economy,” US Attorney Loretta E. Lynch said in a statement after the arrest. “At every turn, he was wrong, and his extensive efforts to strike at the heart of the nation’s financial system were foiled by effective law enforcement. We will use all of the tools at our disposal to stop any such attack before it can occur.”
    How many of these would-be terrorists would have acted were it not for an FBI agent provocateur helping them? Is it possible that the FBI is creating the very enemy we fear?

    Federal officials say they are protecting Americans with these operations—but from whom? Real terrorists, or dupes like Nafis, who appear unlikely to have the capacity for terrorism were it not for FBI agents providing the opportunity and means?

    Nafis is one of more than 150 men since 9/11 who have been caught in FBI terrorism stings, some of whom have received 25 years or more in prison. In these cases, the FBI uses one of its more than 15,000 registered informants—many of them criminals, others trying to stay in the country following immigration violations—to identify potential terrorists. It then provides the means necessary for these would-be terrorists to move forward with a plot—in some cases even planting specific ideas for attacks. The FBI now spends $3 billion on counterterrorism annually, the largest portion of its budget. Our nation’s top law enforcement agency, traditionally focused on investigating crimes after they occur, now operates more as an intelligence organization that tries to preempt crimes before they occur. But how many of these would-be terrorists would have acted were it not for an FBI agent provocateur helping them? Is it possible that the FBI is creating the very enemy we fear?

    Those are the questions I set out to explore beginning in 2010. With the help of a research assistant, I built a database of more than 500 terrorism prosecutions since 9/11 [9], looking closely and critically at every terrorism case brought into federal courts during the past decade. We pored through thousands of pages of court records, and found that nearly half of all terrorism cases since 9/11 involved informants, many of them paid as much as $100,000 per assignment by the FBI. At the time of the story’s publication in Mother Jones in August 2011, 49 defendants had participated in plots led by an FBI agent provocateur, and that number has continued to rise since.

    Historically, media coverage of these operations—begun under George W. Bush and continuing apace under Barack Obama—was mostly uncritical. With their aggressive tactics essentially unknown to the public, the FBI and Justice Department controlled the narrative: another dangerous terrorist apprehended by vigilant federal agents!

    But in late 2011, the conversation began to shift. A couple of months after my story in Mother Jones and following the announcement of a far-fetched sting in which a Massachusetts man believed he’d been poised to destroy the US Capitol building using grenade-laden, remote-controlled airplanes, TPM Muckraker published a story headlined: “The Five Most Bizarre Terror Plots Hatched Under the FBI’s Watch [10].” Author David K. Shipler, in an April 2012 New York Times editorial [11], questioned the legitimacy of terrorism stings involving people who appeared to have no wherewithal to commit acts of terror: “Some threats are real, others less so. In terrorism, it’s not easy to tell the difference.” Stories in other major news outlets followed suit, and by October 2012, a post in Foreign Policy was asking: “How many idiot jihadis can the FBI fool? [12]”

    Which brings us back to Nafis. “The case appears to be the latest to fit a model in which, in the process of flushing out people they believe present a risk of terrorism, federal law enforcement officials have played the role of enabler,” reported the New York Times, after the Justice Department announced Nafis’ arrest. “Though these operations have almost always held up in court, they have come under increasing criticism from those who believe that many of the subjects, even some who openly espoused violence, would have been unable to execute such plots without substantial assistance from the government.”

    In the years since the attacks of September 11, 2001, the federal law enforcement profile of a terrorist has changed dramatically. The men responsible for downing the World Trade Center were disciplined and patient; they were also living and training in the United States with money from an Al Qaeda cell led by Kuwaiti-born Khalid Sheikh Mohammad. In the days and weeks following 9/11, federal officials anxiously awaited a second wave of attacks, which would be launched, they believed at the time, by several sleeper cells around the country.
    Anwar al-Awlaki, a US-born, high-ranking Al Qaeda official became something of the terrorist group’s Dear Abby. Have a question about Islam? Ask Anwar!

    But the feared second wave never crashed ashore. Instead, the United States and allied nations invaded Afghanistan, Al Qaeda’s home base, and forced Osama bin Laden and his deputies into hiding. Bruised and hunted, Al Qaeda no longer had the capability to train terrorists and send them to the United States.

    In response, Al Qaeda’s leaders moved to what FBI officials describe as a “franchise model.” If you can’t run Al Qaeda as a hierarchal, centrally organized outfit, the theory went, run it as a franchise. In other words, export ideas—not terrorists. Al Qaeda and its affiliated organizations went online, setting up websites and forums dedicated to instilling their beliefs in disenfranchised Muslims already living in Western nations. A slickly designed magazine, appropriately titled Inspire, quickly followed. Article headlines included “I Am Proud to Be a Traitor to America,” and “Why Did I Choose Al-Qaeda?”

    Anwar al-Awlaki, the American-born, high-ranking Al Qaeda official who was killed in a US drone strike in Yemen on September 30, 2011, became something of the terrorist group’s Dear Abby. Have a question about Islam? Ask Anwar! Muslim men in nations throughout the Western world would email him questions, and Awlaki would reply dutifully, and in English, encouraging many of his electronic pen pals to violent action. Awlaki also kept a blog and a Facebook page, and regularly posted recruitment videos to YouTube. He said in one video:

    I specifically invite the youth to either fight in the West or join their brothers in the fronts of jihad: Afghanistan, Iraq, and Somalia. I invite them to join us in our new front, Yemen, the base from which the great jihad of the Arabian Peninsula will begin, the base from which the greatest army of Islam will march forth.

    Al Qaeda’s move to a franchise model met with some success. US Army Major Nadal Hassan, for example, corresponded with Awlaki before he killed 13 people and wounded 29 others in the Fort Hood shootings in 2009. Antonio Martinez, a Baltimore man and recent convert to Islam who was sentenced to 25 years in prison for trying to bomb a military recruiting office, sent Awlaki messages and watched Al Qaeda propaganda videos online before getting wrapped up in an FBI sting operation.

    The FBI has a term for Nafis, Martinez, and other alleged terrorists like them: lone wolf. Officials at the Bureau now believe that the next terrorist attack will likely come from a lone wolf, and this belief is at the core of a federal law enforcement policy known variously as preemption, prevention, and disruption. FBI counterterrorism agents want to catch terrorists before they act, and to accomplish this, federal law enforcement officials have in the decade since 9/11 created the largest domestic spying network ever to exist in the United States.

    In fact, the FBI today has 10 times as many informants as it did in the 1960s, when former FBI Director J. Edgar Hoover made the Bureau infamous for inserting spies into organizations as varied as Reverend Dr. Martin Luther King’s and the Ku Klux Klan. Modern FBI informants aren’t burrowing into political groups, however; they are focused on identifying today the terrorist of tomorrow. US government officials acknowledge that while terrorist threats do exist from domestic organizations, such as white supremacist groups and the sovereign citizen movement, they believe the greatest threat comes from within American Muslim communities.

    The FBI’s vast army of spies, located today in every community in the United States with enough Muslims to support a mosque, has one primary function: identify the next lone wolf, likely to be a single male age 16 to 35, according to the Bureau. Informants and their FBI handlers are on the lookout for young Muslims who espouse radical beliefs, are vocal about their disapproval of American foreign policy, or have expressed sympathy for international terrorist groups. If they find anyone who meets the criteria, they move him to the next stage: the sting operation.
    The terrorism sting operations are an evolution of an FBI tactic that has long captured the imaginations of Hollywood filmmakers: undercover drug busts.

    On a cold February morning in 2011, I met with Peter Ahearn, a retired FBI special agent who directed the Western New York Joint Terrorism Task Force, in a coffee shop outside Washington, DC, to talk about how the FBI runs its sting operations. Ahearn was in the bureau’s vanguard as it transformed into a counterterrorism organization in the wake of 9/11. An average-built man with a small dimple on his chin and close-cropped brown hair receding in the front, Ahearn oversaw one of the earliest post-9/11 terrorism investigations, involving the so-called Lackawanna Six—a group of six Yemeni American men living outside Buffalo, New York, who attended a training camp in Afghanistan and were convicted of providing material support to Al Qaeda. “If you’re doing a sting right, you’re offering the target multiple chances to back out,” Ahearn told me. “Real people don’t say, ‘Yeah, let’s go bomb that place.’ Real people call the cops.”

    Indeed, while terrorism sting operations are a new practice for the bureau, they are an evolution of an FBI tactic that has for decades captured the imaginations of Hollywood filmmakers. In 1982, as the illegal drug trade overwhelmed local police resources nationwide and funded an increase in violent crime, President Ronald Reagan’s first attorney general, William French Smith, gave the FBI jurisdiction over federal drug crimes, which previously had been the exclusive domain of the US Drug Enforcement Administration. Eager to show up their DEA rivals, FBI agents began aggressively sending undercover agents into America’s cities. This was relatively new territory for the FBI, which during Hoover’s 37-year stewardship had mandated that agents wear a suit and tie at all times, federal law enforcement badge easily accessible from the coat pocket. But an increasingly powerful Mafia and the bloody drug war forced the FBI to begin enforcing federal laws from the street level. In searching for drug crimes, FBI agents hunted sellers as well as buyers, and soon learned one of the best strategies was to become part of the action.

    At its most cliché, the Hollywood version of this scene is set in a Miami high-rise apartment, its floor-to-ceiling windows overlooking the cresting waves of the Atlantic Ocean. There’s a man seated at the dining table; he’s longhaired, with a scruffy face, and he has a briefcase next to him. Hidden on the other side of the room is a grainy black-and-white camera recording the entire scene. The apartment’s door swings open and two men saunter in, the camera recording their every move and word. The two men hand over bundles of cash, and the scruffy man then hands over the briefcase. But instead of finding pounds of cocaine inside it, the two guests are shocked to find the briefcase is empty—and then FBI agents rush in, guns drawn for the takedown.

    Federal law enforcement officials call this type of sting operation a “no-dope bust,” and its the direct predecessor to today’s terrorism sting. Instead of empty briefcases, the FBI today uses inert bombs and disabled assault rifles (and now that counterterrorism is the bureau’s top priority, the investigation of major drug crimes has largely fallen back to the DEA). While the assumptions behind both types of stings are similar, there is a fundamental flaw as applied to terrorism stings. In drug stings, federal law enforcement officials assume that any buyer caught in a sting would have been able to buy or sell drugs elsewhere had they not fallen into the FBI trap. The numbers support this assumption. In 2010, the most recent year for which data is available, the DEA seized 29,179 kilograms, or 64,328 pounds, of cocaine in the United States.

    In terrorism stings, however, federal law enforcement officials assume that any would-be terrorists caught would have been able to acquire the means elsewhere to carry out their violent plans had they not been ensnared by the FBI. The problem with this assumption is that no data exists to support it—and in fact what data is available often suggests the opposite.

    Few of the more than 150 defendants indicted and convicted this way since 9/11 had any connection to terrorists, evidence showed, and those that did have connections, however tangential, lacked the capacity to launch attacks on their own. Of the more that 150 defendants, an FBI informant not only led one of every three terrorist plots, but also provided all the necessary weapons, money, and transportation.
    The informant goaded them on the whole time, encouraging the pair with lines like: “We will teach these bastards a good lesson.” For his work on the case, he received $100,000 from the FBI.

    The FBI’s logic to support the use of terrorism stings goes something like this: By catching a lone wolf before he strikes, federal law enforcement can take him off the streets before he meets a real terrorist who can provide him with weapons and munitions. However, to this day, no example exists of a lone wolf, by himself unable to launch an attack, becoming operational through meeting an actual terrorist in the United States. In the terrorism sting operations since 9/11, the would-be terrorists are usually uneducated, unsophisticated, and economically desperate—not the attributes for someone likely to plan and launch a sophisticated, violent attack without significant help.

    This isn’t to say there have not been deadly and potentially deadly terrorist attacks and threats in the United States since 9/11. Hesham Mohamed Hadayet, an Egyptian, opened fire on the El-Al ticket counter at Los Angeles International Airport on July 4, 2002, killing two and wounding four. Afghan American Najibullah Zazi, who trained with Al Qaeda in Pakistan in 2008, came close to attacking the New York City subway system in September 2009, with a plan to place backpack bombs on crowded trains coming to and from Grand Central and Times Square stations. Faisal Shahzad, who trained with terrorists in the tribal regions of Pakistan, attempted but failed to detonate a crude car bomb in Times Square on May 1, 2010. While all three were dangerous lone wolves, none fit the profile of would-be terrorists targeted today in FBI terrorism sting operations. Unlike those caught in FBI stings, these three terrorists had international connections and the ability to carry out attacks on their own, however unsuccessful those attacks might have been for Zazi and Shahzad.

    By contrast, consider another New York City terrorism conspiracy—the so-called Herald Square bomb plot. Shahawar Matin Siraj, a 22-year-old Pakistani American, struck up a friendship with a seemingly elderly and knowledgeable Islamic scholar named Dawadi at his uncle’s Islamic Books and Tapes shop in Brooklyn. Dawadi was an FBI informant, Osama Eldawoody, who was put on the government payroll in September 2003 to stoke Siraj’s extremist inclinations. Siraj asked if Eldawoody could help him build a nuclear weapon and volunteered that he and a friend, James Elshafay, wanted to detonate a car bomb on one of New York’s bridges. “He’s a terrorist. He wants to harm the country and the people of the country. That’s what I thought immediately,” Eldawoody said in court testimony.

    Siraj introduced Dawadi to Elshafay, who had drawn schematics of police stations and bridges on napkins with the hopes of plotting a terrorist attack. Elshafay’s crude drawings prompted Siraj to hatch a new plan that involved the three men, Dawadi’s supposed international connections, and an attack on New York’s Herald Square subway station. The two young men discussed how they’d grown to hate the United States for invading Iraq and torturing prisoners. In Eldawoody’s car, the three of them talked about carrying 20- to 30-pound backpack bombs into the Herald Square subway station and leaving them on the train platform. Their conversations were recorded from a secret camera in the car’s dashboard. From April to August 2004, the men considered targets, surveilled the subway, checked security, and drew diagrams of the station. The informant goaded them on the whole time, encouraging the pair with lines like: “We will teach these bastards a good lesson.” For his work on the case, Eldawoody received $100,000 from the FBI.

    The evidence from the sting was enough to win convictions, and Siraj was sentenced to 30 years in prison and Elshafay 5 years. But it was also clear from the trial that Siraj was a dimwitted social recluse—a mother’s boy with little capacity to steal a car on his own, let alone bomb a subway station as part of a spectacular terrorist attack. In fact, Siraj was recorded during the sting operation as saying: “Everyone thinks I’m stupid.”
    During Obama’s first term in office, the Justice Department prosecuted more than 75 targets of terrorism stings.

    The question underlying the Herald Square case can be asked in dozens of other similar sting operations: Could the defendants have become terrorists had they never met the FBI informant? The answer haunts Martin Stolar, the lawyer who represented Siraj at trial and fully expected to win an acquittal through an entrapment defense. “The problem with the cases we’re talking about is that defendants would not have done anything if not kicked in the ass by government agents,” Stolar said. “They’re creating crimes to solve crimes so they can claim a victory in the war on terror.”

    Source URL: http://www.motherjones.com/politics/2013/01/terror-factory-fbi-trevor-aaronson-book

    Links:
    [1] http://www.amazon.com/The-Terror-Factory-Manufactured-Terrorism/dp/1935439618/ref=sr_1_1?ie=UTF8&qid=1354811860&sr=8-1&keywords=The+Terror+Factory
    [2] http://www.motherjones.com/mojo/2012/05/fbi-informants-data-journalism-award
    [3] http://www.motherjones.com/politics/2011/08/fbi-terrorist-informants
    [4] http://www.motherjones.com/politics/2011/08/proxy-detention-gulet-mohamed
    [5] http://www.motherjones.com/politics/2011/08/brandon-darby-anarchist-fbi-terrorism
    [6] http://www.motherjones.com/politics/2011/08/terror-trials-numbers
    [7] http://www.motherjones.com/politics/2011/08/fbi-surveillance-video-sting
    [8] http://www.motherjones.com/politics/2011/08/fbi-sting-greatest-hits
    [9] http://www.motherjones.com/fbi-terrorist
    [10] http://tpmmuckraker.talkingpointsmemo.com/2011/10/the_five_most_bizarre_terror_plots_hatched_under_the_fbis_watch.php
    [11] http://www.nytimes.com/2012/04/29/opinion/sunday/terrorist-plots-helped-along-by-the-fbi.html?_r=2&pagewanted=all
    [12] http://blog.foreignpolicy.com/posts/2012/10/17/how_many_idiot_jihadists_can_the_fbi_fool
    [13] http://theterrorfactory.com/documents/HolderSpeechDec2010.pdf

    By Trevor Aaronson | Fri Jan. 11, 2013 3:01 AM PST

    Find this story at 11 January 2013

    Copyright ©2013 Mother Jones and the Foundation for National Progress

    The Informants; Another alleged terrorist was just busted by the FBI. But is the bureau preventing plots—or leading them?

    James Cromitie [1] was a man of bluster and bigotry. He made up wild stories about his supposed exploits, like the one about firing gas bombs into police precincts using a flare gun, and he ranted about Jews. “The worst brother in the whole Islamic world is better than 10 billion Yahudi,” he once said [2].

    A 45-year-old Walmart stocker who’d adopted the name Abdul Rahman after converting to Islam during a prison stint for selling cocaine, Cromitie had lots of worries—convincing his wife he wasn’t sleeping around, keeping up with the rent, finding a decent job despite his felony record. But he dreamed of making his mark. He confided as much in a middle-aged Pakistani he knew as Maqsood.

    “I’m gonna run into something real big [3],” he’d say. “I just feel it, I’m telling you. I feel it.”

    Our Yearlong Investigation Into the Program to Spy on America’s Muslim Communities [4]
    How the Bureau Enlists Foreign Regimes to Detain and Interrogate US Citizens [5]
    When Did Lefty Darling Brandon Darby Turn Government Informant? [6]
    Charts from Our Terror Trial Database [7]
    Watch an FBI Surveillance Video [8]
    Documents: FBI Spies and Suspects, in Their Own Words [9]

    Maqsood and Cromitie had met at a mosque in Newburgh, a struggling former Air Force town about an hour north of New York City. They struck up a friendship, talking for hours about the world’s problems and how the Jews were to blame.

    It was all talk until November 2008, when Maqsood pressed his new friend.

    “Do you think you are a better recruiter or a better action man?” Maqsood asked [10].

    “I’m both,” Cromitie bragged.

    “My people would be very happy to know that, brother. Honestly.”

    “Who’s your people?” Cromitie asked.

    “Jaish-e-Mohammad.”
    Crunch the Numbers
    We analyzed the prosecutions of 508 alleged domestic terrorists. View them by affiliation or state, or play with the full data set.

    Maqsood said he was an agent for the Pakistani terror group, tasked with assembling a team to wage jihad in the United States. He asked Cromitie what he would attack if he had the means. A bridge, Cromitie said.

    “But bridges are too hard to be hit,” Maqsood pleaded, “because they’re made of steel.”

    “Of course they’re made of steel,” Cromitie replied. “But the same way they can be put up, they can be brought down.”

    Maqsood coaxed Cromitie toward a more realistic plan. The Mumbai attacks were all over the news, and he pointed out how those gunmen targeted hotels, cafés, and a Jewish community center.

    “With your intelligence, I know you can manipulate someone,” Cromitie told his friend. “But not me, because I’m intelligent.” The pair settled on a plot to bomb synagogues in the Bronx, and then fire Stinger missiles at airplanes taking off from Stewart International Airport in the southern Hudson Valley. Maqsood would provide all the explosives and weapons, even the vehicles. “We have two missiles, okay?” he offered [11]. “Two Stingers, rocket missiles.”

    Maqsood was an undercover operative; that much was true. But not for Jaish-e-Mohammad. His real name was Shahed Hussain [12], and he was a paid informant for the Federal Bureau of Investigation.

    Ever since 9/11, counterterrorism has been the FBI’s No. 1 priority, consuming the lion’s share of its budget—$3.3 billion, compared to $2.6 billion for organized crime—and much of the attention of field agents and a massive, nationwide network of informants. After years of emphasizing informant recruiting as a key task for its agents, the bureau now maintains a roster of 15,000 spies—many of them tasked, as Hussain was, with infiltrating Muslim communities in the United States. In addition, for every informant officially listed in the bureau’s records, there are as many as three unofficial ones, according to one former high-level FBI official, known in bureau parlance as “hip pockets.”
    The bureau now maintains a roster of 15,000 spies, some paid as much as $100,000 per case, many of them tasked with infiltrating Muslim communities in the United States.

    The informants could be doctors, clerks, imams. Some might not even consider themselves informants. But the FBI regularly taps all of them as part of a domestic intelligence apparatus whose only historical peer might be COINTELPRO [13], the program the bureau ran from the ’50s to the ’70s to discredit and marginalize organizations ranging from the Ku Klux Klan to civil-rights and protest groups.

    Throughout the FBI’s history, informant numbers have been closely guarded secrets. Periodically, however, the bureau has released those figures. A Senate oversight committee in 1975 found the FBI had 1,500 informant [14]s [14]. In 1980, officials disclosed there were 2,800 [15]. Six years later, following the FBI’s push into drugs and organized crime, the number of bureau informants ballooned to 6,000, the Los Angeles Times reported [15] in 1986. And according to the FBI, the number grew significantly after 9/11. In its fiscal year 2008 budget authorization request [16], the FBI disclosed that it it had been been working under a November 2004 presidential directive demanding an increase [17] in “human source development and management,” and that it needed $12.7 million [18] for a program to keep tabs on its spy network and create software to track and manage informants.

    The bureau’s strategy has changed significantly from the days when officials feared another coordinated, internationally financed attack from an Al Qaeda sleeper cell. Today, counterterrorism experts believe groups like Al Qaeda, battered by the war in Afghanistan and the efforts of the global intelligence community, have shifted to a franchise model, using the internet to encourage sympathizers to carry out attacks in their name. The main domestic threat, as the FBI sees it, is a lone wolf.

    The bureau’s answer has been a strategy known variously as “preemption,” “prevention,” and “disruption”—identifying and neutralizing potential lone wolves before they move toward action. To that end, FBI agents and informants target not just active jihadists, but tens of thousands of law-abiding people, seeking to identify those disgruntled few who might participate in a plot given the means and the opportunity. And then, in case after case, the government provides the plot, the means, and the opportunity.

    Here’s how it works: Informants report to their handlers on people who have, say, made statements sympathizing with terrorists. Those names are then cross-referenced with existing intelligence data, such as immigration and criminal records. FBI agents may then assign an undercover operative to approach the target by posing as a radical. Sometimes the operative will propose a plot, provide explosives, even lead the target in a fake oath to Al Qaeda. Once enough incriminating information has been gathered, there’s an arrest—and a press conference [19] announcing another foiled plot.

    If this sounds vaguely familiar, it’s because such sting operations are a fixture in the headlines. Remember the Washington Metro [20] bombing plot? The New York subway [21] plot? The guys who planned to blow up the Sears Tower [22]? The teenager seeking to bomb a Portland Christmas tree [23] lighting? Each of those plots, and dozens more across the nation, was led by an FBI asset.

    Over the past year, Mother Jones and the Investigative Reporting Program at the University of California-Berkeley have examined prosecutions of 508 defendants in terrorism-related cases, as defined by the Department of Justice. Our investigation found:
    Nearly half the prosecutions involved the use of informants, many of them incentivized by money (operatives can be paid as much as $100,000 per assignment) or the need to work off criminal or immigration violations. (For more on the details of those 508 cases, see our charts page [24] and searchable database [25].)
    Sting operations resulted in prosecutions against 158 defendants. Of that total, 49 defendants participated in plots led by an agent provocateur—an FBI operative instigating terrorist action.
    With three exceptions, all of the high-profile domestic terror plots of the last decade were actually FBI stings. (The exceptions are Najibullah Zazi, who came close to bombing [26] the New York City subway system in September 2009; Hesham Mohamed Hadayet [27], an Egyptian who opened fire on the El-Al ticket counter at the Los Angeles airport; and failed Times Square bomber Faisal Shahzad [28].)
    In many sting cases, key encounters between the informant and the target were not recorded—making it hard for defendants claiming entrapment to prove their case.
    Terrorism-related charges are so difficult to beat in court, even when the evidence is thin, that defendants often don’t risk a trial.

    “The problem with the cases we’re talking about is that defendants would not have done anything if not kicked in the ass by government agents,” says Martin Stolar, a lawyer who represented a man caught in a 2004 sting involving New York’s Herald Square [21] subway station. “They’re creating crimes to solve crimes so they can claim a victory in the war on terror.” In the FBI’s defense, supporters argue that the bureau will only pursue a case when the target clearly is willing to participate in violent action. “If you’re doing a sting right, you’re offering the target multiple chances to back out,” says Peter Ahearn, a retired FBI special agent who directed the Western New York Joint Terrorism Task Force and oversaw the investigation of the Lackawanna Six [29], an alleged terror cell near Buffalo, New York. “Real people don’t say, ‘Yeah, let’s go bomb that place.’ Real people call the cops.”
    Terms
    of
    Entrapment
    A guide to counterterrorism jargon.

    1001: Known as the “Al Capone,” Title 18, Section 1001 [30] of the federal criminal code covers the crime of lying to federal agents. Just as the government prosecuted Capone for tax violations [31], it has frequently used 1001 against terrorism defendants [32] whose crimes or affiliations it couldn’t prove in court.
    Agent provocateur: An informant or undercover operative who incites a target to take unlawful action [33]; the phrase originally described strikebreakers trying to provoke violence [34].

    Assessment: The term for a 72-hour investigation [35]—which may include surveillance—that FBI agents can launch without having a predicate [36] (see below).

    COINTELPRO [13]: From 1956 to 1971, the FBI’s Counter Intelligence Program attempted to infiltrate and sometimes harass domestic political groups [37], from the Ku Klux Klan to the National Lawyers Guild and the Southern Christian Leadership Conference [38].

    DIOG: The Domestic Investigations and Operations Guide [36], a 258-page FBI manual for undercover operations and the use of informants. Recently revised to allow agents to look for information—including going through someone’s trash—about a person who is not formally being investigated [39], sometimes to flip them as an informant.

    Domain Management: An FBI data-mining and analysis program [36] used to map US communities along ethnic and religious lines.

    Hip pocket: An unregistered informant who provides information [40] and tips to FBI agents but whose information is not used in court.

    Joint Terrorism Task Force: A partnership among federal and local law enforcement agencies [41]; through it, for example, FBI agents can join forces with immigration agents [42] to put the squeeze on someone to become an informant.

    Material support: Providing help to a designated foreign terrorist organization. This can include money, lodging, training, documents, weapons, and personnel [43]—including oneself, and including joining a terrorist cell dreamed up by the FBI [44].

    Operator: Someone who wants to be a terrorist; in the FBI’s view, sympathizers become operators [45].

    Predicate: Information clearly suggesting that an individual is involved in unlawful activity; it’s required for the FBI to start an investigation [36].

    Even so, Ahearn concedes that the uptick in successful terrorism stings might not be evidence of a growing threat so much as a greater focus by the FBI. “If you concentrate more people on a problem,” Ahearn says, “you’ll find more problems.” Today, the FBI follows up on literally every single call, email, or other terrorism-related tip it receives for fear of missing a clue.

    And the emphasis is unlikely to shift anytime soon. Sting operations have “proven to be an essential law enforcement tool in uncovering and preventing potential terror attacks,” said Attorney General Eric Holder in a December 2010 speech [46] to Muslim lawyers and civil rights activists. President Obama’s Department of Justice has announced sting-related prosecutions at an even faster clip than the Bush administration, with 44 new cases since January 2009. With the war on terror an open-ended and nebulous conflict, the FBI doesn’t have an exit strategy.

    Located deep in a wooded area on a Marine Corps base west of Interstate 95—a setting familiar from Silence of the Lambs—is the sandstone fortress of the FBI Academy in Quantico, Virginia. This building, erected under J. Edgar Hoover, is where to this day every FBI special agent is trained.

    J. Stephen Tidwell graduated from the academy in 1981 and over the years rose to executive assistant director, one of the 10 highest positions in the FBI; in 2008, he coauthored the Domestic Investigations and Operations Guide, or DIOG [47] (PDF), the manual for what agents and informants can and cannot do.

    A former Texas cop, Tidwell is a barrel-chested man with close-cropped salt-and-pepper hair. He’s led some of the FBI’s highest-profile investigations, including the DC sniper case and the probe of the 9/11 attack on the Pentagon.

    On a cloudy spring afternoon, Tidwell, dressed in khakis and a blue sweater, drove me in his black Ford F-350 through Hogan’s Alley [48]—a 10-acre Potemkin village with houses, bars, stores, and a hotel. Agents learning the craft role-play stings, busts, and bank robberies here, and inside jokes and pop-culture references litter the place (which itself gets its name from a 19th-century comic strip). At one end of the town is the Biograph Theater, named for the Chicago movie house where FBI agents gunned down John Dillinger [49] in 1934. (“See,” Tidwell says. “The FBI has a sense of humor.”)

    Inside the academy, a more somber tone prevails. Plaques everywhere honor agents who have been killed on the job. Tidwell takes me to one that commemorates John O’Neill, who became chief of the bureau’s then-tiny counterterrorism section in 1995. For years before retiring from the FBI, O’Neill warned [50] of Al Qaeda’s increasing threat, to no avail. In late August 2001, he left the bureau to take a job as head of security for the World Trade Center, where he died 19 days later at the hands of the enemy he’d told the FBI it should fear. The agents he had trained would end up reshaping the bureau’s counterterrorism operations.

    Before 9/11, FBI agents considered chasing terrorists an undesirable career path, and their training did not distinguish between Islamic terror tactics and those employed by groups like the Irish Republican Army. “A bombing case is a bombing case,” Dale Watson, who was the FBI’s counterterrorism chief on 9/11, said in a December 2004 deposition. The FBI also did not train agents in Arabic or require most of them to learn about radical Islam. “I don’t necessarily think you have to know everything about the Ku Klux Klan to investigate a church bombing,” Watson said. The FBI had only one Arabic speaker [51] in New York City and fewer than 10 nationwide.

    But shortly after 9/11, President George W. Bush called FBI Director Robert Mueller to Camp David. His message: never again. And so Mueller committed to turn the FBI into a counterintelligence organization rivaling Britain’s MI5 in its capacity for surveillance and clandestine activity. Federal law enforcement went from a focus on fighting crime to preventing crime; instead of accountants and lawyers cracking crime syndicates, the bureau would focus on Jack Bauer-style operators disrupting terror groups.

    To help run the counterterrorism section, Mueller drafted Arthur Cummings, a former Navy SEAL who’d investigated the first World Trade Center bombing. Cummings pressed agents to focus not only on their immediate target, but also on the extended web of people linked to the target. “We’re looking for the sympathizer who wants to become an operator, and we want to catch them when they step over that line to operator,” Cummings says. “Sometimes, that step takes 10 years. Other times, it takes 10 minutes.” The FBI’s goal is to create a hostile environment for terrorist recruiters and operators—by raising the risk of even the smallest step toward violent action. It’s a form of deterrence, an adaptation of the “broken windows” theory used to fight urban crime. Advocates insist it has been effective, noting that there hasn’t been a successful large-scale attack against the United States since 9/11. But what can’t be answered—as many former and current FBI agents acknowledge—is how many of the bureau’s targets would have taken the step over the line at all, were it not for an informant.

    So how did the FBI build its informant network? It began by asking where US Muslims lived. Four years after 9/11, the bureau brought in a CIA expert on intelligence-gathering methods named Phil Mudd [52]. His tool of choice was a data-mining system using commercially available information, as well as government data such as immigration records, to pinpoint the demographics of specific ethnic and religious communities—say, Iranians in Beverly Hills or Pakistanis in the DC suburbs.

    The FBI officially denies that the program, known as Domain Management, works this way—its purpose, the bureau says, is simply to help allocate resources according to threats. But FBI agents told me that with counterterrorism as the bureau’s top priority, agents often look for those threats in Muslim communities—and Domain Management allows them to quickly understand those communities’ makeup. One high-ranking former FBI official jokingly referred to it as “Battlefield Management.”

    Some FBI veterans criticized the program as unproductive and intrusive—one told Mudd during a high-level meeting that he’d pushed the bureau to “the dark side.” That tension has its roots in the stark difference between the FBI and the CIA: While the latter is free to operate internationally without regard to constitutional rights, the FBI must respect those rights in domestic investigations, and Mudd’s critics saw the idea of targeting Americans based on their ethnicity and religion as a step too far.

    Nonetheless, Domain Management quickly became the foundation for the FBI’s counterterrorism dragnet. Using the demographic data, field agents were directed to target specific communities to recruit informants. Some agents were assigned to the task full time. And across the bureau, agents’ annual performance evaluations are now based in part on their recruiting efforts.

    People cooperate with law enforcement for fairly simple reasons: ego, patriotism, money, or coercion. The FBI’s recruitment has relied heavily on the latter. One tried-and-true method is to flip someone facing criminal charges. But since 9/11 the FBI has also relied heavily on Immigration and Customs Enforcement [42], with which it has worked closely as part of increased interagency coordination. A typical scenario will play out like this: An FBI agent trying to get someone to cooperate will look for evidence that the person has immigration troubles. If they do, he can ask ICE to begin or expedite deportation proceedings. If the immigrant then chooses to cooperate, the FBI will tell the court that he is a valuable asset, averting deportation.
    A well-muscled 49-year-old with a shaved scalp, Craig Monteilh has been a versatile snitch: He’s pretended to be a white supremacist, a Russian hit man, a Sicilian drug trafficker, and a French-Syrian Muslim.

    Sometimes, the target of this kind of push is the one person in a mosque who will know everyone’s business—the imam. Two Islamic religious leaders, Foad Farahi [53] in Miami and Sheikh Tarek Saleh in New York City, are currently fighting deportation proceedings that, they claim, began after they refused to become FBI assets. The Muslim American Society Immigrant Justice Center has filed similar complaints on behalf of seven other Muslims with the Department of Homeland Security.

    Once someone has signed on as an informant, the first assignment is often a fishing expedition. Informants have said in court testimony that FBI handlers have tasked them with infiltrating mosques without a specific target or “predicate”—the term of art for the reason why someone is investigated. They were, they say, directed to surveil law-abiding Americans with no indication of criminal intent.

    “The FBI is now telling agents they can go into houses of worship without probable cause,” says Farhana Khera, executive director of the San Francisco-based civil rights group Muslim Advocates. “That raises serious constitutional issues.”

    Tidwell himself will soon have to defend these practices in court—he’s among those named in a class-action lawsuit [54] (PDF) over an informant’s allegation that the FBI used him to spy on a number of mosques in Southern California.

    That informant, Craig Monteilh, is a convicted felon who made his money ripping off cocaine dealers before becoming an asset for the Drug Enforcement Administration and later the FBI. A well-muscled 49-year-old with a shaved scalp, Monteilh has been a particularly versatile snitch: He’s pretended to be a white supremacist, a Russian hit man, and a Sicilian drug trafficker. He says when the FBI sent him into mosques (posing as a French-Syrian Muslim), he was told to act as a decoy for any radicals who might seek to convert him—and to look for information to help flip congregants as informants, such as immigration status, extramarital relationships, criminal activities, and drug use. “Blackmail is the ultimate goal,” Monteilh says.

    Officially, the FBI denies it blackmails informants. “We are prohibited from using threats or coercion,” says Kathleen Wright, an FBI spokeswoman. (She acknowledges that the bureau has prevented helpful informants from being deported.)

    FBI veterans say reality is different from the official line. “We could go to a source and say, ‘We know you’re having an affair. If you work with us, we won’t tell your wife,'” says a former top FBI counterterrorism official. “Would we actually call the wife if the source doesn’t cooperate? Not always. You do get into ethics here—is this the right thing to do?—but legally this isn’t a question. If you obtained the information legally, then you can use it however you want.”

    But eventually, Monteilh’s operation imploded in spectacular fashion. In December 2007, police in Irvine, California, charged him with bilking two women out of $157,000 as part of an alleged human growth hormone scam. Monteilh has maintained it was actually part of an FBI investigation, and that agents instructed him to plead guilty to a grand-theft charge and serve eight months so as not to blow his cover. The FBI would “clean up” the charge later, Monteilh says he was told. That didn’t happen, and Monteilh has alleged in court filings that the government put him in danger by letting fellow inmates know that he was an informant. (FBI agents told me the bureau wouldn’t advise an informant to plead guilty to a state criminal charge; instead, agents would work with local prosecutors to delay or dismiss the charge.)

    The class-action suit, filed by the ACLU, alleges that Tidwell, then the bureau’s Los Angeles-based assistant director, signed off on Monteilh’s operation. And Tidwell says he’s eager to defend the bureau in court. “There is not the blanket suspicion of the Muslim community that they think there is,” Tidwell says. “We’re just looking for the bad guys. Anything the FBI does is going to be interpreted as monitoring Muslims. I would tell [critics]: ‘Do you really think I have the time and money to monitor all the mosques and Arab American organizations? We don’t. And I don’t want to.'”

    Shady informants, of course, are as old as the FBI; one saying in the bureau is, “To catch the devil, you have to go to hell.” Another is, “The only problem worse than having an informant is not having an informant.” Back in the ’80s, the FBI made a cottage industry of drug stings—a source of countless Hollywood plots, often involving briefcases full of cocaine and Miami as the backdrop.

    It’s perhaps fitting, then, that one of the earliest known terrorism stings also unfolded in Miami, though it wasn’t launched by the FBI. Instead the protagonist was a Canadian bodyguard and, as a Fort Lauderdale, Florida, newspaper put it in 2002 [55], “a 340-pound man with a fondness for firearms and strippers.” He subscribed to Soldier of Fortune [56] and hung around a police supply store on a desolate stretch of Hollywood Boulevard, north of Miami.

    Howard Gilbert aspired to be a CIA agent but lacked pertinent experience. So to pad his résumé, he hatched a plan to infiltrate a mosque in the suburb of Pembroke Pines by posing as a Muslim convert named Saif Allah [57]. He told congregants that he was a former Marine and a security expert, and one night in late 2000, he gave a speech about the plight of Palestinians.

    “That was truly the night that launched me into the terrorist umbrella of South Florida,” Gilbert would later brag [58] to the South Florida Sun-Sentinel.

    Nineteen-year-old congregant Imran Mandhai, stirred by the oration, approached Gilbert and asked if he could provide him weapons and training. Gilbert, who had been providing information to the FBI, contacted his handlers and asked for more money to work on the case. (He later claimed that the bureau had paid him $6,000.) But he ultimately couldn’t deliver—the target had sensed something fishy about his new friend.

    The bureau also brought in Elie Assaad [59], a seasoned informant originally from Lebanon. He told Mandhai that he was an associate of Osama bin Laden tasked with establishing a training camp in the United States. Gilbert suggested attacking electrical substations in South Florida, and Assaad offered to provide a weapon. FBI agents then arrested Mandhai; he pleaded guilty in federal court and was sentenced to nearly 14 years in prison. It was a model of what would become the bureau’s primary counterterrorism M.O.—identifying a target, offering a plot, and then pouncing.

    “These guys were homeless types,” one former FBI official says about the alleged Sears Tower plotters. “And yes, we did show a picture where somebody was taking the oath to Al Qaeda. So what?” Illustration: Jeffrey Smith
    Gilbert himself didn’t get to bask in his glory; he never worked for the FBI again and died in 2004. Assaad, for his part, ran into some trouble when his pregnant wife called 911. She said Assaad had beaten and choked her to the point that she became afraid [60] for her unborn baby; he was arrested, but in the end his wife refused to press charges.

    The jail stint didn’t keep Assaad from working for the FBI on what would turn out to be perhaps the most high-profile terrorism bust of the post-9/11 era. In 2005, the bureau got a tip [61] from an informant about a group of alleged terrorists in Miami’s Liberty City neighborhood. The targets were seven men [62]—some African American, others Haitian—who called themselves the “Seas of David” [63] and ascribed to religious beliefs that blended Judaism, Christianity, and Islam. The men were martial-arts enthusiasts who operated out of a dilapidated warehouse, where they also taught classes for local kids. The Seas of David’s leader was Narseal Batiste [64], the son of a Louisiana preacher, father of four, and a former Guardian Angel.

    In response to the informant’s tip, the FBI had him wear a wire during meetings with the men, but he wasn’t able to engage them in conversations about terrorist plots. So he introduced the group to Assaad, now playing an Al Qaeda operative. At the informant’s request, Batiste took photographs of the FBI office in North Miami Beach and was caught on tape discussing a notion to bomb the Sears Tower in Chicago. Assaad led Batiste, and later the other men, in swearing an oath to Al Qaeda, though the ceremony (recorded and entered into evidence at trial) bore a certain “Who’s on First?” flavor:

    “God’s pledge is upon me, and so is his compact,” Assaad said as he and Batiste sat in his car. “Repeat after me.”

    “Okay. Allah’s pledge is upon you.”

    “No, you have to repeat exactly. God’s pledge is upon me, and so is his compact. You have to repeat.”
    Ultimately, the undercover recordings suggest that Batiste was mostly trying to shake down his “terrorist” friend.

    “Well, I can’t say Allah?” Batiste asked.

    “Yeah, but this is an English version because Allah, you can say whatever you want, but—”

    “Okay. Of course.”

    “Okay.”

    “Allah’s pledge is upon me. And so is his compact,” Batiste said, adding: “That means his angels, right?”

    “Uh, huh. To commit myself,” Assaad continued.

    “To commit myself.”

    “Brother.”

    “Brother,” Batiste repeated.

    “Uh. That’s, uh, what’s your, uh, what’s your name, brother?”

    “Ah, Brother Naz.”

    “Okay. To commit myself,” the informant repeated.

    “To commit myself.”

    “Brother.”

    “Brother.”

    “You’re not—you have to say your name!” Assaad cried.

    “Naz. Naz.”

    “Uh. To commit myself. I am Brother Naz. You can say, ‘To commit myself.'”

    “To commit myself, Brother Naz.”

    Things went smoothly until Assaad got to a reference to being “protective of the secrecy of the oath and to the directive of Al Qaeda.”

    Here Batiste stopped. “And to…what is the directive of?”

    “Directive of Al Qaeda,” the informant answered.

    “So now let me ask you this part here. That means that Al Qaeda will be over us?”

    “No, no, no, no, no,” Assaad said. “It’s an alliance.”

    “Oh. Well…” Batiste said, sounding resigned.

    “It’s an alliance, but it’s like a commitment, by, uh, like, we respect your rules. You respect our rules,” Assaad explained.

    “Uh, huh,” Batiste mumbled.

    “And to the directive of Al Qaeda,” Assaad said, waiting for Batiste to repeat.

    “Okay, can I say an alliance?” Batiste asked. “And to the alliance of Al Qaeda?”

    “Of the alliance, of the directive—” Assaad said, catching himself. “You know what you can say? And to the directive and the alliance of Al Qaeda.”

    “Okay, directive and alliance of Al Qaeda,” Batiste said.

    “Okay,” the informant said. “Now officially you have commitment and we have alliance between each other. And welcome, Brother Naz, to Al Qaeda.”

    Or not. Ultimately, the undercover recordings made by Assaad suggest that Batiste, who had a failing drywall business and had trouble making the rent for the warehouse, was mostly trying to shake down his “terrorist” friend. After first asking the informant for $50,000, Batiste is recorded in conversation after conversation asking how soon he’ll have the cash.

    “Let me ask you a question,” he says in one exchange. “Once I give you an account number, how long do you think it’s gonna take to get me something in?”

    “So you is scratching my back, [I’m] scratching your back—we’re like this,” Assaad dodged.

    “Right,” Batiste said.
    “When we put forth a case like that to suggest to the American public that we’re protecting them, we’re not protecting them. The agents back in the bullpen, they know it’s not true.”

    The money never materialized. Neither did any specific terrorist plot. Nevertheless, federal prosecutors charged (PDF [65]) Batiste and his cohorts—whom the media dubbed the Liberty City Seven—with conspiracy to support terrorism, destroy buildings, and levy war against the US government. Perhaps the key piece of evidence was the video of Assaad’s Al Qaeda “oath.” Assaad was reportedly paid [66] $85,000 for his work on the case; the other informant got $21,000.

    James J. Wedick, a former FBI agent, was hired to review the Liberty City case as a consultant for the defense. In his opinion, the informant simply picked low-hanging fruit. “These guys couldn’t find their way down the end of the street,” Wedick says. “They were homeless types. And, yes, we did show a picture where somebody was taking the oath to Al Qaeda. So what? They didn’t care. They only cared about the money. When we put forth a case like that to suggest to the American public that we’re protecting them, we’re not protecting them. The agents back in the bullpen, they know it’s not true.”

    Indeed, the Department of Justice had a difficult time winning convictions in the Liberty City case. In three separate trials, juries deadlocked [67] on most of the charges, eventually acquitting one of the defendants (charges against another were dropped) and convicting five of crimes that landed them in prison for between 7 to 13 years. When it was all over, Assaad told ABC News’ Brian Ross [59] that he had a special sense for terrorists: “God gave me a certain gift.”

    But he didn’t have a gift for sensing trouble. After the Liberty City case, Assaad moved on to Texas and founded a low-rent modeling agency [68]. In March, when police tried to pull him over, he led them in a chase through El Paso [69] (with his female passenger jumping out at one point), hit a cop with his car, and ended up rolling his SUV on the freeway. Reached by phone, Assaad declined to comment. He’s saving his story, he says, for a book he’s pitching to publishers.

    Not all of the more than 500 terrorism prosecutions [25] reviewed in this investigation are so action-movie ready. But many do have an element of mystery. For example, though recorded conversations are often a key element of prosecutions, in many sting cases the FBI didn’t record large portions of the investigation, particularly during initial encounters or at key junctures during the sting. When those conversations come up in court, the FBI and prosecutors will instead rely on the account of an informant with a performance bonus on the line.

    Mohamed Osman Mohamud [70] was an 18-year old wannabe rapper when an FBI agent asked if he’d like to “help the brothers.” Eventually the FBI gave him a fake car bomb and a phone to blow it up during a Christmas tree lighting. Illustration: Jeffrey Smith
    One of the most egregious examples of a missing recording involves a convoluted tale that begins in the early morning hours of November 1, 2009, with a date-rape allegation on the campus of Oregon State University. Following a Halloween party, 18-year-old Mohamed Osman Mohamud [71], a Somali-born US citizen, went home with another student. The next morning, the woman reported to police that she believed she had been drugged.

    Campus police brought Mohamud in for questioning and a polygraph test; FBI agents, who for reasons that have not been disclosed had been keeping an eye on the teen for about a month, were also there [72]. Mohamud claimed that the sex was consensual, and a drug test given to his accuser eventually came back negative.

    During the interrogation, OSU police asked Mohamud if a search of his laptop would indicate that he’d researched date-rape drugs. He said it wouldn’t and gave them permission to examine his hard drive. Police copied its entire contents and turned the data over to the FBI—which discovered, it later alleged in court documents, that Mohamud had emailed someone in northwest Pakistan talking about jihad.

    Soon after his run-in with police, Mohamud began to receive emails from “Bill Smith,” a self-described terrorist who encouraged him to “help the brothers.” “Bill,” an FBI agent, arranged for Mohamud to meet one of his associates in a Portland hotel room. There, Mohamud told the agents that he’d been thinking of jihad since age 15. When asked what he might want to attack, Mohamud suggested the city’s Christmas tree lighting ceremony [73]. The agents set Mohamud up with a van that he thought was filled with explosives. On November 26, 2010, Mohamud and one of the agents drove the van to Portland’s Pioneer Square, and Mohamud dialed [74] the phone to trigger the explosion. Nothing. He dialed again. Suddenly FBI agents appeared and dragged him away as he kicked and yelled, “Allahu akbar!” Prosecutors charged him with attempting to use a weapon of mass destruction; his trial is pending.
    The FBI’s defenders say the bureau must flush out terrorist sympathizers before they act. “What would you do?” asks one. “Wait for him to figure it out himself?”

    The Portland case has been held up as an example of how FBI stings can make a terrorist where there might have been only an angry loser. “This is a kid who, it can be reasonably inferred, barely had the capacity to put his shoes on in the morning,” Wedick says.

    But Tidwell, the retired FBI official, says Mohamud was exactly the kind of person the FBI needs to flush out. “That kid was pretty specific about what he wanted to do,” he says. “What would you do in response? Wait for him to figure it out himself? If you’ll notice, most of these folks [targeted in stings] plead guilty. They don’t say, ‘I’ve been entrapped,’ or, ‘I was immature.'” That’s true—though it’s also true that defendants and their attorneys know that the odds of succeeding at trial are vanishingly small. Nearly two-thirds of all terrorism prosecutions since 9/11 have ended in guilty pleas, and experts hypothesize that it’s difficult for such defendants to get a fair trial. “The plots people are accused of being part of—attacking subway systems or trying to bomb a building—are so frightening that they can overwhelm a jury,” notes David Cole, a Georgetown University law professor who has studied these types of cases.

    But the Mohamud story wasn’t quite over—it would end up changing the course of another case on the opposite side of the country. In Maryland, rookie FBI agent Keith Bender had been working a sting against 21-year-old Antonio Martinez [75], a recent convert to Islam who’d posted inflammatory comments on Facebook [76] (“The sword is cummin the reign of oppression is about 2 cease inshallah”). An FBI informant had befriended Martinez and, in recorded conversations, they talked about attacking a military recruiting station.

    Just as the sting was building to its climax, Martinez saw news reports about the Mohamud case, and how there was an undercover operative involved. He worried: Was he, too, being lured into a sting? He called his supposed terrorist contact: “I’m not falling for no BS,” he told him [76].

    Faced with the risk of losing the target, the informant—whose name is not revealed in court records—met with Martinez and pulled him back into the plot. But while the informant had recorded numerous previous meetings with Martinez, no recording [77] was made for this key conversation; in affidavits, the FBI blamed a technical glitch. Two weeks later, on December 8, 2010, Martinez parked what he thought was a car bomb in front of a recruitment center and was arrested when he tried to detonate [78] it.

    Frances Townsend, who served as homeland security adviser to President George W. Bush, concedes that missing recordings in terrorism stings seem suspicious. But, she says, it’s more common than you might think: “I can’t tell you how many times I had FBI agents in front of me and I yelled, ‘You have hundreds of hours of recordings, but you didn’t record this meeting.’ Sometimes, I admit, they might not record something intentionally”—for fear, she says, that the target will notice. “But more often than not, it’s a technical issue.”

    Wedick, the former FBI agent, is less forgiving. “With the technology the FBI now has access to—these small devices that no one would ever suspect are recorders or transmitters—there’s no excuse not to tape interactions between the informant and the target,” he says. “So why in many of these terrorism stings are meetings not recorded? Because it’s convenient for the FBI not to record.”

    So what really happens as an informant works his target, sometimes over a period of years, and eases him over the line? For the answer to that, consider once more the case of James Cromitie [1], the Walmart stocker with a hatred of Jews. Cromitie was the ringleader in the much-publicized Bronx synagogue bombing plot that went to trial last year [79]. But a closer look at the record reveals that while Cromitie was no one’s idea of a nice guy, whatever leadership existed in the plot emanated from his sharply dressed, smooth-talking friend Maqsood, a.k.a. FBI informant Shahed Hussain.

    A Pakistani refugee who claimed to be friends with Benazir Bhutto and had a soft spot for fancy cars, Hussain was by then one of the FBI’s more successful counterterrorism informants. (See our timeline of Hussain’s career as an informant [12].) He’d originally come to the bureau’s attention when he was busted in a DMV scam [80] that charged test takers $300 to $500 for a license. Having “worked off” those charges, he’d transitioned from indentured informant to paid snitch, earning as much as $100,000 per assignment.
    At trial, informant Hussain admitted that he created the “impression” that his target would make big money by bombing synagogues in the Bronx.

    Hussain was assigned to visit a mosque in Newburgh, where he would start conversations with strangers about jihad [81]. “I was finding people who would be harmful, and radicals, and identify them for the FBI,” Hussain said during Cromitie’s trial. Most of the mosque’s congregants were poor, and Hussain, who posed as a wealthy businessman and always arrived in one of his four luxury cars [82]—a Hummer, a Mercedes, two different BMWs—made plenty of friends. But after more than a year working the local Muslim community, he had not identified a single actual target [83].

    Then, one day in June 2008, Cromitie approached Hussain in the parking lot outside the mosque. The two became friends, and Hussain clearly had Cromitie’s number. “Allah didn’t bring you here to work for Walmart,” he told him [84] at one point.

    Cromitie, who once claimed he could “con the corn from the cob,” had a history of mental instability. He told a psychiatrist that he saw and heard things that weren’t there and had twice tried to commit suicide [85]. He told tall tales, most of them entirely untrue—like the one about how his brother stole $126 million worth of stuff from Tiffany.

    Exactly what Hussain and Cromitie talked about in the first four months of their relationship isn’t known, because the FBI did not record [86] those conversations. Based on later conversations, it’s clear that Hussain cultivated Cromitie assiduously. He took the target, all expenses paid [87] by the FBI, to an Islamic conference in Philadelphia to meet Imam Siraj Wahhaj, a prominent African-American Muslim leader. He helped pay Cromitie’s rent [88]. He offered to buy him a barbershop [89]. Finally, he asked Cromitie to recruit others [90] and help him bomb synagogues.

    On April 7, 2009, at 2:45 p.m., Cromitie and Hussain sat on a couch inside an FBI cover house on Shipp Street in Newburgh. A hidden camera [91] was trained on the living room.

    “I don’t want anyone to get hurt,” Cromitie told the informant [92].

    “Who? I—”

    “Think about it before you speak,” Cromitie interrupted.

    “If there is American soldiers, I don’t care,” Hussain said, trying a fresh angle.

    “Hold up,” Cromitie agreed. “If it’s American soldiers, I don’t even care.”

    “If it’s kids, I care,” Hussain said. “If it’s women, I care.”

    “I care. That’s what I’m worried about. And I’m going to tell you, I don’t care if it’s a whole synagogue of men.”

    “Yep.”

    “I would take ‘em down, I don’t even care. ‘Cause I know they are the ones.”

    “We have the equipment to do it.”

    “See, see, I’m not worried about nothing. Ya know? What I’m worried about is my safety,” Cromitie said.

    “Oh, yeah, safety comes first.”

    “I want to get in and I want to get out.”

    “Trust me,” Hussain assured.

    At Cromitie’s trial, Hussain would admit that he created the—in his word—”impression” that Cromitie would make a lot of money by bombing synagogues.

    “I can make you $250,000, but you don’t want it, brother,” he once told [93] Cromitie when the target seemed hesitant. “What can I tell you?” (Asked about the exchange in court, Hussain said that “$250,000” was simply a code word for the bombing plot—a code word, he admitted, that only he knew.)

    But whether for ideology or money, Cromitie did recruit three others, and they did take photographs of Stewart International Airport in Newburgh as well as of synagogues in the Bronx. On May 20, 2009, Hussain drove Cromitie [94] to the Bronx, where Cromitie put what he believed were bombs [95] inside cars he thought had been parked by Hussain’s coconspirators. Once all the dummy bombs were placed, Cromitie headed back to the getaway car [96]—Hussain was in the driver’s seat—and then a SWAT team surrounded the car.

    Source URL: http://www.motherjones.com/politics/2011/08/fbi-terrorist-informants

    Links:
    [1] http://motherjones.com/node/127157
    [2] https://www.documentcloud.org/documents/230124-cromite-uc-transcripts-1.html#document/p21/a30101
    [3] https://www.documentcloud.org/documents/230124-cromite-uc-transcripts-1.html#document/p97/a30100
    [4] http://www.motherjones.com/politics/2011/08/fbi-terrorist-informants
    [5] http://www.motherjones.com/politics/2011/08/proxy-detention-gulet-mohamed
    [6] http://www.motherjones.com/politics/2011/08/brandon-darby-anarchist-fbi-terrorism
    [7] http://www.motherjones.com/politics/2011/08/terror-trials-numbers
    [8] http://www.motherjones.com/politics/2011/08/fbi-surveillance-video-sting
    [9] http://www.motherjones.com/politics/2011/08/fbi-sting-greatest-hits
    [10] https://www.documentcloud.org/documents/230124-cromite-uc-transcripts-1.html#document/p121/a30102
    [11] https://www.documentcloud.org/documents/230139-cromite-uc-transcripts-2.html#document/p109/a12
    [12] http://motherjones.com/politics/2011/08/shahed-hussain-fbi-informant
    [13] http://vault.fbi.gov/cointel-pro
    [14] http://www.justice.gov/oig/special/0509/chapter2.htm
    [15] http://articles.latimes.com/1986-06-15/news/mn-11287_1_fbi-informant
    [16] https://www.documentcloud.org/documents/238034-33-fbi-se-2.html
    [17] https://www.documentcloud.org/documents/238034-33-fbi-se-2.html#document/p38/a30817
    [18] https://www.documentcloud.org/documents/238034-33-fbi-se-2.html#document/p36/a30818
    [19] http://abclocal.go.com/wabc/story?section=news/local&id=6824533
    [20] http://www.cbsnews.com/stories/2010/10/27/national/main6996775.shtml
    [21] http://articles.cnn.com/2004-08-28/us/ny.bombplot_1_subway-station-shahawar-matin-siraj-herald-square-station?_s=PM:US
    [22] http://www.washingtonpost.com/wp-dyn/content/article/2008/04/16/AR2008041603607.html
    [23] http://www.csmonitor.com/USA/Justice/2010/1129/FBI-alleged-Christmas-tree-bomber-thought-9-11-was-awesome
    [24] http://motherjones.com/politics/2011/08/terror-trials-numbers
    [25] http://motherjones.com/fbi-terrorist
    [26] http://www.justice.gov/opa/pr/2010/April/10-ag-473.html
    [27] http://abcnews.go.com/US/story?id=91485&page=1
    [28] http://motherjones.com/fbi-terrorist/faisal-shahzad-times-square-car-bomb
    [29] http://motherjones.com/politics/2003/03/living-age-fire
    [30] http://www.law.cornell.edu/uscode/html/uscode18/usc_sec_18_00001001—-000-.html
    [31] https://www.documentcloud.org/documents/231565-taxing-terrorism-from-al-capone-to-al-qaida.html
    [32] http://www.justice.gov/archive/ag/speeches/2001/agcrisisremarks10_25.htm
    [33] https://www.documentcloud.org/documents/231567-farhana-khera.html
    [34] http://www.etymonline.com/index.php?term=provocateur
    [35] http://www.justice.gov/oig/reports/FBI/a0902/app5.htm
    [36] http://vault.fbi.gov/FBI%20Domestic%20Investigations%20and%20Operations%20Guide%20%28DIOG%29
    [37] http://books.google.com/books?id=DFlIcxsGUEIC&lpg=PA52&ots=X8vwNY-3f9&dq=cointelpro%20naacp&pg=PP1#v=onepage&q&f=false
    [38] https://www.documentcloud.org/documents/231566-cointelpro.html
    [39] https://www.documentcloud.org/documents/231572-fbi-compliance-with-attorny-generals-guidelines.html
    [40] http://www.justice.gov/oig/special/0509/chapter3.htm
    [41] http://www.justice.gov/jttf/
    [42] http://www.ice.gov/jttf/
    [43] http://www.law.cornell.edu/uscode/18/usc_sec_18_00002339—A000-.html
    [44] https://www.documentcloud.org/documents/231575-ahmedindictment.html
    [45] http://motherjones.com/politics/2011/08/fbi-terrorist-informants
    [46] http://www.justice.gov/iso/opa/ag/speeches/2010/ag-speech-1012101.html
    [47] http://graphics8.nytimes.com/packages/images/nytint/docs/the-new-operations-manual-from-the-f-b-i/original.pdf?scp=1&sq=FBI%20Domestic%20Investigations%20and%20Operations%20Guidelines%20%28DOG%29&st=cse
    [48] http://www.fbi.gov/about-us/training/hogans-alley
    [49] http://www.fbi.gov/news/stories/2004/july/dillinger_072304
    [50] http://www.newyorker.com/archive/2002/01/14/020114fa_fact_wright?currentPage=1
    [51] http://www.slate.com/id/2146654/
    [52] http://www.nytimes.com/2006/10/10/us/10fbi.html
    [53] http://www.miaminewtimes.com/2009-10-08/news/unholy-war-fbi-tries-to-deport-north-miami-beach-imam-foad-farahi-for-refusing-to-be-an-informant/
    [54] http://www.aclu-sc.org/downloads/40/585704.pdf
    [55] http://articles.sun-sentinel.com/2002-06-12/news/0206120212_1_fbi-informant-imran-mandhai
    [56] http://www.sofmag.com/
    [57] http://courtlistener.com/ca11/oNa/usa-v-imran-mandhai/
    [58] http://articles.sun-sentinel.com/2002-06-12/news/0206120212_1_fbi-informant-imran-mandhai/2
    [59] http://abcnews.go.com/video/playerIndex?id=8544160
    [60] https://www.documentcloud.org/documents/230973-assaadarrestreport.html#document/p2/a30249
    [61] http://www.washingtonpost.com/wp-dyn/content/article/2006/09/01/AR2006090101764_pf.html
    [62] http://www.justice.gov/opa/pr/2006/June/06_ag_386.html
    [63] http://www.economist.com/node/7117914?story_id=7117914
    [64] http://motherjones.com/node/126247
    [65] http://www.investigativeproject.org/documents/case_docs/742.pdf
    [66] https://www.documentcloud.org/documents/230978-asaadpaid.html#document/p2/a30293
    [67] http://articles.sfgate.com/2008-04-17/news/17147416_1_mistrial-elie-assad-defense-lawyers
    [68] http://www.fbmonitor.com/monitor/2010/10october/102810/community/102810_community5.html
    [69] http://www.elpasotimes.com/ci_17526478
    [70] http://motherjones.com/fbi-terrorist/mohamed-osman-mohamud
    [71] http://motherjones.com/node/127152
    [72] https://www.documentcloud.org/documents/230979-mohamudnon-fisa.html#document/p3/a30274
    [73] https://www.documentcloud.org/documents/229270-mohamud-complaint.html#document/p5/a30261
    [74] https://www.documentcloud.org/documents/229270-mohamud-complaint.html#document/p36/a30263
    [75] http://motherjones.com/node/127147
    [76] https://www.documentcloud.org/documents/229269-martinez-complaint.html#document/p4/a30266
    [77] https://www.documentcloud.org/documents/229269-martinez-complaint.html#document/p14/a30267
    [78] https://www.documentcloud.org/documents/229269-martinez-complaint.html#document/p19/a30269
    [79] http://www.nytimes.com/2010/08/25/nyregion/25plot.html?ref=jamescromitie
    [80] https://www.documentcloud.org/documents/231512-1-complaint.html
    [81] https://www.documentcloud.org/documents/230984-9-16-10.html#document/p55/a30796
    [82] https://www.documentcloud.org/documents/230984-9-16-10.html#document/p56/a12
    [83] https://www.documentcloud.org/documents/230991-9-23-10.html#document/p89/a30459
    [84] https://www.documentcloud.org/documents/230124-cromite-uc-transcripts-1.html#document/p72/a30278
    [85] https://www.documentcloud.org/documents/230987-cromitie-parole-hearing-transcript.html#document/p8/a30460
    [86] https://www.documentcloud.org/documents/230989-9-22-10.html#document/p101/a12
    [87] https://www.documentcloud.org/documents/230992-9-20-10.html#document/p70/a12
    [88] https://www.documentcloud.org/documents/230993-9-8-10-shahed-included.html#document/p22/a30462
    [89] https://www.documentcloud.org/documents/230990-9-21-10.html#document/p69/a30280
    [90] https://www.documentcloud.org/documents/230990-9-21-10.html#document/p68/a30281
    [91] http://video.nytimes.com/video/2010/10/18/nyregion/1248069169871/bomb-plot-defendant-expresses-doubts.html?scp=2&sq=Cromitie&st=cse
    [92] https://www.documentcloud.org/documents/230139-cromite-uc-transcripts-2.html#document/p74/a30272
    [93] https://www.documentcloud.org/documents/230986-hussaincromitietelephonetranscript.html#document/p3/a30273
    [94] https://www.documentcloud.org/documents/230999-9-15-10-shahed-included-redirect.html#document/p17/a12
    [95] https://www.documentcloud.org/documents/230999-9-15-10-shahed-included-redirect.html#document/p22/a13
    [96] https://www.documentcloud.org/documents/230999-9-15-10-shahed-included-redirect.html#document/p23/a30465
    [97] http://www.bloomberg.com/news/2011-06-29/new-york-city-synagogue-bomb-plotters-are-sentenced-to-25-years-in-prison.html
    [98] https://www.documentcloud.org/documents/230985-8-25-10-fuller.html#document/p179/a30282
    [99] http://journalism.berkeley.edu/program/investigative/
    [100] http://motherjones.com/authors/trevor-aaronson
    [101] http://fij.org/
    [102] http://motherjones.com/authors/lauren-ellis
    [103] http://motherjones.com/authors/hamed-aleaziz

    By Trevor Aaronson | Fri Jul. 29, 2011 2:44 PM PDT

    Find this story at Septembet/October 2011

    Copyright ©2013 Mother Jones and the Foundation for National Progress

    << oudere artikelen  nieuwere artikelen >>