• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • A DEATH IN ATHENS Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?

    Van nieuwsblog.burojansen.nl

    JUST OUTSIDE THE MAIN DOWNTOWN part of Athens lies Kolonos, an old Athenian neighborhood near the archaeological park of Akadimia Platonos, where Plato used to teach. Along the maze of narrow streets, flower-filled balconies hang above open-air markets, and locals gather for hours at lazy sidewalk cafes, sipping demitasse cups of espresso and downing shots of Ouzo in quick gulps.

    It was a neighborhood Costas Tsalikidis knew well. He lived at No. 18 Euclid Street, a loft apartment just down the hall from his parents. Slim and dark-haired, with a strong chin and a sly smile, he was born in Athens 38 years earlier to a middle-class family in the construction business. Talented in math and physics from an early age, he earned a degree in electrical engineering from the National Technical University of Athens, considered the most prestigious college in Greece, where he specialized in telecommunications, and later obtained his master’s in computer science in England. Putting his skills to good use, for the last 11 years he had worked for Vodafone-Panafon, also known as Vodafone Greece, the country’s largest cell phone company, and was promoted in 2001 to network-planning manager at the company’s headquarters in the trendy Halandri section of Athens.

    On March 9, 2005, Costas’ brother, Panagiotis, dropped by the apartment. He thought he’d have a coffee before a business meeting scheduled for that morning. But as he entered the building, he found his mother, Georgia, running up and down the corridor yelling for help.

    “Cut him down!” she was saying. “Cut him down!”

    Panagiotis had no idea what she was talking about until he went inside his brother’s apartment and saw Costas hanging from a rope tied to pipes above the lintel of his bathroom door, an old wooden chair nearby. He and his mother cut the rope and laid Costas down on the bed.

    Costas Tsalikidis Photo: Courtesy of the Tsalikidis familyThe day before his death, Costas’ boss at Vodafone had ordered that a newly discovered code — a powerful and sophisticated bug — be deactivated and removed from its systems. The wiretap, placed by persons unknown, targeted more than 100 top officials, including then Prime Minister Kostas Karamanlis and his wife, Natassa; the mayor of Athens; members of the Ministerial Cabinet; as well as journalists, capturing not only the country’s highest secrets, but also its most intimate conversations. The question was, who did it?
    For a year, the eavesdropping case remained secret, but when the affair finally became public, it was regarded as Greece’s Watergate. One newspaper called it “a scandal of monumental proportions.” And at its center was the dark underside of the 2004 Summer Olympic Games in Athens. While the athletes were competing for medals as millions watched, far in the shadows spies had hacked into the country’s major telecom systems to listen and record.

    A decade later, Costas’ death is caught up in an investigation into what now appears to have been a U.S. covert operation in Greece. Last February, Greek authorities took the extraordinary step of issuing an international arrest warrant for a CIA official the Greeks believe was a key figure in the operation while based in Athens. Unnoticed by the U.S. press, the warrant was a nearly unprecedented action by an allied country. The intelligence official, identified as William George Basil, was accused of espionage and eavesdropping. But by then he had already left the country, and the U.S. government, as it has done for the past 10 years, continues to stonewall Greek authorities on the agency’s involvement.

    The Greek charges only touch the surface, however, and Basil may be less a key figure than simply a spy guilty of poor tradecraft. An investigation by The Intercept has uncovered not only the role of the CIA, but also that of the NSA, as well as how and why the operation was carried out. The investigation began while I was producing a documentary for PBS NOVA on cyberwarfare, scheduled to air on October 14, for which some of the interviews were conducted. In addition, I have had exclusive access to highly classified and previously unreported NSA documents released by Edward Snowden.

    The Intercept, along with the Greek newspaper Kathimerini, interviewed over two dozen people familiar with the wiretapping case, ranging from U.S. intelligence officials and Greek government officials to those involved in the investigation and its aftermath. Many of those interviewed agreed to talk on condition that their names not be used, fearing criminal prosecution for speaking on intelligence matters or professional retribution. While some questions remain, the evidence points to a massive illegal eavesdropping program that may have led to Costas’ tragic death.

    “COSTAS WAS ENGAGED,” his brother, Panagiotis, told me last year. “He was planning to get married.” Like Costas, who was three years younger, Panagiotis spoke fluent English, the product of frequent trips to the U.S., both on business and vacation.

    After a dinner of lamb and hummus at a restaurant not far from the apartment where Costas died, Panagiotis spoke emotionally about his brother. “He had met the woman of his life and they were planning to get married really soon. And for that reason, they were looking to get a house and they had already started buying things that they could use in their new household. Costas was happy and optimistic and things had been working out really good for him.”

    At the time, Panagiotis couldn’t understand what had happened; Costas was in good health and, at least until recently, seemed to love his job at Vodafone. “I thought there was no reason for him to commit suicide,” he said, although he acknowledged Costas had been under more pressure than usual. “In the last year of his life, he was working very hard because Greece had undertaken the Olympic Games of 2004,” he said. “And that meant a lot of hours at work and a lot of planning to beef up the networks.”

    Given the enormous numbers of journalists and tourists who were planning to attend the events, all wanting to communicate, Costas’ workload increased enormously in the months before the games were to begin. Eventually, the technical infrastructure created by the Athens Olympics Organizing Committee for staff and media involved more than 11,000 computers, 23,000 fixed-line telephone devices, and 9,000 mobile phones. But the Olympics ended more than six months before Costas’ death, so there had to be another reason.

    At work, things suddenly began to change. Costas told his brother that he wanted to quit. “He tendered his resignation to the company, but it wasn’t accepted,” Panagiotis told me. “He wanted to get out.” And he sent a text to his fiancée, a piano teacher named Sara Galanopoulou, saying he had to leave his job, adding cryptically that it was a “matter of life and death.”

    As Costas Tsalikidis and his colleagues at Vodafone worked overtime in the months leading up to the games, thousands of miles away another group was also getting ready for the Summer Olympics in Greece: members of the U.S. National Security Agency. But rather than communicating, they were far more interested in listening. According to previously undisclosed documents from the Snowden archive, NSA has a long history of tapping into Olympic Games, both overseas and within the U.S. “NSA has had an active role in the Olympics since 1984 Los Angeles games,” according to a classified document from 2003, “and has seen its involvement increase with the recent games in Atlanta, Sydney, and Salt Lake City. During the 2002 Winter Olympics in Salt Lake City, the focus was on counterterrorism, and NSA acted largely in support of the FBI in a fusion cell known as the Olympics Intelligence Center (OIC). … NSA’s support to the 2004 Olympics in Athens will be much more complicated.”

    In 2004, for the first time since the 9/11 attacks of 2001, the Summer Olympic Games would be held outside the U.S., and thus the difficulties would be far greater. “Several factors will make the Athens Olympics vastly different,” the document continued, “not the least of which is the fact these Olympics will not be held at a domestic location. Also different is that the security organization that NSA will support is the EYP, or Greek National Intelligence Service. NSA will gather information and tip off the EYP of possible terrorist or criminal actions. Without a doubt, the communication between NSA and EYP will take some coordination, and for that reason preparations are already underway.”

    According to a former senior U.S. intelligence official involved with the operation, there was close cooperation between NSA and the Greek government. “The Greeks identified terrorist nets, so NSA put these devices in there and they told the Greeks, OK, when it’s done we’ll turn it off,” said the source. “They put them in the Athens communications system, with the knowledge and approval of the Greek government. This was to help with security during the Olympics.”

    The Olympic Games ran smoothly — there were no serious terrorist threats and Greece had its best medal tally in more than a century. On August 29, 16 days after the games began, closing ceremonies were held at the Athens Olympic Stadium. As 70,000 people watched, Greek performers displayed traditional dances, a symbolic lantern was lit with the Olympic Flame, and Dr. Jacques Rogge, president of the International Olympics Committee, gave a short speech and then officially closed the games.

    Two weeks later, the Paralympics ended, and at that point, keeping their promise to the Greek government, the NSA employees should have quietly disconnected their hardware and deleted their software from the local telecommunications systems, packed up their bugging equipment, and boarded a plane for Fort Meade. The problem was, they didn’t. Instead, they secretly kept the spying operation active, but instead of terrorists, they targeted top Greek officials. According to the former U.S. intelligence official involved with the operation, the NSA began conducting the operation secretly, without the approval or authorization of the CIA chief of station in Athens, the U.S. ambassador, or the Greek government.

    “We had a huge problem right after the Greek Olympics,” the source said. “They [NSA] said when the Olympics is over, we’ll turn it off and take it away. And after the Olympics they turned it off but they didn’t take it away and they turned it back on and the Greeks discovered it. They triangulated some signals, anonymous signals, and it all pointed back to the embassy.”

    At that point, the source said, someone from the Greek government called Richard Eric Pound, the CIA chief of station at the embassy in Athens and the person officially responsible for all intelligence operations in the country. Pound had arrived in May 2004, replacing Michael F. Walker, the agency’s former deputy director of the paramilitary Special Activities Division, as chief of station in Athens. Describing himself as “a small town boy from Indiana who set off to see the world,” Pound had joined the agency in 1976. Hefty and mustachioed, he was a veteran of the agency’s backwater posts in Africa.

    Pound, according to the source, knew nothing about the operation having been turned back on, so he called his boss at CIA headquarters to ask about it. “He says, ‘What in God’s name is this all about?’” said the source (Pound declined to speak to The Intercept). Pound’s boss then immediately called his NSA counterpart. “Oh, yeah, we were going to tell you about that,” the NSA official told Pound’s CIA boss, according to the source. “They didn’t take it out and they turned it back on.”

    National Security Agency Deputy Director John Chris Inglis testifies before the House Select Intelligence Committee on the NSA’s PRISM program, which tracks web traffic and US citizens’ phone records, during a hearing on Capitol Hill in Washington, DC, June 18, 2013. AFP PHOTO / Saul LOEB (Photo credit should read SAUL LOEB/AFP/Getty Images) National Security Agency Deputy Director John Chris Inglis in Washington, D.C., June 18, 2013. Photo: Saul Loeb/AFP/Getty ImagesNot informing the chief of station and the ambassador was an enormous breach of protocol. The chain of events surprised another source, a long-time veteran of the CIA’s National Clandestine Service, who was once a colleague of Basil in Athens. “I can’t think of another time in my experience when that ever happened, that’s how unusual it is,” the source said. “I’m astounded by that.”
    In 2006, Chris Inglis became the NSA’s deputy director, the agency’s No. 2 official, who was thus in a position to discover what had happened. In an interview, I questioned him about the scandal and the illegal bugging operation. “Was the NSA involved?” I asked. Inglis offered no denial. “I couldn’t say whether NSA was involved in that or any other activity that might have been alleged to be conducted by an intelligence service, let alone NSA.”

    Inglis did confirm, however, that NSA operations in foreign countries would normally have the approval of the CIA chief of station. “The chief of station,” he said, “would speak on intelligence matters for the nation, or essentially be expected to adjudicate matters on behalf of the nation.” He added, “So if NSA was expected to conduct an intelligence operation physically in some particular place of the world, I would expect that the chief of mission — the ambassador — and that the chief of station — the intelligence rep — would have some influence on that, some kind of ability to understand what it was and to ensure that it was done in the proper way.”

    I also put the question to Gen. Michael Hayden, the NSA director at the time. “Do you remember the incident that came up involving Greece?” I asked. “Not anything we’re going to talk about here,” he said. “Did that come to your attention?” I pressed. “Not something I can talk about,” he replied.

    At the time of the Greek bugging operation, Hayden was also secretly running the NSA’s illegal warrantless eavesdropping and metadata dragnet surveillance programs, the largest domestic spying operations in U.S. history.

    FILE – In this Dec. 6, 2002 an aerial file photo of the US embassy in Athens, Greece. Theodoros Pangalos a former foreign minister of Greece said on Tuesday, Oct. 29, 2013 the U.S. is not the only country eavesdropping on foreign diplomats: his country’s secret services did that to U.S. ambassadors in Athens and Ankara in the 1990s. (AP Photo/Thanassis Stavrakis, File) An aerial file photo of the U.S. Embassy in Athens, Greece, Dec. 6, 2002. Photo: Thanassis Stavrakis/AP
    Stonewalled by the U.S., over the past decade Greek investigators were nevertheless able to follow a digital trail right to the front door of the U.S. Embassy in Athens, and then to William George Basil, a mysterious embassy official with a Greek background.

    Although very little is publicly known about Basil, interviews with his relatives and childhood friends in Greece, as well as fellow embassy employees and intelligence officials in Athens and the U.S., shed light on his background.

    Basil was born on December 10, 1950, in Baltimore, where many of his relatives had settled after emigrating from Greece. Much of his extended family came from the small Greek island of Karpathos in the Aegean Sea, a port of call for the Argonauts traveling between Libya and Crete, and mentioned in Homer’s Iliad. There, his ancestors worked as stonemasons and as farmhands in mountainside wheat fields.

    His father, George, had emigrated to the U.S. where Basil and his sister, Maria, spent their early years. But when Basil was 9, his now-divorced father became engaged to a woman from Karpathos and they all traveled to the island for the wedding. An old snapshot shows a young Basil in a suit jacket sitting uneasily on the back of a donkey. After a few months, the family returned to the U.S., then in the 1960s, when Basil was in his early teens, moved back to Karpathos for good.

    Today, childhood friends there still remember Basil as “Billy,” an Americanized youth who liked to spend time on the beach. His cousin Nikos Kritikos often played sports with him. “He played rugby when he was young,” Nikos said. “He was amazingly smart. … We grew up in the same house; his stepmother, Marigoula, raised us.” And Basil’s uncle Manolis Kritikos, a local schoolteacher, remembered him as “a happy kid who smiled.” “He was always restless as a young man, he searched things,” he said. “Most of all he liked the history of this place, the folklore. … And he loved Greece and [the Karpathos village of] Olympos more than anything.”

    Basil 9 years old attending his father’s wedding on Karpathos Basil, 9 years old, attending his father’s wedding on Karpathos. After graduating from high school at the American Community Schools in Athens in 1968, Basil joined the Army for five years and was posted to Alaska. Then, according to Basil’s former CIA colleague, he took a job as a Baltimore County deputy sheriff and later joined the CIA’s Office of Security as a polygraph expert. But, after nearly two decades, said the colleague, he grew bored with strapping recruits and potential agents to lie detector machines and sought a position in the agency’s Directorate of Operations. Largely based on his Greek heritage and fluency in the language, he was accepted and quickly disappeared behind the agency’s heavy black curtain, emerging undercover as a Foreign Service Officer with the State Department.
    With a black diplomatic passport in his pocket, he was soon on his way to Athens, a city he knew well; he had owned an apartment in the city for many years, which he rented out. Soon after arriving, he moved into an apartment near the beach in Glyfada, one of the most exclusive areas of the city, home to ship owners and wealthy business executives. A long-time biker, he would often cruise around the city on his motorcycle.

    At the U.S. Embassy in Athens, he was officially a second secretary in the regional affairs section, later promoted to first secretary. In reality, he joined the CIA station as a terrorism expert. The station, located on the embassy’s top floor (with the forgery section in the basement), was one of the largest in Europe, because it often served smaller Middle East stations with logistical help and temporary personnel. Protected by a bulletproof vest under his shirt, a 9 mm pistol strapped to his belt, and a small M38 handgun on his ankle, Basil, who had a reputation as an Olympic-level shooter, drove around the city in an armored car looking for informants to recruit and liaising with the Greek police organization. According to a confidential report by Greek prosecutor Yiannis Diotis, obtained by The Intercept, Basil played a role in a March 2003 operation — just prior to the U.S. invasion of Iraq — that involved an informant recruited by the embassy’s CIA station. The operation, code-named “Net,” led to the discovery, by a joint U.S.-Greek team, of a small cache of guns and explosives in the basement of the Iraq Embassy in Athens.

    While most CIA assignments to Athens were two years, Basil kept extending his tour, giving him an opportunity to spend time on Karpathos, visiting friends and relatives and playing backgammon. “He never withheld where he was working or what he was doing,” recalled his cousin Nikos. “A lot of times we would call each other and he would tell me, ‘I am in the Middle East.’ His job was to report on the sentiment of those countries’ society. … From what he said he had a lot of friends in high places. I understood that he was acquainted with Ministers of Interior and Ministers of Public Order in Greece.”

    One person who knew Basil in passing was John Brady Kiesling, a now-retired career Foreign Service Officer who had worked as the embassy’s political officer from July 2000 to March 2003. I spoke to him in his apartment in the historic Plaka section of Athens, a labyrinth of winding streets and colorful shops in the shadow of the Acropolis. After leaving his post at the embassy, he decided to remain in Greece, where he has followed the bugging case closely. When I brought up the possibility of the NSA conducting a covert operation out of the embassy, without the knowledge of either the ambassador or the CIA chief of station, he looked surprised. “I would say that a rogue agency was performing it if it was performed without the prior clearance with the ambassador, as the president’s representative in Greece,” he said. “It definitely is something that is hanging as a sort of swinging sword blade over the U.S.-Greek relationship.”

    But according to Basil’s former CIA colleague in Athens, there are occasions when an ambassador is not informed by the agency because of the sensitivity of the operation. However, there was never a time when a chief of station was kept in the dark. “There were times we didn’t inform the ambassador — it was just too sensitive — and we would have to get a waiver signed,” the source said.

    william-george-basil Visa from U.S. passport of William George Basil. A half-dozen miles southwest of Athens is the city of Piraeus. The largest passenger port in Europe and the third largest in the world, it services about 20 million passengers a year. Piraeus is to ships what Chicago’s O’Hare Airport is to planes. There are long rows of ferries, endless quays, hydrofoils and mega-yachts, tankers and cruise ships. It was here, not far from the pier for ferries to Karpathos that the planning ended and the operation began. According to the Greek prosecutor’s report, on June 8, 2004, someone entered the Mobile Telecommunication Center at 31 Akti Miaouli Street, and in the name of a “Markos Petrou,” purchased the first four of what would eventually be 14 prepaid cell phones.
    They would become the “shadow” phones. As normal calls from Vodafone went to and from legitimate parties, a parallel stream of digitized voice and data — an exact copy — was directed to the NSA’s shadow phones. The data would then be automatically transferred miles away to NSA receivers and computers for monitoring, analysis, and storage.

    Not long after, according to the Snowden documents I reviewed, the NSA contingent began arriving at US-966G, the surveillance agency’s code for the Athens embassy. The planning had already been underway. “Although the first race, dive, and somersault are still a year away,” noted a Signals Intelligence Directorate document, “SID Today,” dated August 15, 2003, “in truth, NSA has been gearing up for the 2004 Olympics for quite some time, in anticipation of playing a larger role than ever before at the international games.” The document then noted that NSA would be sending “the largest contingent of personnel in support of the games in our history. A team of 10 NSA analysts will arrive in Greece anywhere from 30-45 days before the Olympics and stay until the flame is extinguished. … The scope of the Olympics is tremendous, and so will be the support of SID [Signals Intelligence Directorate] and NSA.”

    Then, in a note of unintended irony, the writer added, “The world will be watching and so will NSA!”

    A key part of the operation would be obtaining secret access to the Greek telecom network. And it is here that Costas Tsalikidis may have entered the picture. As a senior engineer in charge of network planning, working for the country’s largest cellular service provider, he would have been one of those in a position to become the team’s inside person. But he was also far from the only one. “Of course, it could have even been me,” said another Vodafone technician interviewed.

    The operation could have been accomplished a number of ways. At the beginning, the installation of the bugging software, while illegal according to Greek law, had been secretly authorized by the Greek government. Thus, an inside person would have been operating outside the law in providing assistance to U.S. intelligence, but with the patriotic objective of helping protect Greece from terrorists. Also, the person may never have been told that the software was supposed to be removed following the conclusion of the games. In any case, it is unlikely that the person would have known who the targets were since they were just lists of phone numbers.

    In fact, recruiting a foreign telecom employee as an “inside person” for a major bugging operation was standard operating procedure for both the NSA and the CIA, according to the senior intelligence official involved with the Athens operation. “What the NSA really doesn’t like to admit, about 70 percent of NSA’s exploitation is human enabled,” the former official said. “For example, at a foreign Ministry of Post and Telecommunications, if NSA determines it needs to get access to that system, NSA and/or the CIA in coordination would come up with a mechanism that would allow them to replicate the existing switch to be swapped out. The CIA would then go and seek out the person who had access to that switch — like a Nortel switch or a router — go in there, and then it would be the CIA that would effect the operation. And then the take from it would be exploited by the NSA.”

    And according to a highly classified NSA document provided by Snowden and previously published by The Intercept, covertly recruiting employees in foreign telecom companies has long been one of the NSA’s deepest secrets. A program code-named “Sentry Owl,” for example, deals with “foreign commercial platform[s]” and “human asset[s] cooperating with the NSA/CSS [Central Security Service].” The document warns that information related to Sentry Owl must be classified at an unusually high level, known as ECI, or Exceptionally Controlled Information, well above top secret.

    “Human intelligence guys can provide sometimes the needed physical access without which you just can’t do the signals intelligence activity,” Gen. Hayden, the NSA head at the time of the Athens bugging, who later ran the CIA, told me.

    Basil’s ties to Greece made him very good at developing local agents. “He was the best recruiter the station had, the best,” said the former CIA associate in Athens. “[Basil] may have been in charge of recruiting the guy on the inside. He may have made the initial recruitment.”

    With an agent in place inside the network, the next step would be to implant spyware capable of secretly transmitting the conversations of the NSA’s targets to the shadow phones where they could be resent to NSA computers. Developing such complex malware is the job of the NSA’s Tailored Access Operations (TAO) organization. And, according to the previously undisclosed Snowden documents, members of the group “performed CNE [Computer Network Exploitation] operations against Greek communications providers” as part of the preparations for the Olympics. In lay terms, this means they developed malware to secretly extract communications data. Also involved were members of the Special Source Operations (SSO) group, the specialists who work covertly with telecom companies, such as AT&T — or in this case Vodafone — to get secret access to their networks.

    The key to the operation was hijacking a particular piece of software, the “lawful intercept” program. Installed in most modern telecom systems, it gave a telecom company the technical capability to respond to a legal warrant from the local government to monitor a suspect’s communications. Vodafone’s central switching equipment was made by Ericsson, the large Swedish company, and on January 31, 2002, Ericsson delivered to Vodafone an upgrade containing the lawful intercept program, a piece of software known as the Remote Control Equipment Subsystem (RES). According to a report by Greece’s Authority for Communication Security and Privacy (ADAE), Costas was the Vodafone employee who accepted delivery of the upgrade.

    Normally, when a lawful warrant is submitted to a company such as Vodafone Greece, the information, including the target phone numbers, would first be logged into a program called the Interception Management System (IMS). This creates a permanent record of the request that can later be audited. The information is then sent to the RES, which initiates the actual monitoring by secretly creating a duplicate communications stream for the targeted number. That duplicate stream is then transmitted, along with the metadata — date, time, and number calling or being called — to the law enforcement agency.

    But despite having the capability to initiate wiretaps with the RES program, at the time of the Olympics Greece did not have laws in place to permit them. As a result, Vodafone never paid the additional fee to Ericsson for the IMS program and the digital key to activate the system. Far behind the NSA, the Greek government had only simple wiretap technology. “All they had was some primitive suitcase methods that would allow very limited surveillance of very specific targets,” said Kiesling, the former U.S. Embassy official. “From an American point of view, that was terrifyingly primitive.”

    Thus, according to Greek sources, prior to the Olympics U.S. officials began asking the Greek government for permission to secretly activate the lawful intercept program, which led to the government agreeing to the U.S. bugging operation. Ironically, the presidential decree permitting widespread eavesdropping was finally enacted on March 10, 2005, the day after Costas’ death.

    For NSA, the missing IMS program was the technical opening its operatives needed. In essence, they created malware that would secretly turn on the RES program and begin tapping. But without the IMS program there would be no audit trail, no indication or evidence that eavesdropping was going on as the target numbers were being tapped and transmitted to the shadow phones by the RES. “It was a very complex system, because it was invisible to detection,” Vodafone Greece CEO George Koronias told investigators. “It functioned independently of whether the lawful interception system was activated, and bypassed the security alarm.”

    Exploiting the weaknesses associated with lawful intercept programs was a common trick for NSA. According to a previously unreleased top-secret PowerPoint presentation from 2012, titled “Exploiting Foreign Lawful Intercept Roundtable,” the agency’s “countries of interest” for this work included, at that time, Mexico, Indonesia, Egypt, and others. The presentation also notes that NSA had about 60 “Fingerprints” — ways to identify data — from telecom companies and industry groups that develop lawful intercept systems, including Ericsson, as well as Motorola, Nokia, and Siemens.

    There are also a variety of “Access Methods” used to penetrate other countries’ lawful intercept programs. These include using the highly secret Special Collection Service. Known internally as “F-6,” it is described in another Snowden document as “a joint NSA-CIA organization whose mission is to covertly collect SIGINT [Signals Intelligence] from official U.S. establishments abroad, such as embassies and consulates.” The organization’s job, according to the PowerPoint, is to intercept microwaves, the thousands of communications-packed signals that crisscross a city. The PowerPoint also suggested using the Special Source Operations unit, the people who work out secret arrangements with the local telecom companies. And with the Tailored Access Operations unit, techniques could be developed to hack into the country’s telecom systems. For the Athens Olympics operation, it would be a full house.

    With the malware installed, the NSA was set to go, with more than a dozen shadow phones purchased and a contingent of employees from at least 11 different NSA organizations poised to begin eavesdropping during “24-hour watches.” According to the ADAE report, the tappers first activated the malware at Vodafone’s communications centers on August 4, 2004, and five days later they began inserting the target phone numbers. Then on September 28, following the conclusion of the Paralympic Games, some of the malware was removed. But less than a week later, long after the Olympic Torch had been extinguished, new malware was implanted.

    “And then,” said Kiesling, looking both troubled and perplexed, “the mystery becomes why it continued after the Olympics, and that’s a mystery that still has not been solved.” It was a question I asked a former senior NSA official with long involvement in worldwide eavesdropping operations. “They never [remove it],” the official said with a laugh. “Once you have access, you have access. You have the opportunity to put implants in, that’s an opportunity.”

    “FEVER,” COSTAS WROTE. Several of the antennas used for the bugging operation were heating up, and to Costas, it was as if they had a fever. After the Olympic Games concluded, Costas started having problems at work. In the weeks following Costas’ death, his brother discovered one of his notebooks, dating from October and November 2004, after the Olympics, and it described a number of incidents. “In his notes he said that at certain points in time certain antennas seemed to get overworked and they were trying to figure out why that was happening,” said Panagiotis. “Now it turned out that those antennas were the same antennas that were connected with the system of the wiretapping.” In another entry, which Panagiotis submitted to the prosecutor, Costas wrote about a month before he died: “Something is not right at the company.”

    Then, at 7:56 p.m. on January 24, 2005, someone installed a routine update in the NSA’s bugging software at Vodafone’s facility in the Paiania section of the city. It would turn out to be anything but routine. Within seconds, errors appeared, which caused hundreds of text messages from customers to go undelivered, and people began complaining. At the same time, an automatic failure report was sent to Vodafone management. It was as if a burglar alarm had gone off during a robbery. As normally happens, Vodafone sent the voluminous logs and data dumps to Ericsson for analysis, while those involved quietly waited — and worried. The once cheerful and upbeat Costas turned glum and angry. “We have heard that Costas was in meetings inside the company, in meetings that were very loud and a lot of people were arguing,” said Panagiotis. “He tendered his resignation to the company, but it wasn’t accepted. … He wanted to get out.”

    On March 4, after weeks of investigation, Ericsson notified Vodafone that it had discovered a sophisticated piece of malware, containing a hefty 6,500 lines of code — evidence of a large bugging operation. The company also turned up the target phone numbers of the prime minister and his wife, the mayor of Athens, members of the Ministerial Cabinet, and scores of high officials, as well as the numbers for the shadow phones and the metadata describing when the calls were made.

    Three days later, Vodafone technicians isolated the malware. Then on March 8, before law enforcement had an opportunity to get involved, Koronias, the Vodafone Greece CEO, ordered the software deactivated and removed, thus hampering any future investigation. Apparently alerted, those involved in the bugging operation immediately turned off their shadow phones. “Vodafone’s decision to deactivate the software meant our hands were tied,” Yiannis Korandis, the chief of the EYP, the Greek National Intelligence Service, told investigators.

    The next morning Panagiotis discovered his brother’s body hanging from a white rope tied to a pipe above the bathroom doorway. To this day, he is convinced that Costas was murdered to keep him quiet and prevent him from quitting and going public with the details. “He probably wanted answers there and then and I think that led to his demise,” he said. The bugging, Panagiotis suspects, may have been the reason Costas sent the text to his fiancée about leaving his job being a “matter of life and death.”

    Athens, GREECE: Vodafone Greece Chief Executive Officer George Koronias holds documents 06 April 2006 before the start of a parliamentary committee hearing investigating the case of a phone-tapping scandal, which targeted Prime Minister Costas Karamanlis and top officials during and after the 2004 Athens Olympics games. AFP PHOTO / Louisa Gouliamaki (Photo credit should read LOUISA GOULIAMAKI/AFP/Getty Images) Vodafone Greece CEO George Koronias holds documents in April 2006 before the start of a parliamentary committee hearing investigating the phone-tapping scandal. Photo: Louisa Gouliamaki /AFP/Getty ImagesWithin hours of Costas’ death, Ericsson prepared a formal “Incident Case Description,” outlining technical details about the malware and how it worked. It contained the warning: “This document is to be treated as highly confidential and … all necessary steps to protect this information must be taken, including the mandatory use of Entrust encryption within Ericsson.” After seven pages of technical detail, the report concluded that someone had loaded unauthorized “corrections,” i.e. malware implants, “designed to introduce RES functionality in such a way that it is not visible to any observer. Neither Ericsson nor Vodafone have any knowledge of the corrections. Nor is it known who supplied the correction, who loaded them or how long they have been loaded in the network.” In other words, someone had introduced malware to secretly activate the lawful intercept’s tapping function while at the same time hiding the fact that it had been turned on. On March 10, the report was turned over to Vodafone Greece CEO Koronias.
    The Tsalikidis family’s former lawyer, Themistoklis Sofos, believes that Costas discovered the spy software by chance and then reported it. “Some people were afraid that he would talk so they killed him in a professional manner,” he told a Greek newspaper. Although the official coroner’s report said he took his own life, no suicide note was ever found, and the initial forensic report was inconclusive.

    Nevertheless, Supreme Court prosecutor Dimitris Linos said that Costas’ death was clearly tied to the eavesdropping operation. “If there had not been the phone tapping, there would not have been a suicide,” he said in June 2006. In his report, prosecutor Yiannis Diotis also said that Costas had knowledge of the illegal phone-tapping software. And Giorgos Constantinopoulos, a former colleague in charge of communications security for Vodafone, reportedly told prosecutors that he was sure Costas was in a position to know about the spy software, and that his death was likely connected to that discovery.

    THROUGHOUT THIS PAST SUMMER in Athens as the debt crisis mounted, crowds of pro-government demonstrators filled Syntagma Square shouting angry chants against European creditors. A few blocks away on Panepistimiou Street, an anarchy symbol was spray-painted on the walls of the headquarters of the Bank of Greece. And behind the Doric columns and yellow neo-classical façade of the Parliament Building, nervous politicians huddled and debated what to do next.

    But a mile and a half away, in a heavily guarded compound near Pedion tou Areos, one of the largest parks in Athens, prosecutors were finally bringing to a close a decade of investigations. And on June 26 the finger of guilt was pointed directly at America’s Central Intelligence Agency. Now it is up to the Justices’ Council to decide how to proceed, and it may prove very embarrassing for the United States.

    From the very start, according to a former senior Greek official involved in the investigation, there was no doubt within the highest levels of government that the U.S. was behind the bugging. On Friday, March 25, 2005, two weeks after Panagiotis cut the rope from his brother’s neck, Greeks celebrated Independence Day, followed by a weekend of festivities. But in Maximos Mansion, the Greek White House, the talk was far from jubilant. As Greek Navy helicopters flew low over the Acropolis during a military parade, members of the Greek inner circle were meeting with Prime Minister Costas Karamanlis about the bugging scandal that had targeted him and his wife.

    A few days before, Foreign Minister Petros Molyviatis was in Washington engaged in high-level meetings with top officials. Secretary of State Condoleezza Rice spoke of the “excellent state of relations between Greece and the United States,” and President George W. Bush issued a proclamation declaring “our special ties of friendship, history, and shared values with Greece.” He noted, “Our two Nations are founded on shared ideals of liberty.” But based on the investigation up to that point, close aides, including Foreign Minister Molyviatis, were convinced that U.S. intelligence was behind the operation. Although at least one member of the group wanted to bury the whole matter rather than cause a rupture in relations with the U.S., Karamanlis disagreed, according to the source. “No way,” Karamanlis said. “If they find this on us 10 years from now, things will prove really difficult.”

    The decision was made to have the police and the EYP intelligence service launch an investigation. Although far from exhaustive, with many questions left unanswered, Minister of Public Order George Voulgarakis and several other officials finally held a televised press conference in February 2006. Scribbling with a blue marker on a white board, they noted that the 14 shadow cell phones were using four mobile phone antennas with a radius of about 2 kilometers in central Athens.

    Within that area was the U.S. Embassy on Vassilissis Sofias Avenue, which turned out to be a matter of great embarrassment for both the U.S. and Greek governments. “The U.S. has been fingered in the media as the culprit,” U.S. Ambassador Charles P. Ries noted in a classified memo to Washington, released by WikiLeaks. Ries suspected Voulgarakis of the leak. Calling him “a less reliable ally,” Ries said Voulgarakis “has allowed rumors to circulate that the U.S. is behind [the] major eavesdropping case in Greece.” Nevertheless, both sides wanted to pretend all was normal. Thus, Foreign Minister Molyviatis suggested to Ries that they move a previously scheduled meeting between them from the ambassador’s residence to the very public Grande Bretagne Hotel in central Athens. There, Ries noted in his memo, “All could see that the U.S.-Greece relationship was unimpaired.”

    It was an odd lunch. Molyviatis was sitting across from the man whose embassy, he believed, had been listening in on his cell phone for months. And Ries, out of the loop because it was a rogue NSA/CIA operation, still may not have known of his embassy’s involvement. “Addressing the eavesdropping case,” Ries said in his memo, “Molyviatis gave his opinion that the whole hullabaloo [the press conference] had been unnecessary. It would have been sufficient to hand the matter to the judicial authorities for investigation and, if appropriate, prosecution, he said. But now, both he and the Prime Minister were keen to show that the current hysteria did not detract from excellent U.S.-Greece relations.”

    For some, however, the cozy relations only seemed to increase the anger. In May, a Greek terrorist organization, “Revolutionary Struggle,” attempted to assassinate Voulgarakis with a remote-controlled bomb. Pointing to the wiretapping scandal and weakening Greek sovereignty as a key reason for the attack, the group said it opposed state-sponsored “terrorism of mass surveillance.” At the U.S. Embassy, the deputy chief of mission sent a classified cable to Washington, released by WikiLeaks, with a warning. “This group is to be taken seriously,” he said. “While there is no mention thus far of targeting foreign ‘capitalist-imperialists,’ it would not be a leap of faith for RS to focus its attention on the U.S. presence in Greece.” Ten months later, the group fired a rocket at the embassy.

    Around the time the eavesdropping was discovered, Basil left the country, apparently with a quick reassignment by CIA to Sudan. Then, according to Greek documents obtained by The Intercept, on August 4, as things quieted down, he obtained a visa at the Greek Embassy in Khartoum and returned 10 days later to Athens and his cover job as first secretary for regional affairs. The diplomatic position gave him immunity from arrest.

    The investigation was the first of what would be five major probes stretching over a decade in which more than 500 witnesses would be questioned, including agents of the EYP. Evidence built up slowly as investigators picked apart the telltale computer logs, traced the cell phone signals, and dissected layers and layers of software. Over the years, piece after piece, the puzzle began to come together.

    In his testimony, Ericsson’s managing director for Greece, Bill Zikou, laid out the “how,” describing the method by which the bugging was accomplished. “What happened in this incident,” he said, “is that a complex, sophisticated, non-Ericsson intruder piece of software was planted into the Vodafone Greece network,” which by activating the RES function “thus made illegal interceptions possible.”

    william-basil200 William George Basil. Date unknown. Photo: FacebookThen investigators turned to the “who.” At the conclusion of its operation, the NSA was hoping that it could disappear into the night without leaving a trace. “Unlike the athletes, when the Olympics are over, the NSA team is hoping you won’t even know they were there,” said one of the classified documents. It bore the ironic title, “Another Successful Olympics Story.” But as a result of sloppy intelligence tradecraft by the American spies, each step pointed the investigators closer and closer to the U.S.
    One person who spent a great deal of time buying shadow phones was William Basil. “We used to call him the telephone man,” said the former CIA colleague in Athens. “All we do is we buy burner phones. Just drive in any direction you want and go to a random phone store and just buy a phone, make a call, and throw the phone away.”

    But Basil wasn’t the only one buying shadow phones. According to the prosecutor’s confidential report, issued June 26, 2015 and obtained by The Intercept, investigators traced four of the shadow cell phones to the shop in Piraeus. There, the prosecutor showed pictures of Basil and his wife, Irene, to the store’s manager. “She is known” to the store, the manager said. The prosecutor then noted in his report that Irene was “acting as designated by him [Basil] and on his behalf.” And according to registered deeds, the family of Irene Basil has long owned a home in Piraeus just a few miles from the shop.

    Things got even sloppier. After purchasing the four shadow phones, meant to be untraceable, the SIM card from one of them was removed and placed in a cell phone registered to the U.S. Embassy. It was a direct link between the covert operation and the U.S. government. Investigators then traced more than 40 calls to and from the U.S. Embassy involving the phone. The numbers listed in the ADAE report include the embassy’s main number, the emergency after-hours number, the Marine guard, and the FBI office. There was even a call to a women’s clothing store in Athens, Rouge Paris.

    Then, on the same shadow phone using another SIM card, investigators found calls to Maryland. Based on the phone numbers, The Intercept was able to determine that those calls were made to Ellicott City, where Basil and his wife used to own property, and to neighboring Cantonsville, both bedroom communities for NSA. The implications greatly worried the investigators. “We were scared,” one told a parliamentary committee. “This is something that the Foreign and Justice Ministries should investigate.”

    Finally, after years of slow, ineffective, and politically hindered investigations that produced more fog than clarity, the determined work of the ADAE and a few others began paying off. The evidence pointed at the U.S. Embassy, and with a bit of luck and thanks to the American spies’ mistakes, prosecutors came up with a name, William Basil, and the international arrest warrant was issued last February.

    But by then, he was long gone. After Athens, Basil was promoted to deputy chief of station in Islamabad, Pakistan, then sent back to a desk job at headquarters, that of director of human resources at the agency’s Counterterrorism Center. Now retired and no longer protected by diplomatic immunity, he may never see Greece again, the country where his wife currently lives in her family’s home in Piraeus. In 2012, according to a petition he signed protesting a planned marine park on Karpathos, he wrote, “I own property in Karpathos and plan to retire there next year.”

    Today the two-story house near the beach in Diafani sits empty; construction materials are stacked on the porch, its exterior unpainted. Nearby, friends and relatives can’t believe that Billy from Karpathos could have secretly wiretapped their top officials, or spied on their government. “There’s no way he did what they say he did,” said Basil’s cousin Nikos. “Because of his love [for] Greece, they would know that if that thing [the wiretapping] needed to be done, they would most certainly ask somebody else to do it. No way he did it. It is well known that he was first and foremost a Greek patriot.”

    Months before the arrest warrant was issued, Basil had been in touch by phone with a prominent criminal lawyer in Athens, Ilias G. Anagnostopoulos, according to a Greek source, who asked not to be named because of the confidential nature of the information. When asked by the attorney if he would be willing to testify if it came to that, Basil, according to the source, replied: “If there are questions, of course I can answer them.” The attorney met with the prosecutor, but after leaks to the press, Basil told Anagnostopoulos to drop the matter for the time being. Complicating matters, the prosecutor has filed the eavesdropping case alongside a much larger, but unconnected, conspiratorial case involving an assassination attempt on former Prime Minister Karamanlis, a key target of the wiretapping operation.

    CIA Chief of Station Eric Pound left Athens in 2007, returning to headquarters to become chief of the External Operations and Cover Division, the organization responsible for creating front companies overseas for clandestine officers masquerading as business executives or other occupations. After he retired in September 2009, Pound mentioned to a college audience that the CIA has an obsession to learn the truth. He added, “But obsession does not always lead to success.”

    Costas Tsalikides March 9, 2005 Costas Tsalikidis, March 9, 2005.
    Panagiotis and other family members also want the truth. In 2011, Costas’ family asked two coroners to reexamine the medical records. One was Dr. Steven Karch, a forensic pathologist and former medical examiner in San Francisco, and the other was Dr. Theodoros Vougiouklakis, an associate professor of forensic medicine in Greece. Karch called the original autopsy “farcical.” Based on pictures of the body, the coroners concluded that the marks to Costas’ neck couldn’t have come from simply jumping off the chair. “Something was done to him prior,” Karch told The Intercept.
    The family agrees with this conclusion. “I believe there are people who know what happened, what exactly and who exactly did it and they will give us those facts,” said Panagiotis. “I believe that as time goes by the reasons for protecting the perpetrators will fade and mouths will open.” Last March, on the 10th anniversary of Costas’ death, his mother spoke to a local Greek reporter for the first time. “I want to know what happened to my child and nobody that investigated until now, 10 years [later], gave me the slightest response,” she said. “As long as I live I will live with this suffering. I want to punish those who are guilty for what happened, and those who know [but] do not speak.”

    There appears little chance that her questions will be answered, however. It is extremely unlikely the Obama administration will ever allow Basil, or any other intelligence official, to be extradited. Nor is it likely that Basil will return to Greece voluntarily with an arrest warrant waiting for him. Around 2009 he appeared in a Facebook picture, seemingly in disguise, sporting a long white beard and moustache. “Dude, Santa’s job isn’t available for what … another seven months,” a friend joked on Facebook. Though he has not responded to requests for an interview, pictures online show him in Greece in 2013 attending his daughter’s wedding, without the beard, in the Glyfada section of Athens. Multiple attempts to reach Basil by phone, and through family members, were unsuccessful. Both the CIA and NSA declined to comment on any issue surrounding the Athens wiretapping, including Basil’s indictment.

    As for the NSA, a classified review of the Greek Olympics asked the now ironic question, “After this year’s gold medal performance, what comes next?” Next will certainly be the Olympics scheduled for Rio de Janeiro, Brazil, next summer. According to a previously published top-secret NSA slide, the agency has already planted malware throughout the country’s telecommunications system. And, if history is any guide, in the weeks leading up to the start of the games, teams from the SCS, SSO, TAO, and other organizations will arrive once again to begin 24/7 eavesdropping. And as in Greece, they may just happen to leave some of their monitoring equipment behind.

    Sitting in his apartment overlooking Athens’ Plaka, John Brady Kiesling could make little sense of it all. “I don’t see a shred of evidence that this wiretapping did the U.S. government any good,” he said. “I think it’s just important to underscore that intelligence gathering is never free. It always comes at a human and political cost to someone. In this case it was paid by an innocent Vodafone technician.”

    Aggelos Petropoulos of the Athens-based newspaper Kathimerini contributed reporting from Greece, and Ryan Gallagher, senior reporter at The Intercept, contributed research and reporting from the Snowden Archive.

    Documents published with this story:

    Another Successful Olympics Story
    Exploiting Foreign Lawful Intercept Roundtable
    Gold Medal Support for Olympic Games
    NSA Team Selected for Olympics Support
    SID Trains for Athens Olympics

    James Bamford
    Sep. 29 2015, 4:01 a.m.

    Find this story at 29 September 2015
    Copyright https://theintercept.com/

    Bonn and the Putsch

    Van nieuwsblog.burojansen.nl

    JAKARTA/BONN/PULLACH (Own report) – Germany’s Federal Intelligence Service (BND) has been heavily involved in the 1965 murderous putsch in Indonesia – the guest nation of this year’s Frankfurt Book Fair. This was confirmed in secret documents from the Bundestag, the German Parliament. According to BND President at the time, Gerhard Wessel’s manuscript for a talk he delivered to a session of the Bundestag’s “Confidential Committee” in June 1968, the BND did more than merely support the Indonesian military in their blood-soaked “liquidation of the CPI” (Communist Party of Indonesia) – resulting in the murder of hundreds of thousands, possibly even millions – with advisors, equipment and finances. Suharto, who subsequently took power, had even attributed a “large part … of the success” of the operation to the BND. Up to now, mainly the US-American assistance to the putsch has been known. The putsch, and the more than 30 year-long dictatorship that followed – which also had been reliably promoted by West Germany – are important themes being presented by Indonesian writers at this year’s Frankfurt Book Fair. To this day, the German government has refused to allow an investigation of the BND’s support for the putsch and the Indonesian military’s excessive brutality.

    Hundreds of Thousands Dead

    The Indonesian putsch, bringing Maj. Gen. Haji Mohamed Suharto to power in Jakarta, began in October 1965 as a reaction to an attempted coup d’état, killing several officers on September 30. Suharto’s dictatorial reign lasted until 1998. The attempted coup was falsely attributed to the Communist Party of Indonesia (CPI). Subsequently, the military launched excessively brutal operations against all genuine and suspected members and sympathizers of the communist party. Hundreds of thousands, possibly even millions, were murdered; millions were imprisoned. The exact number is still unknown. The crimes committed at the time by the military have never really been brought to light.

    50 to 100 Victims Each Night

    One of the things never brought to light is what support western powers had given to the Suharto putsch. US complicity, having had the best relations to the Indonesian armed forces, has, to some extent, already been exposed. According to experts, for example, by 1965, around 4,000 Indonesian officers had been trained in US military installations as well as high-ranking officers having been trained in counter-insurgency on the basis of US field manuals at Indonesia’s elite military institutes.[1] December 2, 1965, the US ambassador gave his consent to providing financial support to the “Kap-Gestapu” movement, a movement – as he put it – “inspired by the army, even though comprised of civilian action groups,” which “shouldered the task of the ongoing repressive measures against Indonesia’s Communist Party.”[2] The ambassador must have known what this would mean. November 13, his employees had passed on information from the Indonesian police indicating, “between 50 and 100 members of the CPI in Eastern and Central Java were being killed each night.” April 15, the embassy had admitted, “it did not know if the actual number” of murdered CPI activists “was not closer to 100,000 or 1,000,000.” In spite of the mass murder, the US ambassador in Jakarta reported back to Washington (August 10, 1966) that the authorities in Jakarta had been provided a list of the leading CPI members.[3]
    “Reliable Friend of Germany”
    Agencies of the West German government had also been involved in the putsch. The BND had supported “Indonesia’s military intelligence service’s 1965 defeat of a left-wing putsch in Jakarta, with submachine guns, shortwave radios and money (with a total value of 300,000 DM),” reported “Der Spiegel” in March 1971.[4] Twelve weeks later, the magazine added that “a commando of BND men” had “trained military intelligence service operatives in Indonesia” and “relieved their CIA colleagues, who were under the heavy pressure of anti-American propaganda.”[5] By “supplying Soviet rifles and Finnish ammunition, the BND instructors” were even actually intervening in that “civil war.” If one can believe the BND’s founder, Reinhard Gehlen, Bonn, at the time, had the best contacts to leading military officers. In his “Memoirs,” published in 1971, Gehlen wrote, “two of Germany’s reliable friends” were among the Indonesian officers, murdered September 30, including “the longtime and highly revered military attaché in Bonn, Brig. Gen. Pandjaitan.” During the putsch, the BND was “in the fortunate position of being able to provide the West German government with timely and detailed reports – from excellent sources – … on the progress of those days, which had been so crucial for Indonesia.”[6]

    An Excellent Resident

    Other indications have emerged from the research published by the expert of intelligence services, Erich Schmidt-Eenboom and the political scientist, Matthias Ritzi. Their findings confirmed that there was close coordination between the BND and CIA. In April 1961, BND headquarters in Pullach had informed the US Central Intelligence Agency that it had “an excellent Chief of Station” in Jakarta, writes Schmidt-Eenboom. The CIA thought the BND was referring to Rudolf Oebsger-Röder, a former colonel of the SS working in the Reich Security Central Office (Reichssicherheitshauptamt) in Nazi Germany, who joined West Germany’s Organization Gehlen in 1948 and was later on post in Indonesia, as a correspondent for the Süddeutsche Zeitung and the Neue Zürcher Zeitung.[7] The BND had maintained Oebsger-Röder on its staff until the mid-’60s. In mid-January 1964, a high-ranking CIA representative paid Gehlen a visit and asked him how the West Germans were handling the developments in Indonesia, explain Schmidt-Eenboom and Ritzi. Gehlen told him that he is keeping Bonn up-to-date, but does not yet know how the chancellery intends to proceed.

    “A Large Part BND”

    The manuscript for a talk BND President Gerhard Wessel presented June 21 1968 to the Bundestag’s Confidential Committee provides more details. In the form of notes, Wessel gave “details of BND activities” in support of its Indonesian partner service, explained Schmidt-Eenboom and Ritzi. Explicitly the manuscript explains that “the close ties already in place to the Indonesian strategic ND (intelligence service) by October 1965, had facilitated support (advisors, equipment, money) to Indonesia’s ND and its special military organs during the elimination of the CPI (and Sukarno’s disempowerment – control and support of demonstrations).”[8] The “CPI’s elimination” included the assassination of hundreds of thousands of genuine and suspected members and sympathizers of the Indonesian CP. According to the manuscript, BND President Wessel continued his speech to the Confidential Committee, “in the opinion of Indonesian politicians and military officers ((Suharto, Nasution, Sultan) a large part thanks to the BND.”
    Praise from Pullach
    Reflecting back, BND founder Gehlen was praising these crimes almost effusively. “The significance of the Indonesian army’s success, which … pursued the elimination of the entire Communist Party with all consequences and severity, cannot – in my opinion – be appraised highly enough,” Gehlen wrote in his 1971 “Memoirs.”[9]

    Berlin’s Priorities

    The German government is still refusing to shed light on Germany’s participation in these crimes. In a parliamentary interpellation, the government was asked if it has knowledge of “foreign governments, intelligence services or other organizations’ direct or indirect support of the massacres.” In Mai 2014, it responded, “after a thorough assessment, the government concludes that it cannot give an open answer.” It is “imperative” to keep the “requested information” secret. The “protection of sources” is a “principle of primary importance to the work of intelligence services.”[10] For the German government, the Indonesian civil society’s need to have information on foreign support for the immense mass murder is of less importance than its “protection of sources.”

    [1] Rainer Werning: Putsch nach “Pütschchen”. junge Welt 01.10.2015.
    [2], [3] Rainer Werning: Der Archipel Suharto. In: Konflikte auf Dauer? Osnabrücker Jahrbuch Frieden und Wissenschaft, herausgegeben vom Oberbürgermeister der Stadt Osnabrück und dem Präsidenten der Universität Osnabrück. Osnabrück 2008, S. 183-199.
    [4] Hermann Zolling, Heinz Höhne: Pullach intern. Der Spiegel 11/1971.
    [5] Hermann Zolling, Heinz Höhne: Pullach intern. Der Spiegel 23/1971.
    [6] Reinhard Gehlen: Der Dienst. Erinnerungen 1942-1971. Mainz/Wiesbaden 1971.
    [7], [8] Matthias Ritzi, Erich Schmidt-Eenboom: Im Schatten des Dritten Reiches. Der BND und sein Agent Richard Christmann. Berlin 2011. See Review: Im Schatten des Dritten Reiches.
    [9] Reinhard Gehlen: Der Dienst. Erinnerungen 1942-1971. Mainz/Wiesbaden 1971.
    [10] Antwort der Bundesregierung auf die Kleine Anfrage der Abgeordneten Andrej Hunko, Jan van Aken, Sevim Dağdelen, weiterer Abgeordneter und der Fraktion DIE LINKE. Deutscher Bundestag Drucksache 18/1554, 27.05.2014.

    Bonn and the Putsch

    Find this story at 15 October 2015
    © Informationen zur Deutschen Außenpolitik

    CIA Cover-Up Thwarted FBI’s Nuclear Diversion Investigations Evidence that missing uranium went to Israel withheld since 1968

    Van nieuwsblog.burojansen.nl

    According to formerly top-secret and secret Central Intelligence Agency files (PDF) released August 31 in response to a Freedom of Information Act lawsuit (PDF), the agency’s long retention of key information ultimately stymied two FBI investigations into the 1960s diversion of weapons-grade uranium from a Pennsylvania-based government contractor into the Israeli nuclear weapons program.

    The Nuclear Materials and Equipment Corporation (NUMEC) was a nuclear fuel processing company founded by legendary chemist Zalman Mordecai Shapiro and financed by entrepreneur David Luzer Lowenthal. According to the Department of Energy, during Shapiro’s reign at NUMEC, the company lost more weapons-grade uranium – 337 kilograms after accounting for losses – much of a particularly unique and high enrichment level than any other U.S. facility. Losses only returned to industry norms after Shapiro, who later unsuccessfully tried to get a job working on advanced hydrogen bomb designs, was forced out of NUMEC.

    In the 1950’s Shapiro developed vital breakthroughs for US Navy nuclear propulsion systems. In the 1940s Lowenthal fought in Israel’s War of Independence, serving as a smuggler who developed close contacts with high Israeli intelligence officials. An ardent supporter of Israel, Shapiro was Pittsburgh Chapter President of the Zionist Organization of America. According to the Jerusalem Post, Shapiro later joined the board of governors of the Israeli Intelligence Heritage Center, an organization that honors spies who secretly took action to advance Israel. NUMEC holding company Apollo Industries President Morton Chatkin also held a ZOA leadership role while Apollo Executive Vice President Ivan J. Novick went on to become ZOA’s national president. David Lowenthal, who raised capital for acquiring NUMEC’s facilities (an old steel mill in the center of the village) served as Apollo’s treasurer.

    In 1968 CIA Director Richard Helms sent an urgent request for an investigation to Attorney General Ramsey Clark (PDF) stating “You are well aware of the great concern which exists at the highest levels of this Government with regard to the proliferation of nuclear weapons…It is critical for us to establish whether or not the Israelis now have the capability of fabricating nuclear weapons which might be employed in the Near East…I urge that the Federal Bureau of Investigation be called upon to initiate a discreet intelligence investigation of all source nature of Dr. Shapiro in order to establish the nature and extent of his relationship with the Government of Israel.” (PDF)

    The FBI investigation documented Shapiro’s many meetings with top Israeli nuclear weapons development officials such as Avraham Hermoni and wiretapped a conversation representative of the overall lack of concern over worker safety and the environment by Shapiro and Lowenthal. The FBI discovered that NUMEC had formed a joint venture with the Israel Atomic Energy Commission called Isorad to supply food irradiators to Israel. The now-defunct Atomic Energy Agency questioned Zalman Shapiro in 1969 – never asking if he had diverted material – over his many meetings with Israelis known to the FBI to be intelligence operatives. After the AEC defended Shapiro and his continued holding of security clearances, the FBI terminated its intelligence investigation.

    In 1976 the Ford administration reopened the NUMEC investigation in order to determine if a diversion had occurred and whether a government cover-up had ensued. The 130-page release is replete with formal CIA denials to Congressional Committee investigators, the GAO and the Nuclear Regulatory Commission inquiries about whether the CIA had participated in any illegal diversions, or whether it was aware of any presidential finding authorizing such an operation. Arizona Democrat Morris Udall asked bluntly on August 23, 1977 “Is it possible that President Johnson, who was known to be a friend of Israel, could have encouraged the flow of nuclear materials to the Israelis?” Citing CIA’s role in alerting the attorney general to the problem as evidence that it was not involved, the agency also repeatedly emphasized “we in CIA are not and have not been concerned with the law enforcement aspects of this problem. Indeed, Dick Helms turned the matter over to the FBI in order to avoid such involvement.” Rather, exploring the NUMEC-Israel link was part of CIA’s intelligence function to substantiate why its National Intelligence Estimate concluded Israel had a nuclear arsenal.

    FBI special agents soon lost morale over being sent unprepared into a second investigation. The CIA, for its part, continued withholding critical information that could have provided both motivation and a tool for confronting hostile interviewees. This was according to the newly released CIA files “information…of obvious importance in reaching an intelligence decision on the probability of diversion, it is not of any legal pertinence to the FBI’s criminal investigation of NUMEC. In our discussions with the FBI we have alluded to this information but we have not made the details available to special agents from the Washington Field Office of the FBI who are working on the case. While Mr. Bush’s [then-CIA Director George H.W. Bush] conversations are not known to us, we have had no substantive discussions with officials at FBI Headquarters on this matter.” It was this sensitive CIA information, made available only to the president, cabinet, and a limited number of top agency officials that led one National Security Council staffer to conclude, “I do not think that the President has plausible deniability.”

    On June 6, 1977 Associate Deputy Director for Operations Theodore Shackley briefed the FBI agents in charge of the NUMEC investigation. They grumbled that since they had not established that the diversion took place, they could not begin to address the second question about a cover-up. They then pleaded for “new information” from the CIA, blithely ignorant that their reasoning was completely backward – it was old information they required, and it was the CIA’s withholding of it that was the true cover-up. The FBI also thought it needed a NUMEC insider willing to blow the whistle in order to finally break the case open.

    Unknown to the FBI, every CIA director was complicit in withholding a key clandestine operational finding from investigators. According to a May 11, 1977 report by Shackley, the “CIA has not furnished to the FBI sensitive agent reporting…since the decision was made by Directors Helms, Colby and Bush that this information would not further the investigation of NUMEC but would compromise sources and methods.”

    Though carefully redacted from the CIA release, the omitted fact was likely that highly enriched uranium of a signature unique to NUMEC had been detected in Israel, a country that did not have facilities to enrich uranium. This sensitive information (PDF) was delivered to former Atomic Energy Commissioner Glen Seaborg by two Department of Energy investigators sifting for more facts about NUMEC in June of 1978. It was powerful enough evidence that the retired Seaborg subsequently refused to be interviewed by less informed FBI investigators.

    The CIA noted FBI investigators “indicated that even if they came up with a case, it was extremely unlikely that Justice and State would allow it to come to trial…they feel that they have been given a job to do with none of the tools necessary to do it.” Although in 1981 special agents finally identified a former NUMEC employee who had personally witnessed the means of the diversion – Zalman Shapiro and other NUMEC officials stuffing HEU canisters into irradiators (PDF) sealed and rushed to Israel – lacking the missing CIA puzzle piece the FBI investigation went dormant as the statute of limitations for Atomic Energy Act violations – punishable by death – finally expired.

    Grant F. Smith is the author of DIVERT! NUMEC, Zalman Shapiro, and the diversion of U.S. weapons-grade uranium into the Israeli nuclear weapons program. He currently serves as director of research at the Institute for Research: Middle Eastern Policy in Washington (IRmep), D.C. Read other articles by Smith, or visit the IRmep website.

    by Grant Smith, September 07, 2015

    Find this story at 7 September 2015

    Copyright © Antiwar.com 2015

    U.S. Suspected Israeli Involvement in 1960s Missing Uranium (2014)

    Van nieuwsblog.burojansen.nl

    Officials Believed Ally Used Materials Lifted From Pennsylvania Toward a Weapons Program

    Declassified documents from the 1970s provide new evidence that federal officials believed bomb-grade uranium that disappeared from a Pennsylvania nuclear facility in the 1960s was likely taken for use in a clandestine Israeli atomic-weapons program.

    The documents, obtained earlier this year through public-records requests by a Washington-based nonprofit group, also indicate that senior officials wanted to keep the matter under wraps for fear it could undermine U.S. Middle East peace efforts.

    Though the Central Intelligence Agency’s case for the suspected theft wasn’t conclusive, it was sufficiently persuasive that “I do not think that the President has plausible deniability” regarding the question, said a memo dated July 28, 1977, by a National Security Council staffer in President Jimmy Carter’s administration.

    A security council memo to Mr. Carter a few days later expressed more uncertainty about whether a theft had occurred, but noted that then-Secretary of State Cyrus Vance had a coming Middle East trip and discussed the need to keep attention “away from the CIA’s information.”

    The question of whether one of America’s closest allies was involved in the theft of some of its most valuable and dangerous material in pursuit of nuclear weapons has been one of the enduring mysteries of the atomic age. The suspected theft has drawn the attention of at least three presidents and other senior government officials.

    The evidence suggested that “something did transpire,” said Zbigniew Brzezinski, Mr. Carter’s national-security adviser, in a recent interview. “But until you have conclusive evidence you don’t want to make an international incident. This is a potentially very explosive, controversial issue.” Besides, he added, even if a theft was proved, “What are we going to say to the Israelis, ‘Give it back?’ ”

    Israel hasn’t ever said whether it has nuclear weapons. A spokeswoman for the Israeli Embassy in Washington, D.C., declined to comment for this article.

    So did a spokeswoman for the Obama administration, which like past U.S. administrations has declined to say whether it believes Israel has an atomic arsenal. A CIA spokesman also declined to comment.

    Mr. Carter, who said at a 2008 gathering in Britain that he believes Israel has nuclear weapons, declined through a spokeswoman to be interviewed.

    His diplomatic efforts as president, which helped produce a peace treaty between Israel and Egypt in 1979, likely wouldn’t have been possible “if there was some huge scandal at the time about this,” said John Marcum, the staffer who wrote the July 28, 1977, memo, in a recent interview.

    The theft suspicions surround events at a now-dismantled facility in Apollo, Pa., owned by a company called Nuclear Materials & Equipment Corp., or Numec. In the mid-1960s, some 200 pounds of bomb-grade uranium—enough possibly for several Hiroshima-sized bombs—couldn’t be accounted for there.

    ENLARGE
    An FBI investigation begun in the late 1960s, which drew interest from top Nixon administration officials, including the president, couldn’t determine what happened to the uranium, according to Federal Bureau of Investigation and other agency documents. But FBI officials did raise questions about suspected dealings between Numec’s founder and president, Zalman Shapiro, and Israeli intelligence officials, according to government documents. Babcock & Wilcox Co., a nuclear-technology and energy company that acquired Numec in 1971, declined to comment.

    In an interview late last year, the 93-year-old Mr. Shapiro, who has long argued the material had been lost in the production process, said that no theft took place. He said his dealings with Israel, where Numec had commercial activities, were legitimate and to his knowledge never involved intelligence officials.

    Potentially crucial sections of the recently released documents—obtained by the Institute for Research: Middle Eastern Policy, an organization that has been critical of Israel—remain classified.

    The latest document release underscores the need for the government to declassify the remaining information about the suspected theft, some former federal officials say.

    “We know the CIA thought the material was stolen. We want to know why they thought that,” said Victor Gilinsky, a former commissioner of the Nuclear Regulatory Commission.

    Government records show that a federal nuclear-enrichment facility in Ohio sent shipments to Numec containing the highest percentage of U235, the explosive form of uranium, ever known to have been produced, said Roger Mattson, another former NRC official.

    Did the CIA later find that such uranium had turned up in Israel, as some documentary evidence suggests? “That’s not something that’s declassified,” said Jessica Tuchman Mathews, a national-security official in the Carter administration who wrote or received some of the recently declassified documents.

    By JOHN R. EMSHWILLER
    Updated Aug. 6, 2014 7:41 p.m. ET

    Find this story at 6 August 2014

    Copyright ©2015 Dow Jones & Company, Inc.

    MI6 spy Gareth Williams found dead in bag had ‘hacked Clinton secrets’

    Van nieuwsblog.burojansen.nl

    A MI6 spy who was discovered dead in a holdall at his apartment in 2010 had hacked into sensitive information about former US President Bill Clinton, it has been claimed. The spy had obtained Clinton’s diary for an event and passed it to a friend.
    Gareth Williams, 31, hacked into the event’s guest list as it was to be attended by President Clinton, passing it to his friend who was also to be a guest at the party, according to sources speaking on condition of anonymity to the Sun on Sunday.
    “The Clinton diary hack came at a time when Williams’s work with America was of the most sensitive nature,” one source said. “It was a diplomatic nightmare for Sir John Sawers, the new director of MI6 at the time.”
    The death of Williams remains an unsolved case after five years. A three-year investigation by the Metropolitan Police ended in 2013, deciding that no one else was involved in Williams’ death and his being locked inside the bag, which was found in his bath. A coroner’s report following his death judged that he was killed unlawfully, however.
    Another inside source told the newspaper that before his death, living with a new identity has been taking its toll on Williams. “Williams’s state of mind in the months before his death was worrying those closest to him,” the source told the paper. “He found the training so stressful and his mood blackened even talking about it.”
    “Typically he’d be asked to learn a new identity then report to a country hotel to meet an interrogation team. There he would be grilled about his new ID for 48 hours without sleep, the source added. “His wrist was broken once after he was handcuffed to a metal bar inside a van that was driven around the country for several hours while he faced a barrage of questions.”
    Last week, it was reported that spies may have broken into Williams’ flat in Pimlico, central London, through a skylight, re-entering the residence in order to destroy evidence while the property was under armed guard after the spy’s death. An anonymous source told the Mirror that forensic officers realised that equipment in the flat had been moved in their absence. Williams was a keen cyclist from Anglesey in North Wales and before his death had attended a hacking conference in the US and also a drag show by himself two days before his death.

    International Business TimesBy Jack Moore | International Business Times – Sun, Aug 30, 2015

    Find this story at 30 August 2015

    copyright https://uk.news.yahoo.com/

    MI6 spy Gareth Williams was ‘killed by Russia for refusing to become double agent’, former KGB man claims (2015)

    Van nieuwsblog.burojansen.nl

    Defector Boris Karpichkov claims Russia had a secret agent in GCHQ and Williams knew who it was

    A Russian defector has claimed that the MI6 spy who was found dead in a padlocked holdall in his bath in Pimlico was “exterminated” by Russian intelligence agents because he refused to become a double agent and knew the identity of a Kremlin spy working inside GCHQ.

    Codebreaker Gareth Williams was found dead at his home in 2010. He had been a cipher expert at GCHQ but was on secondment to MI6 when he died.

    MI6 spy in a bag case: Gareth Williams ‘probably’ locked himself in
    Scotland Yard boss Horgan-Howe warns MI6 over spy Gareth Williams
    Spy Gareth Williams was probably the victim of a ‘criminally mediated’
    Coroner criticises MI6 investigation into spy Gareth Williams’ death
    MI6 spy Gareth Williams ‘poisoned or suffocated’
    MI6 spy Gareth Williams tied himself to bed, says landlady
    According to the coroner at the subsequent inquest, his death was likely a “criminally mediated” unlawful killing, though it was “unlikely” to be satisfactorily explained. Police investigating Williams’ death suggested he had died as the result of a sex game gone wrong.

    But a defector, Boris Karpichkov, claims intelligence sources in Russia have admitted the MI6 spy was killed by the SVR, the current incarnation of the country’s espionage agency which was formerly known as the KGB.

    Speaking to the Daily Mirror, Karpichkov claimed the SVR attempted to recruit Williams as a double agent, allegedly using details from the British cypher’s private life as leverage.

    Police disclosed at the time of Williams’ death that he owned £15,000 worth of women’s designer clothing, a wig and make up. It had been suggested that Williams dressed as a woman outside of work, though a forensics expert has since said they believe the spy likely worked undercover as a woman.

    Spy Gareth Williams was probably the victim of a ‘criminally mediated’ unlawful killing

    Karpichkov, who is ex-KGB, claims the SVR threatened to reveal the Briton was a transvestite, before Williams in turn revealed he knew the identity of the person who had “tipped the Russians off” about him.

    “The SVR then had no alternative but to exterminate him in order to protect their agent inside GCHQ,” he alleges.

    Karpichkov, who also lives in the Pimlico area, said he had seen Russian diplomatic cars in the area around the time of Williams’ death but had believed they had been sent to monitor himself. He claims to have not seen the cars since Williams died.

    Karpichkov has also claimed that Williams was killed by an untraceable poison which was pushed into his ear using a needleless syringe.

    At the time of the inquiry the coroner said that the involvement of intelligence services in Williams’ death remained a “legitimate line of inquiry” but stressed “there was no evidence to support that he died at the hands” of a government agency.

    Loulla-Mae Eleftheriou-Smith Monday 28 September 2015 12:55 BST1 comment

    Find this story at 28 September 2015

    copyright http://www.independent.co.uk/

    MI6 spy found dead in bag probably locked himself inside, Met says (2013)

    Van nieuwsblog.burojansen.nl

    Three-year investigation by Scotland Yard concludes Gareth Williams probably died as a result of a tragic accident

    Gareth Williams: last year a coroner concluded that the spy was probably unlawfully killed and his death the result of a criminal act.

    The MI6 spy found dead in a bag three years ago probably locked himself in the holdall and died as a result of a tragic accident, Scotland Yard has said.

    Outlining the results of a three-year investigation on Wednesday, the Metropolitan police said Gareth Williams most likely died alone in his flat.

    But Detective Assistant Commissioner Martin Hewitt said the police could not “fundamentally and beyond doubt” rule out the possibility that a third party was involved in his death.

    Williams’s naked body was found in the padlocked bag, with the keys discovered under his body, in the otherwise empty bath in his flat in Pimlico, central London, in August 2010.

    Last year, a coroner concluded that Williams was probably unlawfully killed and his death the result of a criminal act. Following an eight-day inquest, the Westminster coroner, Dr Fiona Wilcox, said he was probably either suffocated or poisoned, before a third party locked and placed the bag in the bath.

    But Hewitt said Scotland Yard’s three-year inquiry had come to a different conclusion and that Williams was “most probably” alone when he died.

    “Despite all of this considerable effort, it is still the case that there is insufficient evidence to be definitive on the circumstances that led to Gareth’s death,” he said.

    “Rather, what we are left with is either individual pieces of evidence, or a lack of such evidence, that can logically support one of a number of hypotheses.”

    Hewitt added that the investigation had added “some clarity and detail” to the case, but that “no evidence has been identified to establish the full circumstances of Gareth’s death beyond all reasonable doubt”.

    A forensic examination of Williams’s flat, a security service safe house, has concluded that there was no sign of forced entry or DNA that pointed to a third party present at the time of the spy’s death.

    Scotland Yard’s inquiry also found no evidence of Williams’s fingerprints on the padlock of the bag or the rim of the bath, which the coroner last year said supported her assertion of “third-party involvement” in the death. Hewitt said it was theoretically possible for Williams to lower himself into the holdall without touching the rim of the bath.

    Winding down the lengthy investigation, which has drawn interviews and statements from 27 of Williams’s colleagues in MI6 and GCHQ, Hewitt said the death remained a tragedy that would be kept under review by detectives.

    In a statement, Williams’s family said they were disappointed with the police findings and that they agreed with the coroner’s conclusions that he was most likely killed unlawfully.”We are naturally disappointed that it is still not possible to state with certainty how Gareth died and the fact that the circumstances of his death are still unknown adds to our grief,” the family said.

    “We note that the investigation has been conducted with further interviews upon some of the witnesses who gave evidence at the inquest and that the investigation team were at last able to interview directly members of GCHQ and SIS [MI6].

    “We consider that on the basis of the facts at present known the coroner’s verdict accurately reflects the circumstances of Gareth’s death.”

    In a press briefing at Scotland Yard, Hewitt admitted it was “a cause of some regret” that the police were not able to definitively explain the circumstances surrounding the 31-year-old’s death.

    He rejected suggestions that the security services had “pulled the wool” over his eyes, following concerns over how MI6 and counter-terrorism officers had handled some evidence during the initial investigation. It emerged on Wednesday that police only gained access to Williams’s spy agency personnel and vetting files after the coroner’s inquest ended last May.

    Williams, a maths prodigy and fitness enthusiast originally from Anglesey, was a private person with few other close friends aside from his family, police said. In interviews, MI6 and GCHQ colleagues described him as a “conscientious and decent man” and detectives were unable to identify anyone with any animosity towards him or a motive for causing him harm.

    As part of the fresh investigation, a forensic sweep of Williams’s flat discovered 10 to 15 unidentified traces of DNA, which are being kept under examination, but none on the North Face holdall or around the bath area of the en suite bathroom of the flat’s main bedroom. There was also no evidence of a “deep clean” of the flat to wipe all trace of DNA.

    Hewitt said: “There are really three hypotheses that you can use here. One is that Gareth, for whatever reason, got himself into that bag and then was unable to get himself out and died as a result of that.

    “One is that Gareth, with someone else, got into the bag consensually, then something went wrong and he died as a result of that. The third is that someone murdered Gareth by putting him in that bag. I would argue that any physical absence [of evidence of] a third party being present tends to make the hypotheses that there is a third party present less likely.”

    He added: “The coroner drew an inference. I am now drawing a different inference.”

    At the coroner’s inquest, two experts tried 400 times to lock themselves into the 32in by 19in holdall without success, with one remarking that even Harry Houdini “would have struggled” to squeeze himself inside. But days after the inquest, footage emerged of a retired army sergeant climbing into the bag and locking it from the inside.

    Hewitt said it was now established that it was theoretically possible for a person to climb into the bag and that it was “more probable” that Williams did this before suffocating as a result of the accident. It emerged during the inquest that Williams had an interest in escapology, but the police said it would be speculation to link his death to a failed attempt to escape from the locked holdall.

    Josh Halliday
    Wednesday 13 November 2013 14.44 GMT Last modified on Thursday 22 May 2014 09.11 BST

    Find this story at 13 November 2013

    © 2015 Guardian News and Media Limited

    MI6 and Met condemned over Gareth Williams’ death (2012)

    Van nieuwsblog.burojansen.nl

    Coroner criticises intelligence agency for failing to report missing MI6 officer and rules he was probably killed unlawfully

    The coroner in the Gareth Williams case delivered a damning verdict that was highly critical of the Metropolitan police’s counter-terrorism branch and MI6 as she ruled that the officer had probably been killed unlawfully.

    The cause of death of Williams, 31, who was found padlocked in a holdall in the bath at his flat in Pimlico, central London, was “unnatural and likely to have been criminally mediated”, said Dr Fiona Wilcox.

    Passing a narrative verdict, she said she was satisfied that “a third party placed the bag in the bath and on the balance of probabilities locked the bag”.

    She was, therefore, “satisfied that on the balance of probabilities that Gareth was killed unlawfully”.

    Wilcox levelled devastating criticism at Williams’s employers at MI6 who failed to report him missing for seven days when he did not turn up for work. The explanation from his line manager lacked credibility, she said, and she could “only speculate as to what effect this [delay] had on the investigation”.

    The lawyer for the Secret Intelligence Service, Andrew O’Connor, delivered deep regrets and an unprecedented apology to the family from Sir John Sawers, chief of the SIS, who recognised that “failure to act more swiftly” when Williams was absent had contributed to their “anguish and suffering”.

    Officers in the Met’s counter-terrorism branch, SO15, whose role was to interview SIS witnesses, were also strongly criticised. SO15 failed to inform DCI Jackie Sebire, senior investigating officer, of the existence of nine memory sticks and a black holdall found at Williams’ MI6 office until two days before the inquest ended, the coroner said. On discovering this, Wilcox said she had seriously questioned whether she should adjourn the inquest at that point.

    No formal statements were taken by S015 officers who interviewed Williams’ colleagues, “and I find this did affect the quality of evidence heard in this court,” she said.

    She also criticised the handling of an iPhone belonging to Williams and found in his work locker, which contained deleted images of him naked in a pair of boots. The officer involved kept it in his possession before handing it to homicide detectives the following day, “demonstrating disregard for the rules governing continuity of evidence”, she said.

    Many agencies “fell short of the ideal”, she said, including LGC Forensics in relation to DNA contamination, and the coroner’s office for failing to inform police officers of a second postmortem.

    Williams, a fitness fanatic from Anglesey, north Wales, was probably alive when put in the bag but probably suffocated very soon afterwards either from CO2 poisoning, hypercapnia, or the effects of a short-acting poison, she said.

    Scotland Yard has always treated the death as suspicious and unexplained, but held back from describing it as murder or manslaughter. Recording her verdict, Wilcox stated her belief that a criminal hand was involved, although police said afterwards that there was no evidence of this. The Guardian understands police inquiries have focused on the theory that Williams died accidentally in a private sexual liaison that went wrong.

    The coroner, however, ruled out bondage or auto-erotic activity as explanations.

    The dead man’s family said in a statement that their grief had been exacerbated by the failure of his employers at MI6 to make “even the most basic inquiries of his whereabouts and welfare” when he was absent from work for seven days.

    They were “extremely disappointed at the failure and reluctance of MI6” to provide relevant information and called on the Metropolitan police commissioner, Bernard Hogan-Howe, to conduct a review of how the investigation would proceed “in the light of the total inadequacy of S015’s investigations into MI6”.

    Wilcox said there was no evidence to suggest that any SIS colleague had been involved, but it remained a legitimate line of inquiry given Williams socialised with so few people, and never let anyone he didn’t know into his flat. So any third party would be “someone he knew or someone there without invitation”.

    An SIS spokesman said: “We fully co-operated with the police and will continue to do so during the ongoing investigation. We gave all the evidence to the police when they wanted it; at no time did we withhold any evidence.”

    An iPhone found in his living room had recently been wiped and restored to factory settings, and it could not be ruled out that contact with a third party had been made via the internet on that phone, she said.

    Wilcox was “sure that a third party moved the bag containing Gareth into the bath”. There were two possibilities: either he entered the bag outside the bathroom and it was carried in by a third party, or he was locked in the bag by a third party and lifted into the bath.

    She dismissed an interest in bondage, and female clothing, as being irrelevant, condemning leaks to the media about him cross-dressing as a possible attempt “by some third party to manipulate a section of the evidence”.

    She said: “Gareth was naked in a bag, not cross-dressed, not in high-heeled shoes.” If his interest was bondage, she would have expected much more internet activity on such websites, when his visits made up a tiny percentage of his browsing. His interest was in fashion, she said. Dismissing any auto-erotic activity, she said he was a “scrupulous risk assessor” and if he had locked himself into the bag would have taken a knife in with him to escape.

    She said that despite a 21-month police inquiry: “Most of the fundamental questions in relation to how Gareth died remained unanswered.”

    Detectives believe scientific tests on a crumpled green hand towel found in his flat may yet yield crucial DNA evidence, as the Metropolitan police launched a review into the case.

    The towel was originally in the bathroom, and moved to the kitchen, police believe, by the “third party”. More tests are being conducted on the bag. The memory sticks, which have now been examined by police, are said not to have produced any significant evidence, but will be examined more closely.

    Martin Hewitt, deputy assistant commissioner of the Met, said the circumstances of the death were particularly complex and continued to be the subject of a thorough investigation.

    He added: “We have listened to the detailed ruling by the coroner and the concerns raised by Gareth’s family. We are giving both very careful consideration.”

    Detectives were “currently undertaking actions in order to develop existing DNA profiles, to trace unidentified individuals who may have information about Gareth’s death, and to further develop analysis of telephone communications”.

    Caroline Davies and Sandra Laville
    Wednesday 2 May 2012 20.31 BST Last modified on Wednesday 21 May 2014 02.01 BST

    Find this story at 2 May 2012

    © 2015 Guardian News and Media Limited

    THE DRONE PAPERS: THE ASSASSINATION COMPLEXSECRET MILITARY DOCUMENTS EXPOSE THE INNER WORKINGS OF OBAMA’S DRONE WARS

    Van nieuwsblog.burojansen.nl

    From his first days as commander in chief, the drone has been President Barack Obama’s weapon of choice, used by the military and the CIA to hunt down and kill the people his administration has deemed — through secretive processes, without indictment or trial — worthy of execution. There has been intense focus on the technology of remote killing, but that often serves as a surrogate for what should be a broader examination of the state’s power over life and death.
    DRONES ARE A TOOL, not a policy. The policy is assassination. While every president since Gerald Ford has upheld an executive order banning assassinations by U.S. personnel, Congress has avoided legislating the issue or even defining the word “assassination.” This has allowed proponents of the drone wars to rebrand assassinations with more palatable characterizations, such as the term du jour, “targeted killings.”

    When the Obama administration has discussed drone strikes publicly, it has offered assurances that such operations are a more precise alternative to boots on the ground and are authorized only when an “imminent” threat is present and there is “near certainty” that the intended target will be eliminated. Those terms, however, appear to have been bluntly redefined to bear almost no resemblance to their commonly understood meanings.

    The first drone strike outside of a declared war zone was conducted more than 12 years ago, yet it was not until May 2013 that the White House released a set of standards and procedures for conducting such strikes. Those guidelines offered little specificity, asserting that the U.S. would only conduct a lethal strike outside of an “area of active hostilities” if a target represents a “continuing, imminent threat to U.S. persons,” without providing any sense of the internal process used to determine whether a suspect should be killed without being indicted or tried. The implicit message on drone strikes from the Obama administration has been one of trust, but don’t verify.

    Photo: The Intercept
    Document
    SMALL FOOTPRINT OPERATIONS 2/13Document
    SMALL FOOTPRINT OPERATIONS 5/13Document
    OPERATION HAYMAKERDocument
    GEOLOCATION-WATCHLISTThe Intercept has obtained a cache of secret slides that provides a window into the inner workings of the U.S. military’s kill/capture operations at a key time in the evolution of the drone wars — between 2011 and 2013. The documents, which also outline the internal views of special operations forces on the shortcomings and flaws of the drone program, were provided by a source within the intelligence community who worked on the types of operations and programs described in the slides. The Intercept granted the source’s request for anonymity because the materials are classified and because the U.S. government has engaged in aggressive prosecution of whistleblowers. The stories in this series will refer to the source as “the source.”

    The source said he decided to provide these documents to The Intercept because he believes the public has a right to understand the process by which people are placed on kill lists and ultimately assassinated on orders from the highest echelons of the U.S. government. “This outrageous explosion of watchlisting — of monitoring people and racking and stacking them on lists, assigning them numbers, assigning them ‘baseball cards,’ assigning them death sentences without notice, on a worldwide battlefield — it was, from the very first instance, wrong,” the source said.

    “We’re allowing this to happen. And by ‘we,’ I mean every American citizen who has access to this information now, but continues to do nothing about it.”
    The Pentagon, White House, and Special Operations Command all declined to comment. A Defense Department spokesperson said, “We don’t comment on the details of classified reports.”

    The CIA and the U.S. military’s Joint Special Operations Command (JSOC) operate parallel drone-based assassination programs, and the secret documents should be viewed in the context of an intense internal turf war over which entity should have supremacy in those operations. Two sets of slides focus on the military’s high-value targeting campaign in Somalia and Yemen as it existed between 2011 and 2013, specifically the operations of a secretive unit, Task Force 48-4.

    Additional documents on high-value kill/capture operations in Afghanistan buttress previous accounts of how the Obama administration masks the true number of civilians killed in drone strikes by categorizing unidentified people killed in a strike as enemies, even if they were not the intended targets. The slides also paint a picture of a campaign in Afghanistan aimed not only at eliminating al Qaeda and Taliban operatives, but also at taking out members of other local armed groups.

    One top-secret document shows how the terror “watchlist” appears in the terminals of personnel conducting drone operations, linking unique codes associated with cellphone SIM cards and handsets to specific individuals in order to geolocate them.

    A top-secret document shows how the watchlist looks on internal systems used by drone operators.
    The costs to intelligence gathering when suspected terrorists are killed rather than captured are outlined in the slides pertaining to Yemen and Somalia, which are part of a 2013 study conducted by a Pentagon entity, the Intelligence, Surveillance, and Reconnaissance Task Force. The ISR study lamented the limitations of the drone program, arguing for more advanced drones and other surveillance aircraft and the expanded use of naval vessels to extend the reach of surveillance operations necessary for targeted strikes. It also contemplated the establishment of new “politically challenging” airfields and recommended capturing and interrogating more suspected terrorists rather than killing them in drone strikes.

    The ISR Task Force at the time was under the control of Michael Vickers, the undersecretary of defense for intelligence. Vickers, a fierce proponent of drone strikes and a legendary paramilitary figure, had long pushed for a significant increase in the military’s use of special operations forces. The ISR Task Force is viewed by key lawmakers as an advocate for more surveillance platforms like drones.

    The ISR study also reveals new details about the case of a British citizen, Bilal el-Berjawi, who was stripped of his citizenship before being killed in a U.S. drone strike in 2012. British and American intelligence had Berjawi under surveillance for several years as he traveled back and forth between the U.K. and East Africa, yet did not capture him. Instead, the U.S. hunted him down and killed him in Somalia.

    Taken together, the secret documents lead to the conclusion that Washington’s 14-year high-value targeting campaign suffers from an overreliance on signals intelligence, an apparently incalculable civilian toll, and — due to a preference for assassination rather than capture — an inability to extract potentially valuable intelligence from terror suspects. They also highlight the futility of the war in Afghanistan by showing how the U.S. has poured vast resources into killing local insurgents, in the process exacerbating the very threat the U.S. is seeking to confront.

    Read more
    FIND, FIX, FINISH These secret slides help provide historical context to Washington’s ongoing wars, and are especially relevant today as the U.S. military intensifies its drone strikes and covert actions against ISIS in Syria and Iraq. Those campaigns, like the ones detailed in these documents, are unconventional wars that employ special operations forces at the tip of the spear.

    The “find, fix, finish” doctrine that has fueled America’s post-9/11 borderless war is being refined and institutionalized. Whether through the use of drones, night raids, or new platforms yet to be unleashed, these documents lay bare the normalization of assassination as a central component of U.S. counterterrorism policy.

    “The military is easily capable of adapting to change, but they don’t like to stop anything they feel is making their lives easier, or is to their benefit. And this certainly is, in their eyes, a very quick, clean way of doing things. It’s a very slick, efficient way to conduct the war, without having to have the massive ground invasion mistakes of Iraq and Afghanistan,” the source said. “But at this point, they have become so addicted to this machine, to this way of doing business, that it seems like it’s going to become harder and harder to pull them away from it the longer they’re allowed to continue operating in this way.”

    The articles in The Drone Papers were produced by a team of reporters and researchers from The Intercept that has spent months analyzing the documents. The series is intended to serve as a long-overdue public examination of the methods and outcomes of America’s assassination program. This campaign, carried out by two presidents through four presidential terms, has been shrouded in excessive secrecy. The public has a right to see these documents not only to engage in an informed debate about the future of U.S. wars, both overt and covert, but also to understand the circumstances under which the U.S. government arrogates to itself the right to sentence individuals to death without the established checks and balances of arrest, trial, and appeal.

    Among the key revelations in this series:

    HOW THE PRESIDENT AUTHORIZES TARGETS FOR ASSASSINATION

    Read more
    KILL CHAINIt has been widely reported that President Obama directly approves high-value targets for inclusion on the kill list, but the secret ISR study provides new insight into the kill chain, including a detailed chart stretching from electronic and human intelligence gathering all the way to the president’s desk. The same month the ISR study was circulated — May 2013 — Obama signed the policy guidance on the use of force in counterterrorism operations overseas. A senior administration official, who declined to comment on the classified documents, told The Intercept that “those guidelines remain in effect today.”

    U.S. intelligence personnel collect information on potential targets, as The Intercept has previously reported, drawn from government watchlists and the work of intelligence, military, and law enforcement agencies. At the time of the study, when someone was destined for the kill list, intelligence analysts created a portrait of a suspect and the threat that person posed, pulling it together “in a condensed format known as a ‘baseball card.’” That information was then bundled with operational information and packaged in a “target information folder” to be “staffed up to higher echelons” for action. On average, it took 58 days for the president to sign off on a target, one slide indicates. At that point, U.S. forces had 60 days to carry out the strike. The documents include two case studies that are partially based on information detailed on baseball cards.

    The system for creating baseball cards and targeting packages, according to the source, depends largely on intelligence intercepts and a multi-layered system of fallible, human interpretation. “It isn’t a surefire method,” he said. “You’re relying on the fact that you do have all these very powerful machines, capable of collecting extraordinary amounts of data and information,” which can lead personnel involved in targeted killings to believe they have “godlike powers.”

    ASSASSINATIONS DEPEND ON UNRELIABLE INTELLIGENCE AND HURT INTELLIGENCE GATHERING

    Read more
    FIRING BLINDIn undeclared war zones, the U.S. military has become overly reliant on signals intelligence, or SIGINT, to identify and ultimately hunt down and kill people. The documents acknowledge that using metadata from phones and computers, as well as communications intercepts, is an inferior method of finding and finishing targeted people. They described SIGINT capabilities in these unconventional battlefields as “poor” and “limited.” Yet such collection, much of it provided by foreign partners, accounted for more than half the intelligence used to track potential kills in Yemen and Somalia. The ISR study characterized these failings as a technical hindrance to efficient operations, omitting the fact that faulty intelligence has led to the killing of innocent people, including U.S. citizens, in drone strikes.

    The source underscored the unreliability of metadata, most often from phone and computer communications intercepts. These sources of information, identified by so-called selectors such as a phone number or email address, are the primary tools used by the military to find, fix, and finish its targets. “It requires an enormous amount of faith in the technology that you’re using,” the source said. “There’s countless instances where I’ve come across intelligence that was faulty.” This, he said, is a primary factor in the killing of civilians. “It’s stunning the number of instances when selectors are misattributed to certain people. And it isn’t until several months or years later that you all of a sudden realize that the entire time you thought you were going after this really hot target, you wind up realizing it was his mother’s phone the whole time.”

    Within the special operations community, the source said, the internal view of the people being hunted by the U.S. for possible death by drone strike is: “They have no rights. They have no dignity. They have no humanity to themselves. They’re just a ‘selector’ to an analyst. You eventually get to a point in the target’s life cycle that you are following them, you don’t even refer to them by their actual name.” This practice, he said, contributes to “dehumanizing the people before you’ve even encountered the moral question of ‘is this a legitimate kill or not?’”

    By the ISR study’s own admission, killing suspected terrorists, even if they are “legitimate” targets, further hampers intelligence gathering. The secret study states bluntly: “Kill operations significantly reduce the intelligence available.” A chart shows that special operations actions in the Horn of Africa resulted in captures just 25 percent of the time, indicating a heavy tilt toward lethal strikes.

    STRIKES OFTEN KILL MANY MORE THAN THE INTENDED TARGET

    Read more
    MANHUNTING IN THE HINDU KUSH The White House and Pentagon boast that the targeted killing program is precise and that civilian deaths are minimal. However, documents detailing a special operations campaign in northeastern Afghanistan, Operation Haymaker, show that between January 2012 and February 2013, U.S. special operations airstrikes killed more than 200 people. Of those, only 35 were the intended targets. During one five-month period of the operation, according to the documents, nearly 90 percent of the people killed in airstrikes were not the intended targets. In Yemen and Somalia, where the U.S. has far more limited intelligence capabilities to confirm the people killed are the intended targets, the equivalent ratios may well be much worse.

    “Anyone caught in the vicinity is guilty by association,” the source said. When “a drone strike kills more than one person, there is no guarantee that those persons deserved their fate. … So it’s a phenomenal gamble.”

    THE MILITARY LABELS UNKNOWN PEOPLE IT KILLS AS “ENEMIES KILLED IN ACTION”

    Read more
    MANHUNTING IN THE HINDU KUSH The documents show that the military designated people it killed in targeted strikes as EKIA — “enemy killed in action” — even if they were not the intended targets of the strike. Unless evidence posthumously emerged to prove the males killed were not terrorists or “unlawful enemy combatants,” EKIA remained their designation, according to the source. That process, he said, “is insane. But we’ve made ourselves comfortable with that. The intelligence community, JSOC, the CIA, and everybody that helps support and prop up these programs, they’re comfortable with that idea.”

    The source described official U.S. government statements minimizing the number of civilian casualties inflicted by drone strikes as “exaggerating at best, if not outright lies.”

    THE NUMBER OF PEOPLE TARGETED FOR DRONE STRIKES AND OTHER FINISHING OPERATIONS

    Read more
    KILL CHAINAccording to one secret slide, as of June 2012, there were 16 people in Yemen whom President Obama had authorized U.S. special operations forces to assassinate. In Somalia, there were four. The statistics contained in the documents appear to refer only to targets approved under the 2001 Authorization for Use of Military Force, not CIA operations. In 2012 alone, according to data compiled by the Bureau of Investigative Journalism, there were more than 200 people killed in operations in Yemen and between four and eight in Somalia.

    HOW GEOGRAPHY SHAPES THE ASSASSINATION CAMPAIGN

    Read more
    FIRING BLINDIn Afghanistan and Iraq, the pace of U.S. strikes was much quicker than in Yemen and Somalia. This appears due, in large part, to the fact that Afghanistan and Iraq were declared war zones, and in Iraq the U.S. was able to launch attacks from bases closer to the targeted people. By contrast, in Somalia and Yemen, undeclared war zones where strikes were justified under tighter restrictions, U.S. attack planners described a serpentine bureaucracy for obtaining approval for assassination. The secret study states that the number of high-value targeting operations in these countries was “significantly lower than previously seen in Iraq and Afghanistan” because of these “constraining factors.”

    Even after the president approved a target in Yemen or Somalia, the great distance between drone bases and targets created significant challenges for U.S. forces — a problem referred to in the documents as the “tyranny of distance.” In Iraq, more than 80 percent of “finishing operations” were conducted within 150 kilometers of an air base. In Yemen, the average distance was about 450 kilometers and in Somalia it was more than 1,000 kilometers. On average, one document states, it took the U.S. six years to develop a target in Somalia, but just 8.3 months to kill the target once the president had approved his addition to the kill list.

    INCONSISTENCIES WITH WHITE HOUSE STATEMENTS ABOUT TARGETED KILLING

    Read more
    KILL CHAINThe White House’s publicly available policy standards state that lethal force will be launched only against targets who pose a “continuing, imminent threat to U.S. persons.” In the documents, however, there is only one explicit mention of a specific criterion: that a person “presents a threat to U.S. interest or personnel.” While such a rationale may make sense in the context of a declared war in which U.S. personnel are on the ground in large numbers, such as in Afghanistan, that standard is so vague as to be virtually meaningless in countries like Yemen and Somalia, where very few U.S. personnel operate.

    While many of the documents provided to The Intercept contain explicit internal recommendations for improving unconventional U.S. warfare, the source said that what’s implicit is even more significant. The mentality reflected in the documents on the assassination programs is: “This process can work. We can work out the kinks. We can excuse the mistakes. And eventually we will get it down to the point where we don’t have to continuously come back … and explain why a bunch of innocent people got killed.”

    The architects of what amounts to a global assassination campaign do not appear concerned with either its enduring impact or its moral implications. “All you have to do is take a look at the world and what it’s become, and the ineptitude of our Congress, the power grab of the executive branch over the past decade,” the source said. “It’s never considered: Is what we’re doing going to ensure the safety of our moral integrity? Of not just our moral integrity, but the lives and humanity of the people that are going to have to live with this the most?”

    Jeremy Scahill
    Oct. 15 2015, 1:57 p.m.

    Find this story at 15 October 2015

    Copyright https://theintercept.com/

    German spy scandal deepens

    Van nieuwsblog.burojansen.nl

    The German intelligence service has spied on European and American embassies in ways that may have been beyond its mandate, German media ARD and Spiegel Online reported on Wednesday (14 October).
    The Bundesnachtrichtendienst (BND) reportedly targeted French and US institutions and eavesdropped on them to acquire information about countries like Afghanistan.

    The news follows reports in April that the BND spied on France and the European Commission on behalf of the US’ National Security Agency (NSA). But according to the new reports, BND also spied on allies on its own initiative.
    For its spying programme, the BND used thousands of search queries, so-called selectors, including phone numbers and IP addresses, possibly queries the service chose itself.

    “The question is … whether the used queries were covered by the BND’s mandate”, MP Clemens Binninger of chancellor Angela Merkel’s centre-right CDU party told ARD.

    Binninger is head of the Bundestag’s supervisory body that oversees the intelligence service.

    The German media sourced their news at a secret meeting of the overseeing body on Wednesday evening.

    The revelations are remarkable considering the criticism that followed revelations by Edward Snowden in 2013 that the NSA had spied on EU leaders, including Merkel.

    “Spying among friends – that is just not done”, Merkel said following the scandal.

    The BND programme stopped around the same time as the Snowden revelations revealed the NSA practices, in the autumn of 2013.

    German MPs are planning to interview staff next week at the BND headquarters in Pullach and review the list of search queries to determine if there has been any illegal practice.

    By PETER TEFFER
    BRUSSELS, 15. OCT, 09:11

    Find this story at 15 October 2015

    Copyright https://euobserver.com/

    German spy charged with treason for aiding CIA and Russia

    Van nieuwsblog.burojansen.nl

    Prosecutors have charged a German spy with treason, breach of official secrecy and taking bribes for allegedly providing secret documents to both the CIA and Russia’s intelligence agency. Prosecutors say Thursday Aug. 20, 2015, the 32-year-old man,handled mail and classified documents for Germany’s foreign intelligence agency BND. ( Stephan Jansen/dpa via AP)
    BERLIN (AP) — A German spy who allegedly acted as a double agent for the United States and Russia has been charged with treason, breach of official secrecy and taking bribes, Germany’s federal prosecutors’ office said Thursday.

    The 32-year-old, identified only as Markus R. due to privacy rules, is accused of offering his services to the CIA in early 2008 while working for Germany’s foreign intelligence agency BND. Documents he gave the U.S. spy agency would have revealed details of the BND’s work and personnel abroad, officials said.

    “In doing so the accused caused serious danger to Germany’s external security,” prosecutors said in a statement. “In return the accused received sums amounting to at least 95,000 euros ($104,900) from the CIA.”

    Shortly before his arrest in July 2014, Markus R. also offered to work for Russian intelligence and provided them with three documents, again harming Germany’s national security, prosecutors said.

    The discovery that the CIA had allegedly been spying on its German counterpart caused anger in Berlin, adding to diplomatic tension between Germany and the United States over reports about U.S. surveillance of Chancellor Angela Merkel’s cellphone.

    Following the arrest, the German government demanded the removal of the CIA station chief in Berlin.

    Prosecutors said Markus R. would have had access to sensitive documents because his job involved handling mail and classified documents for the BND’s foreign operations department.

    German weekly Der Spiegel reported that the 218 documents Markus R. allegedly passed to the CIA included a list of all BND agents abroad, a summary of an eavesdropped phone call between former U.S. Secretary of State Hillary Rodham Clinton and former U.N. Secretary-General Kofi Annan, as well as a draft counter-espionage strategy. A spokeswoman for the federal prosecutors’ office declined to comment on the report.

    If convicted, Markus R. could face between one and 15 years in prison.

    Associated Press By FRANK JORDANS
    August 20, 2015 11:07 AM

    Find this story at 20 August 2015
    Copyright http://news.yahoo.com/

    Deliberate Deception Washington Gave Answer Long Ago in NSA Case

    Van nieuwsblog.burojansen.nl

    For months, the German government sought to create the impression it was still waiting for an answer from the US on whether it could share NSA target lists for spying with a parliamentary investigation. The response came months ago.

    The order from Washington was unambiguous. The United States Embassy in Berlin didn’t want to waste any time and moved to deliver the diplomatic cable without delay. It was May 10, 2015, a Sunday — and even diplomats aren’t crazy about working weekends. On this day, though, they had no other choice. James Melville, the embassy’s second-in-command, hand delivered the mail from the White House to Angela Merkel’s Chancellery at 9 p.m.

    The letter that Melville handed over to Merkel’s staff contained the long-awaited answer to how the German federal government could proceed with highly classified lists of NSA spying targets. The so-called “selector” lists had become notorious in Germany and the subject of considerable grief for Merkel because her foreign intelligence agency, the BND, may have helped the NSA to spy on German firms as a result of them. The selector lists, which were fed into the BND’s monitoring systems on behalf of the NSA, are reported to have included both German and European targets that were spied on by the Americans.

    The letter put the German government in a very delicate position. The expectation had been that the US government would flat out refuse to allow officials in Berlin to present the lists to members of the federal parliament, which is currently investigating NSA spying in Germany, including the eavesdropping of Merkel’s own mobile phone. But that wasn’t the case. Instead, the Americans delivered a more differentiated letter, making it all the more interesting.

    Canned Answers

    Nevertheless, the German government remained silent about the letter’s existence. It disposed of all queries by saying that talks with the US on how to deal with the lists were still ongoing. The government kept giving the same reply whenever journalists from SPIEGEL or other media asked if it had received an answer from the Americans.

    On May 11, for example, one day after Chancellery officials received the letter, Merkel’s spokesman Steffen Seibert responded to a query by saying: “The heads of the Parliamentary Control Panel (responsible for parliamentary oversight of Germany’s intelligence agencies) and the NSA investigative committee are all being informed about all relevant things in the context of this consultation process.” Is it not relevant when the US government provides its first official response to the Germans’ request to present the lists to parliament?

    Two days later, on May 13, Seibert was asked explicitly by a reporter whether there had been any new developments on the NSA issue. “I have nothing new to report,” the government spokesman answered. At the very least, his reply was a deliberate deception of the public by the government. The letter, after all, didn’t come from just anyone — it came from US President Barack Obama’s White House chief of staff, Denis McDonough. A letter from such a high-ranking official is most certainly a new development. When questioned by SPIEGEL on the matter, the German government responded that “it would not publicly comment on confidential communications with foreign parties.”

    Several sources familiar with the contents of the letter claim that in it, Obama’s people express their great respect for the parliamentary oversight of intelligence services and also accept that the committee will learn more about the NSA target list. At the same time, the letter also includes the decisive requirement: that the German government had to make sure no information contained in the target lists went public.

    Keeping the Public in the Dark

    The demand created a dilemma for the government. It meant, on the one Hand, that Merkel’s Chancellery could no longer hide behind the Americans as an excuse to withhold the information from parliament. On the other hand, the Chancellery didn’t want to take the risk of sharing the lists with members of the Bundestag because doing so, they worried, would create the risk that someone might then leak them to the media.

    Merkel and her people instead deliberately kept German citizens and members of parliament in the dark about the Americans’ position. Almost two weeks after receipt of the letter from Washington, Merkel’s chief of staff, Chancellery Minister Peter Altmaier, informed the heads of the NSA investigative committee in a highly confidential meeting of an answer by the Americans, but he implied it had been vague, and there was no mention of any willingness on the part of the US government to allow the German parliament to clarify the issue. Instead, Altmaier argued that Washington had listed a number of legal concerns. He said it was unlikely further discussions would lead to any green light.

    When the German weekly Die Zeit reported 10 days ago that the Americans had given their okay for the release of the lists, Altmaier responded: “We could have spared ourselves a difficult debate if permission to pass (the lists) on had actually been given by the US.” Altmaier clearly attempted to skirt the question of whether the US had made any statements on the issue.

    Officials in the Chancellery are now doing their best to portray the McDonough letter as a kind of kick-off in German-American consultations on how to deal with the selector lists. After receiving the letter, Chancellery Minister Altmaier had a number of exchanges with his US counterpart by phone and email. In addition, Klaus-Dieter Fritsche, the Chancellery’s intelligence coordinator, also spoke several times with the Americans.

    Berlin’s approach to the negotiations says quite a bit about the outcome one should expect. Officially, the German government is asking for permission to release the selector lists without the application of any restrictions by the US government. It had to have been clear to everyone involved that a demand like that would be unrealistic, but in this instance, the government didn’t want to risk making any mistakes. Within the Chancellery, officials then agreed that any time they were approached with questions, they would always answer that the consultations were still in progress — even if a decision had already been made.

    Pushback from the Opposition

    “The Federal Chancellery is doing exactly the opposite of what Merkel promised,” criticizes Konstantin von Notz, the Green Party’s representative on the NSA investigative committee. “Instead of clearing things up, things are being concealed behind the scenes, also using improper means.”

    As the course of the NSA scandal showed, Merkel and her people already have practice when it comes to cover-up attempts. During her election campaign in 2013, Merkel created the impression for months that there was a chance Germany might be able to reach a no-spy agreement with the US. Throughout, the White House signaled behind the scenes that it would never agree to one, but the German government told the public nothing about these discussions.

    Now, a special ombudsman is supposed to steer the government out of the difficult situation in which it finds itself. It’s an idea that originated with Altmaier. Rather than providing the selector lists to the NSA investigative committee in parliament, they will instead be viewed by Kurt Graulich, a former justice with the Federal Administrative Court. Altmaier’s hope is that this path will prevent details from being leaked to the press.

    The opposition parties in parliament are against the idea. And why shouldn’t they be? In recent years, the Chancellery has done everything in its power to downplay spying by US intelligence services on Germany. Altmaier’s predecessor, Ronald Pofalla, even went so far in August 2013 as to say that the NSA scandal had been “cleared up.” The revelation, arguably the biggest, that Merkel’s own mobile phone had been tapped by the NSA followed two months later. Now the Green and Left parties want to prevent the government from choosing its own inspector. They are considering a legal challenge at the Federal Constitutional Court to stop Merkel’s government.

    08/21/2015 07:44 PM
    By Matthias Gebauer, René Pfister and Holger Stark

    Find this story at 21 August 2015

    © SPIEGEL ONLINE 2015

    An American Tip to German Spies Points to a More Complex Relationship

    Van nieuwsblog.burojansen.nl

    BERLIN — In the summer of 2011, American intelligence agencies spied on a senior German official who they concluded had been the likely source of classified information being leaked to the news media.

    The Obama administration authorized the top American spy in Germany to reveal to the German government the identity of the official, according to German officials and news media reports. The decision was made despite the risk of exposing that the United States was monitoring senior national security aides to Chancellor Angela Merkel.

    The tip-off appears to have led to a senior German intelligence official being barred from access to sensitive material. But it also raises suspicions that Ms. Merkel’s government had strong indications of the extent of American surveillance at least two years before the disclosures by Edward J. Snowden, which included the number of a cellphone used by the chancellor.

    The decision by the United States to risk disclosing a surveillance operation against a close ally indicates the high level of concern over the perceived security breach. It is unclear, however, what that information might have been or if it involved intelligence provided to Germany by the United States.

    The German newsmagazine Der Spiegel reported Friday that it believed the American effort to expose the German intelligence official arose from conversations by its own journalists. It filed a complaint with the federal prosecutor in Germany over espionage activity and a violation of Germany’s data protection laws. The prosecutor’s office declined to comment, other than to confirm that the filing had been received.

    In Washington, a spokesman for the National Security Council, Ned Price, declined on Friday to comment on the reported surveillance other than to indicate that the government does not spy on foreign journalists. “The United States is not spying on ordinary people who don’t threaten our national security,” Mr. Price said.

    The disclosure is the latest intelligence revelation to shake the alliance, even though it is unclear that the National Security Agency actively listened to Ms. Merkel’s calls. Among other actions that widened the rift, the Germans last summer expelled the then-C.I.A. chief. And this week material uncovered by the antisecrecy group WikiLeaks suggested that the Americans had been spying on their German allies back to the 1990s.

    The first hints emerged in the German media this year. The Bild am Sonntag newspaper reported that Hans Josef Vorbeck, a deputy director of the chancellery’s intelligence division, had been “put out in the cold” in 2011 after the then-C.I.A. station chief in Berlin gave information to Mr. Vorbeck’s boss, Günter Heiss. Der Spiegel said Mr. Heiss was specifically told of contacts with its journalists.

    Mr. Heiss, a quiet but powerful figure in German intelligence activities, was questioned for nearly six hours at an open hearing of a German parliamentary committee on Thursday. Mr. Heiss was particularly reticent when asked about Mr. Vorbeck. He repeatedly declined to answer questions about him, challenging the mandate of the committee to pose such queries, and arguing that he was not allowed to discuss a third party in public.

    Konstantin von Notz, a lawmaker for the opposition Green Party, which has been vocal in its criticism of Ms. Merkel and the German handling of alleged American espionage, accused Mr. Heiss of hiding behind a “cascade” of excuses.

    Eventually, Hans-Christian Ströbele, a longtime lawmaker for the Greens, asked Mr. Heiss whether he ever had a “concrete suspicion” that Mr. Vorbeck was leaking classified information. Mr. Heiss said there was no “concrete suspicion” that would have led to “concrete action.” He indicated the matter had been discussed in the chancellery, but declined to give specifics.

    But when asked whether Mr. Vorbeck had been the target of spying, Mr. Heiss declared: “No. That much I can say.”

    In a report in the edition it published on Saturday, Der Spiegel said Mr. Heiss had learned of the suspicions against Mr. Vorbeck in the summer of 2011, when invited by the C.I.A. station chief to take a walk.

    Appearing before the committee last month, Guido Müller, a senior intelligence official, at first said he could not recall Mr. Vorbeck’s transfer to a lower-level job. Mr. Müller then said he could remember it only if testifying behind closed doors.

    When he appeared before the committee, two days shy of his 64th birthday, Mr. Vorbeck himself was cagey. When Mr. von Notz raised the Bild am Sonntag reports and asked for more detail, the demoted intelligence officer replied that he “did not know much more than what has been in the papers,” according to a transcript on a live-blog at netzpolitik.org, a website that tracks intelligence matters.

    André Hahn, a lawmaker for the opposition Left party, asked Mr. Vorbeck whether he had a good relationship with Mr. Heiss — “at first,” Mr. Vorbeck answered — and whether he had ever been charged with betraying secrets. “Not then and not now,” Mr. Vorbeck replied, according to the netzpolitik blog.

    Mr. Vorbeck is suing the government for material damages he said he suffered as a result of being transferred to a senior archival post concerning the history of German intelligence. His lawyer declined to return a call seeking comment or access to his client.

    The dimensions of German anger over American espionage have been evidenced in public opinion polls and in protests against a possible trans-Atlantic trade pact. German officials have talked about creating an internal Internet so that communications among Germans do not have to pass outside the country.

    What makes these disclosures different is that they suggest that German publications have been either direct or indirect targets of American surveillance. “Spiegel suspects spying by U.S. secret services,” the online edition of the respected weekly Die Zeit reported Friday.

    The latest disclosures by WikiLeaks — a summary of an October 2011 conversation Ms. Merkel had with an adviser about the debt crisis in Greece, a document from her senior adviser on European affairs, plus a list of 69 telephone numbers of important ministries and senior officials that appeared to date back to the 1990s — had already prompted Ms. Merkel’s chief of staff on Thursday to invite the United States ambassador, John B. Emerson, to explain.

    A government statement following that meeting did not confirm the material, but made plain that violations of German laws would be prosecuted. The government defended its heightened counterintelligence operations, hinting at the depth of anger with the United States.

    Steffen Seibert, the German government spokesman, referred inquiries on Friday to another government spokesman who said he could not be identified by name. He reiterated that the government did not comment on personnel moves, and that it reported on intelligence services only to the relevant supervisory committee in Parliament.

    The spokesman added in an email that Mr. Heiss had testified on Thursday that there was no reason to take disciplinary or other action regarding Mr. Vorbeck.

    Alison Smale and Melissa Eddy reported from Berlin, David E. Sanger from Vienna and Eric Schmitt from Washington.

    By ALISON SMALE, MELISSA EDDY, DAVID E. SANGER and ERIC SCHMITTJULY 3, 2015

    Find this story at 3 July 2015

    © 2015 The New York Times Company

    Germany trades citizens’ metadata for NSA’s top spy software

    Van nieuwsblog.burojansen.nl

    Spies keen to use XKeyscore, less keen to tell German government or citizens.

    In order to obtain a copy of the NSA’s main XKeyscore software, whose existence was first revealed by Edward Snowden in 2013, Germany’s domestic intelligence agency agreed to hand over metadata of German citizens it spies on. According to documents seen by the German newspaper Die Zeit, after 18 months of negotiations, the US and Germany signed an agreement in April 2013 that would allow the Federal Office for the Protection of the Constitution (Bundesamtes für Verfassungsschutz—BfV) to obtain a copy of the NSA’s most important program and to adopt it for the analysis of data gathered in Germany.

    This was a lower level of access compared to the non-US “Five Eyes” nations—the UK, Australia, Canada, and New Zealand—which had direct access to the main XKeyscore system. In return for the software, the BfV would “to the maximum extent possible share all data relevant to NSA’s mission.” Interestingly, there is no indication in the Die Zeit story that the latest leak comes from Snowden, which suggests that someone else has made the BfV’s “internal documents” available.

    Unlike Germany’s foreign intelligence service, the Bundesnachrichtendienst (BND), the domestic-oriented BfV does not employ bulk surveillance of the kind also deployed on a vast scale by the NSA and GCHQ. Instead, it is only allowed to monitor individual suspects in Germany and, even to do that, must obtain the approval of a special parliamentary commission. Because of this targeted approach, BfV surveillance is mainly intended to gather the content of specific conversations, whether in the form of e-mails, telephone exchanges, or even faxes, if anyone still uses them. Inevitably, though, metadata is also gathered, but as Die Zeit explains, “whether the collection of this [meta]data is consistent with the restrictions outlined in Germany’s surveillance laws is a question that divides legal experts.”

    The BfV had no problems convincing itself that it was consistent with Germany’s laws to collect metadata, but rarely bothered since—remarkably—all analysis was done by hand before 2013, even though metadata by its very nature lends itself to large-scale automated processing. This explains the eagerness of the BfV to obtain the NSA’s XKeyscore software after German agents had seen its powerful metadata analysis capabilities in demonstrations.

    It may also explain the massive expansion of the BfV that the leaked document published by Netzpolitik had revealed earlier this year. As Die Zeit notes, the classified budget plans “included the information that the BfV intended to create 75 new positions for the ‘mass data analysis of Internet content.’ Seventy-five new positions is a significant amount for any government agency.”

    FURTHER READING

    GERMANY’S TOP PROSECUTOR FIRED OVER NETZPOLITIK “TREASON” PROBE
    Heads begin to roll, but the investigation has not yet been dropped.
    The BfV may have been keen to deploy XKeyscore widely, but it wasn’t so keen to inform the German authorities about the deal with the NSA. Peter Schaar, who was data protection commissioner at the time, told Die Zeit: “I knew nothing about such an exchange deal [of German metadata for US software].” He says that he only discovered that the BfV was using XKeyscore when he asked the surveillance service explicitly after reading about the program in Snowden’s 2013 revelations. The same is true for another key oversight body: “The Parliamentary Control Panel learned that the BfV had received XKeyscore software and had begun using it. But even this very general briefing was only made after the panel had explicitly asked following the Snowden revelations,” according to Die Zeit.

    This post originated on Ars Technica UK
    by Glyn Moody (UK) – Aug 27, 2015 5:32pm CEST

    Find this story at 27 August 2015

    © 2015 Condé Nast

    New WikiLeaks Revelations: NSA Targeted Phones of All of German Chancellor Angela Merkel’s Top Aides

    Van nieuwsblog.burojansen.nl

    BERLIN — WikiLeaks on Wednesday published a new list of German phone numbers it claims showed the U.S. National Security Agency targeted phones belonging to Chancellor Angela Merkel’s close aides and chancellery offices for surveillance.

    Wednesday’s publication came a week after WikiLeaks released a list of numbers it said showed the NSA targeted officials at various other German ministries and elsewhere. That rekindled concerns over U.S. surveillance in Germany after reports two years ago that Merkel’s own cellphone was targeted.

    Merkel’s chief of staff last week asked the U.S. ambassador to a meeting and told him that German law must be followed.

    There was no immediate comment from the German government on the latest publication.

    The list includes a cellphone number attributed to Ronald Pofalla, Merkel’s chief of staff from 2009-13; a landline number that appears to belong to the leader of Merkel’s parliamentary caucus; various other connections at Merkel’s office; and a cellphone number for the chancellor that WikiLeaks says was used until 2013.

    It was unclear when exactly the partially redacted list of 56 German phone numbers dates from and it wasn’t immediately possible to confirm the accuracy of that and other documents released by WikiLeaks.

    Those documents, WikiLeaks said, are NSA reports based on interceptions — including one from 2009 that details Merkel’s views on the international financial crisis and another from 2011 summarizing advisers’ views on plans for the eurozone’s rescue fund.

    According to the secret-spilling site, the list of phone numbers was updated for more than a decade after 2002 and a “close study” of it shows it evolved from an earlier target list dating back into the 1990s.

    July 8, 2015
    Associated Press

    Find this story at 8 July 2015

    Copyright http://www.matthewaid.com/

    << oudere artikelen  nieuwere artikelen >>