• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • BEHIND THE CURTAIN A Look at the Inner Workings of NSA’s XKEYSCORE (II)

    Van nieuwsblog.burojansen.nl

    The sheer quantity of communications that XKEYSCORE processes, filters and queries is stunning. Around the world, when a person gets online to do anything — write an email, post to a social network, browse the web or play a video game — there’s a decent chance that the Internet traffic her device sends and receives is getting collected and processed by one of XKEYSCORE’s hundreds of servers scattered across the globe.

    In order to make sense of such a massive and steady flow of information, analysts working for the National Security Agency, as well as partner spy agencies, have written thousands of snippets of code to detect different types of traffic and extract useful information from each type, according to documents dating up to 2013. For example, the system automatically detects if a given piece of traffic is an email. If it is, the system tags if it’s from Yahoo or Gmail, if it contains an airline itinerary, if it’s encrypted with PGP, or if the sender’s language is set to Arabic, along with myriad other details.

    This global Internet surveillance network is powered by a somewhat clunky piece of software running on clusters of Linux servers. Analysts access XKEYSCORE’s web interface to search its wealth of private information, similar to how ordinary people can search Google for public information.

    Based on documents provided by NSA whistleblower Edward Snowden, The Intercept is shedding light on the inner workings of XKEYSCORE, one of the most extensive programs of mass surveillance in human history.

    How XKEYSCORE works under the hood

    It is tempting to assume that expensive, proprietary operating systems and software must power XKEYSCORE, but it actually relies on an entirely open source stack. In fact, according to an analysis of an XKEYSCORE manual for new systems administrators from the end of 2012, the system may have design deficiencies that could leave it vulnerable to attack by an intelligence agency insider.

    XKEYSCORE is a piece of Linux software that is typically deployed on Red Hat servers. It uses the Apache web server and stores collected data in MySQL databases. File systems in a cluster are handled by the NFS distributed file system and the autofs service, and scheduled tasks are handled by the cron scheduling service. Systems administrators who maintain XKEYSCORE servers use SSH to connect to them, and they use tools such as rsync and vim, as well as a comprehensive command-line tool, to manage the software.

    John Adams, former security lead and senior operations engineer for Twitter, says that one of the most interesting things about XKEYSCORE’s architecture is “that they were able to achieve so much success with such a poorly designed system. Data ingest, day-to-day operations, and searching is all poorly designed. There are many open source offerings that would function far better than this design with very little work. Their operations team must be extremely unhappy.”

    Analysts connect to XKEYSCORE over HTTPS using standard web browsers such as Firefox. Internet Explorer is not supported. Analysts can log into the system with either a user ID and password or by using public key authentication.

    As of 2009, XKEYSCORE servers were located at more than 100 field sites all over the world. Each field site consists of a cluster of servers; the exact number differs depending on how much information is being collected at that site. Sites with relatively low traffic can get by with fewer servers, but sites that spy on larger amounts of traffic require more servers to filter and parse it all. XKEYSCORE has been engineered to scale in both processing power and storage by adding more servers to a cluster. According to a 2009 document, some field sites receive over 20 terrabytes of data per day. This is the equivalent of 5.7 million songs, or over 13 thousand full-length films.

    This map from a 2009 top-secret presentation does not show all of XKEYSCORE’s field sites.
    When data is collected at an XKEYSCORE field site, it is processed locally and ultimately stored in MySQL databases at that site. XKEYSCORE supports a federated query system, which means that an analyst can conduct a single query from the central XKEYSCORE website, and it will communicate over the Internet to all of the field sites, running the query everywhere at once.

    There might be security issues with the XKEYSCORE system itself as well. As hard as software developers may try, it’s nearly impossible to write bug-free source code. To compensate for this, developers often rely on multiple layers of security; if attackers can get through one layer, they may still be thwarted by other layers. XKEYSCORE appears to do a bad job of this.

    When systems administrators log into XKEYSCORE servers to configure them, they appear to use a shared account, under the name “oper.” Adams notes, “That means that changes made by an administrator cannot be logged.” If one administrator does something malicious on an XKEYSCORE server using the “oper” user, it’s possible that the digital trail of what was done wouldn’t lead back to the administrator, since multiple operators use the account.

    There appears to be another way an ill-intentioned systems administrator may be able to cover their tracks. Analysts wishing to query XKEYSCORE sign in via a web browser, and their searches are logged. This creates an audit trail, on which the system relies to assure that users aren’t doing overly broad searches that would pull up U.S. citizens’ web traffic. Systems administrators, however, are able to run MySQL queries. The documents indicate that administrators have the ability to directly query the MySQL databases, where the collected data is stored, apparently bypassing the audit trail.

    AppIDs, fingerprints and microplugins

    Collecting massive amounts of raw data is not very useful unless it is collated and organized in a way that can be searched. To deal with this problem, XKEYSCORE extracts and tags metadata and content from the raw data so that analysts can easily search it.

    This is done by using dictionaries of rules called appIDs, fingerprints and microplugins that are written in a custom programming language called GENESIS. Each of these can be identified by a unique name that resembles a directory tree, such as “mail/webmail/gmail,” “chat/yahoo,” or “botnet/blackenergybot/command/flood.”

    One document detailing XKEYSCORE appIDs and fingerprints lists several revealing examples. Windows Update requests appear to fall under the “update_service/windows” appID, and normal web requests fall under the “http/get” appID. XKEYSCORE can automatically detect Airblue travel itineraries with the “travel/airblue” fingerprint, and iPhone web browser traffic with the “browser/cellphone/iphone” fingerprint.

    PGP-encrypted messages are detected with the “encryption/pgp/message” fingerprint, and messages encrypted with Mojahedeen Secrets 2 (a type of encryption popular among supporters of al Qaeda) are detected with the “encryption/mojaheden2” fingerprint.

    When new traffic flows into an XKEYSCORE cluster, the system tests the intercepted data against each of these rules and stores whether the traffic matches the pattern. A slideshow presentation from 2010 says that XKEYSCORE contains almost 10,000 appIDs and fingerprints.

    AppIDs are used to identify the protocol of traffic being intercepted, while fingerprints detect a specific type of content. Each intercepted stream of traffic gets assigned up to one appID and any number of fingerprints. You can think of appIDs as categories and fingerprints as tags.

    If multiple appIDs match a single stream of traffic, the appID with the lowest “level” is selected (appIDs with lower levels are more specific than appIDs with higher levels). For example, when XKEYSCORE is assessing a file attachment from Yahoo mail, all of the appIDs in the following slide will apply, however only “mail/webmail/yahoo/attachment” will be associated with this stream of traffic.

    To tie it all together, when an Arabic speaker logs into a Yahoo email address, XKEYSCORE will store “mail/yahoo/login” as the associated appID. This stream of traffic will match the “mail/arabic” fingerprint (denoting language settings), as well as the “mail/yahoo/ymbm” fingerprint (which detects Yahoo browser cookies).

    Sometimes the GENESIS programming language, which largely relies on Boolean logic, regular expressions and a set of simple functions, isn’t powerful enough to do the complex pattern-matching required to detect certain types of traffic. In these cases, as one slide puts it, “Power users can drop in to C++ to express themselves.” AppIDs or fingerprints that are written in C++ are called microplugins.

    Here’s an example of a microplugin fingerprint for “botnet/conficker_p2p_udp_data,” which is tricky botnet traffic that can’t be identified without complicated logic. A botnet is a collection of hacked computers, sometimes millions of them, that are controlled from a single point.

    Here’s another microplugin that uses C++ to inspect intercepted Facebook chat messages and pull out details like the associated email address and body of the chat message.

    One document from 2009 describes in detail four generations of appIDs and fingerprints, which begin with only the ability to scan intercepted traffic for keywords, and end with the ability to write complex microplugins that can be deployed to field sites around the world in hours.

    If XKEYSCORE development has continued at a similar pace over the last six years, it’s likely considerably more powerful today.

    Illustration for The Intercept by Blue Delliquanti

    Documents published with this article:

    Advanced HTTP Activity Analysis
    Analyzing Mobile Cellular DNI in XKS
    ASFD Readme
    CADENCE Readme
    Category Throttling
    CNE Analysis in XKS
    Comms Readme
    DEEPDIVE Readme
    DNI101
    Email Address vs User Activity
    Free File Uploaders
    Finding and Querying Document Metadata
    Full Log vs HTTP
    Guide to Using Contexts in XKS Fingerprints
    HTTP Activity in XKS
    HTTP Activity vs User Activity
    Intro to Context Sensitive Scanning With XKS Fingerprints
    Intro to XKS AppIDs and Fingerprints
    OSINT Fusion Project
    Phone Number Extractor
    RWC Updater Readme
    Selection Forwarding Readme
    Stats Config Readme
    Tracking Targets on Online Social Networks
    TRAFFICTHIEF Readme
    Unofficial XKS User Guide
    User Agents
    Using XKS to Enable TAO
    UTT Config Readme
    VOIP in XKS
    VOIP Readme
    Web Forum Exploitation Using XKS
    Writing XKS Fingerprints
    XKS Application IDs
    XKS Application IDs Brief
    XKS as a SIGDEV Tool
    XKS, Cipher Detection, and You!
    XKS for Counter CNE
    XKS Intro
    XKS Logos Embedded in Docs
    XKS Search Forms
    XKS System Administration
    XKS Targets Visiting Specific Websites
    XKS Tech Extractor 2009
    XKS Tech Extractor 2010
    XKS Workflows 2009
    XKS Workflows 2011
    UN Secretary General XKS

    Micah Lee, Glenn Greenwald, Morgan Marquis-Boire
    July 2 2015, 4:42 p.m.
    Second in a series.

    Find this story at 2 July 2015

    Copyright https://theintercept.com/

    XKEYSCORE: NSA’s Google for the World’s Private Communications (I)

    Van nieuwsblog.burojansen.nl

    One of the National Security Agency’s most powerful tools of mass surveillance makes tracking someone’s Internet usage as easy as entering an email address, and provides no built-in technology to prevent abuse. Today, The Intercept is publishing 48 top-secret and other classified documents about XKEYSCORE dated up to 2013, which shed new light on the breadth, depth and functionality of this critical spy system — one of the largest releases yet of documents provided by NSA whistleblower Edward Snowden.

    The NSA’s XKEYSCORE program, first revealed by The Guardian, sweeps up countless people’s Internet searches, emails, documents, usernames and passwords, and other private communications. XKEYSCORE is fed a constant flow of Internet traffic from fiber optic cables that make up the backbone of the world’s communication network, among other sources, for processing. As of 2008, the surveillance system boasted approximately 150 field sites in the United States, Mexico, Brazil, United Kingdom, Spain, Russia, Nigeria, Somalia, Pakistan, Japan, Australia, as well as many other countries, consisting of over 700 servers.

    These servers store “full-take data” at the collection sites — meaning that they captured all of the traffic collected — and, as of 2009, stored content for 3 to 5 days and metadata for 30 to 45 days. NSA documents indicate that tens of billions of records are stored in its database. “It is a fully distributed processing and query system that runs on machines around the world,” an NSA briefing on XKEYSCORE says. “At field sites, XKEYSCORE can run on multiple computers that gives it the ability to scale in both processing power and storage.”

    XKEYSCORE also collects and processes Internet traffic from Americans, though NSA analysts are taught to avoid querying the system in ways that might result in spying on U.S. data. Experts and privacy activists, however, have long doubted that such exclusions are effective in preventing large amounts of American data from being swept up. One document The Intercept is publishing today suggests that FISA warrants have authorized “full-take” collection of traffic from at least some U.S. web forums.

    The system is not limited to collecting web traffic. The 2013 document, “VoIP Configuration and Forwarding Read Me,” details how to forward VoIP data from XKEYSCORE into NUCLEON, NSA’s repository for voice intercepts, facsimile, video and “pre-released transcription.” At the time, it supported more than 8,000 users globally and was made up of 75 servers absorbing 700,000 voice, fax, video and tag files per day.

    The reach and potency of XKEYSCORE as a surveillance instrument is astonishing. The Guardian report noted that NSA itself refers to the program as its “widest reaching” system. In February of this year, The Intercept reported that NSA and GCHQ hacked into the internal network of Gemalto, the world’s largest provider of cell phone SIM cards, in order to steal millions of encryption keys used to protect the privacy of cell phone communication. XKEYSCORE played a vital role in the spies’ hacking by providing government hackers access to the email accounts of Gemalto employees.

    Numerous key NSA partners, including Canada, New Zealand and the U.K., have access to the mass surveillance databases of XKEYSCORE. In March, the New Zealand Herald, in partnership with The Intercept, revealed that the New Zealand government used XKEYSCORE to spy on candidates for the position of World Trade Organization director general and also members of the Solomon Islands government.

    These newly published documents demonstrate that collected communications not only include emails, chats and web-browsing traffic, but also pictures, documents, voice calls, webcam photos, web searches, advertising analytics traffic, social media traffic, botnet traffic, logged keystrokes, computer network exploitation (CNE) targeting, intercepted username and password pairs, file uploads to online services, Skype sessions and more.

    Bulk collection and population surveillance

    XKEYSCORE allows for incredibly broad surveillance of people based on perceived patterns of suspicious behavior. It is possible, for instance, to query the system to show the activities of people based on their location, nationality and websites visited. For instance, one slide displays the search “germansinpakistn,” showing an analyst querying XKEYSCORE for all individuals in Pakistan visiting specific German language message boards.

    As sites like Twitter and Facebook become increasingly significant in the world’s day-to-day communications (a Pew study shows that 71 percent of online adults in the U.S. use Facebook), they become a critical source of surveillance data. Traffic from popular social media sites is described as “a great starting point” for tracking individuals, according to an XKEYSCORE presentation titled “Tracking Targets on Online Social Networks.”

    When intelligence agencies collect massive amounts of Internet traffic all over the world, they face the challenge of making sense of that data. The vast quantities collected make it difficult to connect the stored traffic to specific individuals.

    Internet companies have also encountered this problem and have solved it by tracking their users with identifiers that are unique to each individual, often in the form of browser cookies. Cookies are small pieces of data that websites store in visitors’ browsers. They are used for a variety of purposes, including authenticating users (cookies make it possible to log in to websites), storing preferences, and uniquely tracking individuals even if they’re using the same IP address as many other people. Websites also embed code used by third-party services to collect analytics or host ads, which also use cookies to track users. According to one slide, “Almost all websites have cookies enabled.”

    The NSA’s ability to piggyback off of private companies’ tracking of their own users is a vital instrument that allows the agency to trace the data it collects to individual users. It makes no difference if visitors switch to public Wi-Fi networks or connect to VPNs to change their IP addresses: the tracking cookie will follow them around as long as they are using the same web browser and fail to clear their cookies.

    Apps that run on tablets and smartphones also use analytics services that uniquely track users. Almost every time a user sees an advertisement (in an app or in a web browser), the ad network is tracking users in the same way. A secret GCHQ and CSE program called BADASS, which is similar to XKEYSCORE but with a much narrower scope, mines as much valuable information from leaky smartphone apps as possible, including unique tracking identifiers that app developers use to track their own users. In May of this year, CBC, in partnership with The Intercept, revealed that XKEYSCORE was used to track smartphone connections to the app marketplaces run by Samsung and Google. Surveillance agency analysts also use other types of traffic data that gets scooped into XKEYSCORE to track people, such as Windows crash reports.

    In a statement to The Intercept, the NSA reiterated its position that such sweeping surveillance capabilities are needed to fight the War on Terror:

    “The U.S. Government calls on its intelligence agencies to protect the United States, its citizens, and its allies from a wide array of serious threats. These threats include terrorist plots from al-Qaeda, ISIL, and others; the proliferation of weapons of mass destruction; foreign aggression against the United States and our allies; and international criminal organizations.”

    Indeed, one of the specific examples of XKEYSCORE applications given in the documents is spying on Shaykh Atiyatallah, an al Qaeda senior leader and Osama bin Laden confidant. A few years before his death, Atiyatallah did what many people have often done: He googled himself. He searched his various aliases, an associate and the name of his book. As he did so, all of that information was captured by XKEYSCORE.

    XKEYSCORE has, however, also been used to spy on non-terrorist targets. The April 18, 2013 issue of the internal NSA publication Special Source Operations Weekly boasts that analysts were successful in using XKEYSCORE to obtain U.N. Secretary General Ban Ki-moon’s talking points prior to a meeting with President Obama.

    XKEYSCORE for hacking: easily collecting user names, passwords and much more

    XKEYSCORE plays a central role in how the U.S. government and its surveillance allies hack computer networks around the world. One top-secret 2009 NSA document describes how the system is used by the NSA to gather information for the Office of Tailored Access Operations, an NSA division responsible for Computer Network Exploitation (CNE) — i.e., targeted hacking.

    Particularly in 2009, the hacking tactics enabled by XKEYSCORE would have yielded significant returns as use of encryption was less widespread than today. Jonathan Brossard, a security researcher and the CEO of Toucan Systems, told The Intercept: “Anyone could be trained to do this in less than one day: they simply enter the name of the server they want to hack into XKEYSCORE, type enter, and are presented login and password pairs to connect to this machine. Done. Finito.” Previous reporting by The Intercept revealed that systems administrators are a popular target of the NSA. “Who better to target than the person that already has the ‘keys to the kingdom?’” read a 2012 post on an internal NSA discussion board.

    This system enables analysts to access web mail servers with remarkable ease.

    The same methods are used to steal the credentials — user names and passwords — of individual users of message boards.

    Hacker forums are also monitored for people selling or using exploits and other hacking tools. While the NSA is clearly monitoring to understand the capabilities developed by its adversaries, it is also monitoring locations where such capabilities can be purchased.

    Other information gained via XKEYSCORE facilitates the remote exploitation of target computers. By extracting browser fingerprint and operating system versions from Internet traffic, the system allows analysts to quickly assess the exploitability of a target. Brossard, the security researcher, said that “NSA has built an impressively complete set of automated hacking tools for their analysts to use.”

    Given the breadth of information collected by XKEYSCORE, accessing and exploiting a target’s online activity is a matter of a few mouse clicks. Brossard explains: “The amount of work an analyst has to perform to actually break into remote computers over the Internet seems ridiculously reduced — we are talking minutes, if not seconds. Simple. As easy as typing a few words in Google.”

    These facts bolster one of Snowden’s most controversial statements, made in his first video interview published by The Guardian on June 9, 2013. “I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge to even the president, if I had a personal email.”

    Indeed, training documents for XKEYSCORE repeatedly highlight how user-friendly the program is: with just a few clicks, any analyst with access to it can conduct sweeping searches simply by entering a person’s email address, telephone number, name or other identifying data. There is no indication in the documents reviewed that prior approval is needed for specific searches.

    In addition to login credentials and other target intelligence, XKEYSCORE collects router configuration information, which it shares with Tailored Access Operations. The office is able to exploit routers and then feed the traffic traveling through those routers into their collection infrastructure. This allows the NSA to spy on traffic from otherwise out-of-reach networks. XKEYSCORE documents reference router configurations, and a document previously published by Der Spiegel shows that “active implants” can be used to “cop[y] traffic and direc[t]” it past a passive collector.

    XKEYSCORE for counterintelligence

    Beyond enabling the collection, categorization, and querying of metadata and content, XKEYSCORE has also been used to monitor the surveillance and hacking actions of foreign nation states and to gather the fruits of their hacking. The Intercept previously reported that NSA and its allies spy on hackers in order to collect what they collect.

    Once the hacking tools and techniques of a foreign entity (for instance, South Korea) are identified, analysts can then extract the country’s espionage targets from XKEYSCORE, and gather information that the foreign power has managed to steal.

    Monitoring of foreign state hackers could allow the NSA to gather techniques and tools used by foreign actors, including knowledge of zero-day exploits—software bugs that allow attackers to hack into systems, and that not even the software vendor knows about—and implants. Additionally, by monitoring vulnerability reports sent to vendors such as Kaspersky, the agency could learn when exploits they were actively using need to be retired because they’ve been discovered by a third party.

    Seizure v. searching: oversight, audit trail and the Fourth Amendment

    By the nature of how it sweeps up information, XKEYSCORE gathers communications of Americans, despite the Fourth Amendment protection against “unreasonable search and seizure” — including searching data without a warrant. The NSA says it does not target U.S. citizens’ communications without a warrant, but acknowledges that it “incidentally” collects and reads some of it without one, minimizing the information that is retained or shared.

    But that interpretation of the law is dubious at best.

    XKEYSCORE training documents say that the “burden is on user/auditor to comply with USSID-18 or other rules,” apparently including the British Human Rights Act (HRA), which protects the rights of U.K. citizens. U.S. Signals Intelligence Directive 18 (USSID 18) is the American directive that governs “U.S. person minimization.”

    Kurt Opsahl, the Electronic Frontier Foundation’s general counsel, describes USSID 18 as “an attempt by the intelligence community to comply with the Fourth Amendment. But it doesn’t come from a court, it comes from the executive.”

    If, for instance, an analyst searched XKEYSCORE for all iPhone users, this query would violate USSID 18 due to the inevitable American iPhone users that would be grabbed without a warrant, as the NSA’s own training materials make clear.

    Opsahl believes that analysts are not prevented by technical means from making queries that violate USSID 18. “The document discusses whether auditors will be happy or unhappy. This indicates that compliance will be achieved by after-the-fact auditing, not by preventing the search.”

    Screenshots of the XKEYSCORE web-based user interface included in slides show that analysts see a prominent warning message: “This system is audited for USSID 18 and Human Rights Act compliance.” When analysts log in to the system, they see a more detailed message warning that “an audit trail has been established and will be searched” in response to HRA complaints, and as part of the USSID 18 and USSID 9 audit process.

    Because the XKEYSCORE system does not appear to prevent analysts from making queries that would be in violation of these rules, Opsahl concludes that “there’s a tremendous amount of power being placed in the hands of analysts.” And while those analysts may be subject to audits, “at least in the short term they can still obtain information that they shouldn’t have.”

    During a symposium in January 2015 hosted at Harvard University, Edward Snowden, who spoke via video call, said that NSA analysts are “completely free from any meaningful oversight.” Speaking about the people who audit NSA systems like XKEYSCORE for USSID 18 compliance, he said, “The majority of the people who are doing the auditing are the friends of the analysts. They work in the same office. They’re not full-time auditors, they’re guys who have other duties assigned. There are a few traveling auditors who go around and look at the things that are out there, but really it’s not robust.”

    In a statement to The Intercept, the NSA said:

    “The National Security Agency’s foreign intelligence operations are 1) authorized by law; 2) subject to multiple layers of stringent internal and external oversight; and 3) conducted in a manner that is designed to protect privacy and civil liberties. As provided for by Presidential Policy Directive 28 (PPD-28), all persons, regardless of their nationality, have legitimate privacy interests in the handling of their personal information. NSA goes to great lengths to narrowly tailor and focus its signals intelligence operations on the collection of communications that are most likely to contain foreign intelligence or counterintelligence information.”

    Coming next: A Look at the Inner Workings of XKEYSCORE

    Source maps: XKS as a SIGDEV Tool, p. 15, and XKS Intro, p. 6

    Documents published with this article:

    Advanced HTTP Activity Analysis
    Analyzing Mobile Cellular DNI in XKS
    ASFD Readme
    CADENCE Readme
    Category Throttling
    CNE Analysis in XKS
    Comms Readme
    DEEPDIVE Readme
    DNI101
    Email Address vs User Activity
    Free File Uploaders
    Finding and Querying Document Metadata
    Full Log vs HTTP
    Guide to Using Contexts in XKS Fingerprints
    HTTP Activity in XKS
    HTTP Activity vs User Activity
    Intro to Context Sensitive Scanning With XKS Fingerprints
    Intro to XKS AppIDs and Fingerprints
    OSINT Fusion Project
    Phone Number Extractor
    RWC Updater Readme
    Selection Forwarding Readme
    Stats Config Readme
    Tracking Targets on Online Social Networks
    TRAFFICTHIEF Readme
    Unofficial XKS User Guide
    User Agents
    Using XKS to Enable TAO
    UTT Config Readme
    VOIP in XKS
    VOIP Readme
    Web Forum Exploitation Using XKS
    Writing XKS Fingerprints
    XKS Application IDs
    XKS Application IDs Brief
    XKS as a SIGDEV Tool
    XKS, Cipher Detection, and You!
    XKS for Counter CNE
    XKS Intro
    XKS Logos Embedded in Docs
    XKS Search Forms
    XKS System Administration
    XKS Targets Visiting Specific Websites
    XKS Tech Extractor 2009
    XKS Tech Extractor 2010
    XKS Workflows 2009
    XKS Workflows 2011
    UN Secretary General XKS

    Morgan Marquis-Boire, Glenn Greenwald, Micah Lee
    July 1 2015, 4:49 p.m.
    Illustrations by Blue Delliquanti and David Axe for The Intercept

    Find this story at 1 July 2015

    copyright https://firstlook.org/theintercept/

    XKeyscore: A Dubious Deal with the NSA

    Van nieuwsblog.burojansen.nl

    Internal documents show that Germany’s domestic intelligence agency, the BfV, received the coveted software program XKeyscore from the NSA – and promised data from Germany in return.

    The agents from the Federal Office for the Protection of the Constitution (BfV), Germany’s domestic intelligence agency, were deeply impressed. They wanted to be able to do that too. On Oct. 6, 2011, employees of the US intelligence agency NSA were in the Bavarian town of Bad Aibling to demonstrate all that the spy software XKeyscore could do. To make the demonstration as vivid as possible, the Americans fed data into their program that the BfV had itself collected during a warranted eavesdropping operation. An internal memo shows how enthusiastic the German intelligence agents were: Analyzing data with the help of the software, the memo reads in awkward officialese, resulted in “a high recognition of applications used, Internet applications and protocols.” And in the data, XKeyscore was able to “recognize, for example, Hotmail, Yahoo or Facebook. It was also able to identify user names and passwords.” In other words, it was highly effective.

    It was far beyond the capabilities of the BfV’s own system. In response, then-BfV President Heinz Fromm made a formal request five months later to his American counterpart, NSA head Keith Alexander, for the software to be made available to the German intelligence agency. It would, he wrote, superbly complement the current capabilities for monitoring and analyzing Internet traffic.

    But fully a year and a half would pass before a test version of XKeyscore could begin operating at the BfV facility in the Treptow neighborhood of Berlin. It took that long for the two agencies to negotiate an agreement that regulated the transfer of the software in detail and which defined the rights and obligations of each side.

    The April 2013 document called “Terms of Reference,” which ZEIT ONLINE and DIE ZEIT has been able to review, is more than enlightening. It shows for the first time what Germany’s domestic intelligence agency promised their American counterparts in exchange for the use of the coveted software program. “The BfV will: To the maximum extent possible share all data relevant to NSA’s mission,” the paper reads. Such was the arrangement: data in exchange for software.

    It was a good deal for the BfV. Being given the software was a “proof of trust,” one BfV agent exulted. Another called XKeyscore a “cool system.” Politically and legally, however, the accord is extremely delicate. Nobody outside of the BfV oversees what data is sent to the NSA in accordance with the “Terms of Reference,” a situation that remains unchanged today. Neither Germany’s data protection commissioner nor the Parliamentary Control Panel, which is responsible for oversight of the BfV, has been fully informed about the deal. “Once again, I have to learn from the press of a new BfV-NSA contract and of the impermissible transfer of data to the US secret service,” complains the Green Party parliamentarian Hans-Christian Ströbele, who is a member of the Parliamentary Control Panel. The Federal Office for the Protection of the Constitution, for its part, insists that it has adhered strictly to the law.

    SOFTWARE GEGEN DATEN
    Interne Dokumente belegen, dass der Verfassungsschutz vom amerikanischen Geheimdienst NSA die begehrte Spionagesoftware XKeyscore bekam. Dafür versprachen die Verfassungsschützer, so viele Daten aus deutschen G-10-Überwachungsmaßnahmen an die NSA zu liefern, wie möglich.

    Lesen Sie dazu:

    Der Datendeal: Was Verfassungsschutz und NSA miteinander verabredeten – was Parlamentarier und Datenschützer dazu sagen

    Read the english version here: A Dubious Deal with the NSA

    Dokument: Die Übereinkunft zwischen Verfassungsschutz und NSA im Wortlaut

    Read the english version here: XKeyscore – the document

    Die Software: Der Datenknacker “Poseidon” findet jedes Passwort

    The data in question is regularly part of the approved surveillance measures carried out by the BfV. In contrast, for example, to the Bundesnachrichtendienst (BND), Germany’s foreign intelligence agency, the BfV does not use a dragnet to collect huge volumes of data from the Internet. Rather, it is only allowed to monitor individual suspects in Germany — and only after a special parliamentary commission has granted approval. Because such operations necessarily imply the curtailing of rights guaranteed by Article 10 of Germany’s constitution, they are often referred to as G-10 measures. Targeted surveillance measures are primarily intended to turn up the content of specific conversations, in the form of emails, telephone exchanges or faxes. But along the way, essentially as a side effect, the BfV also collects mass quantities of so-called metadata. Whether the collection of this data is consistent with the restrictions outlined in Germany’s surveillance laws is a question that divides legal experts. Well-respected constitutional lawyers are of the opinion that intelligence agencies are not allowed to analyze metadata as they see fit. The agencies themselves, naturally, have a different view.

    It is clear, after all, that metadata also enables interesting conclusions to be drawn about the behavior of those under surveillance and their contacts, just as, in the analog world, the sender and recipient written on an envelope can also be revealing, even if the letter inside isn’t read. Those who know such data can identify communication networks and establish movement and behavioral profiles of individuals. Prior to 2013, Germany’s domestic intelligence agency was only able to analyze metadata by hand — and it was rarely done as a result. But that changed once the agency received XKeyscore. The version of the software obtained by the BfV is unable to collect data on the Internet itself, but it is able to rapidly analyze the huge quantities of metadata that the agency has already automatically collected. That is why XKeyscore is beneficial to the BfV. And, thanks to the deal, that benefit is one that extends to the NSA.

    In practice, it assumedly works as follows: When an Islamist who is under surveillance by the BfV regularly receives calls from Afghanistan, for example, then the telephone number is likely exactly the kind of information that is forwarded on to the NSA. That alone is not necessarily cause for concern; after all, combatting terrorism is the goal of intelligence agency cooperation. But nobody outside of the BfV knows whose data, and how much of it, is being shared with the NSA. Nobody can control the practicalities of the data exchange. And it is completely unclear where political responsibility lies.

    In 2013 alone, the BfV began 58 new G-10 measures and continued 46 others from the previous year. Who was targeted? What information was passed on to the NSA? Was information pertaining to German citizens also shared? When confronted with such questions, the BfV merely responded: “The BfV is unable to publicly comment on the particulars of the cooperation or on the numbers of data collection operations.”

    How important XKeyscore has become for the BfV can also be seen elsewhere. Not long ago, the website Netzpolitik.org published classified budget plans for 2013 which included the information that the BfV intended to create 75 new positions for the “mass data analysis of Internet content.” Seventy-five new positions is a significant amount for any government agency. A new division called 3C was to uncover movement profiles and contact networks and to process raw data collected during G-10 operations. The name XKeyscore does not appear in the documents published by Netzpolitik.org. But it is reasonable to suspect that the new division was established to deploy the new surveillance software.

    Germany’s domestic intelligence agency is itself also aware of just how sensitive its deal with the Americans is. Back in July 2012, a BfV division warned that even the tests undertaken with XKeyscore could have “far-reaching legal implications.” To determine the extent of the software’s capabilities, the division warned, employees would have to be involved who didn’t have the appropriate security clearance to view the data used in the tests. The BfV has declined to make a statement on how, or whether, the problem was solved.

    Germany’s data protection commissioner was apparently not informed. “I knew nothing about such an exchange deal,” says Peter Schaar, who was data protection commissioner at the time. “I am also hearing for the first time about a test with real data.” He says he first learned that BfV was using XKeyscore after he asked of his own accord in 2013 — in the wake of revelations about the program from whistleblower Edward Snowden.

    Schaar is of the opinion that the agency was obliged to inform him. Because real data was used during the tests, Schaar says, it constituted data processing. The BfV, by contrast, is of the opinion that the use of XKeyscore has to be controlled solely by the G-10 commission. It is a question that has long been the source of contention. In testimony before the parliamentary investigative committee that is investigating NSA activities in Germany, Schaar has demanded that the G-10 law be more clearly formulated to remove the ambiguity.

    The fact that the BfV recognized the problems with its NSA cooperation can be seen elsewhere in the files as well. During the negotiations over the XKeyscore deal, the BfV noted: “Certain NSA requests … cannot be met insofar as German law prevents it.” But the Americans insisted that the software finally be “used productively.” The NSA wants “working results,” the German agents noted. There is, they wrote, apparently “high internal pressure” to receive information from the Germans.

    Ultimately, the BfV arrived at the conclusion that transferring information obtained with the help of XKeyscore to the NSA was consistent with German law. Insights gathered by way of G-10 operations were already being “regularly” shared with “foreign partner agencies.” That, at least, is what the BfV declared to the German Interior Ministry in January 2014. Furthermore, the agency declared, a special legal expert would approve each data transfer.

    That, it seems, was enough oversight from the perspective of the BfV. The agency apparently only partially informed its parliamentarian overseers about the deal. The Parliamentary Control Panel learned that the BfV had received XKeyscore software and had begun using it. But even this very general briefing was only made after the panel had explicitly asked following the Snowden revelations. The deal between the intelligence agencies, says the Green Party parliamentarian Ströbele, “is undoubtedly an ‘occurrence of particular import,’ about which, according to German law, the German government must provide sufficient information of its own accord.” He intends to bring the issue before the Parliamentary Control Panel. The NSA investigative committee in German parliament will surely take a closer look as well.

    Translated by Charles Hawley
    Von Kai Biermann und Yassin Musharbash
    26. August 2015, 18:11 Uhr

    Find this story at 26 August 2015

    copyright http://www.zeit.de/

    Wikileaks: ‘Massive’ NSA spying on top German officials

    Van nieuwsblog.burojansen.nl

    Wikileaks says its latest release of documents shows the wide reach of economic espionage conducted by the NSA in Germany. Documents released by the whistleblowers suggest an intense interest in the Greek debt crisis.

    A new batch of documents released by Wikileaks on Wednesday purports to show the extent to which the spying conducted by the US National Security Agency (NSA) on German officials was economic in nature , as opposed to being focused on security issues.
    As far back as the late 1990s, the phone numbers of officials in the German Ministry of Finance, including sometimes the ministers themselves, were targeted by NSA spies, according to a Wikileaks press release. The list of high priority targets for Germany are mostly telephone numbers within the finance ministry, some within the ministry of agriculture, a few within offices responsible for European policy, and advisors who assisted Merkel ahead of G7 and WTO meetings. One of the targets was within the European Central Bank itself.
    NSA interest in the course of Greek bailout
    Some of the espionage also dealt with the handling of the Greek debt crisis, particularly in “intercepted talk between Chancellor Merkel and her assistant, the Chancellor talks about her views on solutions to the Greek financial crisis and her disagreement with members of her own cabinet, such as Finance Minister Wolfgang Schäuble, on matters of policy.”
    The NSA was also interested in Merkel’s discussions of “the positions of French leaders, and of the heads of the key institutions of the Troika: European Commission President Jose Manuel Barroso, European Central Bank President Jean-Claude Trichet and IMF Director Christine Lagarde,” with regard to the Greece’s bailout issues.
    This intercept, which is dated to October 2011, is classified as highly sensitive, “two levels above top secret.” Despite this, it was still cleared for distribution among the “US-led ‘Five Eyes’ spying alliance of UK, Canada, Australia and New Zealand.”
    Wikileaks also says that the NSA was given a German intercept gathered by British Intelligence (GCHQ), which “details the German government’s position ahead of negotiations on a EU bailout plan for Greece.”
    “The report refers to an overview prepared by German Chancellery Director-General for EU Affairs Nikolaus Meyer-Landrut. Germany was, according to the intercept, opposed to giving a banking license to the European Financial Stability Facility (EFSF), however it would support a special IMF fund into which the BRICS nations would contribute to bolster European bailout activities.”
    Julian Assange, Wikileaks’ embattled editor-in-chief, made a statement on Wednesday’s release, saying that it “further demonstrates that the United States’ economic espionage campaign extends to Germany and to key European institutions and issues such as the European Central Bank and the crisis in Greece.”
    “Would France and Germany have proceeded with the BRICS bailout plan for Greece if this intelligence was not collected and passed to the United States – who must have been horrified at the geopolitical implications?” he asked.
    The “Süddeutsche Zeitung” daily was given access to the leaked documents. It reports that a spokesman for the German government said Berlin is not familiar enough with the information published by Wikileaks to offer an analysis or response.
    es/gsw

    01.07.2015

    Find this story at 1 July 2015
    © 2015 Deutsche Welle

    Selektorenliste der NSA Welche Nummern der Kanzlerin die NSA abhörte

    Van nieuwsblog.burojansen.nl

    Anhand der Telefonnummern in dieser Selektorenliste wird deutlich, dass die Ausspähung durch die NSA beispielsweise auch die Telefone von Ronald Pofalla, Peter Altmaier und Volker Kauder umfasste.

    Der amerikanische Nachrichtendienst hat die deutsche Politik weitaus systematischer ausgespäht als bisher bekannt – und das seit Jahrzehnten.

    Neue Dokumente der Enthüllungsplattform Wikileaks belegen, dass auch die Regierungen der Kanzler Helmut Kohl und Gerhard Schröder von der NSA belauscht wurden.

    Bund und Berlin ziehen Bilanz zu HauptstadtbautenBild vergrößern
    Das Kanzleramt in Berlin steht im Mittelpunkt der neuen Wikileaks-Enthüllungen. (Foto: dpa)
    Diese Erkenntnisse können aus den neuen Enthüllungen gewonnen werden:

    Die neuen Wikileaks-Enthüllungen katapultieren die Diskussion in eine neue Höhe. Es geht darin um das Kanzleramt – es wurde über Jahrzehnte von der NSA ausgespäht, in Bonn und in Berlin. Die Liste umfasst 56 Anschlüsse und wurde von Wikileaks am Mittwochabend ins Netz gestellt. SZ, NDR und WDR konnten sie vorab prüfen.
    Die Regierungen von Helmut Kohl, Gerhard Schröder und Angela Merkel waren alle im Visier des amerikanischen Nachrichtendienstes. Die halbe Mannschaft von Ex-Kanzler Schröder steht auf der Liste. Bodo Hombach, der für eine kurze Zeit Kanzleramtsminister war und schwierige Operationen in Nahost auszuführen hatte, ist ebenso aufgeführt wie der sicherheitspolitische Berater Michael Steiner und Schröders Mann für die Weltwirtschaftsgipfel, Klaus Gretschmann.
    Etwa zwei Dutzend Nummern der Bundeskanzlerin stehen auf der Liste. Darunter ihre Handynummer, die mindestens bis Ende 2013 gültig war; ihre Büronummer; eine ihr zugeschriebene Nummer in der CDU-Bundesgeschäftsstelle und ihre Faxnummern; auch ihr enger Vertrauter Volker Kauder, Vorsitzender der CDU/CSU-Bundestagsfraktion, war Ziel der NSA.
    Auch Merkels ehemaliger Kanzleramtsminister Ronald Pofalla steht auf der Liste. Es findet sich darauf seine bis heute aktive Handynummer.
    Auffällig ist, dass die Abteilung 2 des Kanzleramts, die für Außen- und Sicherheitspolitik zuständig ist, oft vorkommt. Auch der Bereich Wirtschaftspolitik ist stark vertreten, ebenso Abteilung 6 – sie ist für den Bundesnachrichtendienst zuständig.
    Vorige Woche hatte Wikileaks erste Unterlagen der NSA veröffentlicht, die Deutschland betreffen. Drei Bundesministerien – das Wirtschafts-, das Landwirtschafts- und das Finanzministerium – standen dabei im Mittelpunkt.
    Lesen Sie mehr zu den neuen Wikileaks-Enthüllungen in der digitalen Ausgabe der Süddeutschen Zeitung.
    IhreSZ Flexi-Modul Header
    Ihr Forum
    Wie sollte sich Merkel angesichts der jüngsten Wikileaks-Enthüllungen verhalten?
    Die NSA hat Wikileaks-Dokumenten zufolge über Jahrzehnte das Bundeskanzleramt abgehört. Betroffen von den Spähangriffen waren die Regierungen von Bundeskanzlerin Merkel sowie die ihrer Vorgänger Schröder und Kohl. Das Ausmaß des Lauschangriffs ist damit deutlich größer als bislang angenommen. Ihr Forum

    Helmut Kohl mit Gerhard Schröder im Bundestag, 1999
    Tatort Kanzleramt
    Kurzer Draht zur Macht
    Die NSA hat die deutsche Politik weitaus systematischer ausgespäht als bisher bekannt – und das seit Jahrzehnten. Neue Dokumente von Wikileaks belegen, dass auch die Kanzler Helmut Kohl und Gerhard Schröder belauscht wurden.

    Kohl NSA
    Wikileaks-Dokumente
    Von Kohl bis Merkel – die NSA hörte mit
    Wikileaks-Dokumente belegen: Jahrzehntelang hat der US-Geheimdienst das Kanzleramt ausgeforscht. Auch die Telefone von Ronald Pofalla, Peter Altmaier und Volker Kauder wurden angezapft.

    9. Juli 2015, 06:11 Uhr

    Find this story at 9 July 2015

    Copyright www.sueddeutsche.de

    Neue Dokumente von WikiLeaks Kanzleramt schon seit Kohl-Ära im NSA-Visier

    Van nieuwsblog.burojansen.nl

    Die NSA hat nach Informationen von WikiLeaks schon seit Jahrzehnten das Bundeskanzleramt abgehört. Das zeigen neue Dokumente, die NDR, WDR und SZ vor Veröffentlichung einsehen konnten. Betroffen waren demnach neben Kanzlerin Merkel auch ihre Vorgänger Schröder und Kohl.

    Noch in der vergangenen Woche hatten der Geheimdienstkoordinator im Kanzleramt, Günter Heiß, und der ehemalige Kanzleramtschef Ronald Pofalla (CDU) bei einer Befragung im NSA-Untersuchungsausschuss abgewiegelt. Auf die Frage, ob Merkels Handy abgehört worden sei, sagte Heiß, es gebe Indizien dafür. Es könne aber auch sein, dass ein Gespräch “zufällig” abgehört worden sei, als ein “Beifang” etwa bei einem Telefonat mit dem russischen Präsidenten Putin. Pofalla sagte, er halte es bis heute für nicht bewiesen, dass das Handy der Kanzlerin abgehört worden sei. Der “Spiegel” hatte 2013 erstmals über diesen Verdacht berichtet.

    Nun liegen die neuen WikiLeaks-Dokumente vor – eine Liste mit 56 Telefonnummern, darunter Merkels Handy-Nummer, die sie bis mindestens Ende 2013 genutzt hat. Die Nummern stammen offenbar aus einer Datenbank der NSA, in der Abhörziele erfasst sind. Und in dieser Liste findet sich nicht nur Merkels alte Mobilnummer, sondern auch mehr als ein Dutzend weiterer Festnetz-, Handy- und Faxanschlüsse aus ihrem direkten Umfeld – darunter die Durchwahl ihrer Büroleiterin im Kanzleramt, Beate Baumann, ihres Stellvertreters sowie weitere Nummern aus dem Kanzlerbüro.

    Eine Liste mit Telefonnummern von Wikileaks galerieWikiLeaks hat eine Liste mit Telefonnummern und Namen aus dem Bundeskanzleramt veröffentlicht, die offenbar aus einer Datenbank mit Abhörzielen der NSA stammen [die letzten Ziffern wurden von der Redaktion unkenntlich gemacht].
    Außerdem steht der Name des Unions-Fraktionschefs Volker Kauder, einem engen Vertrauten von Merkel, samt einer Nummer im Bundestag auf der Liste und eine Merkel zugeordnete Nummer in der CDU-Bundesgeschäftsstelle. Auch die aktuelle Handy-Nummer von Ronald Pofalla ist in der NSA-Datenbank erfasst. Er hatte es anscheinend schon geahnt. In der Sitzung des NSA-Untersuchungsausschusses wies ihn jemand darauf hin, dass seine Nummer bislang nicht aufgetaucht sei. Pofallas Antwort: “Kommt noch.”

    Gezieltes Vorgehen der NSA

    Die Liste zeigt, dass die NSA offenbar sehr gezielt vorgegangen ist. Außer der Kanzlerin und ihrem Büro umfasst sie vor allem Nummern und Namen von der Leitung des Bundeskanzleramts sowie von den Abteilungen 2, 4 und 6 – zuständig für Außen- und Sicherheitspolitik, Wirtschaftspolitik und die Nachrichtendienste. Selbst die Telefonzentrale des Kanzleramts inklusive der Faxnummer wurde offenbar ausspioniert. Von wann die Liste stammt, ist nicht bekannt. Viele der aufgeführten Nummern sind bis heute aktuell, andere – teils noch aus Bonner Zeiten – sind anscheinend veraltet.

    Mitarbeiter von Kohl und Schröder im Visier

    Wann der US-Geheimdienst den Lauschangriff auf das Zentrum der deutschen Regierung gestartet hat, ist nicht klar. Aber einiges deutet daraufhin, dass auch Mitarbeiter von Merkels Vorgängern abgehört wurden. Die ersten Ziele hat die NSA offenbar bereits vor mehr als 20 Jahren in die Datenbank aufgenommen und in den folgenden Jahren stetig erweitert. Unter anderem findet sich eine alte Bonner Nummer mit dem Eintrag “DR LUDEWIG CHIEF OF DIV 4” in der Liste. Dr. Johannes Ludewig leitete von 1991 bis 1994 die Wirtschaftsabteilung des Kanzleramts, die Abteilung 4. Danach wechselte er ins Wirtschaftsministerium. Ausgespäht wurde offenbar auch ein persönlicher Referent des damaligen CDU-Staatsministers Anton Pfeiffer, ein enger Vertrauter von Helmut Kohl.

    Außerdem stehen unter anderem auf der Liste: Bodo Hombach, der 1998/99 einige Monate lang das Kanzleramt geleitet hat; Schröders sicherheitspolitischer Berater Michael Steiner; Klaus Gretschmann, ehemaliger Leiter der Abteilung für Wirtschaftspolitik, der unter anderem die Weltwirtschaftsgipfel für den Kanzler vorbereitet hat; Ernst Uhrlau, von 1998 bis 2005 im Kanzleramt für die Aufsicht über die Nachrichtendienste zuständig.

    NSA hörte Kanzleramt offenbar jahrzehntelang ab
    tagesthemen 22:15 Uhr, 08.07.2015, S. Buchen/J. Goetz/C. Deker, NDR
    Icon facebook Icon Twitter Icon Google+ Icon Briefumschlag
    Download der Videodatei
    Weitere “streng geheime” Abhörprotokolle veröffentlicht

    WikiLeaks hat außer der Telefonliste erneut einige als “streng geheim” eingestufte Abhörprotokolle der NSA veröffentlicht, darunter abgefangene Gespräche von Kanzlerin Merkel unter anderem mit Scheich Muhammad bin Zayid Al Nahyan aus den Vereinigten Arabischen Emiraten aus dem Jahr 2009 über die Situation im Iran. Laut einem weiteren Protokoll – ebenfalls von 2009 – hat sie intern kurz vor dem damals geplanten G20-Gipfel in London Vorschläge der US-Notenbank zur Lösung der Finanzkrise kritisiert. Es ging um “toxische Anlagen”, die in “bad banks” ausgelagert werden sollten. Merkel habe sich skeptisch dazu geäußert, dass Banken sich komplett ihrer Verantwortung entziehen.

    Mitte Juni hat Generalbundesanwalt Harald Range ein Ermittlungsverfahren wegen des mutmaßlichen Ausspähens von Merkels Handy eingestellt. Die Vorwürfe seien nicht gerichtsfest nachzuweisen. Beweisdokumente habe die Behörde nicht beschaffen können. Kurz darauf – Anfang Juli – hat Wikileaks erste Abhörprotokolle und eine Liste mit Abhörzielen veröffentlicht, die auf einen umfassenden Lauschangriff der NSA auf die deutsche Regierung hindeuteten.

    Bundesregierung prüft Veröffentlichungen

    Als Reaktion auf die erste Enthüllung bat die Bundesregierung den US-Botschafter in Deutschland, John B. Emerson, zu einem Gespräch ins Kanzleramt. Die Bundesanwaltschaft prüft nun mögliche neue Ermittlungen wegen der NSA-Aktivitäten. Und in Regierungskreisen hieß es, man wundere sich in dieser Sache über gar nichts mehr. Beschwerden in Washington seien aber offenbar sinnlos. Die Bundesregierung erklärte nun auf Anfrage von NDR, WDR und SZ, die Veröffentlichung aus der vergangenen Woche werde von den zuständigen Stellen geprüft und bewertet, dies dauere an. “Insbesondere da ein Nachweis der Authentizität der veröffentlichten Dokumente fehlt, ist eine abschließende Bewertung derzeit nicht möglich.”

    Zu den in den aktuellen Dokumenten aufgeführten Mobilfunknummern will die Bundesregierung nicht öffentlich Stellung nehmen. Eine Sprecher betonte jedoch, dass weiterhin gelte, was der Chef des Bundeskanzleramts, Peter Altmaier, in der vergangenen Woche gegenüber dem US-Botschaft deutlich gemacht habe: “Die Einhaltung deutschen Rechts ist unabdingbar und festgestellte Verstöße werden mit allen Mitteln des Rechtsstaats verfolgt werden. Darüber hinaus wird die für die Sicherheit unserer Bürger unverzichtbare Zusammenarbeit der deutschen und amerikanischen Nachrichtendienste durch derartige wiederholte Vorgänge belastet. Bereits seit dem vergangenen Jahr hat die Bundesregierung ihre Spionageabwehr verstärkt und fühlt sich darin durch die neuesten Veröffentlichungen bestätigt.”

    Die US-Regierung hat sich bislang weder offiziell noch inoffiziell zur aktuellen Abhörpraxis in Deutschland geäußert. Nur Kanzlerin Merkel hat nach den ersten Berichten über das Abhören ihres Handys eine Art No-Spy-Garantie von US-Präsident Obama bekommen. Dabei ging es allerdings tatsächlich nur um sie persönlich, stellte der frühere NSA- und CIA-Direktor Michael Hayden in einem “Spiegel”-Interview klar. “Das war kein Versprechen, das für irgendjemand anderes an der Spitze der Bundesregierung gilt.”

    Rechercheverbund
    Die investigativen Ressorts von NDR, WDR und “Süddeutscher Zeitung” kooperieren unter Leitung von Georg Mascolo themen- und projektbezogen. Die Rechercheergebnisse, auch zu komplexen internationalen Themen, werden für Fernsehen, Hörfunk, Online und Print aufbereitet.

    Stand: 09.07.2015 09:40 Uhr
    Von John Goetz, Janina Findeisen und Christian Baars (NDR)

    Find this story at 9 July 2015

    © ARD-aktuell / tagesschau.de

    WikiLeaks: Steinmeier target of systematic NSA spying

    Van nieuwsblog.burojansen.nl

    WikiLeaks has published evidence that the NSA systematically spied on German Foreign Minister Frank-Walter Steinmeier, as well as other officials. The alleged spying reportedly predates the September 11, 2001 attacks.

    German Foreign Minister Frank-Walter Steinmeier was reportedly the target of systematic spying by the US National Security Agency (NSA), according to information released Monday by transparency organization WikiLeaks.
    WikiLeaks documented an intercepted conversation or phone call held by Steinmeier on November 29, 2005 shortly after he had completed his first official visit to the United States as foreign minister.
    It is unclear with whom Steinmeier was speaking at the time, but the subject of the call was the US Central Intelligence Agency’s (CIA) controversial renditions program. It was alleged that the US had used the airspace and airport facilities of cooperating European countries to illegally abduct European citizens and residents in order to interrogate them at secret “black site” prisons.
    Steinmeier denied knowledge of the alleged rendition flights in 2005 and according to the intercept, “seemed relieved that he had not received any definitive response from the US secretary of state regarding press reports of CIA flights through Germany to secret prisons in Eastern Europe allegedly used for interrogating terrorism subjects.”
    Human rights groups have accused the United States of having used the so-called “extraordinary renditions” in order to interrogate suspected terrorists using methods not allowed in the US itself, including torture.
    NSA Symbolbild
    WikiLeaks has revealed what appears to be a years-long effort to spy on the German Foreign Ministry
    ‘Tacit complicity of European governments’
    The US has acknowledged that the CIA operated a secret detention program outside its borders, but denied the use of torture. In 2008, Steinmeier again denied Germany had in any way supported the rendition flights at a parliamentary hearing, calling such accusations “utter nonsense.”
    “Today’s publication indicates that the NSA has been used to help the CIA kidnap and torture with impunity. For years the CIA was systematically abducting and torturing people, with the tacit complicity of European governments,” WikiLeaks founder Julian Assange said in a statement.
    The new documents paint a picture of an apparent years-long NSA effort to spy on the German Foreign Ministry, dating back to before the September 11, 2001 terrorist attacks. The documents reveal a list of 20 phone numbers the NSA targeted for monitoring, two of which were assigned to Steinmeier as well one number potentially assigned to Joschka Fischer, Germany’s vice chancellor and foreign minister from 1998 to 2005.
    The German Foreign Ministry has not commented on the latest revelations, which come shortly after WikiLeaks revealed the NSA had allegedly spied on top German politicians for decades .
    German Green Party parliamentarian Hans-Christian Ströbele demanded an explanation from the government and secret service in light of the latest revelations.
    “They must say what they will do now to resolve the spying and avert damage,” Ströbele said after Monday’s revelations. He also questioned whether Steinmeier in 2006 “actually failed to answer questions regarding US rendition flights over Germany.”
    bw/cmk (AFP, dpa)

    20.07.2015

    Find this story at 20 July 2015

    © 2015 Deutsche Welle

    An Attack on Press Freedom SPIEGEL Targeted by US Intelligence

    Van nieuwsblog.burojansen.nl

    Revelations from WikiLeaks published this week show how boundlessly and comprehensively American intelligence services spied on the German government. It has now emerged that the US also conducted surveillance against SPIEGEL.

    Walks during working hours aren’t the kind of pastime one would normally expect from a leading official in the German Chancellery. Especially not from the head of Department Six, the official inside Angela Merkel’s office responsible for coordinating Germany’s intelligence services.

    But in the summer of 2011, Günter Heiss found himself stretching his legs for professional reasons. The CIA’s station chief in Berlin had requested a private conversation with Heiss. And he didn’t want to meet in an office or follow standard protocol. Instead, he opted for the kind of clandestine meeting you might see in a spy film.

    Officially, the CIA man was accredited as a counsellor with the US Embassy, located next to Berlin’s historic Brandenburg Gate. Married to a European, he had already been stationed in Germany once before and knew how to communicate with German officials. At times he could be demanding and overbearing, but he could also be polite and courteous. During this summer walk he also had something tangible to offer Heiss.

    The CIA staffer revealed that a high-ranking Chancellery official allegedly maintained close contacts with the media and was sharing official information with reporters with SPIEGEL.

    The American provided the name of the staffer: Hans Josef Vorbeck, Heiss’ deputy in Department Six. The information must have made it clear to Heiss that the US was spying on the German government as well as the press that reports on it.

    The central Berlin stroll remained a secret for almost four years. The Chancellery quietly transferred Vorbeck, who had until then been responsible for counterterrorism, to another, less important department responsible dealing with the history of the BND federal intelligence agency. Other than that, though, it did nothing.

    Making a Farce of Rule of Law

    Officials in the Chancellery weren’t interested in how the CIA had obtained its alleged information. They didn’t care to find out how, and to which degree, they were being spied on by the United States. Nor were they interested in learning about the degree to which SPIEGEL was being snooped on by the Americans. Chancellery officials didn’t contact any of the people in question. They didn’t contact members of the Bundestag federal parliament sitting on the Parliamentary Control Panel, the group responsible for oversight of the intelligence services. They didn’t inform members of the Office for the Protection of the Constitution, the agency responsible for counterintelligence in Germany, either. And they didn’t contact a single public prosecutor. Angela Merkel’s office, it turns out, simply made a farce of the rule of law.

    As a target of the surveillance, SPIEGEL has requested more information from the Chancellery. At the same time, the magazine filed a complaint on Friday with the Federal Public Prosecutor due to suspicion of intelligence agency activity.

    Because now, in the course of the proceedings of the parliamentary investigative committee probing the NSA’s activities in Germany in the wake of revelations leaked by whistleblower Edward Snowden, details about the event that took place in the summer of 2011 are gradually leaking to the public. At the beginning of May, the mass-circulation tabloid Bild am Sonntag reported on a Chancellery official who had been sidelined “in the wake of evidence of alleged betrayal of secrets through US secret services.”

    Research conducted by SPIEGEL has determined the existence of CIA and NSA files filled with a large number of memos pertaining to the work of the German newsmagazine. And three different government sources in Berlin and Washington have independently confirmed that the CIA station chief in Berlin was referring specifically to Vorbeck’s contacts with SPIEGEL.

    An Operation Justified by Security Interests?

    Obama administration sources with knowledge of the operation said that it was justified by American security interests. The sources said US intelligence services had determined the existence of intensive contacts between SPIEGEL reporters and the German government and decided to intervene because those communications were viewed as damaging to the United States’ interests. The fact that the CIA and NSA were prepared to reveal an ongoing surveillance operation to the Chancellery underlines the importance they attached to the leaks, say sources in Washington. The NSA, the sources say, were aware that the German government would know from then on that the US was spying in Berlin.

    As more details emerge, it is becoming increasingly clear that representatives of the German government at best looked away as the Americans violated the law, and at worst supported them.

    Just last Thursday, Günter Heiss and his former supervisor, Merkel’s former Chief of Staff Ronald Pofalla, were questioned by the parliamentary investigative committee and attempted to explain the egregious activity. Heiss confirmed that tips had been given, but claimed they hadn’t been “concrete enough” for measures to be taken. When asked if he had been familiar with the issue, Pofalla answered, “Of course.” He said that anything else he provided had to be “in context,” at which point a representative of the Chancellery chimed in and pointed out that could only take place in a meeting behind closed doors.

    In that sense, the meeting of the investigative committee once again shed light on the extent to which the balance of power has shifted between the government and the Fourth Estate. Journalists, who scrutinize and criticize those who govern, are an elementary part of the “checks and balances” — an American invention — aimed at ensuring both transparency and accountability. When it comes to intelligence issues, however, it appears this system has been out of balance for some time.

    Government Lies

    When SPIEGEL first reported in Summer 2013 about the extent of NSA’s spying on Germany, German politicians first expressed shock and then a certain amount of indignation before quickly sliding back into their persona as a loyal ally. After only a short time and a complete lack of willingness on the part of the Americans to explain their actions, Pofalla declared that the “allegations are off the table.”

    But a number of reports published in recent months prove that, whether out of fear, outrage or an alleged lack of knowledge, it was all untrue. Everything the government said was a lie. As far back as 2013, the German government was in a position to suspect, if not to know outright, the obscene extent to which the United States was spying on an ally. If there hadn’t already been sufficient evidence of the depth of the Americans’ interest in what was happening in Berlin, Wednesday’s revelations by WikiLeaks, in cooperation with Süddeutsche Zeitung, filled in the gaps.

    SPIEGEL’s reporting has long been a thorn in the side of the US administration. In addition to its reporting on a number of other scandals, the magazine exposed the kidnapping of Murat Kurnaz, a man of Turkish origin raised in Bremen, Germany, and his rendition to Guantanamo. It exposed the story of Mohammed Haydar Zammar, who was taken to Syria, where he was tortured. The reports triggered the launch of a parliamentary investigative committee in Berlin to look also into the CIA’s practices.

    When SPIEGEL reported extensively on the events surrounding the arrest of three Islamist terrorists in the so-called “Sauerland cell” in Germany, as well as the roles played by the CIA and the NSA in foiling the group, the US government complained several times about the magazine. In December 2007, US intelligence coordinator Mike McConnell personally raised the issue during a visit to Berlin. And when SPIEGEL reported during the summer of 2009, under the headline “Codename Domino,” that a group of al-Qaida supporters was believed to be heading for Europe, officials at the CIA seethed. The sourcing included a number of security agencies and even a piece of information supplied by the Americans. At the time, the station chief for Germany’s BND intelligence service stationed in Washington was summoned to CIA headquarters in Langley, Virginia.

    The situation escalated in August 2010 after SPIEGEL, together with WikiLeaks, the Guardian and the New York Times, began exposing classified US Army reports from Afghanistan. That was followed three months later with the publication of the Iraq war logs based on US Army reports. And in November of that year, WikiLeaks, SPIEGEL and several international media reported how the US government thinks internally about the rest of the world on the basis of classified State Department cables. Pentagon officials at the time declared that WikiLeaks had “blood on its hands.” The Justice Department opened an investigation and seized data from Twitter accounts, e-mail exchanges and personal data from activists connected with the whistleblowing platform. The government then set up a Task Force with the involvement of the CIA and NSA.

    Not even six months later, the CIA station chief requested to go on the walk in which he informed the intelligence coordinator about Vorbeck and harshly criticized SPIEGEL.

    Digital Snooping

    Not long later, a small circle inside the Chancellery began discussing how the CIA may have got ahold of the information. Essentially, two possibilities were conceivable: either through an informant or through surveillance of communications. But how likely is it that the CIA had managed to recruit a source in the Chancellery or on the editorial staff of SPIEGEL?

    The more likely answer, members of the circle concluded, was that the information must have been the product of “SigInt,” signals intelligence — in other words, wiretapped communications. It seems fitting that during the summer of 2013, just prior to the scandal surrounding Edward Snowden and the documents he exposed pertaining to NSA spying, German government employees warned several SPIEGEL journalists that the Americans were eavesdropping on them.

    At the end of June 2011, Heiss then flew to Washington. During a visit to CIA headquarters in Langley, the issue of the alleged contact with SPIEGEL was raised again. Chancellery staff noted the suspicion in a classified internal memo that explicitly names SPIEGEL.

    One of the great ironies of the story is that contact with the media was one of Vorbeck’s job responsibilities. He often took part in background discussions with journalists and even represented the Chancellery at public events. “I had contact with journalists and made no secret about it,” Vorbeck told SPIEGEL. “I even received them in my office in the Chancellery. That was a known fact.” He has since hired a lawyer.

    It remains unclear just who US intelligence originally had in its scopes. The question is also unlikely to be answered by the parliamentary investigative committee, because the US appears to have withheld this information from the Chancellery. Theoretically, at least, there are three possibilities: The Chancellery — at least in the person of Hans Josef Vorbeck. SPIEGEL journalists. Or blanket surveillance of Berlin’s entire government quarter. The NSA is capable of any of the three options. And it is important to note that each of these acts would represent a violation of German law.

    Weak Arguments

    So far, the Chancellery has barricaded itself behind the argument that the origin of the information had been too vague and abstract to act on. In addition, the tip had been given in confidentiality, meaning that neither Vorbeck nor SPIEGEL could be informed. But both are weak arguments, given that the CIA station chief’s allegations were directed precisely at SPIEGEL and Vorbeck and that the intelligence coordinator’s deputy would ultimately be sidelined as a result.

    And even if you follow the logic that the tip wasn’t concrete enough, there is still one committee to whom the case should have been presented under German law: the Bundestag’s Parliamentary Control Panel, whose proceedings are classified and which is responsible for oversight of Germany’s intelligence services. The nine members of parliament on the panel are required to be informed about all intelligence events of “considerable importance.”

    Members of parliament on the panel did indeed express considerable interest in the Vorbeck case. They learned in fall 2011 of his transfer, and wanted to know why “a reliable coordinator in the fight against terrorism would be shifted to a post like that, one who had delivered excellent work on the issue,” as then chairman of the panel, Social Demoratic Party politician Thomas Oppermann, criticized at the time.

    But no word was mentioned about the reasons behind the transfer during a Nov. 9, 2011 meeting of the panel. Not a single word about the walk taken by the CIA chief of station. Not a word about the business trip to Washington taken by Günter Heiss afterward. And not a word about Vorbeck’s alleged contacts with SPIEGEL. Instead, the parliamentarians were told a myth — that the move had been made necessary by cutbacks. And also because he was needed to work on an historical appraisal of Germany’s foreign intelligence agency, the BND.

    Deceiving Parliament

    Officials in the Chancellery had decided to deceive parliament about the issue. And for a long time, it looked as though they would get away with it.

    The appropriate way of dealing with the CIA’s incrimination would have been to transfer the case to the justice system. Public prosecutors would have been forced to follow up with two investigations: One to find out whether the CIA’s allegations against Vorbeck had been true — both to determine whether government secrets had been breached and out of the obligation to assist a longtime civil servant. It also would have had to probe suspicions that a foreign intelligence agency conducted espionage in the heart of the German capital.

    That could, and should, have been the case. Instead, the Chancellery decided to go down the path of deception, scheming with an ally, all the while interpreting words like friendship and partnership in a highly arbitrary and scrupulous way.

    Günter Heiss, who received the tip from the CIA station chief, is an experienced civil servant. In his earlier years, Heiss studied music. He would go on as a music instructor to teach a young Ursula von der Leyen (who is Germany’s defense minister today) how to play the piano. But then Heiss, a tall, slightly lanky man, switched professions and instead pursued a career in intelligence that would lead him to the top post in the Lower Saxony state branch of the Office for the Protection of the Constitution. Even back then, the Christian Democrat was already covering up the camera on his laptop screen with tape. At the very least “they” shouldn’t be able to see him, he said at the time, elaborating that the “they” he was referring to should not be interpreted as being the US intelligence services, but rather the other spies – “the Chinese” and, “in any case, the Russians.” For conservatives like Heiss, America, after all, is friendly territory.

    ‘Spying Among Friends Not Acceptable’

    If there was suspicion in the summer of 2011 that the NSA was spying on a staff member at the Chancellery, it should have set off alarm bells within the German security apparatus. Both the Office for the Protection of the Constitution, which is responsible for counter-intelligence, and the Federal Office for Information Security should have been informed so that they could intervene. There also should have been discussions between the government ministers and the chancellor in order to raise government awareness about the issue. And, going by the maxim the chancellor would formulate two years later, Merkel should have had a word with the Americans along the lines of “Spying among friends is not acceptable.”

    And against the media.

    If it is true that a foreign intelligence agency spied on journalists as they conducted their reporting in Germany and then informed the Chancellery about it, then these actions would place a huge question mark over the notion of a free press in this country. Germany’s highest court ruled in 2007 that press freedom is a “constituent part of a free and democratic order.” The court held that reporting can no longer be considered free if it entails a risk that journalists will be spied on during their reporting and that the federal government will be informed of the people they speak to.

    “Freedom of the press also offers protection from the intrusion of the state in the confidentiality of the editorial process as well as the relationship of confidentiality between the media and its informants,” the court wrote in its ruling. Freedom of the press also provides special protection to the “the secrecy of sources of information and the relationship of confidentiality between the press, including broadcasters, and the source.”

    Criminalizing Journalism

    But Karlsruhe isn’t Washington. And freedom of the press is not a value that gives American intelligence agencies pause. On the contrary, the Obama administration has gained a reputation for adamantly pursuing uncomfortable journalistic sources. It hasn’t even shied away from targeting American media giants.

    In spring 2013, it became known that the US Department of Justice mandated the monitoring of 100 telephone numbers belonging to the news agency Associated Press. Based on the connections that had been tapped, AP was able to determine that the government likely was interested in determining the identity of an important informant. The source had revealed to AP reporters details of a CIA operation pertaining to an alleged plot to blow up a commercial jet.

    The head of AP wasn’t the only one who found the mass surveillance of his employees to be an “unconstitutional act.” Even Republican Senators like John Boehner sharply criticized the government, pointing to press freedoms guaranteed by the Bill of Rights. “The First Amendment is first for a reason,” he said.

    But the Justice Department is unimpressed by such formulations. New York Times reporter James Risen, a two-time Pulitzer Prize winner, was threatened with imprisonment for contempt of court in an effort to get him to turn over his sources — which he categorically refused to do for seven years. Ultimately, public pressure became too intense, leading Obama’s long-time Attorney General Eric Holder to announce last October that Risen would not be forced to testify.

    The Justice Department was even more aggressive in its pursuit of James Rosen, the Washington bureau chief for TV broadcaster Fox. In May 2013, it was revealed that his telephone was bugged, his emails were read and his visits to the State Department were monitored. To obtain the necessary warrants, the Justice Department had labeled Rosen a “criminal co-conspirator.”

    The strategy of criminalizing journalism has become something of a bad habit under Obama’s leadership, with his government pursuing non-traditional media, such as the whistleblower platform WikiLeaks, with particular aggression.

    Bradley Manning, who supplied WikiLeaks with perhaps its most important data dump, was placed in solitary confinement and tormented with torture-like methods, as the United Nations noted critically. Manning is currently undergoing a gender transition and now calls herself Chelsea. In 2013, a military court sentenced Manning, who, among other things, publicized war crimes committed by the US in Iraq, to 35 years in prison.

    In addition, a criminal investigation has been underway for at least the last five years into the platform’s operators, first and foremost its founder Julian Assange. For the past several years, a grand jury in Alexandria, Virginia has been working to determine if charges should be brought against the organization.

    Clandestine Proceedings

    The proceedings are hidden from the public, but the grand jury’s existence became apparent once it began to subpoena witnesses with connections to WikiLeaks and when the Justice Department sought to confiscate data belonging to people who worked with Assange. The US government, for example, demanded that Twitter hand over data pertaining to several people, including the Icelandic parliamentarian Brigitta Jonsdottir, who had worked with WikiLeaks on the production of a video. The short documentary is an exemplary piece of investigative journalism, showing how a group of civilians, including employees of the news agency Reuters, were shot and killed in Baghdad by an American Apache helicopter.

    Computer security expert Jacob Appelbaum, who occasionally freelances for SPIEGEL, was also affected at the time. Furthermore, just last week he received material from Google showing that the company too had been forced by the US government to hand over information about him – for the time period from November 2009 until today. The order would seem to indicate that investigators were particularly interested in Appelbaum’s role in the publication of diplomatic dispatches by WikiLeaks.

    Director of National Intelligence James Clapper has referred to journalists who worked with material provided by Edward Snowden has his “accomplices.” In the US, there are efforts underway to pass a law pertaining to so-called “media leaks.” Australia already passed one last year. Pursuant to the law, anyone who reveals details about secret service operations may be punished, including journalists.

    Worries over ‘Grave Loss of Trust’

    The German government isn’t too far from such positions either. That has become clear with its handling of the strictly classified list of “selectors,” which is held in the Chancellery. The list includes search terms that Germany’s foreign intelligence agency, the BND, used when monitoring telecommunications data on behalf of the NSA. The parliamentary investigative committee looking into NSA activity in Germany has thus far been denied access to the list. The Chancellery is concerned that allowing the committee to review the list could result in uncomfortable information making its way into the public.

    That’s something Berlin would like to prevent. Despite an unending series of indignities visited upon Germany by US intelligence agencies, the German government continues to believe that it has a “special” relationship with its partners in America — and is apparently afraid of nothing so much as losing this partnership.

    That, at least, seems to be the message of a five-page secret letter sent by Chancellery Chief of Staff Peter Altmaier, of Merkel’s Christian Democrats, to various parliamentary bodies charged with oversight. In the June 17 missive, Altmaier warns of a “grave loss of trust” should German lawmakers be given access to the list of NSA spying targets. Opposition parliamentarians have interpreted the letter as a “declaration of servility” to the US.

    Altmaier refers in the letter to a declaration issued by the BND on April 30. It notes that the spying targets passed on by the NSA since 2005 include “European political personalities, agencies in EU member states, especially ministries and EU institutions, and representations of certain companies.” On the basis of this declaration, Altmaier writes, “the investigative committee can undertake its own analysis, even without knowing the individual selectors.”

    Committee members have their doubts. They suspect that the BND already knew at the end of April what WikiLeaks has now released — with its revelations that the German Economics Ministry, Finance Ministry and Agriculture Ministry were all under the gaze of the NSA, among other targets. That would mean that the formulation in the BND declaration of April 30 was intentionally misleading. The Left Party and the Greens now intend to gain direct access to the selector list by way of a complaint to Germany’s Constitutional Court.

    The government in Berlin would like to prevent exactly that. The fact that the US and German intelligence agencies shared selectors is “not a matter of course. Rather, it is a procedure that requires, and indicates, a special degree of trust,” Almaier writes. Should the government simply hand over the lists, Washington would see that as a “profound violation of confidentiality requirements.” One could expect, he writes, that the “US side would significantly restrict its cooperation on security issues, because it would no longer see its German partners as sufficiently trustworthy.”

    Altmaier’s letter neglects to mention the myriad NSA violations committed against German interests, German citizens and German media.

    By SPIEGEL Staff
    07/03/2015 06:05 PM

    Find this story at 3 July 2015

    © SPIEGEL ONLINE 2015

    Neue Spionageaffäre erschüttert BND

    Van nieuwsblog.burojansen.nl

    Der US-Geheimdienst NSA hat offenbar über Jahre hinweg mit Wissen des Bundesnachrichtendienstes Ziele in Westeuropa und Deutschland ausgespäht. Die Erkenntnisse darüber behielt der BND nach SPIEGEL-Informationen lange für sich.

    Im Mittelpunkt des neuerlichen Skandals steht die gemeinsame Spionagetätigkeit von Bundesnachrichtendienst (BND) und US-Auslandsgeheimdienst NSA. Für die technische Aufklärung lieferte der US-Dienst seit mehr als zehn Jahren sogenannte Selektoren – also etwa IP-Adressen oder Handynummern – an die deutschen Partner. Diese wurden in die BND-Systeme zur Überwachung verschiedener Weltregionen eingespeist.

    Mindestens seit dem Jahr 2008 fiel BND-Mitarbeitern mehrfach auf, dass einige dieser Selektoren dem Aufgabenprofil des deutschen Auslandsgeheimdienstes zuwiderlaufen – und auch nicht von dem “Memorandum of Agreement” abgedeckt sind, das die Deutschen und die Amerikaner zur gemeinsamen Bekämpfung des globalen Terrorismus 2002 ausgehandelt hatten. Stattdessen suchte die NSA gezielt nach Informationen etwa über den Rüstungskonzern EADS, Eurocopter oder französische Behörden. Der BND nahm das offenbar jedoch nicht zum Anlass, die Selektorenliste systematisch zu überprüfen.

    Erst nach Enthüllung des NSA-Skandals im Sommer 2013 befasste sich eine BND-Abteilung gezielt mit den NSA-Suchbegriffen. Im Oktober 2013 lag das Ergebnis vor: Demnach verstießen rund 2000 der Selektoren eindeutig gegen westeuropäische und deutsche Interessen. Die Rede ist intern auch von Politikern, die demnach gezielt und unrechtmäßig ausspioniert wurden. Aber auch diesen Fund meldete der BND nicht an seine Aufsichtsbehörde, das Bundeskanzleramt. Stattdessen bat der zuständige Unterabteilungsleiter die NSA, derartige Verstöße künftig zu unterlassen.

    BND-Chef von Ausschusssitzung ausgeschlossen

    Das wahre Ausmaß des Skandals wurde nun erst aufgrund eines Beweisantrags bekannt, den Linke und Grüne für den NSA-Untersuchungsausschuss gestellt hatten. Die für den Ausschuss zuständige Projektgruppe des BND prüfte die NSA-Selektoren daraufhin erneut – mit dem Ergebnis, dass bis zu 40.000 davon gegen westeuropäische und deutsche Interessen gerichtet sind. Erst im März wurde das Bundeskanzleramt darüber unterrichtet. Weitere Überprüfungen wurden inzwischen angeordnet.

    Am Mittwochabend unterrichtete Kanzleramtsminister Peter Altmaier (CDU) persönlich die Mitglieder des Parlamentarischen Kontrollgremiums und des NSA-Ausschusses über den Spionageskandal. BND-Präsident Gerhard Schindler wurde von der Sitzung explizit ausgeschlossen. Auch Spitzenpolitiker von SPD und CDU wurden bereits informiert.

    Von Maik Baumgärtner, Hubert Gude, Marcel Rosenbach und Jörg Schindler
    Donnerstag, 23.04.2015 – 16:23 Uhr

    Find this story at 24 April 2015

    © SPIEGEL ONLINE 2015

    Airbus va porter plainte pour soupçons d’espionnage en Allemagne (2015)

    Van nieuwsblog.burojansen.nl

    Airbus Group a annoncé jeudi son intention de porter plainte en Allemagne après les informations selon lesquelles le BND, le service fédéral de renseignement extérieur allemand, a aidé ses homologues américains à espionner plusieurs entreprises européennes.

    “Nous avons demandé des informations supplémentaires au gouvernement”, a déclaré un porte-parole d’Airbus en Allemagne. “Nous allons porter plainte contre X en raison de soupçons d’espionnage industriel.”

    L’hebdomadaire Der Spiegel a rapporté la semaine dernière que des responsables du BND avaient indirectement aidé la National Security Agency (NSA) américaine à espionner plusieurs cibles en Europe pendant plus de 10 ans.

    Le ministre de l’Intérieur allemand, Thomas de Maizière, un proche allié de la chancelière Angela Merkel, a nié mercredi avoir menti au Parlement à propos de la collaboration entre les services de renseignement allemands et américains.

    Il est depuis plusieurs jours sous le feu des critiques de l’opposition dans ce dossier en raison de son rôle lorsqu’il était directeur de la chancellerie fédérale entre 2005 et 2009.

    En 2013, après la publication d’informations selon lesquelles les Etats-Unis avaient placé le téléphone portable de la chancelière sur écoute, Angela Merkel avait déclaré que “s’espionner entre amis n’est absolument pas acceptable”.

    Le quotidien Handelsblatt avait le premier fait état de la plainte d’Airbus jeudi.

    Selon la presse allemande, le BND a également aidé les services de renseignement américains à espionner les services de la présidence française, le ministère français des Affaires étrangères et la Commission européenne.

    En France, plusieurs responsables politiques ont réclamé jeudi des excuses de l’Allemagne et une enquête dans ce dossier.

    De son côté, le président de l’exécutif européen, Jean-Claude Juncker, a déclaré lors d’une conférence de presse ignorer si des agents allemands étaient en activité à Bruxelles mais il a rappelé avoir proposé dans le passé que la Commission crée ses propres services secrets “car les agents sont partout”.

    Lui-même ex-Premier ministre d’un gouvernement luxembourgeois contraint à la démission par un scandale d’espionnage et de corruption en 2013, Jean-Claude Juncker a ajouté que son expérience personnelle lui avait appris que les services secrets étaient très difficiles à contrôler.

    La semaine dernière, le gouvernement allemand avait reconnu des failles au sein de ses services de renseignement et dit avoir demandé au BND de les combler.

    (Victoria Bryan, avec Adrian Croft à Bruxelles, Marc Angrand pour le service français)
    Source : Reuters 30/04/15 à 18:48
    Mis à jour le 30/04/15 à 20:30

    Find this story at 30 April 2015

    © 2015 Reuters

    Reaktion auf Spionageaffäre: Rausschmiss erster Klasse ­(2014)

    Van nieuwsblog.burojansen.nl

    Die Bundesregierung reagiert auf die US­Spionage: Der oberste CIA­Vertreter in Berlin soll
    das Land verlassen. Ein solcher Affront war bisher nur gegen Agenten von Paria­Staaten wie
    Iran oder Nordkorea denkbar.
    Berlin ­ Die Bundesregierung reagiert auf die neuen Spionagefälle und die Vorwürfe gegen die
    USA mit einem diplomatischen Affront. Als Reaktion auf die Enthüllungen forderte Berlin den
    Repräsentanten der amerikanischen Geheimdienste in Berlin auf, das Land zu verlassen.
    Umgehend wurde die Botschaft unterrichtet, der Geheimdienstmann musste sich die
    unfreundliche Bitte im Innenministerium von Verfassungsschutz­Chef Hans­Georg Maaßen
    anhören.
    Ein paar Stunden später dann war in Berlin von einer formellen Ausweisung des CIA­Vertreters
    die Rede, der als “station chief” die Aktivitäten des US­Geheimdienstes in Deutschland leitet.
    Wenig später korrigierte die Regierung, man habe nur die Ausreise empfohlen. Das ist zwar nicht
    gleichzusetzen mit einer Ausweisung, faktisch aber bleibt es ein Rausschmiss erster Klasse.
    Die öffentliche Geste der indirekten Ausweisung ist diplomatisch gesehen ein Erdbeben. Eine
    solche Maßnahme war bisher höchstens gegen Paria­Staaten wie Nordkorea oder Iran denkbar
    gewesen. Zwar bat Deutschland in den 90er Jahren schon einmal einen US­Agenten um seine
    Ausreise, er hatte versucht, eine Quelle im Wirtschaftsministerium anzuwerben. Damals aber
    geschah der Rausschmiss eher diskret.
    Der deutschen Entscheidung gingen am Donnerstagmorgen Krisentelefonate zwischen
    Innenminister Thomas de Maizière, Außenminister Frank­Walter Steinmeier und Kanzleramtschef
    Peter Altmaiervoraus. Dabei zeigten sich alle Minister enttäuscht über die wenig einlenkenden
    Reaktionen der USA und waren sich einig: Deutschland könne die Angelegenheit nicht auf sich
    beruhen lassen.
    In den Gesprächen beriet man zunächst die bisherigen Signale aus Washington. CIA­Chef John
    Brennan und der US­Botschafter John Emerson hatten Kontakt zur deutschen Regierung gesucht.
    Berlin fehlten allerdings konkrete Angebote, die Vorwürfe schnell aufzuklären. Von einer
    Entschuldigung war schon gar nicht die Rede.
    Im Parlamentarischen Kontrollgremium berichtete Klaus­Dieter Fritsche, Merkels Beauftragter für
    die Nachrichtendienste, am Donnerstag ernüchtert über das Telefonat mit CIA­Chef Brennan.
    Dieser, so Fritsche, habe nichts außer Floskeln über die transatlantische Verbundenheit und
    seinen Ärger über die schlechte Presselage beizutragen gehabt.
    Offiziell hatte sich die Regierung in der Spionage­Affäre bisher zurückgehalten. Man warte erst die
    juristische Aufklärung und mögliche Erklärungen der USA ab. Offenbar aber war der Ärger bis
    Donnerstag aber so gewachsen, dass die Phase der Zurückhaltung nun beendet wurde.
    Innenminister Thomas de Maizière wollte nach den Beratungen keinen Kommentar abgeben.
    Zwar spielte er wie zuvor Wolfgang Schäuble den möglichen Schaden herunter ­ er nannte die
    von den USA gewonnenen Informationen “lächerlich”.
    Gleichsam unterstrich er, dass der politische Schaden allein durch die Verdachtsmomente gegen
    die USA “unverhältnismäßig und schwerwiegend” sei. Deswegen sei ein wirksamer Schutz gegen
    Angriffe auf unsere Kommunikation ebenso wie eine effektive Spionageabwehr “unverzichtbar für
    unsere wehrhafte Demokratie”. Man sei dabei, beides zu stärken und auszuweiten.
    Bundeskanzlerin Angela Merkel machte ihrem Ärger auf die für sie typische Weise Luft. “Mit
    gesundem Menschenverstand betrachtet ist das Ausspähen von Freunden und Verbündeten ein
    Vergeuden von Kraft”, so die Kanzlerin blumig und doch deutlich. Die Geheimdienste sollten nicht
    alles tun, was machbar ist, sondern sich bei ihrer Arbeit “auf das Wesentliche” konzentrieren.
    Bisher noch keinen Haftbefehl vorgelegt
    10/16/2015 Druckversion ­ Reaktion auf Spionageaffäre: Rausschmiss erster Klasse ­ SPIEGEL ONLINE ­ Politik
    http://www.spiegel.de/politik/deutschland/spionage­bundesregierung­fordert­cia­vertreter­zur­ausreise­auf­a­980342­druck.html 2/3
    Erst am Mittwoch war ein neuer Spionageverdacht bekannt geworden, in diesem Fall verdächtigt
    die Bundesanwaltschaft einen Länderreferenten aus der Abteilung Politik des Wehrressorts,
    Informationen an einen US­Geheimdienst weitergegeben zu haben. Der Militärische
    Abschirmdienst (MAD) hatte den jungen Referenten, der seit gut einem Jahr in einer
    Unterabteilung für die Sicherheitspolitik tätig war, wegen des Verdachts schon seit 2010
    beobachtet, am Mittwoch dann rückten Ermittler vom Generalbundesanwalt im Ministerium an.
    Ob der Verdacht stichhaltig war, ist schwer zu bewerten. Zwar verdächtigte man den heutigen
    Referenten wegen seines engen Kontakts zu einem vermeintlichen US­Geheimdienstler, den er
    vor Jahren während eines Jobs im Kosovo kennengelernt hatte. Bisher aber fehlen Beweise, dass
    dieser den Deutschen tatsächlich abschöpfte. Er selbst bestreitet eine Agententätigkeit. In seiner
    Vernehmung habe der Mitarbeiter aus dem Wehrressort die Beziehung zu dem Amerikaner
    vielmehr als reine Männerfreundschaft bezeichnet. So berichtete es der Vertreter des
    Generalbundesanwalts im Kontrollgremium.
    Verdächtig erschien den Ermittlern nicht zuletzt eine Überweisung von 2.000 Euro, die der USAmerikaner
    vor einiger Zeit auf das Konto des Deutschen veranlasste. Auch hierfür habe der
    Ministeriumsmitarbeiter eine Erklärung gehabt: Das Geld, so soll er ausgesagt haben, sei im
    Rahmen einer Hochzeitsfeier geflossen und auch teilweise zurückgezahlt worden.
    Auch der Generalbundesanwalt sprach nach der Durchsuchung und der Vernehmung nur von
    einem Anfangsverdacht und beantragte noch nicht mal einen Haftbefehl. Trotzdem sorgte allein
    die Nachricht nur wenige Tage nach dem Bekanntwerden eines ähnlichen Falls beim
    Bundesnachrichtendienst (BND) für einen Schock.

    10. Juli 2014, 16:36 Uhr
    Von Matthias Gebauer und Veit Medick

    Find this story at 10 July 2014

    © SPIEGEL ONLINE 2014

    Officials: Islamic State arose from US support for al-Qaeda in Iraq

    Van nieuwsblog.burojansen.nl

    A former Pentagon intelligence chief, Iraqi government sources, and a retired career US diplomat reveal US complicity in the rise of ISIS
    A new memoir by a former senior State Department analyst provides stunning details on how decades of support for Islamist militants linked to Osama bin Laden brought about the emergence of the ‘Islamic State’ (ISIS).
    The book establishes a crucial context for recent admissions by Michael T. Flynn, the retired head of the Pentagon’s Defense Intelligence Agency (DIA), confirming that White House officials made a “willful decision” to support al-Qaeda affiliated jihadists in Syria — despite being warned by the DIA that doing so would likely create an ‘ISIS’-like entity in the region.
    J. Michael Springmann, a retired career US diplomat whose last government post was in the State Department’s Bureau of Intelligence and Research, reveals in his new book that US covert operations in alliance with Middle East states funding anti-Western terrorist groups are nothing new. Such operations, he shows, have been carried out for various short-sighted reasons since the Cold War and after.
    In the 1980s, as US support for mujahideen fighters accelerated in Afghanistan to kick out the Soviet Union, Springmann found himself unwittingly at the heart of highly classified operations that allowed Islamist militants linked to Osama bin Laden to establish a foothold within the United States.
    After the end of the Cold War, Springmann alleged, similar operations continued in different contexts for different purposes — in the former Yugoslavia, in Libya and elsewhere. The rise of ISIS, he contends, was a predictable outcome of this counterproductive policy.
    Pentagon intel chief speaks out
    Everyday brings new horror stories about atrocities committed by ISIS fighters. Today, for instance, the New York Times offered a deeply disturbing report on how ISIS has formally adopted a theology and policy of systematic rape of non-Muslim women and children. The practice has become embedded throughout the territories under ISIS control through a process of organized slavery, sanctioned by the movement’s own religious scholars.
    But in a recent interview on Al-Jazeera’s flagship talk-show ‘Head to Head,’ former DIA chief Lieutenant General (Lt. Gen.) Michael Flynn told host Mehdi Hasan that the rise of ISIS was a direct consequence of US support for Syrian insurgents whose core fighters were from al-Qaeda in Iraq.
    Lt. Gen. Michael T. Flynn, former Director of the Pentagon’s Defense Intelligence Agency (DIA), in a lengthy interview with Al-Jazeera’s Mehdi Hasan
    Back in May, INSURGE intelligence undertook an exclusive investigation into a controversial declassified DIA document appearing to show that as early as August 2012, the DIA knew that the US-backed Syrian insurgency was dominated by Islamist militant groups including “the Salafists, the Muslim Brotherhood and al-Qaeda in Iraq.”
    Asked about the DIA document by Hasan, who noted that “the US was helping coordinate arms transfers to those same groups,” Flynn confirmed that the intelligence described by the document was entirely accurate.
    Telling Hasan that he had read the document himself, Flynn said that it was among a range of intelligence being circulated throughout the US intelligence community that had led him to attempt to dissuade the White House from supporting these groups, albeit without success.
    Flynn added that this sort of intelligence was available even before the decision to pull out troops from Iraq:
    “My job was to ensure that the accuracy of our intelligence that was being presented was as good as it could be, and I will tell you, it goes before 2012. When we were in Iraq, and we still had decisions to be made before there was a decision to pull out of Iraq in 2011, it was very clear what we were going to face.”
    In other words, long before the inception of the armed insurrection in Syria — as early as 2008 (the year in which the final decision was made on full troop withdrawal by the Bush administration) — US intelligence was fully aware of the threat posed by al-Qaeda in Iraq (AQI) among other Islamist militant groups.
    Supporting the enemy
    Despite this, Flynn’s account shows that the US commitment to supporting the Syrian insurgency against Bashir al-Assad led the US to deliberately support the very al-Qaeda affiliated forces it had previously fought in Iraq.
    Far from simply turning a blind eye, Flynn said that the White House’s decision to support al-Qaeda linked rebels against the Assad regime was not a mistake, but intentional:
    Hasan: “You are basically saying that even in government at the time, you knew those groups were around, you saw this analysis, and you were arguing against it, but who wasn’t listening?”
    Flynn: “I think the administration.”
    Hasan: “So the administration turned a blind eye to your analysis?”
    Flynn: “I don’t know if they turned a blind eye. I think it was a decision, a willful decision.”
    Hasan: “A willful decision to support an insurgency that had Salafists, Al-Qaeda and the Muslim Brotherhood?”
    Flynn: “A willful decision to do what they’re doing… You have to really ask the President what is it that he actually is doing with the policy that is in place, because it is very, very confusing.”
    Prior to his stint as DIA chief, Lt. Gen. Flynn was Director of Intelligence for the Joint Special Operations Command (JSOC) and Commander of the Joint Functional Component Command.
    Flynn is the highest ranking former US intelligence official to confirm that the DIA intelligence report dated August 2012, released earlier this year, proves a White House covert strategy to support Islamist terrorists in Iraq and Syria even before 2011.
    In June, INSURGE reported exclusively that six former senior US and British intelligence officials agreed with this reading of the declassified DIA report.
    Flynn’s account is corroborated by other former senior officials. In an interview on French national television , former French Foreign Minister Roland Dumas said that the US’ chief ally, Britain, had planned covert action in Syria as early as 2009 — after US intelligence had clear information according to Flynn on al-Qaeda’s threat to Syria:
    “I was in England two years before the violence in Syria on other business. I met with top British officials, who confessed to me that they were preparing something in Syria. This was in Britain not in America. Britain was preparing gunmen to invade Syria.”
    Former French Foreign Minister Roland Dumas on French national television confirming information received from UK Foreign Office officials in 2009 regarding operations in Syria
    Al-Qaeda in Iraq, the precursor to the movement now known as ‘Islamic State,’ was on the decline due to US and Iraqi counter-terrorism operations from 2008 to 2011 in coordination with local Sunni tribes. In that period, al-Qaeda in Iraq became increasingly isolated, losing the ability to enforce its harsh brand of Islamic Shari’ah law in areas it controlled, and giving up more and more territory.
    By late 2011, over 2,000 AQI fighters had been killed, just under 9,000 detained, and the group’s leadership had been largely wiped out.
    Right-wing pundits have often claimed due to this background that the decision to withdraw troops from Iraq was the key enabling factor in the resurgence of AQI, and its eventual metamorphosis into ISIS.
    But Flynn’s revelations prove the opposite — that far from the rise of ISIS being solely due to a vacuum of power in Iraq due to the withdrawal of US troops, it was the post-2011 covert intervention of the US and its allies, the Gulf states and Turkey, which siphoned arms and funds to AQI as part of their anti-Assad strategy.
    Even in Iraq, the surge laid the groundwork for what was to come. Among the hundred thousand odd Sunni tribesmen receiving military and logistical assistance from the US were al-Qaeda sympathisers and anti-Western insurgents who had previously fought alongside al-Qaeda.
    In 2008, a US Army-commissioned RAND report confirmed that the US was attempting to “to create divisions in the jihadist camp. Today in Iraq such a strategy is being used at the tactical level.” This included forming “temporary alliances” with al-Qaeda affiliated “nationalist insurgent groups” that have fought the US for four years, now receiving “weapons and cash” from the US.
    The idea was, essentially, to bribe former al-Qaeda insurgents to breakaway from AQI and join forces with the Americans. Although these Sunni nationalists “have cooperated with al-Qaeda against US forces,” they are now being supported to exploit “the common threat that al-Qaeda now poses to both parties.”
    In the same year, former CIA military intelligence officer and counter-terrorism specialist Philip Geraldi, stated that US intelligence analysts “are warning that the United States is now arming and otherwise subsidizing all three major groups in Iraq.” The analysts “believe that the house of cards is likely to fall down as soon as one group feels either strong or frisky enough to assert itself.” Giraldi predicted:
    “The winner in the convoluted process has been everyone who wants to see a civil war.”
    By Flynn’s account, US intelligence was also aware in 2008 that the empowerment of former al-Qaeda insurgents would eventually backfire and strengthen AQI in the long-run, especially given that the Shi’a dominated US-backed central government continued to discriminate against Sunni populations.
    Syriana
    Having provided extensive support for former al-Qaeda affiliated Sunni insurgents in Iraq from 2006 to 2008 — in order to counter AQI — US forces did succeed in temporarily routing AQI from its strongholds in the country.
    Simultaneously, however, if Roland Dumas’ account is correct, the US and Britain began covert operations in Syria in 2009. From 2011 onwards, US support for the Syrian insurgency in alliance with the Gulf states and Turkey was providing significant arms and cash to AQI fighters.
    The porous nature of relations between al-Qaeda factions in Iraq and Syria, and therefore the routine movement of arms and fighters across the border, was well-known to the US intelligence community in 2008.
    In October 2008, Major General John Kelly — the US military official responsible for Anbar province where the bulk of US support for Sunni insurgents to counter AQI was going — complained bitterly that AQI fighters had regrouped across the border in Syria, where they had established a “sanctuary.”
    The border, he said, was routinely used as an entry point for AQI fighters to enter Iraq and conduct attacks on Iraqi security forces.
    Ironically, at this time, AQI fighters in Syria were tolerated by the Assad regime. A July 2008 report by the Combating Terrorism Center at the US Military Academy at West Point documented AQI’s extensive networks inside Syria across the border with Iraq.
    “The Syrian government has willingly ignored, and possibly abetted, foreign fighters headed to Iraq. Concerned about possible military action against the Syrian regime, it opted to support insurgents and terrorists wreaking havoc in Iraq.”
    Yet from 2009 onwards according to Dumas, and certainly from 2011 by Flynn’s account, the US and its allies began supporting the very same AQI fighters in Syria to destabilize the Assad regime.
    The policy coincided with the covert US strategy revealed by Seymour Hersh in 2007: using Saudi Arabia to funnel support for al-Qaeda and Muslim Brotherhood affiliated Islamists as a mechanism for isolating Iran and Syria.
    Reversing the surge
    During this period in which the US, the Gulf states, and Turkey supported Syrian insurgents linked to AQI and the Muslim Brotherhood, AQI experienced an unprecedented resurgence.
    US troops finally withdrew fully from Iraq in December 2011, which means by the end of 2012, judging by the DIA’s August 2012 report and Flynn’s description of the state of US intelligence in this period, the US intelligence community knew that US and allied support for AQI in Syria was directly escalating AQI’s violence across the border in Iraq.
    Despite this, in Flynn’s words, the White House made a “willful decision” to continue the policy despite the possibility it entailed “of establishing a declared or undeclared Salafist principality in Eastern Syria (Hasaka and Der Zor)” according to the DIA’s 2012 intelligence report.
    The Pentagon document had cautioned that if a “Salafist principality” did appear in eastern Syria under AQI’s dominance, this would have have “dire consequences” for Iraq, providing “the ideal atmosphere for AQI to return to its old pockets in Mosul and Ramadi,” and a “renewed momentum” for a unified jihad “among Sunni Iraq and Syria.”
    Most strikingly, the report warned that AQI, which had then changed its name to the Islamic State of Iraq (ISI):
    “ISI could also declare an Islamic State through its union with other terrorist organisations in Iraq and Syria, which will create grave danger in regards to unifying Iraq and the protection of its territory.”
    As the US-led covert strategy accelerated sponsorship of AQI in Syria, AQI’s operations in Iraq also accelerated, often in tandem with Syrian al-Qaeda affiliate, Jabhut al-Nusra.
    According to Prof. Anthony Celso of the Department of Security Studies at Angelo State University in Texas, “suicide bombings, car bombs, and IED attacks” by AQI in Iraq “doubled a year after the departure of American troops.” Simultaneously, AQI began providing support for al-Nusra by inputting fighters, funds and weapons from Iraq into Syria.
    As the Pentagon’s intelligence arm had warned, by April 2013, AQI formally declared itself the Islamic State in Iraq and Syria (ISIS).
    In the same month, the European Union voted to ease the embargo on Syria to allow al-Qaeda and ISIS dominated Syrian rebels to sell oil to global markets, including European companies. From this date to the following year when ISIS invaded Mosul, several EU countries were buying ISIS oil exported from the Syrian fields under its control.
    The US anti-Assad strategy in Syria, in other words, bolstered the very al-Qaeda factions the US had fought in Iraq, by using the Gulf states and Turkey to finance the same groups in Syria. As a direct consequence, the secular and moderate elements of the Free Syrian Army were increasingly supplanted by virulent Islamist extremists backed by US allies.
    A Free Syrian Army fighter rests inside a cave at a rebel camp in Idlib, Syria on 17th September 2013. As of April 2015, moderate FSA rebels in Idlib have been supplanted by a US-backed rebel coalition led by Jabhut al-Nusra, al-Qaeda in Syria
    Advanced warning
    In February 2014, Lt. Gen. Flynn delivered the annual DIA threat assessment to the Senate Armed Services Committee. His testimony revealed that rather than coming out of the blue, as the Obama administration claimed, US intelligence had anticipated the ISIS attack on Iraq.
    In his statement before the committee, which corroborates much of what he told Al-Jazeera, Flynn had warned that “al-Qaeda in Iraq (AQI) also known as Iraq and Levant (ISIL)… probably will attempt to take territory in Iraq and Syria to exhibit its strength in 2014, as demonstrated recently in Ramadi and Fallujah.” He added that “some Sunni tribes and insurgent groups appear willing to work tactically with AQI as they share common anti-government goals.”
    Criticizing the central government in Baghdad for its “refusal to address long-standing Sunni grievances,” he pointed out that “heavy-handed approach to counter-terror operations” had led some Sunni tribes in Anbar “to be more permissive of AQI’s presence.” AQI/ISIL has “exploited” this permissive security environment “to increase its operations and presence in many locations” in Iraq, as well as “into Syria and Lebanon,” which is inflaming “tensions throughout the region.”
    It should be noted that precisely at this time, the West, the Gulf states and Turkey, according to the DIA’s internal intelligence reports, were supporting AQI and other Islamist factions in Syria to “isolate” the Assad regime. By Flynn’s account, despite his warnings to the White House that an ISIS attack on Iraq was imminent, and could lead to the destabilization of the region, senior Obama officials deliberately continued the covert support to these factions.
    US intelligence was also fully cognizant of Iraq’s inability to repel a prospective ISIS attack on Iraq, raising further questions about why the White House did nothing.
    The Iraqi army has “been unable to stem rising violence” and would be unable “to suppress AQI or other internal threats” particularly in Sunni areas like Ramadi, Falluja, or mixed areas like Anbar and Ninewa provinces, Flynn told the Senate. As Iraq’s forces “lack cohesion, are undermanned, and are poorly trained, equipped and supplied,” they are “vulnerable to terrorist attack, infiltration and corruption.”
    Senior Iraqi government sources told me on condition of anonymity that both Iraqi and American intelligence had anticipated an ISIS attack on Iraq, and specifically on Mosul, as early as August 2013.
    Intelligence was not precise on the exact timing of the assault, one source said, but it was known that various regional powers were complicit in the planned ISIS offensive, particularly Qatar, Saudi Arabia and Turkey:
    “It was well known at the time that ISIS were beginning serious plans to attack Iraq. Saudi Arabia, Qatar and Turkey played a key role in supporting ISIS at this time, but the UAE played a bigger role in financial support than the others, which is not widely recognized.”
    When asked whether the Americans had attempted to coordinate with Iraq on preparations for the expected ISIS assault, particularly due to the recognized inability of the Iraqi army to withstand such an attack, the senior Iraqi official said that nothing had happened:
    “The Americans allowed ISIS to rise to power because they wanted to get Assad out from Syria. But they didn’t anticipate that the results would be so far beyond their control.”
    This was not, then, a US intelligence failure as such. Rather, the US failure to to curtail the rise of ISIS and its likely destabilization of both Iraq and Syria, was not due to a lack of accurate intelligence — which was abundant and precise — but due to an ill-conceived political decision to impose ‘regime change’ on Syria at any cost.
    Vicious cycle
    This is hardly the first time political decisions in Washington have blocked US intelligence agencies from pursuing investigations of terrorist activity, and scuppered their crackdowns on high-level state benefactors of terrorist groups.
    According to Michael Springmann in his new book, Visas for al-Qaeda: CIA Handouts that Rocked the World, the same structural problems explain the impunity with which terrorist groups have compromised Western defense and security measures for the last few decades.
    Much of his book is clearly an effort to make sense of his personal experience by researching secondary sources and interviewing other former US government and intelligence officials. While there are many problems with some of this material, the real value of Springmann’s book is in the level of detail he brings to his first-hand accounts of espionage at the US State Department, and its damning implications for understanding the ‘war on terror’ today.
    Springmann served in the US government as a diplomat with the Commerce Department and the State Department’s Foreign Service, holding postings in Germany, India, and Saudi Arabia. He began his diplomatic career as a commercial officer at the US embassy in Stuttgart, Germany (1977–1980), before becoming a commercial attaché in New Delhi, India (1980–1982). He was later promoted to head of the Visa Bureau at the US embassy in Jeddah, Saudi Arabia (1987–1989), and then returned to Stuttgart to become a political/economic officer (1989–1991).
    Before he was fired for asking too many questions about illegal practices at the US embassy in Jeddah, Springmann’s last assignment was as a senior economic officer at the State Department’s Bureau of Intelligence and Research (1991), where he had security clearances to access restricted diplomatic cables, along with highly classified intelligence from the National Security Agency (NSA) and CIA.
    Springmann says that during his tenure at the US embassy in Jeddah, he was repeatedly asked by his superiors to grant illegal visas to Islamist militants transiting through Jeddah from various Muslim countries. He eventually learned that the visa bureau was heavily penetrated by CIA officers, who used their diplomatic status as cover for all manner of classified operations — including giving visas to the same terrorists who would later execute the 9/11 attacks.
    CIA officials operating at the US embassy in Jeddah, according to Springmann, included CIA base chief Eric Qualkenbush, US Consul General Jay Frere, and political officer Henry Ensher.
    Thirteen out of the 15 Saudis among the 9/11 hijackers received US visas. Ten of them received visas from the US embassy in Jeddah. All of them were in fact unqualified, and should have been denied entry to the US.
    Springmann was fired from the State Department after filing dozens of Freedom of Information requests, formal complaints, and requests for inquiries at multiple levels in the US government and Congress about what he had uncovered. Not only were all his attempts to gain disclosure and accountability systematically stonewalled, in the end his whistleblowing cost him his career.
    Springmann’s experiences at Jeddah, though, were not unique. He points out that Sheikh Omar Abdel Rahman, who was convicted as the mastermind of the 1993 World Trade Center bombing, received his first US visa from a CIA case officer undercover as a consular officer at the US embassy in Khartoum in Sudan.
    The ‘Blind Sheikh’ as he was known received six CIA-approved US visas in this way between 1986 and 1990, also from the US embassy in Egypt. But as Springmann writes:
    “The ‘blind’ Sheikh had been on a State Department terrorist watch list when he was issued the visa, entering the United States by way of Saudi Arabia, Pakistan, and the Sudan in 1990.”
    In the US, Abdel Rahman took-over the al-Kifah Refugee Center, a major mujahideen recruitment hub for the Afghan war controlled by Abdullah Azzam, Osama bin Laden and Ayman al-Zawahiri. He not only played a key role in recruiting mujahideen for Afghanistan, but went on to recruit Islamist fighters for Bosnia after 1992.
    Even after the 1993 WTC attack, as Springmann told BBC Newsnight in 2001, “The attack on the World Trade Center in 1993 did not shake the State Department’s faith in the Saudis, nor did the attack on American barracks at Khobar Towers in Saudi Arabia three years later, in which 19 Americans died.”
    The Bosnia connection is highly significant. Springmann reports that alleged 9/11 mastermind Khalid Sheikh Muhammad “had fought in Afghanistan (after studying in the United States) and then went on to the Bosnian war in 1992…
    “In addition, two more of the September 11, 2001, hijackers, Khalid al-Mihdhar and Nawaf al-Hazmi, both Saudis, had gained combat experience in Bosnia. Still more connections came from Mohammed Haydar Zammar, who supposedly helped Mohammed Atta with planning the World Trade Center attacks. He had served with Bosnian army mujahideen units. Ramzi Binalshibh, friends with Atta and Zammar, had also fought in Bosnia.”
    US and European intelligence investigations have uncovered disturbing evidence of how the Bosnian mujahideen pipeline, under the tutelage of Saudi Arabia, played a major role in incubating al-Qaeda’s presence in Europe.
    According to court papers filed in New York on behalf of the 9/11 families in February, covert Saudi government support for Bosnian arms and training was “especially important to al-Qaeda acquiring the strike capabilities used to launch attacks in the US.”
    After 9/11, despite such evidence being widely circulated within the US and European intelligence communities, both the Bush and Obama administrations continued working with the Saudis to mobilize al-Qaeda affiliated extremists in the service of what the DIA described as rolling back “the strategic depth of the Shia expansion” across Iraq, Iran and Syria.
    The existence of this policy has been confirmed by former 30-year MI6 Middle East specialist Alastair Crooke. Its outcome — in the form of the empowerment of the most virulent Islamist extremist forces in the region — was predictable, and indeed predicted.
    In August 2012 — the same date as the DIA’s controversial intelligence report anticipating the rise of ISIS — I quoted the uncannily prescient remarks of Michael Scheuer, former chief of the CIA’s bin Laden unit, who forecast that US support for Islamist rebels in Syria would likely to lead to “the slaughter of some portion of Syria’s Alawite and Shia communities”; “the triumph of Islamist forces, although they may deign to temporarily disguise themselves in more innocent garb”; “the release of thousands of veteran and hardened Sunni Islamist insurgents”; and even “the looting of the Syrian military’s fully stocked arsenals of conventional arms and chemical weapons.”
    I then warned that the “further militarization” of the Syrian conflict would thwart the “respective geostrategic ambitions” of regional powers “by intensifying sectarian conflict, accelerating anti-Western terrorist operations, and potentially destabilizing the whole Levant in a way that could trigger a regional war.”
    Parts of these warnings have now transpired in ways that are even more horrifying than anyone ever imagined. The continued self-defeating approach of the US-led coalition may well mean that the worst is yet to come.
    by Nafeez Ahmed
    Aug 13
    Find this story at 13 August 2015
    Copyright https://medium.com/

    Despite bombing, Islamic State is no weaker than a year ago

    Van nieuwsblog.burojansen.nl

    WASHINGTON (AP) — After billions of dollars spent and more than 10,000 extremist fighters killed, the Islamic State group is fundamentally no weaker than it was when the U.S.-led bombing campaign began a year ago, American intelligence agencies have concluded.
    U.S. military commanders on the ground aren’t disputing the assessment, but they point to an upcoming effort to clear the important Sunni city of Ramadi, which fell to the militants in May, as a crucial milestone.
    The battle for Ramadi, expected over the next few months, “promises to test the mettle” of Iraq’s security forces, Marine Corps Brig. Gen. Kevin J. Killea, who is helping run the U.S.-led coalition effort in Iraq, told reporters at the Pentagon in a video briefing from the region.
    The U.S.-led military campaign has put the Islamic State group on defense, Killea said, adding, “There is progress.” Witnesses on the ground say the airstrikes and Kurdish ground actions are squeezing the militants in northern Syria, particularly in their self-proclaimed capital in Raqqa.
    But U.S. intelligence agencies see the overall situation as a strategic stalemate: The Islamic State remains a well-funded extremist army able to replenish its ranks with foreign jihadis as quickly as the U.S. can eliminate them. Meanwhile, the group has expanded to other countries, including Libya, Egypt’s Sinai Peninsula and Afghanistan.
    The assessments by the CIA, the Defense Intelligence Agency and others appear to contradict the optimistic line taken by the Obama administration’s special envoy, retired Gen. John Allen, who told a forum in Aspen, Colorado, last week that “ISIS is losing” in Iraq and Syria. The intelligence was described by officials who would not be named because they were not authorized to discuss it publicly.
    “We’ve seen no meaningful degradation in their numbers,” a defense official said, citing intelligence estimates that put the group’s total strength at between 20,000 and 30,000, the same estimate as last August, when the airstrikes began.
    The Islamic State’s staying power raises questions about the administration’s approach to the threat that the group poses to the U.S. and its allies. Although officials do not believe it is planning complex attacks on the West from its territory, the group’s call to Western Muslims to kill at home has become a serious problem, FBI Director James Comey and other officials say.
    Yet under the Obama administration’s campaign of bombing and training, which prohibits American troops from accompanying fighters into combat or directing airstrikes from the ground, it could take a decade or more to drive the Islamic State from its safe havens, analysts say. The administration is adamant that it will commit no U.S. ground troops to the fight despite calls from some in Congress to do so.
    The U.S.-led coalition and its Syrian and Kurdish allies have made some inroads. The Islamic State has lost 9.4 percent of its territory in the first six months of 2015, according to an analysis by the conflict monitoring group IHS.
    A Delta Force raid in Syria that killed Islamic State financier Abu Sayyaf in May also has resulted in a well of intelligence about the group’s structure and finances, U.S. officials say. His wife, held in Iraq, has been cooperating with interrogators.
    Syrian Kurdish fighters and their allies have wrested most of the northern Syria border from the Islamic State group, and the plan announced this week for a U.S.-Turkish “safe zone” is expected to cement those gains.
    In Raqqa, U.S. coalition bombs pound the group’s positions and target its leaders with increasing regularity. The militants’ movements have been hampered by strikes against bridges, and some fighters are sending their families away to safer ground.
    But American intelligence officials and other experts say the Islamic State is in no danger of being defeated any time soon.
    “The pressure on Raqqa is significant … but looking at the overall picture, ISIS is mostly in the same place,” said Harleen Gambhir, a counterterrorism analyst at Institute for the Study of War, a Washington think tank.
    Although U.S. officials have said it is crucial that the government in Baghdad win back disaffected Sunnis, there is little sign of that happening. American-led efforts to train Syrian rebels to fight the Islamic State have produced a grand total of 60 vetted fighters.
    The militants have adjusted their tactics to thwart a U.S. bombing campaign that tries assiduously to avoid civilian casualties, officials say. Fighters no longer move around in easily targeted armored columns; they embed themselves among women and children, and they communicate through couriers to thwart eavesdropping and geolocation, the defense official said.
    Oil continues to be a major revenue source. By one estimate, the Islamic State is clearing $500 million per year from oil sales, said Daniel Glaser, assistant secretary for terrorist financing at the Treasury Department. That’s on top of as much as $1 billion in cash the group seized from banks in its territory.
    Although the U.S. has been bombing oil infrastructure, the militants have been adept at rebuilding oil refining, drilling and trading capacity, the defense official said.
    The stalemate makes the battle for Ramadi all the more important.
    Iraqi security forces, including 500 Sunni fighters, have begun preparing to retake the Sunni city, Killea said, and there have been 100 coalition airstrikes designed to support the effort. But he cautioned it will take time.
    “Momentum,” he said, “is a better indicator of success than speed.”
    Karam and Mroue reported from Beirut.
    By KEN DILANIAN, ZEINA KARAM and BASSEM MROUE
    Jul. 31, 2015 1:36 PM EDT
    Find this story at 31 July 2015
    © 2015 Associated Press

    C.I.A. Cash Ended Up in Coffers of Al Qaeda

    Van nieuwsblog.burojansen.nl

    WASHINGTON — In the spring of 2010, Afghan officials struck a deal to free an Afghan diplomat held hostage by Al Qaeda. But the price was steep — $5 million — and senior security officials were scrambling to come up with the money.
    They first turned to a secret fund that the Central Intelligence Agency bankrolled with monthly cash deliveries to the presidential palace in Kabul, according to several Afghan officials involved in the episode. The Afghan government, they said, had already squirreled away about $1 million from that fund.
    Within weeks, that money and $4 million more provided from other countries was handed over to Al Qaeda, replenishing its coffers after a relentless C.I.A. campaign of drone strikes in Pakistan had decimated the militant network’s upper ranks.
    “God blessed us with a good amount of money this month,” Atiyah Abd al-Rahman, the group’s general manager, wrote in a letter to Osama bin Laden in June 2010, noting that the cash would be used for weapons and other operational needs.
    Photo
    Abdul Khaliq Farahi, who was kidnapped by Al Qaeda in 2008. Credit Michael Kamber for The New York Times
    Bin Laden urged caution, fearing the Americans knew about the payment and had laced the cash with radiation or poison, or were tracking it. “There is a possibility — not a very strong one — that the Americans are aware of the money delivery,” he wrote back, “and that they accepted the arrangement of the payment on the basis that the money will be moving under air surveillance.”
    The C.I.A.’s contribution to Qaeda’s bottom line, though, was no well-laid trap. It was just another in a long list of examples of how the United States, largely because of poor oversight and loose financial controls, has sometimes inadvertently financed the very militants it is fighting.
    While refusing to pay ransoms for Americans kidnapped by Al Qaeda, the Taliban or, more recently, the Islamic State, the United States has spent hundreds of billions of dollars over the last decade at war in Iraq and Afghanistan, some of which has been siphoned off to enemy fighters.
    The letters about the 2010 ransom were included in correspondence between Bin Laden and Mr. Rahman that was submitted as evidence by federal prosecutors at the Brooklyn trial of Abid Naseer, a Pakistani Qaeda operative who was convicted this month of supporting terrorism and conspiring to bomb a British shopping center.
    The letters were unearthed from the cache of computers and documents seized by Navy SEALs during the 2011 raid in which Bin Laden was killed in Abbottabad, Pakistan, and had been classified until introduced as evidence at the trial.
    Details of the C.I.A.’s previously unreported contribution to the ransom demanded by Al Qaeda were drawn from the letters and from interviews with Afghan and Western officials speaking on the condition of anonymity because of the sensitivity of the issue. The C.I.A. declined to comment.
    The diplomat freed in exchange for the cash, Abdul Khaliq Farahi, was serving as the Afghan consul general in Peshawar, Pakistan, when he was kidnapped in September 2008 as he drove to work. He had been weeks away from taking up his new job as Afghanistan’s ambassador to Pakistan.
    Afghan and Pakistani insurgents had grabbed Mr. Farahi, but within days they turned him over to Qaeda members. He was held for more than two years.
    The Afghan government had no direct contact with Al Qaeda, stymieing negotiations until the Haqqani network, an Afghan insurgent faction with close ties to Al Qaeda, stepped in to mediate.
    Qaeda leaders wanted some captive militants released, and from the letters it appeared that they calibrated their offer, asking only for men held by Afghan authorities, not those imprisoned by the Americans, who would refuse the demand as a matter of policy. But the Afghans refused to release any prisoners, “so we decided to proceed with a financial exchange,” Mr. Rahman wrote in the June 2010 letter. “The amount we agreed on in the deal was $5 million.”
    Photo
    A 2009 surveillance video image of Abid Naseer, right, who was convicted this month in a bombing plot. Credit U.S. Attorney’s Office, via Associated Press
    The first $2 million was delivered shortly before that letter was written. In it, Mr. Rahman asked Bin Laden if he needed money, and said “we have also designated a fair amount to strengthen the organization militarily by stockpiling good weapons.” (The Qaeda leaders named in the letters were identified by aliases. Bin Laden, for instance, signed his letters Zamray; Mr. Rahman, who was killed in a drone strike in Pakistan in August 2011, went by the alias Mahmud.)
    The cash would also be used to aid the families of Qaeda fighters held prisoner in Afghanistan, and some was given to Ayman al-Zawahri, who would succeed Bin Laden as the Qaeda leader and was identified in the letters under the alias Abu-Muhammad, Mr. Rahman said.
    Other militant groups had already heard about the ransom payment and had their hands out, Mr. Rahman reported. “As you know, you cannot control the news,” he wrote. “They are asking us to give them money, may God help us.”
    But Bin Laden was clearly worried that the payout was an American ruse intended to reveal the locations of senior Qaeda leaders. “It seems a bit strange somewhat because in a country like Afghanistan, usually they would not pay this kind of money to free one of their men,” he wrote.
    “Is any of his relatives a big official?” he continued, referring to Mr. Farahi, the diplomat. It was a prescient question: Mr. Farahi was the son-in-law of a man who had served as a mentor to then-President Hamid Karzai.
    Advocating caution, Bin Laden advised Mr. Rahman to change the money into a different currency at one bank, and then go to another and exchange the money again into whatever currency was preferred. “The reason for doing that is to be on the safe side in case harmful substances or radiation is put on paper money,” Bin Laden wrote.
    Neither of the two men appeared to have known where the money actually came from. Aside from the C.I.A. money, Afghan officials said that Pakistan contributed nearly half the ransom in an effort to end what it viewed as a disruptive sideshow in its relations with Afghanistan. The remainder came from Iran and Persian Gulf states, which had also contributed to the Afghan president’s secret fund.
    In a letter dated Nov. 23, 2010, Mr. Rahman reported to Bin Laden that the remaining $3 million had been received and that Mr. Farahi had been released.
    The C.I.A., meanwhile, continued dropping off bags of cash — ranging each time from a few hundred thousand dollars to more than $1 million — at the presidential palace every month until last year, when Mr. Karzai stepped down.
    The money was used to buy the loyalty of warlords, legislators and other prominent — and potentially troublesome — Afghans, helping the palace finance a vast patronage network that secured Mr. Karzai’s power base. It was also used to cover expenses that needed to be kept off the books, such as clandestine diplomatic trips, and for more mundane costs, including rent payments for the guesthouses where some senior officials lived.
    The cash flow has slowed since a new president, Ashraf Ghani, assumed office in September, Afghan officials said, refusing to elaborate. But they added that cash was still coming in, and that it was not clear how robust any current American constraints on it are.
    “It’s cash,” said a former Afghan security official. “Once it’s at the palace, they can’t do a thing about how it gets spent.”
    By MATTHEW ROSENBERGMARCH 14, 2015
    Find this story 14 March 2015
    © 2015 The New York Times Company HomeSearch

    ISIS fighter was trained by State Department

    Van nieuwsblog.burojansen.nl

    Washington (CNN) An ISIS fighter who calls for jihad in a new online video was trained in counterterrorism tactics on American soil, in a program run by the United States, officials tell CNN.
    The video features a former police commander from Tajikistan named Col. Gulmurod Khalimov. He appears in black ISIS garb with a sniper rifle and a bandolier of ammunition. He says in the video that he participated in programs on U.S. soil three times, at least one of which was in Louisiana.
    The State Department has confirmed this claim.
    “From 2003-2014 Colonel Khalimov participated in five counterterrorism training courses in the United States and in Tajikistan, through the Department of State’s Diplomatic Security/Anti-Terrorism Assistance program,” said spokeswoman Pooja Jhunjhunwala.
    The program is intended to train candidates from participating countries in the latest counterterrorism tactics, so they can fight the very kind of militants that Khalimov has now joined.
    A State Department official said Khalimov was trained in crisis response, tactical management of special events, tactical leadership training and related issues.
    In the video, Khalimov says that what he saw during his training sessions turned him against his sponsors.
    “Listen, you American pigs: I’ve been to America three times. I saw how you train soldiers to kill Muslims,” he says in Russian. “You taught your soldiers how to surround and attack, in order to exterminate Islam and Muslims.”
    Then, in the most chilling part of the 10-minute video, he looks directly into the camera and says, “God willing, we will find your towns, we will come to your homes, and we will kill you.”
    He then demonstrates his dexterity with a sniper rifle by blowing apart a tomato from a distance of perhaps 25 yards. The scene is played in slow motion.
    Who are the women of ISIS?
    The American program in which Khalimov participated is designed to teach tactics used by police and military units against terrorists by countries that cooperate with the United States on security matters. But now experts are concerned that this defector has brought ISIS not only a propaganda victory, but also an insider’s knowledge of the playbook the United States is using in the fight against ISIS.
    “That is a dangerous capability,” said former Army intelligence officer Michael Breen. “It’s never a good thing to have senior counterterrorism people become terrorists.”
    “It sounds like he was involved in defending sensitive people and sensitive targets,” said Breen, who is now with the Truman Project in Washington. “He knows how to plan counterterrorism operations. So he knows how the people who protect a high-value target will be thinking; he knows how people who protect an embassy would be thinking.”
    Former Army sniper Paul Scharre, now with the Center for a New American Security, said Khalimov could not only help train other ISIS fighters in tactics, but also serve as a recruiter for the group.
    “They’re obviously trying to draw in recruits” with the video, he said.
    War against ISIS: Successes and failures
    Khalimov was an officer of the primary counterterrorism unit which responds to terrorist threats in Tajikistan, a State Department official said, so he and other members of his unit were recommended for the program by the Tajik government.
    “All appropriate Leahy vetting was undertaken in advance of this training,” said spokeswoman Jhunjhunwala.
    Scharre, who has served as a trainer of Afghan soldiers in Afghanistan, says there is always a risk that a trainee will turn against their American instructors.
    But Breen, who has also participated in training sessions overseas, said building counterterrorism partners requires a necessary leap of faith. “There’s absolutely no way to beat an opponent like the Islamic State, without training a lot of people,” he said. “That’s a core of our strategy.”
    By Dugald McConnell and Brian Todd, CNN
    Updated 1804 GMT (0104 HKT) May 30, 2015 | Video Source: CNN
    Find this story at 30 May 2015
    © 2015 Cable News Network.

    << oudere artikelen  nieuwere artikelen >>