• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Former F.B.I. Agent Sues, Claiming Retaliation Over Misgivings in Anthrax Case

    Van nieuwsblog.burojansen.nl

    WASHINGTON — When Bruce E. Ivins, an Army microbiologist, took a fatal overdose of Tylenol in 2008, the government declared that he had been responsible for the anthrax letter attacks of 2001, which killed five people and set off a nationwide panic, and closed the case.

    Now, a former senior F.B.I. agent who ran the anthrax investigation for four years says that the bureau gathered “a staggering amount of exculpatory evidence” regarding Dr. Ivins that remains secret. The former agent, Richard L. Lambert, who spent 24 years at the F.B.I., says he believes it is possible that Dr. Ivins was the anthrax mailer, but he does not think prosecutors could have convicted him had he lived to face criminal charges.

    In a lawsuit filed in federal court in Tennessee last Thursday, Mr. Lambert accused the bureau of trying “to railroad the prosecution of Ivins” and, after his suicide, creating “an elaborate perception management campaign” to bolster its claim that he was guilty. Mr. Lambert’s lawsuit accuses the bureau and the Justice Department of forcing his dismissal from a job as senior counterintelligence officer at the Energy Department’s lab in Oak Ridge, Tenn., in retaliation for his dissent on the anthrax case.

    Photo

    The late Bruce Ivins in 2003, when he was a microbiologist at Fort Detrick, Md. Credit Sam Yu/Frederick News Post, via Assocaited Press
    The anthrax letters were mailed to United States senators and news organizations in the weeks after the Sept. 11, 2001, terrorist attacks, causing a huge and costly disruption in the postal system and the federal government. Members of Congress and Supreme Court justices were forced from their offices while technicians in biohazard suits cleaned up the lethal anthrax powder. Decontamination costs nationwide exceeded $1 billion. At least 17 people were sickened, in addition to the five who died.

    The bureau’s investigation, one of the longest-running and most technically complex inquiries in its history, has long been seen as troubled. Investigators initially lacked the forensic skills to analyze bioterrorist attacks. For several years, agents focused on a former Army scientist and physician, Dr. Steven J. Hatfill, who was subsequently cleared and given a $4.6 million settlement to resolve a lawsuit. Reviews by the National Academy of Sciences and the Government Accountability Office faulted aspects of the F.B.I.’s scientific work on the case.

    Mr. Lambert, who was himself criticized for pursuing Dr. Hatfill for so long, has now offered, in his lawsuit and in an interview, an insider’s view of what hampered the investigation.

    “This case was hailed at the time as the most important case in the history of the F.B.I.,” Mr. Lambert said. “But it was difficult for me to get experienced investigators assigned to it.”

    He said that the effort was understaffed and plagued by turnover, and that 12 of 20 agents assigned to the case had no prior investigative experience. Senior bureau microbiologists were not made available, and two Ph.D. microbiologists who were put on the case were then removed for an 18-month Arabic language program in Israel. Fear of leaks led top officials to order the extreme compartmentalization of information, with investigators often unable to compare notes and share findings with colleagues, he said.

    Mr. Lambert said he outlined the problems in a formal complaint in 2006 to the F.B.I.’s deputy director. Some of his accusations were later included in a report on the anthrax case by the CBS News program “60 Minutes,” infuriating bureau leaders.

    Photo

    The police in Frederick, Md., spoke with a woman they identified as Diane Ivins, the wife of Bruce E. Ivins, 62, at the couple’s home in Frederick, Md., in 2008. Credit Rob Carr/Associated Press
    The F.B.I., which rarely comments on pending litigation, did not respond to requests for comment on Mr. Lambert’s claims.

    Although the lethal letters contained notes expressing jihadist views, investigators came to believe the mailer was an insider in the government’s biodefense labs. They eventually matched the anthrax powder to a flask in Dr. Ivins’s lab at Fort Detrick in Maryland and began intense scrutiny of his life and work.

    They discovered electronic records that showed he had spent an unusual amount of time at night in his high-security lab in the periods before the two mailings of the anthrax letters. They found that he had a pattern of sending letters and packages from remote locations under assumed names. They uncovered emails in which he described serious mental problems.

    The investigators documented Dr. Ivins’s obsession with a national sorority that had an office near the Princeton, N.J., mailbox where the letters were mailed. They detected what they believed to be coded messages directed at colleagues, hidden in the notes in the letters.

    As prosecutors prepared to charge him with the five murders in July 2008, Dr. Ivins, 62, took his own life at home in Frederick, Md. Days later, at a news conference, Jeffrey A. Taylor, then the United States attorney for the District of Columbia, said the authorities believed “that based on the evidence we had collected, we could prove his guilt to a jury beyond a reasonable doubt.”

    But Mr. Lambert says the bureau also gathered a large amount of evidence pointing away from Dr. Ivins’s guilt that was never shared with the public or the news media. Had the case come to trial, he said, “I absolutely do not think they could have proved his guilt beyond a reasonable doubt.” He declined to be specific, saying that most of the information was protected by the Privacy Act and was unlikely to become public unless Congress carried out its own inquiry.

    After retiring from the F.B.I. in 2012, Mr. Lambert joined the Energy Department. But an F.B.I. ethics lawyer ruled that because Mr. Lambert had to work with F.B.I. agents in his new job, he was violating a conflict-of-interest law that forbade former federal employees from contacting previous colleagues for a year after they had left their government jobs.

    That ruling led to his dismissal, Mr. Lambert said, and he has not been able to find work despite applying for more than 70 jobs. His lawsuit asserts that several other former F.B.I. agents were able to take identical intelligence jobs with the Energy Department and that he was singled out for mistreatment.

    By SCOTT SHANEAPRIL 8, 2015

    Find this story at 8 April 2015

    © 2015 The New York Times Company

    Defense Department anthrax error triggers anger in Congress (2015)

    Van nieuwsblog.burojansen.nl

    The Pentagon wouldn’t say which labs received the live anthrax by mistake or who might have been exposed. The shipments went to facilities in nine states.

    Military officials said Thursday that the Pentagon was in close contact with officials at research labs in California, Texas and seven other states that received potentially live anthrax spores, but they refused to identify the labs or to disclose how many people were being treated with antibiotics to stave off the disease.

    A Defense Department spokesman, Army Col. Steven Warren, said 22 personnel at Osan Air Base in South Korea were taking the antibiotic Cipro as a precaution against anthrax exposure. But he declined to talk about whether workers at labs or other facilities in the United States were also taking Cipro.

    The lack of information was criticized by members of Congress, who demanded answers on how the mistaken shipments happened and who had been affected.

    “This incident represents a serious breach of trust in the United States Army’s obligation to keep our citizens and service members safe,” Sen. Bill Nelson, D-Fla., a member of the Senate Armed Services Committee, said in a letter to Army Secretary John McHugh. “Moreover, the shipments to a South Korea air base weaken the United States’ credibility as a global leader in chemical weapons control.”

    In a separate letter, a bipartisan group of members of the House of Representatives told Defense Secretary Ash Carter and Tom Frieden, the director of the Centers for Disease Control and Prevention, that the inadvertent shipments of live anthrax “raise serious safety concerns” about the way the military handles “dangerous pathogens.”

    The letter was signed by Rep. Fred Upton, R-Mich., the chair of the House Energy and Commerce Committee, and the panel’s senior Democrat, Rep. Frank Pallone of New Jersey, as well as two committee members, Republican Rep. Tim Murphy of Pennsylvania and Democratic Rep. Diana DeGette of Colorado.

    In comments to reporters Thursday, Warren acknowledged that he did not “have a whole lot of details on the exact purpose” of the anthrax shipments to Osan Air Base. In an earlier statement, Warren had said the anthrax shipments were part of a pilot program to develop a field test to identify biological threats in the environment.

    In addition to Osan, the Defense Department said it suspected that labs in nine states had received live anthrax because they had been recipients of the same “cluster” of shipments.

    In addition to facilities in California and Texas, those labs included military, university or commercial enterprises in Delaware, New Jersey, New York, Tennessee, Virginia, Maryland and Wisconsin. The anthrax was shipped from a Defense Department lab in Dugway, Utah.

    Warren said the the Centers for Disease Control and Prevention was working to determine who might have handled the anthrax shipments before they reached the nine destinations.

    He declined to describe what kind of packaging was used to ship the anthrax or to confirm news reports that FedEx had transported at least some of the shipments.

    Live anthrax requires strict handling protocols, and anthrax samples are supposed to be rendered inactive before being shipped for research uses. All military, government and civilian labs that might have received such samples are now reviewing their anthrax inventories.

    “Out of an abundance of caution, DOD has stopped the shipment of this material from its labs pending completion of the investigation,” Warren said.

    “The ongoing investigation includes determining if the labs also received other live samples, epidemiological consultation, worker safety review, laboratory analysis and handling of laboratory waste,” said Jason McDonald, a spokesman for the CDC.

    Anthrax burst into the American psyche one week after the 2001 terror attacks in New York and Washington, when over the course of several weeks five people died and 17 survived infection after anthrax-laced letters were sent to several news organization and to the offices of two U.S. senators.

    Two of the dead in 2001 were postal workers who’d come in contact with anthrax when the letters containing the spores passed through the Brentwood mail facility in Washington, D.C. Another was an employee of a Florida media company that had received one of the letters. How the other two victims were exposed has never been determined.

    Over the next seven years, the FBI and other prosecutors named two men as having possible ties to those anthrax attacks, Steven Hatfill and Bruce Ivins, but the government never brought charges against either of them.

    In the current case, four Defense Department employees in the United States who’d handled the samples have been placed in post-exposure treatment in addition to the 22 in South Korea, CNN reported.

    Warren defended the speed with which the Pentagon made public the information that live anthrax had inadvertently been shipped. That notification came five days after a research lab in Maryland told the Pentagon that it had received live anthrax in a package that was supposed to contain only inactive spores.

    “We got the information out as rapidly as we could,” he said. “It’s important to have as much accurate information as possible. Once we understood that there was no threat to the public, we understood that we had additional time to gather more information and present a more complete picture.”

    Osan Air Base in South Korea said in a statement that “all personnel were provided appropriate medical precautionary measures to include examinations, antibiotics and in some instances, vaccinations. None of the personnel have shown any signs of possible exposure.”

    The base added: “Hazardous material teams immediately cordoned off the facility, decontaminated it under Centers for Disease Control protocol, and destroyed the agent.”

    BY JAMES ROSEN – MCCLATCHY WASHINGTON BUREAU
    28 May 2015

    Find this story at 28 May 2015

    Copyright mcclatchydc.com

    New Report Casts Doubt on FBI Anthrax Investigation (2014)

    Van nieuwsblog.burojansen.nl

    For a second time in three years, an independent inquiry cast doubt Friday on the FBI’s assertion that genetic testing had cinched its conclusion that a now-dead Army bioweapons researcher mailed anthrax-laced letters that killed five people and terrorized the East Coast in 2001.

    The long-awaited report from the Government Accountability Office found that the FBI’s exhaustive, cutting-edge attempt to trace the killer with matches of genetic mutations of anthrax samples at times lacked precision, consistency and adequate standards.

    The 77-page report, perhaps the final official word on the FBI’s seven-year investigation known as Amerithrax, lent credence to a National Academy of Sciences panel’s finding in 2011 that the bureau’s scientific evidence did not definitely show that the anthrax came from the Maryland bioweapons laboratory of Bruce Ivins.

    The report’s findings also mirrored some of the conclusions of a joint investigation by FRONTLINE, McClatchy and ProPublica that was published and aired in the fall of 2011.

    Shortly after Ivins took a suicidal drug overdose on July 29, 2008, federal prosecutors said they’d been drafting criminal charges against him, and they declared the scientist at Fort Detrick, Md., the culprit. In 2010, they laid out an extensive circumstantial case against him, presenting as a smoking gun the findings of genetic testing by outside laboratories that matched four distinct mutations in the anthrax spores in the letters with those in a flask full of anthrax in Ivins’ laboratory.

    “The significance of using such mutations as genetic markers for analyzing evidentiary samples to determine their origins is not clear,” the auditors wrote. “This gap affects both the development of genetic tests targeting such mutations and statistical analyses of the results of their use.”

    The auditors pointed out that an FBI team recommended in 2007 that the bureau conduct experiments to determine whether the mutations the FBI was seeking to match might not have been unique to Ivins’ flask, known as RMR-1029. However, those tests were never done.

    That omission also drew concern from the National Academy of Sciences panel, which noted that it was possible that four identical “morphs” could have grown in another laboratory in what it termed “parallel evolution.”

    The auditors also focused on contradictory test results from samples collected from a colleague of Ivins who’d used anthrax from RMR-1029. That colleague – Henry Heine, though he wasn’t named in the report – submitted one sample that tested positive in all five genetic tests, but a duplicate sample from his vial tested negative for all five markers, the report said.

    The report said that Heine, in the presence of an FBI investigator, didn’t follow instructions for collecting one sample as laid out in a grand jury subpoena. The disclosure raises the possibility that inconsistent collection methods undercut the massive testing effort.

    While praising the FBI for turning to four outside laboratories for genetic tests on more than 1,000 anthrax samples it had gathered, the report said the bureau’s laboratory had failed to ensure that all the samples were collected in the same fashion, gave “minimal” instruction to the outside labs and set insufficient standards for validating the results. It also failed to measure the uncertainty in its results, leaving it unclear how much weight they deserve, the report said.

    Also unstudied was whether the anthrax spores grew differently in varying conditions, the report said.

    The FBI said Friday that it stood by its conclusion, saying it “has complete confidence in the scientific results that provided investigators with leads” to the anthrax used in the attacks.

    “As noted in the National Academy of Sciences Report, the genetic tests used by the FBI were well validated,” the bureau said, adding that after a review of all scientific analysis it “is satisfied that the analysis was conducted in a quality manner.”

    “It is important to note that the scientific results alone were not the sole basis for concluding that Bruce Ivins committed the 2001 anthrax-letter attacks,” the bureau said.

    However, Democratic Rep. Rush Holt of New Jersey, who was among three members of the House of Representatives who requested the audit from Congress’ investigative arm, said “the GAO report confirms what I have often said: that the FBI’s definitive conclusions about the accuracy of their scientific findings in the Amerithrax case are not, in fact, definitive.”

    Holt, a scientist who’s retiring from Congress at month’s end, also said “the United States needs a comprehensive, independent review of the Amerithrax investigation to ensure we have learned the lessons from this bio attack.”

    Paul Kemp, an attorney for Ivins, echoed Holt’s call for a fuller investigation.

    “I only wish we could have had a trial,” he said. “They never had any evidence he prepared the anthrax . . . only that he worked some unexplained overtime. Many scientists in and out of Fort Detrick asserted that there wouldn’t have been enough time for one person to do this – especially in a building and a lab that was open all day every day – without somebody seeing something.”

    December 19, 2014, 7:38 pm ET by Greg Gordon McClatchy Washington Bureau and Mike Wiser, FRONTLINE

    Find this story at 19 December 2014

    Web Site Copyright ©1995-2015 WGBH Educational Foundation

    New Evidence Adds Doubt to FBI’s Case Against Anthrax Suspect (2011)

    Van nieuwsblog.burojansen.nl

    A U.S. Army scientist stands near the letters used in the 2001 anthrax attacks (Photo courtesy of FBI).

    This story is a joint project with ProPublica, PBS Frontline and McClatchy. The story will air on Frontline on Oct. 11. Check local listings.

    WASHINGTON – Months after the anthrax mailings that terrorized the nation in 2001, and long before he became the prime suspect, Army biologist Bruce Ivins sent his superiors an email offering to help scientists trace the killer.

    Part 1: New Evidence Adds Doubt to FBI’s Case Against Anthrax Suspect

    Part 2: Did Bruce Ivins Hide Attack Anthrax From the FBI?

    Part 3: Was FBI’s Science Good Enough to ID Anthrax Killer?

    Video: The Anthrax Files

    Interactive: Read and annotate the case documents

    Editor’s Note: About the Case of the Anthrax Letters

    Already, an FBI science consultant had concluded that the attack powder was made with a rare strain of anthrax known as Ames that’s used in research laboratories worldwide.

    In his email, Ivins volunteered to help take things further. He said he had several variants of the Ames strain that could be tested in “ongoing genetic studies” aimed at tracing the origins of the powder that had killed five people. He mentioned several cultures by name, including a batch made mostly of Ames anthrax that had been grown for him at an Army base in Dugway, Utah.

    Seven years later, as federal investigators prepared to charge him with the same crimes he’d offered to help solve, Ivins, who was 62, committed suicide. At a news conference, prosecutors voiced confidence that Ivins would have been found guilty. They said years of cutting-edge DNA analysis had borne fruit, proving that his spores were “effectively the murder weapon.”

    To many of Ivins’ former colleagues at the germ research center in Fort Detrick, Md., where they worked, his invitation to test the Dugway material and other spores in his inventory is among numerous indications that the FBI got the wrong man.

    What kind of murderer, they wonder, would ask the cops to test his own gun for ballistics?

    To prosecutors, who later branded Ivins the killer in a lengthy report on the investigation, his solicitous email is trumped by a long chain of evidence, much of it circumstantial, that they say would have convinced a jury that he prepared the lethal powder right under the noses of some of the nation’s foremost bio-defense scientists.

    PBS’ Frontline, McClatchy and ProPublica have taken an in-depth look at the case against Ivins, conducting dozens of interviews and reviewing thousands of pages of FBI files. Much of the case remains unchallenged, notably the finding that the anthrax letters were mailed from Princeton, N.J., just steps from an office of the college sorority that Ivins was obsessed with for much of his adult life.

    Bruce Ivins
    Bruce Ivins

    But newly available documents and the accounts of Ivins’ former colleagues shed fresh light on the evidence and, while they don’t exonerate Ivins, are at odds with some of the science and circumstantial evidence that the government said would have convicted him of capital crimes. While prosecutors continue to vehemently defend their case, even some of the government’s science consultants wonder whether the real killer is still at large.

    Prosecutors have said Ivins tried to hide his guilt by submitting a set of false samples of his Dugway spores in April 2002. Tests on those samples didn’t display the telltale genetic variants later found in the attack powder and in sampling from Ivins’ Dugway flask.

    Yet records discovered by Frontline, McClatchy and ProPublica reveal publicly for the first time that Ivins made available at least three other samples that the investigation ultimately found to contain the crucial variants, including one after he allegedly tried to deceive investigators with the April submission.

    Paul Kemp, who was Ivins’ lawyer, said the government never told him about two of the samples, a discovery he called “incredible.” The fact that the FBI had multiple samples of Ivins’ spores that genetically matched anthrax in the letters, Kemp said, debunks the charge that the biologist was trying to cover his tracks.

    Asked about the sample submissions, as well as other inconsistencies and unanswered questions in the Justice Department’s case, lead federal prosecutor Rachel Lieber said she was confident that a jury would have convicted Ivins.

    “You can get into the weeds, and you can take little shots of each of these aspects of our vast, you know, mosaic of evidence against Dr. Ivins,” she said in an interview. But in a trial, she said, prosecutors would have urged jurors to see the big picture.

    “And, ladies and gentlemen, the big picture is, you have, you know, brick upon brick upon brick upon brick upon brick of a wall of evidence that demonstrates that Dr. Ivins was guilty of this offense.”

    Scientists who worked on the FBI’s case do not all share her certainty. Claire Fraser-Liggett, a genetics consultant whose work provided some of the most important evidence linking Ivins to the attack powder, said she would have voted to acquit.

    “I don’t know how it would have been possible to convict him,” said Fraser-Liggett, the director of the University of Maryland’s Institute for Genome Sciences. “Should he have had access to a potential bio-weapon, given everything that’s come to light? I’d say no. Was he just totally off the wall, from everything I’ve seen and read? I’d say yes.

    “But that doesn’t mean someone is a cold-blooded killer.”

    The Justice Department formally closed the anthrax case last year. In identifying Ivins as the perpetrator, prosecutors pointed to his deceptions, his shifting explanations, his obsessions with the sorority and a former lab technician, his penchant for taking long drives to mail letters under pseudonyms from distant post offices and, after he fell into drinking and depression with the FBI closing in, his violent threats during group therapy sessions. An FBI search of his home before he died turned up a cache of guns and ammunition.

    Most of all, though, prosecutors cited the genetics tests as conclusive evidence that Ivins’ Dugway spores were the parent material to the powder.

    Yet, the FBI never could prove that Ivins manufactured the dry powder from the type of wet anthrax suspensions used at Fort Detrick. It couldn’t prove that he scrawled letters mimicking the hateful rhetoric of Islamic terrorists. And it couldn’t prove that he twice slipped away to Princeton to mail the letters to news media outlets and two U.S. senators; it could prove only that he had an opportunity to do so undetected.

    The $100 million investigation did establish that circumstantial evidence could mislead even investigators armed with unlimited resources.

    Before focusing on Ivins, the FBI spent years building a case against another former Army scientist. Steven Hatfill had commissioned a study on the effectiveness of a mailed anthrax attack and had taken ciprofloxacin, a powerful antibiotic used to treat or prevent anthrax, around the dates of the mailings. Then-Attorney General John Ashcroft called Hatfill a “person of interest,” and the government eventually paid him a $5.8 million settlement after mistakenly targeting him.

    Ivins’ colleagues and some of the experts who worked on the case wonder: Could the FBI have made the same blunder twice?

    Did Ivins have a motive?

    Growing up in Ohio, the young Bruce Ivins showed an early knack for music and science. But his home life, described as “strange and traumatic” in a damning psychological report released after his death, left scars that wouldn’t go away.

    The report, written by a longtime FBI consultant and other evaluators with court-approved access to Ivins’ psychiatric records, said Ivins was physically abused by a domineering and violent mother and mocked by his father. Ivins developed “the deeply felt sense that he had not been wanted,” the authors found, and he learned to cope by hiding his feelings and avoiding confrontation with others.

    Ivins attended the University of Cincinnati, staying there until he earned a doctoral degree in microbiology. In his sophomore year, prosecutors say, the socially awkward Ivins had a chance encounter that influenced his life: A fellow student who belonged to the Kappa Kappa Gamma sorority spurned him.

    For more than 40 years, even as a married man, Ivins was obsessed with KKG, a fixation that he later admitted drove him to multiple crimes. Twice he broke into chapters, once climbing through a window and stealing the sorority’s secret code book.

    After taking a research job at the University of North Carolina at Chapel Hill, Ivins discovered that a doctoral student, Nancy Haigwood, was a KKG alumna, and he tried to strike up a friendship. When she kept him at a distance, Ivins turned stalker, swiping her lab book and vandalizing her fiance’s car and the fence outside her home. Two decades later, when Haigwood received an FBI appeal for scientists nationwide to help find the anthrax mailer, she instantly thought of Ivins and phoned the FBI. Investigators didn’t home in on him for years.

    When they did, the mailbox in Princeton, which also was near the home of a former Fort Detrick researcher whom Ivins disliked, loomed large.

    “This mailbox wasn’t a random mailbox,” said Edward Montooth, a recently retired FBI agent who ran the inquiry. “There was significance to it for multiple reasons. And when we spoke to some of the behavioral science folks, they explained to us that everything is done for a reason with the perpetrator. And you may never understand it because you don’t think the same way.”

    Ivins was a complicated, eccentric man. Friends knew him as a practical jokester who juggled beanbags while riding a unicycle, played the organ in church on Sundays and spiced office parties with comical limericks. William Hirt, who befriended Ivins in grad school and was the best man at his wedding, described him as “a very probing, spiritual fellow that wouldn’t hurt a fly.”

    Ivins gained self-esteem and status in his job as an anthrax researcher at the U.S. Army Medical Research Institute of Infectious Diseases at Fort Detrick in Frederick, Md.

    Even so, his fixations wouldn’t quit.

    He became so obsessed with two of his lab technicians that he sent one of them, Mara Linscott, hundreds of email messages after she left to attend medical school in Buffalo, N.Y. Ivins drove to her home to leave a wedding gift on her doorstep. When she left, he wrote a friend, “it was crushing,” and called her “my confidante on everything, my therapist and friend.”

    Later, after snooping on email messages in which the two technicians discussed him, Ivins told a therapist that he’d schemed to poison Linscott but aborted the plan at the last minute.

    USAMRIID was once a secret germ factory for the Pentagon, but the institute’s assignment shifted to vaccines and countermeasures after the United States and Soviet Union signed an international treaty banning offensive weapons in 1969. A decade later, a deadly leak from a secret anthrax-making facility in the Soviet city of Sverdlovsk made it clear that Moscow was cheating and prompted the United States to renew its defensive measures.

    Ivins was among the first to be hired in a push for new vaccines.

    By the late 1990s, he was one of USAMRIID’s top scientists, but the institute was enmeshed in controversy. Worried that Iraqi leader Saddam Hussein had made large quantities of anthrax before the 1991 Persian Gulf War, President Bill Clinton had ordered that all military personnel, not just those in war zones, be inoculated with a 1970s-era vaccine. But soldiers complained of ill health from the vaccine, some blaming it for the symptoms called Gulf War Syndrome.

    Later, Karl Rove, political adviser to new President George W. Bush, suggested that it was time to stop the vaccinations. Further, a Pentagon directive—although quickly reversed in 2000—had ordered a halt to research on USAMRIID’s multiple anthrax-vaccine projects.

    Federal prosecutors say these developments devastated Ivins, who’d devoted more than 20 years to anthrax research that was now under attack.

    “Dr. Ivins’ life’s work appeared destined for failure, absent an unexpected event,” said the Justice Department’s final report on the anthrax investigation, called Amerithrax. Told by a supervisor that he might have to work on other germs, prosecutors say Ivins replied: “I am an anthrax researcher. This is what I do.”

    Ivins’ former bosses at Fort Detrick call that Justice Department characterization wrong. Ivins had little to do with the existing vaccine; rather, he was working to replace it with a better, second-generation version, they say.

    In the summer of 2001, Ivins shouldn’t have had any worries about his future, said Gerard Andrews, who was then his boss as the head of USAMRIID’s Bacteriology Division. “I believe the timeline has been distorted by the FBI,” Andrews said. “It’s not accurate.”

    Months earlier, Andrews said, the Pentagon had approved a full year’s funding for research on the new vaccine and was mapping out a five-year plan to invest well over $15 million.

    Published reports have suggested that Ivins had another motive: greed. He shared patent rights on the new vaccine. If it ever reached the market, after many more years of testing and study, federal rules allowed him to collect up to $150,000 in annual royalties.

    If that was his plan, it didn’t go well. After the attacks, Congress approved billions of dollars for bio-defense and awarded an $877.5 million contract to VaxGen Inc. to make the new vaccine but scrapped it when the California firm couldn’t produce the required 25 million doses within two years.

    Ivins received modest royalty payments totaling at least $6,000. He told prosecutors he gave most of the money to others who had worked with him on the project, said Kemp, his defense attorney.

    Kemp said prosecutors told him privately that they’d dismissed potential financial returns as a motive. That incentive wasn’t cited in the Justice Department’s final report.

    Did Ivins have an opportunity?

    The relatively lax security precautions in place at U.S. defense labs before the mailings and Sept. 11 terrorist attacks offered many opportunities for a deranged scientist. Prosecutors said Ivins had easy access to all the tools needed to make the attack spores and letters.

    Researchers studying dangerous germs work in a “hot suite,” a specially designed lab sealed off from the outside world. The air is maintained at “negative pressure” to prevent germs from escaping. Scientists undress and shower before entering and leaving.

    Watch the video report
    Like many of his colleagues at Fort Detrick, Ivins dropped by work at odd hours. In the summer and fall of 2001, his night and weekend time in the hot suite spiked: 11 hours and 15 minutes in August, 31 hours and 28 minutes in September and 16 hours and 13 minutes in October. He’d averaged only a couple of hours in prior months. Swiping a security card each time he entered and left the suite, he created a precise record of his visits. Rules in place at the time allowed him to work alone.

    Sometime before the mailings, prosecutors theorize, Ivins withdrew a sample of anthrax from his flask—labeled RMR-1029—and began to grow large quantities of the deadly germ. If so, his choice of strains seemed inconsistent with the FBI’s portrait of him as a cunning killer. Surrounded by a veritable library of germs, they say, Ivins picked the Dugway Ames spores, a culture that was expressly under his control.

    Using the Ames strain “pointed right at USAMRIID,” said W. Russell Byrne, who preceded Andrews as the chief of the Bacteriology Division and who’s among those convinced of Ivins’ innocence. “That was our bug.”

    Federal prosecutors have declined to provide a specific account of when they think Ivins grew spores for the attacks or how he made a powder. But the steps required are no mystery.

    First, he would have had to propagate trillions of anthrax spores for each letter. The bug can be grown on agar plates (a kind of petri dish), in flasks or in a larger vessel known as a fermenter. Lieber, then an assistant U.S. attorney and lead prosecutor, said the hot suite had a fermenter that was big enough to grow enough wet spores for the letters quickly.

    To make the amount of powder found in the letters, totaling an estimated 4 to 5 grams, Ivins would have needed 400 to 1,200 agar plates, according to a report by a National Academy of Sciences panel released in May. Growing it in a fermenter or a flask would have been less noticeable, requiring between a few quarts and 14 gallons of liquid nutrients.

    Next was drying. Simple evaporation can do the job, but it also would expose other scientists in a hot suite. Lieber said the lab had two pieces of equipment that could have worked faster: a lyophilizer, or freeze dryer; and a smaller device called a “Speed Vac.”

    Investigators haven’t said whether they think the Sept. 11 attacks prompted Ivins to start making the powder or to accelerate a plan already under way. However, records show that on the weekend after 9/11, Ivins spent more than two hours each night in the hot suite on Friday, Saturday and Sunday.

    The next afternoon, Monday, Sept. 17, 2001, he took four hours of annual leave but was back at USAMRIID at 7 p.m. Because of their Sept. 18 postmarks, the anthrax-laced letters had to have been dropped sometime between 5 p.m. Monday and Tuesday’s noon pickup at a mailbox at 10 Nassau St. in Princeton.

    If Ivins did make the seven-hour round-trip drive from Fort Detrick, he would’ve had to travel overnight. Investigators said he reported to USAMRIID at 7 a.m. Tuesday for a business trip to Pennsylvania.

    Did Ivins have the means?

    Colleagues who worked with Ivins in the hot suite and think that he’s innocent say he’d never worked with dried anthrax and couldn’t have made it in the lab without spreading contamination.

    Andrews, Ivins’ former boss, said Ivins didn’t know how to use the fastest process, the fermenter, which Andrews described as “indefinitely disabled,” with its motor removed. He said the freeze dryer was outside the hot suite, so using it would have exposed unprotected employees to lethal spores.

    Without a fermenter, it would have taken Ivins “30 to 50 weeks of continuous labor” to brew spores for the letters, said Henry Heine, a former fellow Fort Detrick microbiologist who’s now with the University of Florida. Prosecutors and a National Academy of Sciences panel that studied the case said the anthrax could have been grown as quickly as a few days, though they didn’t specify a method.

    FBI searches years later found no traces of the attack powder in the hot suite, lab and drying equipment.

    Fraser-Liggett, the FBI’s genetics consultant, questioned how someone who perhaps had to work “haphazardly, quickly” could have avoided leaving behind tiny pieces of forensically traceable DNA from the attack powder.

    Lieber, the Justice Department prosecutor, said the FBI never expected to find useable evidence in the hot suite after the equipment had been cleaned multiple times.

    “This notion that someone could have stuck a Q-tip up in there and found, you know, a scrap of ‘1029’ DNA, I think is, with all due respect, it’s inconsistent with the reality of what was actually happening,” she said.

    Yet, in 2007, six years after the letters were mailed, the FBI carefully searched Ivins’ home and vehicles looking for, among other things, anthrax spores. None were found.

    The first round of anthrax letters went to an eclectic media group: Tom Brokaw, the NBC anchor; the tabloid newspaper the New York Post; and the Florida offices of American Media Inc., which publishes the National Enquirer. Just over two weeks later, on Oct. 4, jittery Americans were startled to learn that a Florida photo editor, Robert Stevens, had contracted an extremely rare case of inhalation anthrax.

    Stevens died the next day. As prosecutors tell the story, Ivins would hit the road to New Jersey again as early as Oct. 6, carrying letters addressed to the offices of Democratic Sens. Patrick Leahy, the Judiciary Committee chairman from Vermont, and Tom Daschle of South Dakota, the Senate majority leader.

    Unlike the brownish, granular, impure anthrax in the earlier letters, this batch was far purer, with tiny particles that floated like a gas, making them more easily inhaled and therefore deadlier.

    Just a few hours before those letters were dropped at Nassau Street, investigators had a scientific breakthrough: Paul Keim, an anthrax specialist at Northern Arizona University, verified that the spores in Stevens’ tissues were the Ames strain of anthrax.

    “It was a laboratory strain,” Keim recalled later, “and that was very significant to us.”

    On Oct. 15, an intern in Daschle’s office opened a nondescript envelope with the return address “4th Grade, Greendale School, Franklin Park, NJ 08852.” A white powder uncoiled from the rip, eventually swirling hundreds of feet through the Hart Senate Office Building, where dozens of senators work and hold hearings. It would take months and millions of dollars to fully cleanse the building of spores.

    Ill-prepared to investigate America’s first anthrax attack, the FBI didn’t have a properly equipped lab to handle the evidence, so the Daschle letter and remaining powder were taken to Fort Detrick.

    Among those immediately enlisted to examine the attack powder: Bruce Ivins.

    The FBI would turn to Ivins time and again in the months and years ahead. At this early moment, he examined the Daschle spores and logged his observations with scientific exactitude. The quality, he determined, suggested “professional manufacturing techniques.”

    “It is an extremely pure preparation, and an extremely high concentration,” Ivins wrote on Oct. 18, 2001. “These are not ‘garage’ spores.”

    Part 2: Did Bruce Ivins Hide Attack Anthrax From the FBI?

    In early 2002, federal agents who were hunting the anthrax killer were trying to winnow a suspect list that numbered in the hundreds. They knew only that they were looking for someone with access to the rare Ames strain of anthrax used in research labs around the world. Profilers said the perpetrator probably was an American with “an agenda.”

    The powder-laced letters, which killed five people, contained no fingerprints, hair or human DNA but did offer one solid microscopic clue: The lethal spores in the powder were dotted with genetically distinct variants known as morphs.

    So agents set out on an arduous task: Collect samples from Ames anthrax cultures around the world, sort through them and find one with morphs that matched the attack powder. Then they’d have a line on where the murder weapon was made and, perhaps, the identity of the killer.

    Bruce Ivins, an Army scientist at Fort Detrick, Md., had a good idea where the inquiry was headed. In the months after the attacks, he’d schooled federal agents in the intricacies of anthrax, explaining how the telltale morphs can arise from one generation to the next.

    In April 2002, Ivins did something that investigators would highlight years later as a pillar in the capital murder case that was being prepared against him before he committed suicide in 2008: He turned over a set of samples from his flask of Ames anthrax that tested negative, showing no morphs. Later, investigators would take their own samples from the flask and find four morphs that matched those in the powder.

    Rachel Lieber, the lead prosecutor in a case that will never go to trial, thinks that Ivins manipulated his sample to cover his tracks. “If you send something that is supposed to be from the murder weapon, but you send something that doesn’t match, that’s the ultimate act of deception. That’s why it’s so important,” Lieber said.

    However, a re-examination of the anthrax investigation by Frontline, McClatchy and ProPublica turned up new evidence that challenges the FBI’s narrative of Ivins as a man with a guilty conscience who was desperately trying to avoid being discovered.

    Records recently released under the Freedom of Information Act show that Ivins made available a total of four sets of samples from 2002 to 2004, double the number the FBI has disclosed. And in subsequent FBI tests, three of the four sets ultimately tested positive for the morphs.

    Paul Kemp, Ivins’ lawyer, said the existence of Ivins’ additional submissions was significant because it discredits an important aspect of the FBI’s case against his client. “I wish I’d known that at the time,” he said.

    Heroes and suspects

    To understand how investigators eventually came to see almost everything Ivins did or said as proof of his guilt, you have to return to the fall of 2001.

    The FBI wasn’t equipped to handle deadly germs, so the attack powder was rushed to Fort Detrick, the home of the U.S. Army Medical Research Institute of Infectious Diseases.

    From the beginning, Fort Detrick researchers played a prominent role in the inquiry. Ivins was among the most voluble, offering advice and a steady stream of tips about co-workers, foreign powers and former employees who might have carried out the attacks.

    Investigators quickly recognized they were in an awkward situation. Any of the scientists could be the killer. Agents canvassed the tight-knit laboratory, inviting the researchers to finger their colleagues. “We were heroes in the morning and suspects in the afternoon,” recalled Jeffrey Adamovicz, at the time the deputy chief of the Bacteriology Division, where Ivins worked.

    At 8:45 a.m. on Dec. 16, 2001, Ivins typed out an email to colleagues offering to provide Ames strain “for genetic analysis or sequencing by whomever.” He offered a sample of the original Ames anthrax taken in 1981 from a Texas cow and a collection of spores sent to Fort Detrick in 1997, mostly from the U.S. Army base in Dugway, Utah. Seven years later, prosecutors announced that they were certain the attack powder had been grown with germs from the Dugway flask Ivins was offering for scrutiny.

    John Ezzell, a USAMRIID scientist at the time who assisted the FBI, said in an interview that Ivins likely didn’t think the technology could distinguish among Ames variants. But the record suggests otherwise.

    On Jan. 23, 2002, Ivins gave an FBI agent a detailed tutorial on how to spot morphs in anthrax colonies. He also volunteered the names of two people who had the “knowledge and character” to have prepared and sent the letters while explaining that he’d never worked with powdered anthrax.

    Ivins then showed the agent photos of anthrax morphs and said that “DNA sequencing should show the differences in genetics,” the mutations that make morphs grow differently. Ivins had good reason to understand the biology of morphs: One of his best friends at the lab, Patricia Worsham, had published a pioneering paper on the subject several years earlier.

    In suggesting that the FBI use morphs to catch a killer, Ivins was proposing some cutting-edge science. No one had ever attempted to genetically fingerprint morphs, and the researchers advising the FBI weren’t even sure it could be done. Such genetic detective work, now commonplace, was in its infancy. Today, this technique is recognized as a precise but not foolproof method of identification.

    A few weeks later, Ivins gave several people the sort of evidence he seemed to be suggesting they collect. He provided a sample to a colleague who wanted to look at the spores under a microscope. Then, on Feb. 27, Ivins drew anthrax from his flask, which he labeled RMR-1029, and provided it to investigators who were assembling the FBI’s worldwide library of anthrax. If prosecutors are right, the murderer had handed over his gun for testing.

    But then the narrative took a strange twist. Perhaps deliberately, perhaps by chance, Ivins placed the spores in the wrong type of glass vessel. Investigators rejected the sample and told him to try again.

    Sometime in the next few weeks, prosecutors contend, Ivins figured out for the first time that the morphs might trap him. Until then, they assert, he’d assumed that the anthrax in his flask was pure and therefore without morphs. But Paul Keim, the scientist who helped the FBI identify the attack strain, said it seemed implausible that Ivins thought his spores were morph-free. The Dugway culture included dozens of separate batches, most of which were grown at the Utah Army base in fermenters, an ideal breeding ground for morphs. Ivins, Keim said, was likely to have understood this.

    In April 2002, Ivins prepared a third sample from RMR-1029. This time, his lawyer said, he plucked a sample using a technique called a “single colony pick,” a method biologists use to maintain purity when growing bacteria. Ultimately, this sample tested negative for the morphs. Prosecutors said they’re not even sure that the sample Ivins submitted came from the flask. If it did, they said, he obstructed justice, since their subpoena instructed scientists to capture diverse samples of spores that would be sure to reproduce any morphs. Ivins told investigators he’d followed standard procedures for microbiologists when he sampled just one colony.

    Investigators eventually seized and tested the germs Ivins turned over to his colleague for microscopic examination, and found they tested positive for the morphs. Separately, they stumbled across a duplicate first submission from February: the material that had been rejected. It, too, was positive.

    Curious conduct in the lab

    In late April 2002, investigators confronted Ivins about reports that he’d been furtively testing for anthrax spores in his office and other areas outside the “hot suites,” the sealed rooms where researchers worked with deadly pathogens.

    Ivins said that that was true and volunteered that he’d also conducted cleanups in the lab not once but twice — in December 2001, when he bleached over areas he’d found to be contaminated, and again in mid-April, when he conducted a search for errant anthrax spores.

    These acts violated the lab’s standard procedure, which called for the safety office to investigate and clean up any contamination.

    Ivins offered curious explanations. He said that in December, he had been trying to address the worries of a junior technician that sloppy handling of the attack powder had spread deadly spores through the lab. In April, against the advice of his supervisor, he launched his own tests after two researchers accidentally spilled a small amount of anthrax in the hot suite.

    Asked why he didn’t inform safety officials of the possible dangers, Ivins told investigators he didn’t want to disrupt the FBI inquiry or alarm colleagues.

    Whatever his motivation, subsequent tests showed Ivins had a point about failures to contain anthrax in the labs. His sampling showed that tiny amounts of anthrax of various strains had somehow seeped out of the hot suite and into his office. The Army ordered an investigation into why the lab’s safety procedures weren’t followed.

    Despite Ivins’ puzzling behavior, investigators wouldn’t focus on him for years.

    The anthrax inquiry was following another course and had zeroed in on a virologist named Steven Hatfill. A blunt character who boasted of his years in Rhodesia, Hatfill had a penchant for publicity, holes in his résumé and an unpublished novel that featured a Palestinian terrorist who attacks Washington with the bubonic plague. The evidence against him was entirely circumstantial.

    Investigators remained on Hatfill’s trail until late 2006. By then, they’d searched his home, deployed anthrax-sniffing dogs and even emptied a pond, from which they removed a suspicious contraption. It was a turtle trap. No evidence of anthrax turned up. (Hatfill sued the government and received $5.8 million to settle the case).

    A new Ivins sample

    In early April 2004, Ivins was asked to help the FBI collect a complete set of cultures from Fort Detrick. Earlier, FBI agents had found 22 vials of anthrax that hadn’t been turned over. On April 6, a lab assistant found a test tube of material that appeared to have been removed from Ivins’ flask.

    The assistant gave the germs to Henry Heine, a colleague of Ivins’ who happened to be in the building. Heine said he checked with Ivins, who told him to send a sample from the tube to the FBI. In an April 6 email, Ivins thanked Heine, acknowledging that the anthrax “was probably RMR-1029.”

    Heine views this moment as a sign of his colleague’s innocence, pointing out that Ivins willingly turned over a sample he thought had originated from his flask. In an interview, Heine said there were no cameras in the building, that FBI agents weren’t monitoring the search and that Ivins easily could have prepared the sample himself and tampered with the evidence.

    A day later, investigators seized Ivins’ flask, locking it in a safe double-sealed with evidence tape.

    What happened next raises questions about the reliability of the FBI’s method for detecting morphs. The bureau separately ordered tests on Heine’s sample and a second one drawn from the same test tube. Records show conflicting results, one negative and one positive.

    Does this mean the FBI’s tests for morphs were unreliable?

    An FBI scientist said Ivins had told investigators the anthrax in the refrigerator had been diluted. This perhaps made the morphs undetectable in testing, said the scientist, who was made available to discuss the matter on the condition of anonymity.

    Heine said the sample he sent wasn’t diluted.

    “We can only go by what Bruce told us,” the FBI scientist replied.

    Heine said he sent the FBI at least two additional samples from RMR-1029 that Ivins had shared with him. He said the FBI later told him both had tested negative for the morphs. The FBI scientist said the bureau could find no record of this.

    Ivins’ hidden obsessions come out

    In September 2006, the FBI assigned Edward Montooth to lead the anthrax inquiry. Montooth looked at the evidence through fresh eyes, and his attention quickly focused on the background and conduct of Ivins. By December, he told FBI Director Robert Mueller that Ivins had emerged as the prime suspect.

    Investigators saw mounting evidence that the Fort Detrick scientist was hiding something.

    They learned about his lifelong obsession with the Kappa Kappa Gamma sorority and discovered that the Princeton, N.J., mailbox into which the letters had been dropped was just yards from a KKG office. Ivins had mailed packages under assumed names, and his email messages expressed fears that he was paranoid, delusional or suffering from a split personality.

    “When I get all steamed up, I don’t pout. I push Bruce aside, then I’m free to run about!” one read.

    The genetic evidence seemed persuasive. Investigators had tested 1,059 Ames samples from U.S. and foreign labs and found only 10 with three or more of the morphs that genetically matched the letter powder. All traced back to Ivins’ flask.

    The FBI identified 419 people at Fort Detrick and other labs who could have had access to the material. Prosecutors say each was investigated and cleared of possible involvement.

    All of Ivins’ actions in the early days of the investigation were reinterpreted as signs of his guilt. Investigators recovered a portion of his first sample from RMR-1029—the test tubes that had been rejected because they were the wrong kind—and found that they contained the incriminating morphs. They contrasted that with the second sample from 2002—no morphs—and saw it as proof that Ivins had learned before submitting it that the Ames strain could be traced to his flask.

    Asked about the April 2004 sample turned up by PBS Frontline, McClatchy and ProPublica that tested positive, prosecutor Lieber said it could be easily explained. Ivins had no choice: FBI agents were swarming through Fort Detrick looking for cultures of anthrax that hadn’t been submitted for genetic testing.

    The unauthorized cleanup of the lab, the Justice Department said in its report last year, reflected a “guilty conscience.”

    “The evidence suggests that Dr. Ivins knew where to swab because he knew where he had contaminated the building,” prosecutors wrote.

    Even Ivins’ defenders had questioned his actions at the time. “I said, ‘Bruce, do you realize how bad this looks?’ And he was a little bit puzzled,” Adamovicz said. “I said, ‘This makes you look suspicious because it looks like you’re trying to hide something.’ Bruce, of course, denied that he was trying to hide anything. And again, in my view, I don’t think he was trying to hide anything. I think he couldn’t keep a secret if he had to.”

    Watch the video report
    The Army’s report on the incident didn’t portray it as nefarious. It confirmed the presence of Ames anthrax and two other anthrax strains in Ivins’ office. Ames also was found near a “pass box” through which Ivins had transferred one of the letters to the hot suite, the men’s changing area and Ivins’ office. But investigators were unable to nail down an original source for the contamination. They determined that it was unrelated to the minor spill in the hot suite and speculated that it could have resulted from the handling of the anthrax letters.

    Investigators executed a search warrant at Ivins’ home and office. They found guns, a shooting range in his basement and Tasers. But swab after swab taken from every conceivable nook and cranny found not a single spore from the attack powder. Lieber said that was to be expected with a microbiologist trained to handle dangerous germs.

    Claire Fraser-Liggett, a key genetics consultant for investigators, found such a dismissal troubling. “You think about all the efforts that had to go into decontaminating postal facilities, and the volatility of those spores and the fact that they were around for so long,” she said. “I think it represents a big hole, really gives me pause to think: How strong was this case against Dr. Ivins?”

    Ivins sat down for detailed interviews with prosecutors in early 2008 and volunteered a series of damaging admissions with his lawyer present. He acknowledged making long drives at night while his wife slept and calmly recounted his obsession with Kappa Kappa Gamma, blindfolding and bondage. Sometimes his answers were incoherent, FBI summaries show. He couldn’t explain, for example, why he had spent so many late nights in the lab in the weeks before the letter attacks.

    By the summer of 2008, Ivins was coming apart. He told his group therapy session, which he’d begun attending in recent months, that he was planning to get a gun so he could kill his enemies. The FBI searched his home again and seized several guns, bulletproof vests and 250 rounds of ammunition.

    Ivins was briefly committed and then released. On July 26, he took an overdose of over-the-counter medication. Three days later, he was dead at 62. Neither he nor the prosecutors would ever have their day in court.

    ‘This was not an airtight case’

    A week later, Justice Department officials called a news conference to describe their evidence against Ivins as some in Congress called for an independent investigation of the case.

    “We believed that based on the evidence we had collected, we could prove his guilt to a jury beyond a reasonable doubt,” U.S. Attorney Jeffrey Taylor told reporters at the time. “Based on the totality of the evidence we had gathered against him, we are confident that Dr. Ivins was the only person responsible for these attacks.”

    Prosecutors and investigators patiently laid out the case against Ivins. At its heart, they said, was the revolutionary science that had improbably traced the attack powder to a single flask.

    “RMR-1029 was conclusively identified as the parent material to the anthrax powder used in the mailings,” the Justice Department wrote in its summary of the case.

    Fraser-Liggett, who did some of the pioneering genetics work for the investigation, remains unconvinced.

    “This was not an airtight case, by any means. You know, I think that, for an awful lot of people, there is a desire to really want to say that ‘yes, Ivins was the perpetrator. This case can reasonably be closed. And we can put this tragic chapter in U.S. history behind us,’ ” she said. “But I think part of what’s driving that is the fact that, if he wasn’t the perpetrator, then it means that person is still out there.”

    Part 3: Was FBI’s Science Good Enough to ID Anthrax Killer?

    WASHINGTON — In March 2007, federal agents convened an elite group of outside experts to evaluate the science that had traced the anthrax in the letters to a single flask at an Army lab in Maryland.

    Laboratory work had built the heart of the case against Bruce Ivins, an Army researcher who controlled the flask. Investigators had invented a new form of genetic fingerprinting for the case, testing anthrax collected from U.S. and foreign labs for mutations detected in the attack powder.

    Out of more than 1,000 samples, only eight had tested positive for four mutations found in the deadly germs sent to Congress and the news media.

    Even so, the outside scientists, known as the “Red Team,” urged the FBI to do more basic research into how and when the mutations arose to make sure the tests were “sound” and the results unchallengeable.

    Jenifer Smith, a senior manager at the FBI’s laboratory, shared the team’s concerns. Smith recalled that she was worried the FBI didn’t have a full understanding of the mutations and might see a trial judge throw out the key evidence.

    “The admissibility hearing would have been very difficult,” Smith recalled in an interview. “They had some good science, but they also had some holes that would have been very difficult to fill.”

    The FBI rebuffed the Red Team’s suggestion, describing it as “an academic question with little probative value to the investigation.”

    Ivins committed suicide in July 2008 as prosecutors were preparing to charge him with capital murder in the cases of the five people killed by the anthrax mailings. Prosecutors announced that Ivins was the sole perpetrator and the parent material for the letters had come from his flask.

    Three years later, that assertion remains an open question. A separate panel, from the National Academy of Sciences, found that prosecutors had overstated the certainty of their finding. Committee members said newly available testing methods could prove the FBI’s case much more definitively or lead to other potential suspects. But federal investigators, who closed the case more than a year ago, have expressed no interest in further scientific study of the evidence.

    A re-examination of the anthrax case by PBS Frontline, McClatchy and ProPublica has raised new questions about some of the evidence against Ivins. The reporting uncovered previously undisclosed tensions between researchers who were trying to create a new form of forensic science and criminal investigators whose boss was under intense pressure from the president of the United States to crack a case that had few leads and hundreds of plausible suspects.

    Paul Keim, an anthrax expert at Northern Arizona University who assisted in the FBI investigation, said he had qualms about whether the bureau’s groundbreaking laboratory method would have survived a rigorous legal review.

    “I don’t think that it was ready for the courtroom at the time Bruce committed suicide,” Keim said.

    If Ivins hadn’t killed himself, he said, the FBI would have launched a “hard push” for additional data that showed the method was reliable. Such research, he said, also could have shown it wasn’t valid.

    Keim, a member of the Red Team who attended the March 2007 meeting in Quantico, Va., said he didn’t find out that the team’s call for further research had been rejected until a year later, after Ivins had committed suicide and prosecutors were hastily organizing a news conference to describe the science.

    Keim and other scientists involved in the case said the strictures of a criminal investigation prevented them from talking to one another or sharing information as they would on a typical research effort.

    “The investigation was being driven by a small group of bureau scientists and investigators,” Keim said. “Broader engagement with an expert panel sworn to secrecy would have been good. Having the best scientific consultants embedded would have been good.”

    Jenifer Smith was the section chief of the Intelligence and Analysis Section in the FBI’s Weapons of Mass Destruction Directorate until 2009, and she observed the process from inside. During the anthrax case, she said, the FBI lab departed from its traditional procedures and allowed top investigators to influence how the science was conducted.

    “They deviated from traditional lab practice in this particular case,” Smith said. “There were some political things going on behind the scenes, and it was embarrassing not to have this solved. Yes, it was a long, drawn-out investigation. But that’s when you don’t deviate from your practices.”

    Rachel Lieber, the lead prosecutor, said law-enforcement officials did try to make sure the science was rigorously vetted. But Lieber said there were limits and that the science was only a piece of a much larger mosaic of evidence against Ivins.

    “You look at the lines of a trial and where do we spend our resources,” Lieber said. “Are we doing a science project or are we looking for proof at trial? These are two very different standards.”

    Unprecedented effort on science

    Questions about the definitiveness of the scientific findings began to arise soon after prosecutors said Ivins was the anthrax mailer. U.S. Attorney Jeffrey Taylor declared without equivocation in August 2008 that the FBI had proved that Ivins’ flask, RMR-1029, “was the parent flask for the spores” used in the mailings — “effectively the murder weapon.”

    At a briefing a few weeks later, the FBI’s lab director, Christian Hassell, was asked to give a “level of confidence” for the findings. “It’s very high,” he replied. “This whole exercise shows that they were traced back to a single flask.”

    Another official at the briefing, who spoke on condition of anonymity as a ground rule, claimed that the Red Team of outside experts had vetted and approved the work and the FBI had heeded its calls for further research.

    “We invited a cadre of scientists to conduct a Red Team review of the science that we performed, and we took their suggestions,” the official said. “We made additional experiments and the data available to the Red Team at their suggestion. And so all of the science that went behind this was well-reviewed.”

    Critics on Capitol Hill weren’t mollified. Sen. Patrick Leahy, a Vermont Democrat and one of the intended recipients of an anthrax letter, said he didn’t believe that Ivins had acted alone. So FBI Director Robert Mueller announced in September 2008 that a panel of the National Academy of Sciences would conduct an independent review of the scientific findings.

    The FBI didn’t wait for the outcome of those deliberations. In February 2010, with the panel still taking testimony, prosecutors announced that the case was closed, Ivins was the sole perpetrator and RMR-1029 was “conclusively identified as the parent material to the anthrax powder used in the mailings.”

    Nearly a year to the day later, the outside committee looked at the same evidence differently, saying scientific data “provided leads” as to where the spores had come from but “alone did not rule out other sources.”

    The tests that identified the flask as the source of the parent spores for the attack showed an association but didn’t “definitively demonstrate such a relationship,” the panel said.

    When the case of the anthrax mailings broke in late 2001, genetic sequencing was in its early days. It was only a year earlier that two teams of American scientists had announced that they’d mapped the human genome. Work on anthrax was under way but incomplete.

    Watch the video report
    A fortuitous lab miscue may have provided the biggest break. Early in the investigation, a colleague of Ivins’ at the Army research facility in Fort Detrick, Md., left spores from one of the letters growing in a dish longer than she’d planned. When she next looked, the researcher, Terry Abshire, noticed something potentially significant: The cultures had small numbers of visually distinguishable colonies, or morphs, which are caused by genetic mutations.

    One of the leading scientists in the field describes morphs this way: Imagine a jar of M&M’s that are almost all chocolate — the anthrax spores — but sprinkled with a few blues and reds — the morphs. Scoop out a big enough portion of spores, grow the anthrax on plates, and a morph or two probably will appear.

    Morphs that look the same can be caused by different mutations. To create a true genetic fingerprint of the attack powder, scientists had to find and sequence the mutations that spawned the morphs.

    Once they had that fingerprint, investigators could look for a match with the stocks of anthrax in bio-defense labs. The Ames strain used in the letter attacks had been cultured from a dead cow in Texas in 1981, and the Army frequently used it for animal testing of vaccines.

    More than 1,000 samples tested

    The attack powder had multiple morphs. Over several years, contractors developed tests for four morphs that produced what the FBI said were reliable results.

    It was no easy task. Just a year before the anthrax attacks, it would have been inconceivable, Keim said. By late 2001, it was merely revolutionary.

    When the anthrax samples from U.S. and foreign bio-weapons labs were screened, only 10 out of more than 1,000 tested positive for three or more of the morphs. All came from Ivins’ flask, RMR-1029.

    In its report earlier this year, the National Academy of Sciences panel raised numerous questions about this finding, some of which had been posed by the Red Team back in 2007.

    The panel also noted that the FBI didn’t have a complete understanding of how temperature or other growth conditions might affect how many morphs appeared. Perhaps a particular morph would become visible only under certain growth conditions. It was this question that the Red Team had suggested for additional research in 2007.

    The FBI’s own records show that the tests didn’t always deliver reliable results. In trying to prove that a sample Ivins provided from his flask in April 2002 was deceptive because it contained none of the morphs from the attack powder, investigators sampled the flask 30 times. All came back with at least one morph, and 16 came back with all four. Six of them showed only two or fewer, even though they were grown directly from the Ivins culture.

    The National Academy of Sciences panel’s report raised the possibility that some of the morphs could arise through the process of “parallel evolution,” in which identical mutations occur in separately growing colonies of bacteria.

    Richard Lenski, a Michigan State University professor and specialist in this field, said the FBI faced a significant challenge. In what he termed a “dream world” with unlimited resources, researchers could separately grow hundreds of colonies of the anthrax in both Ivins’ flask and the attack powder and compare the morphs that evolve.

    Such an experiment, of course, would be an expensive long shot, because the person who made the powder did so in secret with methods that remain unknown.

    Claire Fraser-Liggett, a pioneering genetics researcher, was part of the effort to track the morphs. In August 2008, she sat onstage alongside senior FBI science officials as the findings were presented. By then, she said, the technology had leapfrogged far beyond the techniques used in 2001 and 2002 to compare morphs.

    Beginning in about 2006, she said, “next generation” sequencing came on line. What cost $250,000 and took one to two months of work in 2001 now could be done for about $150 in a week. With price no longer an issue, the DNA in a colony of anthrax could be sampled over and over and over, assuring accuracy. And you wouldn’t be limited to four morphs; you could test as many as you felt were useful.

    Fraser-Liggett doesn’t fault the FBI for not switching to an untried technique in 2006. But she said the enhanced precision now available could bring new evidence to light, confirming investigators’ original conclusion or pointing in other directions.

    Chemical signals never fully explained

    For now, the case remains a matter of dispute, with prosecutors and law-enforcement officials insisting that the combination of science and circumstantial evidence would have been more than sufficient to win a conviction.

    One area of contention is whether the killer tried to add a chemical to make the spores float more easily, so they’d have a better chance of being inhaled. McClatchy first reported last spring that the FBI had failed to explain the presence of unusual levels of silicon and tin in two of the letters, since those elements aren’t part of the process of growing spores.

    Scientists pressing for answers to those questions published a paper in a scientific journal this month. The FBI says the silicon was present through a natural process, not from any special treatment by Ivins.

    David A. Relman, vice chairman of the National Academy study committee and a professor at the Stanford University School of Medicine, said the scientific picture remained incomplete.

    Relman said, for example, that the high level of silicon measured in the letter sent to the New York Post remained a “big discrepancy,” one for which the panel received no explanation. None of the spores in Ivins’ now-infamous flask contained any silicon.

    Relman said the panel questioned FBI officials about whether the high silicon measurement had arisen from an anomaly in the testing.

    “We asked: ‘Is it nonrepresentative sampling?'” he said.

    “And they said, ‘No, we don’t think that’s the answer.’ ”

    “There is no answer,” Relman said, “That’s why we said it’s not resolved.”

    Lieber, the prosecutor, said she would have moved to exclude the high-silicon reading at trial since it came from a single measurement.

    According to the FBI, the anthrax from RMR-1029 was used as starter germs for the attack powder. Investigators suspect that there were at least two separate production runs. The powder sent to the media was relatively coarse; the anthrax mailed to Congress had much smaller particles and floated like a gas.

    The germs in the flask were a mix of anthrax grown by Ivins and the Army base in Dugway, Utah. During the growth phase, the anthrax killer introduced several impurities, including silicon, trace elements of tin and, in two of the letters, an unusual strain of another bacterium, Bacillus subtilis.

    Had Ivins not committed suicide, his trial very likely would have included vigorous sparring over the scientific evidence. Experts probably would have offered conflicting testimony about the reliability and certainty of the genetic tests.

    Relman said a trial would have been the only way in which the prosecution’s evidence “could have been weighed and challenged by experts.”

    It’s worth considering whether an independent panel should evaluate the full case against Ivins, looking at the science, the evidence investigators gathered and all other relevant material, Relman said.

    “We have to decide … how important this case is to us as a society, and I’m not presupposing it is,” he said.

    Fraser-Liggett and Lenski said it would be valuable to continue testing the anthrax samples in the case as new, more sensitive technologies come on line.

    “Speaking as an individual citizen,” Lenski wrote in an email, “I think it would benefit the public. Even if it didn’t resolve the Amerithrax case with respect to criminal culpability, it would be a valuable test run of what science could contribute if a similar terrorist event were to occur.”

    by Stephen Engelberg, ProPublica, Greg Gordon, McClatchy, Jim Gilmore and Mike Wiser, PBS Frontline, Oct. 10, 2011, 11:04

    Find the story at 10 October 2011 part 1

    Find the story at 10 October 2011 part 2

    Find the story at 10 October 2011 part 3

    Copyright Propublica.org

    The Anthrax Files: The Essential Documents (2011)

    Van nieuwsblog.burojansen.nl

    FRONTLINE closely examined more than 27,000 pages of FBI documents for this investigation. Here are some of the key documents and significant reports on the investigation and the government’s conclusion that Dr. Bruce Ivins was the perpetrator of the attacks.

    October 1997 — USAMRIID Reference Material Receipt Record
    This document shows Dr. Bruce Ivins at the U.S. Army Medical Research Institute of Infectious Diseases (USAMRIID) was the custodian of a 1000 ml flask of liquid anthrax labeled RMR-1029. The FBI later claims RMR-1029 is the parent material of the anthrax used in the mailings.

    October 2001 — Bruce Ivins’ Analysis of the Daschle Sample
    The anthrax from the letter addressed to Sen. Tom Daschle (D-S.D.) was sent to USAMRIID for analysis by Ivins and his colleagues. In his report, Ivins wrote:

    If this is a preparation of bacterial spores, it is an extremely pure preparation, and an extremely high concentration. These are not “garage” spores. The nature of the spore preparation suggests very highly that professional manufacturing techniques were used in the production and purification of the spores, as well as converting the spores into an extremely fine powder.

    March 2005 — Ivins Interviewed by FBI
    In the spring of 2005, investigators were narrowing in on RMR-1029, and they began interviewing people with access to the flask. They interview Ivins on March 31. He is asked detailed questions about the flask, anthrax production at USAMRIID, and personal e-mail exchanges:

    IVINS was aware that many of these e-mails reveal aspects of his personal life and mental health at the time, including an acknowledgement by him that he was seeing a psychologist and had been diagnosed with “paranoid personality disorder.” IVINS offered that at the time some of these e-mails were written he was taking the antidepressant prescription medication Celexa (citalopram hydrobromide). IVINS said he is better now and no longer takes Celexa. IVINS related that he internalizes his negative emotions and, as a result, suffers from ulcers and irritable bowel syndrome. When asked whether his psychological condition had ever caused him to do anything which surprised him, IVINS responded in the negative. IVINS offered that he does not “act out” and has never hit his wife.

    Ivins is also asked whether, as the patent-holder on an anthrax vaccine, he could have financially benefited from the attacks. Ivins says that he received $6,000 in royalties after his vaccine was mass-produced and that he shared the payment with his colleagues.

    Ivins also addresses his late hours and weekends at work, saying he would sometimes go to the lab “‘to escape’ the stresses of his family” and that he spent time in the hot suites to escape a security guard who bothered him.

    And he talks about taking long, “mindless drives,” equating them with “the way some people go for a long walk,” but denies driving to Princeton, N.J. (the location from which the anthrax letters were mailed).

    Years later, Ivins would e-mail a friend about this interrogation, which he says put him into a deep depression:

    Up until that time I felt that I had been helping officials with the anthrax letters case, providing as much as I could that I thought was relevant. Then at the end of March I had an interrogation from two people who said I was suspicious … and asked me lots more accusatory questions. I was crushed and had to be taken out of the biocontainment suites for several months.

    September 2006 — FBI Report on the USAMRIID Anthrax Samples
    This FBI report shows all the samples that tested positive for the morphs that were in the attack anthrax. Three of those samples — highlighted in the document — came from Ivins. The report also notes an additional sample from Ivins that tested negative for the morphs; investigators would later accuse Ivins of having deliberately obscured this sample to hide his involvement in the attacks.

    Summer 2007 — Ivins’ E-mails Following His Grand Jury Appearance
    As pressure increased throughout the investigation, particularly following his May 2007 appearances before the grand jury, Ivins’ e-mail activity revealed an increasingly distraught man:

    “Eventually a trial will come and we’ll be dragged up to the witness chair to testify, and that’s when the other side wil [sic] start dragging us through the dirt. It’s a lawyer’s job to sully the personal and professional reputations of witnesses on the other side. For me it means people finding out that I’m a slob, keep poor records, am lousy at math, and see a psychiatrist. There are things that others would prefer not to be spread around. I’m planning on leaving at the end of September of 2008.” (May 23, 2007)
    “Who knows. I’m just so beat. I was at the grand jury for five hours, 3 hours on one day and 2 hours on the next. The questions were so accusatory on so many fronts. … I’m not planning on jumping off a bridge or something, so don’t think I’m going suicidal or something. I honestly don’t know what anybody can do. … I don’t think there’s much anybody can do. I search emails and documents, trying to find things, trying to help, and look at what it gets me. It makes me wish that I had never gone into biomedical research.” (May 24, 2007)
    “The grand jury was also very accusatory. I’m fortunately taking a lot of medication for depression, but that’s only helping some. I also have to use a lot of caffeine in the morning, and then alcohol and sleeping pills at night. Do you realize that if anybody gets indicted for even the most remote reason with respect to the anthrax letters — something as simple as not locking up spore preps to restrict them from only people in our lab — they face the death penalty? Playing any part, even a minor part such as providing information about how to make spores, or how to make them in broth, how to harvest and purify that could wind up putting one or more hapless persons on death row. Not pleasant to think about.” (June 10, 2007)
    November 2007 — FBI Searches Ivins’ Home
    On Nov. 1, agents interview Ivins at work and ask him a series of questions about RMR-1029 and his submissions to the FBI repository.

    Towards the end of the interview, agents tell Ivins that a search is underway of his home, vehicles and office space. The agents ask Ivins if he “worried”; he acknowledged he was and after a few minutes said that he does things “a middle age man should not do” and that would “not be acceptable to most people,” including cross-dressing.

    “It was the worst day of my life,” Ivins would later e-mail a friend.

    January 2008 — Ivins Interviewed by Federal Prosecutors
    This is the FBI’s report of Ivins’ first major sit-down interview with federal prosecutors. During the interview, he details his obsession with the Kappa Kappa Gamma sorority, which began in the early 1960s after a KKG member rejected a date with him.

    Ivins admits visiting several KKG houses across the south and stealing secret ritual materials from KKG chapters at the University of North Carolina and West Virginia University. He says he committed the burglaries during spring breaks “to ensure nobody would be present in the houses.”
    Ivins says his wife had no knowledge of his obsession or his clandestine visits to KKG houses. In her interview with FRONTLINE, prosecutor Rachel Lieber underscored the significance of this admission: “He said to us, effectively, ‘I don’t have an alibi.’”
    Ivins also tells investigators that after he learned his colleague Nancy Haigwood was a Kappa, “he set out to learn everything about and befriend her.” He admits to stealing her lab notebook while in graduate school, and to later spray painting “KKG” on the sidewalk near her house and vandalizing her car.
    Ivins admits to having several aliases and to maintaining a P.O. box from which he distributed copies of the KKG ritual book using a name prosecutors say was based on the name of Haigwood’s then-husband. He says he had a second P.O. box where he received bondage literature.
    February 2008 — Ivins’ Second Interview by Federal Prosecutors
    In a second sit-down interview with Ivins, prosecutors follow up on many of the statements he made in his first interview, including his KKG obsession. Ivins describes in detail breaking into the Chapel Hill and West Virginity University sorority houses:

    He entered the house at night through a first floor bathroom window which was located behind a shrub. Although there were several lights on inside, he knew nobody was there as those lights were always left on. IVINS, using a small pen light to help him see, went upstairs and looked for anything which was locked and may contain secretive sorority documents or materials. There was a hallway closet which was locked, so IVINS used a coat hanger or some similar object to open the door. Inside the closet he found the “Cipher” and some documents regarding KKG rituals. The Cipher was a document encased in glass, and it referred to a book of ritual which IVINS also looked for but did not find. In an unlocked closet directly across from that which contained the Cipher were some blindfolds made from torn bed sheets. IVINS assumed the blindfolds were used for the KKG initiation, but he did not take them. IVINS left after spending about an hour in the house, taking with him the Cipher and ritual materials.

    He also says he took long drives “as a way to relieve stress or as a form of therapy,” but says his wife never knew where he went or questioned him.

    During the interview, investigators showed Ivins a diagram he drew early on in the investigation that showed how he prepared very pure anthrax spores. But when shown the diagram, Ivins said he didn’t remember drawing it and was “non-responsive” to questions about how to interpret the drawing.

    Investigators would later contrast Ivins’ precise memory of events long past with his inability to explain how his time was spent during late nights in the laboratory. And they would argue that Ivins’ admissions of long drives was significant because it showed a pattern of behavior, and because he undercut an alibi by acknowledging his wife didn’t know when or where he was going.

    July 2008 — Fredericksburg Police Report
    View the report (PDF)

    Threatening to take revenge on his colleagues, Ivins broke down during a group therapy session in July 2008. His therapist, Jean Duley petitioned for Ivins to be involuntarily confined to a mental institution, and police forcibly removed Ivins from the lab the following day. Duley’s notes are included in this police report, released after Ivins’ suicide.

    The client appeared angry, hostile, and jumpy. He was asked if there was an issue he wanted to discuss. The client was evasive, pressed he started talking about anger towards investigators, the government, the whole system. He began to detail the anger, asked to focus he described he wasn’t going to face the death penalty. He described his plan, the bullet proof vest, a gun, a list of co-workers, people that had wronged him, etc. He had a tone of anger but a smile on his face. He was very agitated, shaky and pressed I his speech, very delibrate, [sic] thoughtful and certain in manner. He explained that he had been on the streets looking for someone to pick a fight with him so that he could hurt them, showing a sharp pen he could use as a weapon. He stated that he was not going to drink, but when he did it would be the 1st time, he kept asking for sleeping pills, several times he asked. He repeated his plan with the bullet proof vest, gun, list, explaining that a well thought out plan cleaning up etc could be done, he was stopped because others in the group were unnerved by that speech. He was very clear in his thought patterns, is [sic] anger towards certain individuals and his ideas of harming others and himself.

    February 2010 — Justice Department Releases Summary of Amerithrax Investigation
    View the report (PDF)

    The government publicly named Bruce Ivins as the suspect in a hastily arranged press conference days after his August 2008 suicide; the Justice Department’s final summary of the Amerithrax investigation was released 18 months later.

    The 92-page report details the government’s case against Ivins, including his access to RMR-1029, his late nights and weekends in the lab, his mental health issues, his suspicious submissions to the FBI anthrax repository, his KKG obsession, his habit of long drives, and the threats made during his July 2008 therapy session. Regarding Ivins’ motive, investigators wrote:

    … it is clear that by the summer of 2001, Dr. Ivins was under an extraordinary amount of stress in his professional life. The anthrax vaccine research program that Dr. Ivins had invested essentially his entire career of more than 20 years was in jeopardy of failure. … Under extreme pressure from so many different assaults on his career and life’s work, Dr. Ivins had a motive to commit the crime.”

    February 2011 — National Academies of Sciences Questions FBI Scientific Findings
    View the report

    Under criticism about the FBI’s conclusions in the case, FBI Director Robert Mueller asked an independent panel from the National Academies of Sciences to independently review the investigation’s scientific findings.

    “It is not possible to reach a definitive conclusion about the origins of the B. anthracis in the mailings based on the available scientific evidence alone,” the panel concluded in a 191-page report.

    And the report particularly called into question the conclusions about RMR-1029: “The scientific link between the letter material and flask number RMR-1029 is not as conclusive as stated in the DOJ Investigative Summary,” though the panel did say that genetic evidence supported “an association” between the attack anthrax and RMR-1029.

    In its official response, the FBI maintained that its scientific conclusions were only one part of its case against Ivins:

    … while science played a significant role, it was the totality of the investigative process that determined the outcome of the anthrax case. Although there have been great strides in forensic science over the years, rarely does science alone solve an investigation. The scientific findings in this case provided investigators with valuable investigative leads that led to the identification of the late Dr. Bruce Ivins as the perpetrator of the anthrax attacks.

    August 2011 — Expert Behavioral Analysis Panel Report
    View the report (PDF)

    Following Ivins’ suicide, a federal court judge asked a panel of experts to review Ivins’ psychiatric records. The panel’s review of the records found that:

    Dr. Ivins was psychologically disposed to undertake the mailings; his behavioral history demonstrated his potential for carrying them out; and he had the motivation and the means. The psychiatric records offer considerable additional circumstantial evidence in support of the DOJ’s finding.

    The report details Ivins’ “traumatic, damaging childhood,” his KKG obsession and his “intense emotional attachments” to two of his female lab technicians. It suggests his “lifelong preoccupation” with revenge, “personal validation” and “professional redemption” as possible motives behind the attacks.

    Ivins’ “significant and lengthy history of psychological disturbance and diagnosable mental illness” should have precluded him from holding a security clearance, the report concludes.

    October 10, 2011, 11:57 pm ET

    Find this story at 10 October 2011

    Web Site Copyright ©1995-2015 WGBH Educational Foundation

    THE CIA CAMPAIGN TO STEAL APPLE’S SECRETS

    Van nieuwsblog.burojansen.nl

    RESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept.

    The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released.

    By targeting essential security keys used to encrypt data stored on Apple’s devices, the researchers have sought to thwart the company’s attempts to provide mobile security to hundreds of millions of Apple customers across the globe. Studying both “physical” and “non-invasive” techniques, U.S. government-sponsored research has been aimed at discovering ways to decrypt and ultimately penetrate Apple’s encrypted firmware. This could enable spies to plant malicious code on Apple devices and seek out potential vulnerabilities in other parts of the iPhone and iPad currently masked by encryption.

    The CIA declined to comment for this story.

    The security researchers also claimed they had created a modified version of Apple’s proprietary software development tool, Xcode, which could sneak surveillance backdoors into any apps or programs created using the tool. Xcode, which is distributed by Apple to hundreds of thousands of developers, is used to create apps that are sold through Apple’s App Store.

    The modified version of Xcode, the researchers claimed, could enable spies to steal passwords and grab messages on infected devices. Researchers also claimed the modified Xcode could “force all iOS applications to send embedded data to a listening post.” It remains unclear how intelligence agencies would get developers to use the poisoned version of Xcode.

    Researchers also claimed they had successfully modified the OS X updater, a program used to deliver updates to laptop and desktop computers, to install a “keylogger.”

    Other presentations at the CIA conference have focused on the products of Apple’s competitors, including Microsoft’s BitLocker encryption system, which is used widely on laptop and desktop computers running premium editions of Windows.

    The revelations that the CIA has waged a secret campaign to defeat the security mechanisms built into Apple’s devices come as Apple and other tech giants are loudly resisting pressure from senior U.S. and U.K. government officials to weaken the security of their products. Law enforcement agencies want the companies to maintain the government’s ability to bypass security tools built into wireless devices. Perhaps more than any other corporate leader, Apple’s CEO, Tim Cook, has taken a stand for privacy as a core value, while sharply criticizing the actions of U.S. law enforcement and intelligence agencies.

    “If U.S. products are OK to target, that’s news to me,” says Matthew Green, a cryptography expert at Johns Hopkins University’s Information Security Institute. “Tearing apart the products of U.S. manufacturers and potentially putting backdoors in software distributed by unknowing developers all seems to be going a bit beyond ‘targeting bad guys.’ It may be a means to an end, but it’s a hell of a means.”

    Apple declined to comment for this story, instead pointing to previous comments Cook and the company have made defending Apple’s privacy record.

    lockheed
    Lockheed Martin Dulles Executive Plaza, Herndon, Virginia.
    SECURITY RESEARCHERS from Sandia National Laboratories presented their Apple-focused research at a secret annual CIA conference called the Trusted Computing Base Jamboree. The Apple research and the existence of the conference are detailed in documents provided to The Intercept by National Security Agency whistleblower Edward Snowden.

    The conference was sponsored by the CIA’s Information Operations Center, which conducts covert cyberattacks. The aim of the gathering, according to a 2012 internal NSA wiki, was to host “presentations that provide important information to developers trying to circumvent or exploit new security capabilities,” as well as to “exploit new avenues of attack.” NSA personnel also participated in the conference through the NSA’s counterpart to the CIA’s Trusted Computing Base, according to the document. The NSA did not provide comment for this story.

    The Jamboree was held at a Lockheed Martin facility inside an executive office park in northern Virginia. Lockheed is one of the largest defense contractors in the world; its tentacles stretch into every aspect of U.S. national security and intelligence. The company is akin to a privatized wing of the U.S. national security state — more than 80 percent of its total revenue comes from the U.S. government. Via a subsidiary, Lockheed also operates Sandia Labs, which is funded by the U.S. government. The lab’s researchers have presented Apple findings at the CIA conference.

    “Lockheed Martin’s role in these activities should not be surprising given its leading role in the national surveillance state,” says William Hartung, director of the Arms and Security Project at the Center for International Policy and author of Prophets of War, a book that chronicles Lockheed’s history. “It is the largest private intelligence contractor in the world, and it has worked on past surveillance programs for the Pentagon, the CIA and the NSA. If you’re looking for a candidate for Big Brother, Lockheed Martin fits the bill.”

    The Apple research is consistent with a much broader secret U.S. government program to analyze “secure communications products, both foreign and domestic” in order to “develop exploitation capabilities against the authentication and encryption schemes,” according to the 2013 Congressional Budget Justification. Known widely as the “Black Budget,” the top-secret CBJ was provided to The Intercept by Snowden and gives a sprawling overview of the U.S. intelligence community’s spending and architecture. The White House did not respond to a request for comment.

    As of 2013, according to the classified budget, U.S. intelligence agencies were creating new capabilities against dozens of commercially produced security products, including those made by American companies, to seek out vulnerabilities.

    Last week, CIA Director John Brennan announced a major reorganization at the agency aimed, in large part, at expanding U.S. cyber-operations. The Information Operations Center, which organized the Jamboree conferences, will be folded into a new Directorate of Digital Innovation. Notwithstanding its innocuous name, a major priority of the directorate will be offensive cyberattacks, sabotage and digital espionage. Brennan said the CIA reorganization will be modeled after the agency’s Counterterrorism Center, which runs the U.S. targeted killing and drone program.

    THE DOCUMENTS do not address how successful the targeting of Apple’s encryption mechanisms have been, nor do they provide any detail about the specific use of such exploits by U.S. intelligence. But they do shed light on an ongoing campaign aimed at defeating the tech giant’s efforts to secure its products, and in turn, its customers’ private data.

    “Spies gonna spy,” says Steven Bellovin, a former chief technologist for the U.S. Federal Trade Commission and current professor at Columbia University. “I’m never surprised by what intelligence agencies do to get information. They’re going to go where the info is, and as it moves, they’ll adjust their tactics. Their attitude is basically amoral: whatever works is OK.”

    Bellovin says he generally supports efforts by U.S. intelligence to “hack” devices — including Apple’s — used by terrorists and criminals, but expressed concern that such capabilities could be abused. “There are bad people out there, and it’s reasonable to seek information on them,” he says, cautioning that “inappropriate use — mass surveillance, targeting Americans without a warrant, probably spying on allies — is another matter entirely.”

    In the top-secret documents, ranging from 2010 through 2012, the researchers appear particularly intent on extracting encryption keys that prevent unauthorized access to data stored — and firmware run — on Apple products.

    “The Intelligence Community (IC) is highly dependent on a very small number of security flaws, many of which are public, which Apple eventually patches,” the researchers noted in an abstract of their 2011 presentation at the Jamboree. But, they promised, their presentation could provide the intelligence community with a “method to noninvasively extract” encryption keys used on Apple devices. Another presentation focused on physically extracting the key from Apple’s hardware.

    A year later, at the 2012 Jamboree, researchers described their attacks on the software used by developers to create applications for Apple’s popular App Store. In a talk called “Strawhorse: Attacking the MacOS and iOS Software Development Kit,” a presenter from Sandia Labs described a successful “whacking” of Apple’s Xcode — the software used to create apps for iPhones, iPads and Mac computers. Developers who create Apple-approved and distributed apps overwhelmingly use Xcode, a free piece of software easily downloaded from the App Store.

    The researchers boasted that they had discovered a way to manipulate Xcode so that it could serve as a conduit for infecting and extracting private data from devices on which users had installed apps that were built with the poisoned Xcode. In other words, by manipulating Xcode, the spies could compromise the devices and private data of anyone with apps made by a poisoned developer — potentially millions of people. “Trying to plant stuff in Xcode has fascinating implications,” says Bellovin.

    The researchers listed a variety of actions their “whacked” Xcode could perform, including:

    — “Entice” all Mac applications to create a “remote backdoor” allowing undetected access to an Apple computer.

    — Secretly embed an app developer’s private key into all iOS applications. (This could potentially allow spies to impersonate the targeted developer.)

    — “Force all iOS applications” to send data from an iPhone or iPad back to a U.S. intelligence “listening post.”

    — Disable core security features on Apple devices.

    THE INTELLIGENCE COMMUNITY IS HIGHLY DEPENDENT ON A VERY SMALL NUMBER OF SECURITY FLAWS, MANY OF WHICH ARE PUBLIC, WHICH APPLE EVENTUALLY PATCHES.
    For years, U.S. and British intelligence agencies have consistently sought to defeat the layers of encryption and other security features used by Apple to protect the iPhone. A joint task force comprised of operatives from the NSA and Britain’s Government Communications Headquarters, formed in 2010, developed surveillance software targeting iPhones, Android devices and Nokia’s Symbian phones. The Mobile Handset Exploitation Team successfully implanted malware on iPhones as part of WARRIOR PRIDE, a GCHQ framework for secretly accessing private communications on mobile devices.

    That program was disclosed in Snowden documents reported on last year by The Guardian. A WARRIOR PRIDE plugin called NOSEY SMURF allowed spies to remotely and secretly activate a phone’s microphone. Another plugin, DREAMY SMURF, allowed intelligence agents to manage the power system on a phone and thus avoid detection. PARANOID SMURF was designed to conceal the malware in other ways. TRACKER SMURF allowed ultra-precise geolocating of an individual phone. “[If] its [sic] on the phone, we can get it,” the spies boasted in a secret GCHQ document describing the targeting of the iPhone.

    All of the SMURF malware — including the plugin that secretly turns on the iPhone’s microphone — would first require that agencies bypass the security controls built into the iOS operating system. Spies would either need to hack the phone in order to plant their malware on it, or sneak a backdoor into an app the user installed voluntarily. That was one of the clear aims of the Apple-focused research presented at the CIA’s conference.

    “The U.S. government is prioritizing its own offensive surveillance needs over the cybersecurity of the millions of Americans who use Apple products,” says Christopher Soghoian, the principal technologist at the American Civil Liberties Union. “If U.S. government-funded researchers can discover these flaws, it is quite likely that Chinese, Russian and Israeli researchers can discover them, too. By quietly exploiting these flaws rather than notifying Apple, the U.S. government leaves Apple’s customers vulnerable to other sophisticated governments.”

    Security experts interviewed by The Intercept point out that the SMURF capabilities were already available to U.S. and British intelligence agencies five years ago. That raises the question of how advanced the current capacity to surveil smartphone users is, especially in light of the extensive resources poured into targeting the products of major tech companies. One GCHQ slide from 2010 stated that the agency’s ultimate goal was to be able to “Exploit any phone, anywhere, any time.”

    jobs_stage
    Steve Jobs unveiling the first iPhone on January 9, 2007.
    THE FIRST JAMBOREE took place in 2006, just as Apple was preparing to unveil its highly-anticipated iPhone. In March 2010, according to a top-secret document, during a talk called “Rocoto: Implanting the iPhone,” a presenter discussed efforts to target the iPhone 3G. In addition to analyzing the device’s software for potential vulnerabilities, the presentation examined “jailbreak methods,” used within the iPhone community to free phones from their built-in constraints, that could be leveraged by intelligence agencies. “We will conclude with a look ahead at future challenges presented by the iPhone 3GS and the upcoming iPad,” the abstract noted. Over the years, as Apple updates its hardware, software and encryption methods, the CIA and its researchers study ways to break and exploit them.

    The attempts to target vulnerabilities in Apple’s products have not occurred in a vacuum. Rather, they are part of a vast multi-agency U.S./U.K. effort to attack commercial encryption and security systems used on billions of devices around the world. U.S. intelligence agencies are not just focusing on individual terrorists or criminals — they are targeting the large corporations, such as Apple, that produce popular mobile devices.

    “Every other manufacturer looks to Apple. If the CIA can undermine Apple’s systems, it’s likely they’ll be able to deploy the same capabilities against everyone else,” says Green, the Johns Hopkins cryptographer. “Apple led the way with secure coprocessors in phones, with fingerprint sensors, with encrypted messages. If you can attack Apple, then you can probably attack anyone.”

    According to the Black Budget, U.S. intelligence agencies have tech companies dead in their sights with the aim of breaking or circumventing any existing or emerging encryption or antiviral products, noting the threat posed by “increasingly strong commercial” encryption and “adversarial cryptography.”

    The Analysis of Target Systems Project produced “prototype capabilities” for the intelligence community, enabled “the defeat of strong commercial data security systems” and developed ways “to exploit emerging information systems and technologies,” according to the classified budget. The project received $35 million in funding in 2012 and had more than 200 personnel assigned to it. By the end of 2013, according to the budget, the project would “develop new capabilities against 50 commercial information security device products to exploit emerging technologies,” as well as new methods that would allow spies to recover user and device passwords on new products.

    Among the project’s missions:

    — Analyze “secure communications products, both foreign and domestic produced” to “develop exploitation capabilities against the authentication and encryption schemes.”

    — “[D]evelop exploitation capabilities against network communications protocols and commercial network security products.”

    — “Anticipate future encryption technologies” and “prepare strategies to exploit those technologies.”

    — “Develop, enhance, and implement software attacks against encrypted signals.”

    — “Develop exploitation capabilities against specific key management and authentication schemes.”

    — “[D]evelop exploitation capabilities against emerging multimedia applications.”

    — Provide tools for “exploiting” devices used to “store, manage, protect, or communicate data.”

    — “Develop methods to discover and exploit communication systems employing public key cryptography” and “communications protected by passwords or pass phrases.”

    — Exploit public key cryptography.

    — Exploit Virtual Private Networks, or VPNs, which allow people to browse the Internet with increased security and anonymity.

    The black budget also noted that the U.S. intelligence community partners with “National Laboratories” to conduct the type of research presented at the CIA’s annual Jamboree conference. It confirms the U.S. government’s aggressive efforts to steal encryption and authentication keys, as occurred in the NSA and GCHQ operations against Gemalto, the world’s largest manufacturer of SIM cards, through the use of Computer Network Exploitation attacks. In that case, spy agencies penetrated Gemalto’s internal networks and cyberstalked its employees to steal mass quantities of keys used to encrypt mobile phone communications.

    The CIA’s Information Operations Center is currently the second largest of the spy agency’s specialized centers. It not only conducts cyber-ops, but has operated covertly in other nations, working to develop assets from targeted countries to assist in its cyber-surveillance programs, according to the Black Budget. At times, its personnel brief the president.

    obama_ipad
    U.S. President Barack Obama holds up an iPad.
    AT THE CIA’s Jamboree in 2011, the computer researchers conducted workshops where they revealed the specifics of their efforts to attack one of the key privacy elements of Apple’s mobile devices. These machines have two separate keys integrated into the silicon of their Apple-designed processors at the point of manufacture. The two, paired together, are used to encrypt data and software stored on iPhones and iPads. One, the User ID, is unique to an individual’s phone, and is not retained by Apple. That key is vital to protecting an individual’s data and — particularly on Apple’s latest devices — difficult to steal. A second key, the Group ID, is known to Apple and is the same across multiple Apple devices that use the same processor. The GID is used to encrypt essential system software that runs on Apple’s mobile devices.

    The focus of the security researchers, as described at the CIA conferences, was to target the GID key, which Apple implants on all devices that use the same processors. For instance, Apple’s A4 processor was used in the iPhone 4, the iPod Touch and the original iPad. All of those devices used the same GID. As Apple designs new processors and faster devices that use those processors, the company creates new GIDs. If someone has the same iPhone as her neighbor, they have the exact same GID key on their devices. So, if intelligence agencies extract the GID key, it means they have information useful to compromising any device containing that key.

    At the 2011 Jamboree conference, there were two separate presentations on hacking the GID key on Apple’s processors. One was focused on non-invasively obtaining it by studying the electromagnetic emissions of — and the amount of power used by — the iPhone’s processor while encryption is being performed. Careful analysis of that information could be used to extract the encryption key. Such a tactic is known as a “side channel” attack. The second focused on a “method to physically extract the GID key.”

    Whatever method the CIA and its partners use, by extracting the GID — which is implanted on the processors of all Apple mobile devices — the CIA and its allies could be able to decrypt the firmware that runs on the iPhone and other mobile devices. This would allow them to seek out other security vulnerabilities to exploit. Taken together, the documents make clear that researching each new Apple processor and mobile device, and studying them for potential security flaws, is a priority for the CIA.

    According to the 2011 document describing the Jamboree presentations on Apple’s processor, the researchers asserted that extracting the GID key could also allow them to look for other potential gateways into Apple devices. “If successful, it would enable decryption and analysis of the boot firmware for vulnerabilities, and development of associated exploits across the entire A4-based product-line, which includes the iPhone 4, the iPod touch and the iPad.”

    At the CIA conference in 2012, Sandia researchers delivered a presentation on Apple’s A5 processor. The A5 is used in the iPhone 4s and iPad 2. But this time, it contained no abstract or other details, instructing those interested to contact a CIA official on his secure phone or email.

    “If I were Tim Cook, I’d be furious,” says the ACLU’s Soghoian. “If Apple is mad at the intelligence community, and they should be, they should put their lawyers to work. Lawsuits speak louder than words.”

    tim_cook
    Apple CEO Tim Cook testifies on Capitol Hill in Washington, May 21, 2013.
    FOR YEARS, Apple has included encryption features in the products it sells to consumers. In 2014, the company dramatically broadened the types of data stored on iPhones that are encrypted, and it incorporated encryption by default into its desktop and laptop operating system. This resulted in criticism from leading law enforcement officials, including the FBI director. The encryption technology that Apple has built into its products — along with many other security features — is a virtual wall that separates cybercriminals and foreign governments from customer data. But now, because Apple claims it can no longer extract customer data stored on iPhones, because it is encrypted with a key the company does not know, the U.S. government can be locked out too — even with a search warrant. The FBI director and other U.S. officials have referred to the advent of the encryption era — where previously accessible data and communications may now be off limits because of the security technology protecting them — as “going dark.”

    In the face of this rising challenge to its surveillance capabilities, U.S. intelligence has spent considerable time and resources trying to find security vulnerabilities in Apple’s encryption technology, and, more broadly, in its products, which can be leveraged to install surveillance software on iPhones and Macbooks. “The exploitation of security flaws is a high-priority area for the U.S. intelligence community, and such methods have only become more important as U.S. technology companies have built strong encryption into their products,” says the ACLU’s Soghoian.

    Microsoft has, for nearly a decade, included BitLocker, an encryption technology that protects data stored on a computer, in its Windows operating system. Unlike Apple, which made encryption available to all customers, Microsoft had included this feature only in its more expensive premium and professional versions of Windows, up until a few years ago. BitLocker is designed to work with a Trusted Platform Module, a special security chip included in some computers, which stores the encryption keys and also protects against unauthorized software modification.

    Also presented at the Jamboree were successes in the targeting of Microsoft’s disk encryption technology, and the TPM chips that are used to store its encryption keys. Researchers at the CIA conference in 2010 boasted about the ability to extract the encryption keys used by BitLocker and thus decrypt private data stored on the computer. Because the TPM chip is used to protect the system from untrusted software, attacking it could allow the covert installation of malware onto the computer, which could be used to access otherwise encrypted communications and files of consumers. Microsoft declined to comment for this story.

    In the wake of the initial Snowden disclosures, Apple CEO Tim Cook has specifically denounced the U.S. government’s efforts to compel companies to provide backdoor access to their users’ data.

    “I want to be absolutely clear that we have never worked with any government agency from any country to create a backdoor in any of our products or services. We have also never allowed access to our servers. And we never will,” Cook said last September in announcing Apple’s new privacy policy. More recently, Cook said, “None of us should accept that the government or a company or anybody should have access to all of our private information. This is a basic human right. We all have a right to privacy. We shouldn’t give it up. We shouldn’t give in to scare-mongering.”

    As corporations increasingly integrate default encryption methods and companies like Apple incorporate their own indigenous encryption technologies into easy-to-use text, voice and video communication platforms, the U.S. and British governments are panicking. “Encryption threatens to lead all of us to a very dark place,” declared FBI Director James Comey in an October 2014 lecture at the Brookings Institution. Citing the recent moves by Apple to strengthen default encryption on its operating systems, and commitments by Google to incorporate such tools, Comey said, “This means the companies themselves won’t be able to unlock phones, laptops, and tablets to reveal photos, documents, e-mail, and recordings stored within.”

    Under current U.S. regulations, law enforcement agencies can get a court order to access communications channeled through major tech companies and wireless providers. But if those communications are encrypted through a process not accessible by any involved company, the data is essentially meaningless, garbled gibberish. “In a world in which data is encrypted, and the providers don’t have the keys, suddenly, there is no one to go to when they have a warrant,” says Soghoian. “That is, even if they get a court order, it doesn’t help them. That is what is freaking them out.”

    Comey alleged that “even a supercomputer would have difficulty with today’s high-level encryption,” meaning a “brute force” attempt to decrypt intercepted communications would be ineffective, and, even if successful, time-consuming.

    “Encryption isn’t just a technical feature; it’s a marketing pitch,” Comey added. “But it will have very serious consequences for law enforcement and national security agencies at all levels. Sophisticated criminals will come to count on these means of evading detection. It’s the equivalent of a closet that can’t be opened. A safe that can’t be cracked.”

    A few months after Comey’s remarks, Robert Litt, the general counsel for the Office of the Director of National Intelligence, also appeared at Brookings. “One of the many ways in which Snowden’s leaks have damaged our national security is by driving a wedge between the government and providers and technology companies, so that some companies that formerly recognized that protecting our nation was a valuable and important public service now feel compelled to stand in opposition,” Litt said. He appealed to corporations to embrace “a solution that does not compromise the integrity of encryption technology but that enables both encryption to protect privacy and decryption under lawful authority to protect national security.”

    Green, the Johns Hopkins professor, argues that U.S. government attacks against the products of American companies will not just threaten privacy, but will ultimately harm the U.S. economy. “U.S. tech companies have already suffered overseas due to foreign concerns about our products’ security,” he says. “The last thing any of us need is for the U.S. government to actively undermine our own technology industry.”

    The U.S. government is certainly not alone in the war against secure communications. British Prime Minister David Cameron has suggested that if he is re-elected, he may seek to ban encrypted chat programs that do not provide backdoor access to law enforcement. “Are we going to allow a means of communications which it simply isn’t possible to read?” Cameron said in a speech in England earlier this year. “My answer to that question is: ‘No, we must not.’”

    When the Chinese government recently tried to force tech companies to install a backdoor in their products for use by Chinese intelligence agencies, the U.S. government denounced China. “This is something that I’ve raised directly with President Xi,” President Obama said in early March. “We have made it very clear to them that this is something they are going to have to change if they are to do business with the United States.” But China was actually following the U.S. government’s lead. The FBI has called for an expansion of U.S. law, which would require Apple and its competitors to design their products so that all communications could be made available to government agencies. NSA officials have expressed similar sentiments.

    “Obama’s comments were dripping with hypocrisy,” says Trevor Timm, executive director of the Freedom of the Press Foundation. “Don’t get me wrong, his actual criticism of China for attempting to force tech companies to install backdoors was spot on — now if only he would apply what he said to his own government. Since he now knows backdooring encryption is a terrible policy that will damage cybersecurity, privacy, and the economy, why won’t he order the FBI and NSA to stop pushing for it as well?”

    ———

    Documents published with this article:

    TCB Jamboree 2012 Invitation
    Strawhorse: Attacking the MacOS and iOS Software Development Kit
    TPM Vulnerabilities to Power Analysis and An Exposed Exploit to Bitlocker
    TCB Jamboree 2012
    Apple A4/A5 Application Processors Analysis
    Differential Power Analysis on the Apple A4 Processor
    Secure Key Extraction by Physical De-Processing of Apple’s A4 Processor
    Rocoto: Implanting the iPhone
    Smurf Capability – iPhone
    Black Budget: Cryptanalysis & Exploitation Services – Analysis of Target Systems
    ———

    Andrew Fishman, Alleen Brown, Andrea Jones, Ryan Gallagher, Morgan Marquis-Boire, and Micah Lee contributed to this story.

    Note: An earlier draft of this story incorrectly suggested that the iOS Group ID is used to sign software. An earlier draft also incorrectly stated that Lockheed Martin owns Sandia National Laboratories. Sandia Corporation, a wholly owned subsidiary of Lockheed Martin, operates Sandia National Laboratories as a contractor for the U.S. Department of Energy’s National Nuclear Security Administration.

    Disclosure: Freedom of the Press Foundation, which Trevor Timm represents, has received grant funding from First Look Media, The Intercept’s parent company. Intercept co-founders Glenn Greenwald and Laura Poitras are on the board of the organization.

    Photo: Google Maps; Simon Dawson/Bloomberg/Getty Images; Tony Avelar/Getty Images; Kevin Lamarque/Reuters/Landov; J. Scott Applewhite/AP

    Email the authors: jeremy.scahill@theintercept.com, josh.begley@theintercept.com

    BY JEREMY SCAHILL AND JOSH BEGLEY @jeremyscahill@joshbegley 10 MAR 2015

    Find this story at 10 March 2015

    Copyright firstlook.org

    The Intercept, Mass Surveillance and the State

    Van nieuwsblog.burojansen.nl

    Like a proud father CIA director John Brennan has announced that he’s creating a new directorate to conduct cyberespionage. Never mind all those classified documents published recently by the Intercept which prove that the CIA has been active in the cyber domain for years. While it goes without saying that the CIA’s subversion campaign is unsettling what’s equally thought-provoking is the manner in which the Intercept frames the involvement of the private sector.

    Every year the CIA showcases its latest batch of subversion tools, taking them for a victory lap at a secret conference which internal documents refer to glibly as a “Jamboree.” In 2012 the Jamboree was hosted by Lockheed Martin at a campus in northern Virginia. Journalists at the Intercept describe Lockheed as follows:

    “Lockheed is one of the largest defense contractors in the world; its tentacles stretch into every aspect of U.S. national security and intelligence. The company is akin to a privatized wing of the U.S. national security state — more than 80 percent of its total revenue comes from the U.S. government.”

    Note how this description subtly creates the impression that the ultimate culprit with regard to mass surveillance is the government. Lockheed is merely a “wing” of an overarching “national security state”. All roads lead to U.S. intelligence, it’s all about the state.

    Yet close examination of the history of the CIA yields a different picture. Contractors like Lockheed Martin aren’t a subordinate extension of the national security state. Quite the opposite. It’s probably more accurate to conclude that intelligence agencies, like the NSA, represent a public sector appendage of a much larger corporate power structure whose nexus resides in profound sources of wealth and influence outside of the government. A Deep State, if you will, that’s fundamentally driving what goes on in Washington.

    In the absence of mass public outcry private capital sets the rules. It’s been this way since Ferdinand Lundberg wrote America’s Sixty Families back in 1937. Or perhaps Mr. Scahill hasn’t glimpsed politicians on both sides of the aisle trotting out in front of billionaires to audition for public office?

    Hence there is a recurring theme in L’affaire Snowden that arises from the Intercept’s coverage of mass surveillance. Focus is maintained almost exclusively on the government without acknowledging the central role that corporations play. According to the Intercept’s worldview hi-tech companies are but helpless pawns being coerced and assailed by runaway security services rather than willing symbiotic accomplices that directly benefit from the global panopticon.

    Honestly, doesn’t Ed Snowden have more information on Booz Allen?

    When a doctor is faced with a serious medical condition the diagnosis typically informs the subsequent course of treatment. So it is with mass surveillance. Only in the case of mass surveillance the diagnosis is being shaped by certain actors to fit a preconceived solution. The agenda of the far right is clear. Nothing short of corporate feudalism. Libertarian political operator Grover Norquist boldly spelled it out: “I don’t want to abolish government. I simply want to reduce it to the size where I can drag it into the bathroom and drown it in the bathtub.”

    A messaging scheme which depicts the government as the chief villain is a godsend for people who are itching for reasons to demolish the state. Techno libertarians rejoice and present the public with their version of salvation. “Crypto everywhere” roar CEOs across Silicon Valley. How predictably shallow and self-serving. Their counter-surveillance talking points provide them with something new to sell us. It also absolves them of responsibility while redirecting the public’s attention away from more far-reaching systemic measures.

    In light of this it’s hard not to notice the various twists of fate in L’affaire Snowden. Classified documents gradually trickled into the public record thanks to a whistle-blower who donated money to Ron Paul and exhibited some decidedly right-wing inclinations online. A copy of the classified documents were provided to a journalist who wrote a policy whitepaper for the CATO Institute (formerly known as the Charles Koch Foundation). Then out of the woodwork appears a kindly libertarian billionaire who dazzles the said journalist with fame and fortune, “a dream opportunity that was impossible to decline.”

    The product of coincidence? To an extent. But what’s undeniable is that a member of the financial elite, a man who has clocked over a dozen visits to the Obama White House, deliberately leveraged his assets to inject himself into the unfolding course of events. Once more the narrative about mass surveillance that his news organization conveys tends to cast corporations as champions against mass surveillance while omitting to acknowledge how they stand to benefit from the global panopticon. It appears that elements within the ruling class would have us believe that the Deep State will solve the very problem that it intentionally created.

    Bill Blunden is an independent investigator whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including The Rootkit Arsenal , and Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex. Bill is the lead investigator at Below Gotham Labs.

    by BILL BLUNDEN
    WEEKEND EDITION MARCH 13-15, 2015

    Find this story at March 2015

    Copyright © CounterPunch

    CIA Aided Program to Spy on U.S. Cellphones

    Van nieuwsblog.burojansen.nl

    WASHINGTON—The Central Intelligence Agency played a crucial role in helping the Justice Department develop technology that scans data from thousands of U.S. cellphones at a time, part of a secret high-tech alliance between the spy agency and domestic law enforcement, according to people familiar with the work.

    The CIA and the U.S. Marshals Service, an agency of the Justice Department, developed technology to locate specific cellphones in the U.S. through an airborne device that mimics a cellphone tower, these people said.

    Today, the Justice Department program, whose existence wasreported by The Wall Street Journal last year, is used to hunt criminal suspects. The same technology is used to track terror suspects and intelligence targets overseas, the people said.

    The program operates specially equipped planes that fly from five U.S. cities, with a flying range covering most of the U.S. population. Planes are equipped with devices—some past versions were dubbed “dirtboxes” by law-enforcement officials—that trick cellphones into reporting their unique registration information.
    The surveillance system briefly identifies large numbers of cellphones belonging to citizens unrelated to the search. The practice can also briefly interfere with the ability to make calls, these people said.

    Some law-enforcement officials are concerned the aerial surveillance of cellphone signals inappropriately mixes traditional police work with the tactics and technology of overseas spy work that is constrained by fewer rules. Civil-liberties groups say the technique amounts to a digital dragnet of innocent Americans’ phones.

    ….

    The cooperation between technical experts at the CIA and the Marshals Service, which law-enforcement officials have described as a “marriage,” represents one way criminal investigators are increasingly relying on U.S. intelligence agencies for operational support and technical assistance in the wake of the Sept. 11, 2001, attacks. Many Justice Department officials view the joint effort with the CIA as having made valuable contributions to both domestic and overseas operations.

    A CIA spokesman declined to comment on whether the CIA or any other agency uses the devices. Some technologies developed by the agency “have been lawfully and responsibly shared with other U.S. government agencies,” the spokesman said. “How those agencies use that technology is determined by the legal authorities that govern the operations of those individual organizations—not CIA.” He also said the relationship between the Marshals Service and CIA tech experts couldn’t be characterized as a marriage.

    A Justice Department spokesman said Marshals Service techniques are “carried out consistent with federal law, and are subject to court approval.” The agency doesn’t conduct “domestic surveillance, intelligence gathering, or any type of bulk data collection,” the spokesman said, adding that it doesn’t gather any intelligence on behalf of U.S. spy agencies.

    By DEVLIN BARRETT
    Updated March 10, 2015 7:39 p.m. ET

    Find this story at 10 March 2015
    Copyright wsj.com

    CIA looks to expand its cyber espionage capabilities

    Van nieuwsblog.burojansen.nl

    CIA Director John Brennan is planning a major expansion of the agency’s cyber-espionage capabilities as part of a broad restructuring of an intelligence service long defined by its human spy work, current and former U.S. officials said.

    The proposed shift reflects a determination that the CIA’s approach to conventional espionage is increasingly outmoded amid the exploding use of smartphones, social media and other technologies.

    U.S. officials said Brennan’s plans call for increased use of cyber capabilities in almost every category of operations — whether identifying foreign officials to recruit as CIA informants, confirming the identities of targets of drone strikes or penetrating Internet-savvy adversaries such as the Islamic State.

    Several officials said Brennan’s team has even considered creating a new cyber-directorate — a step that would put the agency’s technology experts on equal footing with the operations and analysis branches, which have been pillars of the CIA’s organizational structure for decades.

    U.S. officials emphasized that the plans would not involve new legal authorities and that Brennan may stop short of creating a new directorate. But the suggestion underscores the scope of his ambitions, as well as their potential to raise privacy concerns or lead to turf skirmishes with the National Security Agency, the dominant player in electronic espionage.

    “Brennan is trying to update the agency to make sure it is prepared to tackle the challenges in front of it,” said a U.S. official familiar with the reorganization plan. “I just don’t think you can separate the digital world people operate in from the human intelligence” mission that is the CIA’s traditional domain.

    Like others, the official spoke on the condition of anonymity to discuss internal decision-making.

    The expanded emphasis on cyber is part of a broader restructuring envisioned by Brennan that is expected to break down long-standing boundaries between the CIA’s operations and analysis directorates, creating hybrid “centers” that combine those and other disciplines.

    Brennan is expected to begin implementing aspects of his plan this month, officials said. He recently met with senior members of the House and Senate Intelligence Committees to outline the proposed changes.

    CIA spokesman Dean Boyd declined to comment, saying that “final decisions have not yet been made with respect to agency reorganization efforts.” In a notice to the CIA workforce last year, Brennan said that he had become “increasingly convinced that the time has come to take a fresh look at how we are organized.”

    The changes are designed to replicate the model of the CIA’s Counterterrorism Center, which has surged in size and influence since the Sept. 11, 2001, attacks. The restructuring could lead to new reporting lines for thousands of CIA employees, as long-standing units such the Latin America and Near East divisions give way to new centers that combine analysis, collection and covert operations.

    The National Clandestine Service and the Directorate of Intelligence — the formal names for the operations and analysis branches — would continue to exist, but would focus more on developing talent and resources that could be distributed to the new centers.

    “It would be a huge deal,” said Michael Allen, a former White House and congressional aide who wrote a 2013 book about intelligence reform. Unlike at the FBI and other security agencies, Allen said, “there hasn’t been wholesale structural reform in the CIA post-9/11.”

    Former officials who are familiar with the plan said it has caused generational friction within the CIA’s ranks, with longtime officers resisting changes that younger employees are more eager to embrace.

    The head of the clandestine service recently resigned, in part over objections to the scope of Brennan’s plan, officials said. Brennan quickly replaced him with a longtime officer who had led an internal review panel that broadly endorsed the director’s reform agenda.

    Although limited compared with the larger NSA, the CIA has substantial cyber capabilities. Its Information Operations Center, which handles assignments such as extracting information from stolen laptops and planting surveillance devices, is now second only to the Counterterrorism Center in size, former officials said.

    The CIA also oversees the Open Source Center, an intelligence unit created in 2005 to scour publicly available data, including Twitter feeds, Facebook postings and Web forums where al-Qaeda and other terrorist groups post material.

    Brennan hopes to make the use of such capabilities more pervasive, U.S. officials said, ensuring that expertise and tools that now reside in the Information Operations Center are distributed across the agency.

    The move comes at a time when the CIA has struggled to gain traction against adversaries — including the Islamic State and the Jabhat al-Nusra terrorist group — that recruit and communicate extensively online but operate in combat zones that CIA officers are generally not able to enter.

    But officials said digital changes have transformed even the most conventional cloak-and-dagger scenarios. Secrets that were once obtained by recruiting a source or meeting in a safe house increasingly reside in clouds of digital transmissions that surround espionage targets.

    To recruit a Russian spy, “you may need to manipulate someone’s e-mail, read someone’s e-mail and track the whereabouts of the FSB,” a former official said, referring to the Russian security service. “Cyber is now part of every mission. It’s not a specialized, boutique thing.”

    Beyond elevating the role of the Information Operations Center, U.S. officials said, Brennan is seeking to ensure that the agency is not lagging in other areas, such as counterintelligence work and the CIA’s internal e-mail system.

    Brennan provided only broad outlines of his plan in recent congressional meetings, which excluded all but the four highest-ranking members of the House and Senate intelligence panels. A senior U.S. intelligence official said some senior NSA executives remain in the dark on Brennan’s cyber ambitions.

    In recent years, the CIA has collaborated extensively with the NSA on a range of covert programs, including its drone campaign against al-Qaeda. Documents released by former NSA contractor Edward Snowden showed that e-mails and cellphone signals intercepted by the NSA were used to confirm the identities of targets in strikes.

    But the CIA also has fought budget and bureaucratic battles to maintain its standalone capability, prompting some to view the latest push as an attempt to capi­tal­ize on Washington’s growing alarm over cyberthreats — and the corresponding shifts in federal budgets.

    Former CIA officials said that the agency is mainly concerned about having direct control over the cyber components of its operations and that Brennan’s plans would not encroach on the global surveillance programs run by the NSA. Nor would they interfere with the work of a new agency the Obama administration is creating to fuse intelligence on cyberattacks.

    Brennan’s push to expand the CIA’s cyber capabilities is “entirely appropriate, even overdue,” said Stephen Slick, a former CIA official who directs the Intelligence Studies Project at the University of Texas at Austin. “Advances in digital technology are having a revolutionary impact on the intelligence business, and it’s important for CIA to adapt its collection and covert action missions to account for the new opportunities and dangers.”

    Ellen Nakashima and Julie Tate contributed to this report.

    By Greg Miller February 23

    Find this story at 23 February 2015

    Copyright washingtonpost.com

    Selected extracts of “top” NSA intercepts of French leadership and chief officials, taken from various editions of the National Security Agency’s Top Secret Global SIGINT Highlights executive briefings.

    Van nieuwsblog.burojansen.nl

    EU and French diplomats who strongly criticize U.S. trade policies and call TPP treaty a confrontation against China.
    High-ranking French official complaining about President Sarkozy’s inflammatory and inaccurate statements on WTO that no-one in government backs
    French ministerial agenda for planned G7 and G20 meeting intercepted
    French economy in dire straits according to intercepted communications between French Finance Minister and French Senator
    Spying on French Ambassador who contemplated exposing U.S. misuse of UN Oil-for-food program in Iraq
    NSA Eavesdrops as Hollande Tries End Run Around Merkel on Greek Eurozone Exit
    US Intercepts of France Complaining About US Intercepts of France
    US Spying On Chirac Discussing UN Appointments
    US Spying on Sarkozy Talking Tough on Israel-Palestine
    US Eavesdrops as Sarkozy Plots French Leadership on Financial Crisis
    EU and French diplomats who strongly criticize U.S. trade policies and call TPP treaty a confrontation against China.

    Date 2 August 2011
    Classification TOP SECRET//COMINT//ORCON/NOFORN
    WikiLeaks Synopsis
    Intercepted communication between French Minister-Counselor for Economic and Financial Affiars Jean-Francois Boittin and EU Trade Section head Hiddo Houben, reveals Boittin’s discontent with U.S. approach towards a WTO pact. Additionally Houben stated that the TPP (being an American initiative) seems devised as a confrontation with China.
    Download PDF

    EU Officials Perceive Lack of U.S. Leadership on Trade Issues, Skeptical of Pacific Initiative (TS//SI//OC/NF)

    (TS//SI//OC/NF) Washington-based EU trade officials ascertained in late July that the U.S. administration is severely lacking in leadership when it comes to trade matters, as shown by the absence of a clear consensus on the future course of the WTO Doha Development Agenda (DDA). French Minister-Counselor for Economic and Financial Affairs Jean-Francois Boittin expressed astonishment at the level of “narcissism” and wasteful contemplation currently on display in Washington, while describing the idea of scrapping the DDA in favor of another plan–which some U.S. officials are seen to favor–as stupefying. The Frenchman further asserted that once a country makes deep cuts in its trade barriers, as the U.S. has done, it no longer has incentives to offer nor, as a consequence, a strong position from which to negotiate with emerging nations. Boittin’s interlocutor, EU Trade Section head Hiddo Houben, after noting the leadership void in the Office of the U.S. Trade Representative, declared that with regard to the disagreement within his host government on DDA, a political decision must be made about what direction is to be followed. On another subject, Houben insisted that the Trans-Pacific Partnership (TPP), which is a U.S. initiative, appears to be designed to force future negotiations with China. Washington, he pointed out, is negotiating with every nation that borders China, asking for commitments that exceed those countries’ administrative capacities, so as to “confront” Beijing. If, however, the TPP agreement takes 10 years to negotiate, the world–and China–will have changed so much that that country likely will have become disinterested in the process, according to Houben. When that happens, the U.S. will have no alternative but to return to the WTO. Finally, he assessed that this focus on Asia is added proof that Washington has no real negotiating agenda vis-´-vis emerging nations, including China and Brazil, or an actual, proactive WTO plan of action.

    Unconventional

    EU diplomatic

    Z-3/OO/531614-11, 011622Z
    High-ranking French official complaining about President Sarkozy’s inflammatory and inaccurate statements on WTO that no-one in government backs

    Date July 2008
    Classification TOP SECRET//COMINT/NOFORN
    WikiLeaks Synopsis
    Intercepted communication reveals discontent of head of Trade Policy Renaud Lassus regarding some statements from Sarkozy regarding a potential negative impact of a WTO trade negotiation pact on France economy.
    Download PDF

    Sarkozy Remarks on WTO Deemed Injurious to France; Rules Clarity Sought (TS//SI//NF)

    (TS//SI//NF) A high-ranking French treasury official lamented in early July recent inflammatory and inaccurate statements by President Nicolas Sarkozy, statements that the official said were certain to complicate French efforts to balance its national interests with its responsibilities as current EU President. Assuming his duties as head of the Trade Policy and Investment Office in the Treasury and Economic Policy Directorate, Renaud Lassus indicated that Sarkozy’s declaration that there will be no WTO Doha Round accord has effectively set the bar extremely high, while also increasing the chances of a dark scenario in which France finds itself as the lone dissenter on a national level, but responsible as EU President for representing the views of the entire union. The choice for France then becomes one of either capitulating or provoking a crisis within the EU. Paris is totally unprepared to deal with this scenario, Lassus confirmed, as no one wants to try to “spin” the situation in which Sarkozy has placed the country when doing so would be admitting that the President had been wrong in the first place. He further commented that Sarkozy’s assertion that a WTO pact would bring a 20-percent drop in production and the loss of 100,000 French jobs was patently incorrect and believed by no one in the government. As for those who thought that Sarkozy would dampen his rhetoric when France actually assumed the Presidency on 1 July, their hopes were dashed, Lassus insisted, by the President’s most virulent personal attack yet on the EU Trade Commissioner. In other WTO-related commentary, knowledgeable insiders believed that the 21 July WTO ministerial could be disrupted if Rules Committee chairman Guillermo Valles Galmes does not make his intentions clear in advance. If this is not done, it is possible that rules issues will be raised at the ministerial, leading to heated negotiations. In addition, fish subsidies could cause problems. India could threaten to torpedo the ministerial unless it were to get a carve-out on special and differential treatment on fish. This would leave developed countries as the only ones that would have disciplines on fish subsidies and would be unacceptable to Europe and Japan.

    Unconventional

    French, EU, Japanese diplomatic

    Z-3/OO/5427-08, 111833Z; Z-3/OO/5416-08, 111607Z
    French ministerial agenda for planned G7 and G20 meeting intercepted

    Date 2012
    Classification TOP SECRET//COMINT//NOFORN
    WikiLeaks Synopsis
    Intercepted communication reveals French Minister of Economy, Finance, and Industry Francois Baroin’s intentions to emphasize the need for the implementation of the Basel Accords on banking laws in the G7 and G20 meeting in 2012 and his support of the U.S. initiative on oil reserves.
    Download PDF

    G-7/G-20: French Minister to Push U.S. on Banking Reform, Warn Against Stifling Growth (TS//SI//NF)

    (TS//SI//NF) With some messages targeted for the United States, the French Treasury Directorate has drafted talking points for Minister of Economy, Finance, and Industry Francois Baroin to use during meetings of the Group of 7 and Group of 20 on 19 and 20 April, just before the spring meetings of the IMF and World Bank. Baroin will emphasize the need to stay on schedule for implementing the Basel Accords (recommendations on banking laws and regulations), given Washington’s slowness to act. He will also support the U.S. initiative on strategic oil reserves in his remarks on the threat to global growth posed by rising oil prices. While repeatedly reminding his colleagues of the hard choices the EU has made the deal with its financial situation, he will also caution against endangering growth by acting too quickly.

    Unconventional
    French diplomatic

    Z-3/OO/512583-12, 171712Z
    French economy in dire straits according to intercepted communications between French Finance Minister and French Senator

    Date 31 July 2012
    Classification TOP SECRET//COMINT//NOFORN
    WikiLeaks Synopsis
    Intercepted communication reveals that Finance, Economy, and Trade Minister Pierre Moscovici believes the French economic situation was far worse than perceived. Additionally, he remarks about that the situation with the automotive industry was more critical than a pre-retirement unemployment supplement known as AER, which he also thought wouldn’t have had a severe impact on elections (while senator Bourquin thought would have driven voters to right-wing National Front).
    Download PDF

    French Finance Minister Says Economy in Dire Straits, Predicts Two Atrocious Years Ahead (TS//SI//NF)

    (TS//SI//NF) The French economic situation is worse than anyone can imagine and drastic measures will have to be taken in the next 2 years, according to Finance, Economy, and Trade Minister Pierre Moscovici. On 19 July, Moscovici, under pressure to re-establish a pre-retirement unemployment supplement known as the AER, warned that the situation is dire. Upon learning that there are no funds available for the AER, French Senator Martial Bourquin warned Moscovici that without the AER program the ruling Socialist Party will have a rough time in the industrial basin of the country, with voters turning to the right-wing National Front. Moscovici disagreed, asserting that the inability to reinstitute the AER will have no impact in electoral terms, besides, the situation with faltering automaker PSA Peugeot Citroen is more important than the AER. (COMMENT: PSA has announced plans to close assembly plants and lay off some 8,000 workers.) Moscovici warned that the 2013 budget is not going to be a “good news budget,” with the government needing to find at least an additional 33 billion euros ($39.9 billion). Nor will 2014 be a good year. Bourquin persisted, warning that the Socialist Party will find itself in a situation similar to that of Socialist former Spanish President Zapatero, who was widely criticized for his handling of his country’s debt situation. Moscovici countered that it was not Zapatero whose behavior the French government would emulate, but rather Social Democrat former German Chancellor Gerhard Schroeder. (COMMENT: Schroeder, chancellor from 1998 to 2005, was widely credited with helping to restore German competitiveness. He favored shifting from pure austerity measures to measures that encourage economic growth and advocated a common EU financial policy.)

    Unconventional

    French diplomatic

    Z-3/OO/524122-12, 271748Z
    Spying on French Ambassador who contemplated exposing U.S. misuse of UN Oil-for-food program in Iraq

    Date 2004
    Classification TOP SECRET//COMINT
    WikiLeaks Synopsis
    Intercepted communication between French Ambassador in Washington Jean-David Levitte reveals his frustration towards a report he defines “scandalous” regarding a possible misuse of the UN Oil-For-Food (OFF) program by French companies during the regime of Saddam Hussein in Iraq, while he claims some of these French companies where in fact U.S. companies’ subsidiaries and no American company was mentioned in such report. Levitte likely refers to the report filed by the US Senate that accused Russian, British and French politicians of receiving oil allocations from Iraq in exchange for their political alliance. Levitte planned to present a list of such U.S. companies to U.S. Congress and the media.
    Download PDF

    (TS//SI) French Envoy Plans to Release List of U.S. Firms Who Allegedly Profited From OFF

    (TS//SI//REL TO USA, AUS, CAN, GBR and NZL) French Ambassador Jean-David Levitte in Washington plans to respond as early as today to information in the Iraq Survey Group report regarding possible misuse of the UN Oil-for-Food (OFF) program by companies from France and other countries during the former Iraqi regime. The ambassador termed the report scandalous, since it named no U.S. companies and he claimed that many French companies with contracts under the OFF program were actually subsidiaries of U.S. firms that also profited from the business dealings. He therefore planned, with foreign ministry backing, to present a list of these U.S. companies to both the U.S. Congress and the media.

    Unconventional

    French diplomatic

    3/OO/27079-04, 071948Z
    NSA Eavesdrops as Hollande Tries End Run Around Merkel on Greek Eurozone Exit

    Date 22 May 2012
    Classification TOP SECRET//COMINT-GAMMA//ORCON/NOFORN
    WikiLeaks Synopsis
    Intercepted communication reveals that Francois Hollande has approved holding a secret meeting with French officials as well as German opposition (without the knowledge of Merkel) to discuss the euro-zone crisis.
    Download PDF

    French President Approves Secret Eurozone Consultations, Meeting With German Opposition (TS//SI-G//OC/NF)

    (TS//SI-G//OC/NF) French President Francois Hollande has approved holding secret meetings in Paris to discuss the eurozone crisis, particularly the consequences of a Greek exit from the eurozone. On 18 May, Hollande directed Prime Minister (PM) Jean-Marc Ayrault to set up a meeting at the Office of the President (the Elysee) for the following week. Hollande, Ayrault, and “appropriate ministers” would attend, and special emphasis would be given to consequences for the French economy in general and for French banks in particular. Hollande stressed that the meeting would be secret. (COMMENT: The French president seems worried that if word were to get out that Paris is seriously considering the possibility of a Greek exit, it would deepen the crisis.) In addition, secret meetings are to be held in Paris between French officlans and members of the German Social Democratic Party (SPD). Hollande assured the PM that hosting the meeting at the Elysee was “doable,” although Ayrault warned the president to keep the event a secret so as to avoid diplomatic problems. (COMMENT: By “diplomatic problems,” Ayrault is referring to what could happen if German Chancellor Angela Merkel finds out that Hollande is going behind her back to meet with the German opposition.) Earlier reporting reveals that following talks last week in Berlin with Merkel, Hollande complained that nothing of substance was achieved; it was purely for show. Hollande had found the chancellor fixated on the Fiscal Pact and above all on Greece, on which he claimed she had given up and was unwilling to budge. This made Hollande very worried for Greece and the Greek people, who might react by voting for an extremist party. After meeting Merkel, the French president contacted SPD Chairman Sigmair Gabriel and invited him to Paris so that they could talk.

    Foreign Satellite, Unconventional

    French, German governmental

    Z-G/OO/503643-12, 211549Z; Z-G/OO/503541-12, 161711Z
    US Intercepts of France Complaining About US Intercepts of France

    Date 24 March 2010
    Classification TOP-SECRET//COMINT/NOFORN
    WikiLeaks Synopsis
    Intercepted communication between French Ambassador in Washington Pierre Vimont and Sarkozy’s diplomatic advisor Jean-David Levitte, reveals potential topics of discussion for a meeting between Sarkozy and U.S. President, particularly Sarkozy’s frustration regarding Washington step back on a bilateral intelligence cooperation agreement and the U.S. desire to continue spying on France.
    Download PDF

    Sensitive Issues on the Agenda When French, U.S. Presidents Meet Next Week in Washington (TS//SI//NF)

    (TS//SI//NF) French President Sarkozy intends to raise a number of sensitive topics with the U.S. President when the two leaders meet in Washington on 31 March, according to an exchange last week between the French ambassador in Washington Pierre Vimont, and Sarkozy’s diplomatic advisor, Jean-David Levitte. Vimont conveyed that the French President will express his frustration that Washington has backed away from its proposed bilateral intelligence cooperation agreement and Sarkozy intends to continue to push for closure. As Vimont and Levitte understand it, the main sticking point is the U.S. desire to continue spying on France. On the topic of Afghanistan, Levitte noted that Sarkozy is ready to authorize more military trainers but wants clarification on how many are needed, given the conflicting figures from U.S. sources. Another proposed topic was efforts by the European Aeronautic, Defense, and Space Corporation (EADS) to win a tanker aircraft contract with the U.S. military. Vimont revealed cryptically that the deal is moving forward but did not provide any details. Levitte had not expected to put the labeling dispute with Pernod Ricard (the world’s second largest spirits group) on the agenda, but Sarkozy had just spoken to the company’s chairman who had asked the president to intercede on his behalf. (COMMENT: Patrick Ricard, chairman of the Pernod Ricard board of directors, is said to be one of Sarkozy’s wealthy backers.) Vimont characterized the issue as a very political matter in the U.S., and suggested that a direct appeal to the White House might be useful. While Sarkozy intends to broach the issue with the U.S. President, Levitte will talk to the U.S. President’s Economic Adviser and Deputy National Security Adviser. Finally, Levitte expected the two leaders to discuss other pressing subjects including Iran, the Middle East Peace Process, Afghanistan and Pakistan, Yemen, Somalia, the Sahel, Russia, China, Turkey, climate change, and the financial situation of several European countries; however, he provided no details on those topics.

    Unconventional

    French diplomatic

    Z-3/OO/507179-10, 231635Z
    US Spying On Chirac Discussing UN Appointments

    Date 2006
    Classification TOP SECRET//COMINT-GAMMA//ORCON/REL TO USA, AUS, CAN, GBR, NZL
    WikiLeaks Synopsis
    Intercepted communication between French President Jacques Chirac and French Foreign Minister Philippe Douste-Blazy reveals that Chirac gave specific instructions to approach UNSYG Ban Ki-Moon and ask the appointment of Terje Roed-Larsen as Deputy UNSYG or another position of equal responsibility.
    Download PDF

    (TS//SI-G//OC) French President Presses for Selection of Roed-Larsen as Deputy UNSYG

    (TS//SI-G//OC/REL TO USA, AUS, CAN, GBR, NZL) French President Jacques Chirac told Foreign Minister Philippe Douste-Blazy on 23 December to work to ensure that current UN Special Envoy for the Implementation of UNSC Resolution 1559 Terje Roed-Larsen is selected as Deputy UNSYG or at least offered a position of similar responsibility. Chirac spelled out in deliberate fashion exactly how he wanted Douste-Blazy to proceed, instructing him to approach new UNSYG Ban Ki-moon and report back on Ban’s sentiments regarding the deputy post. (COMMENT: Chirac’s detailed orders may be in response to the foreign minister’s propensity, amply demonstrated in the past and the impetus behind a number of presidential reprimands, for making ill-timed or inaccurate remarks.) The President was keen on Roed-Larsen’s selection for several reasons, including his belief that the situation in the Middle East requires a skilled hand with experience in the region and the realization that–for once–France, Russia, and the U.S. all support the same man. Other considerations were that Ban intends to keep Frenchman Jean-Marie Guehenno on as head of the UN Department of Peacekeeping Operations, which is to be divided into two parts, with the newer organization handling logistics. That planned division, however, has drawn fire from Douste-Blazy, who thinks that it would be a catastrophe.

    Unconventional

    French leadership, UN diplomatic

    G/OO/6411-06, 271650Z
    US Spying on Sarkozy Talking Tough on Israel-Palestine

    Date 10 June 2011
    Classification TOP SECRET//COMINT-GAMMA//ORCON/NOFORN
    WikiLeaks Synopsis
    Intercepted communication reveals that Sarkozy was determined to resume peace talks between Israel and Palestine, possibly without the involvement of the U.S.
    Download PDF

    Sarkozy Determined to Proceed With Mideast Initiative, May Pressure U.S. President (TS//SI-G//OC/NF)

    (TS//SI-G//OC/NF) In spite of an apparent lack of interest on the part of some major players, French President Nicolas Sarkozy affirmed on 7 June his determination of go forward with an initiative to restart direct Mideast peace talks between Israel and the Palestinians. It was also disclosed in a conversation between Sarkozy and his foreign minister, Alain Juppe, that consideration was given to including the Quartet in the process; however, they were wary about such an invitation because that group might not bow to Paris’s wishes. Not being a member of the Quartet, they surmised, France would have no control over what transpired in one of its meetings, and if the group elected not to support direct talks, the French initiative would be a non-starter. Another concern centered on the dynamics of the Quartet: the fear in Paris was that in any session involving the EU High Representative for Foreign Affairs and Security Policy, UNSYG Ban Ki-moon, Russian Foreign Minister Sergey Lavrov, and the U.S. Secretary of State, the last two individuals would dominate the proceedings. Finally, the president was giving thought to appealing to Russian President Dmitriy Medvedev for a possible joint initiative without the United States or, as another option, issuing an ultimatum to the U.S. President regarding Palestinian statehood. The ultimatum would demand that Washington back France’s efforts to restart the peace process, failing which Sarkozy would tell the U.S. President that Paris will not side with the U.S. in September (presumably referring to the deliberations in the UN General Assembly on Palestinian statehood).

    Unconventional

    French leadership

    Z-G/OO/513370-11, 091416Z
    US Eavesdrops as Sarkozy Plots French Leadership on Financial Crisis

    Date 2008
    Classification TOP SECRET//COMINT-GAMMA//ORCON/REL TO USA, AUS, CAN, GBR, NZL
    WikiLeaks Synopsis
    Intercepted communication reveals that Sarkozy blamed U.S. Government’s many mistakes for the world economic crisis, and given a lack of engagement by the U.S., France, as EU president at the time, had to take the lead in devising solutions.
    Download PDF

    Sarkozy Sees Himself as Only One Who Can Resolve World Financial Crisis (TS//SI-G//OC)

    (TS//SI-G//OC/REL TO USA, AUS, CAN, GBR, NZL) French President Nicolas Sarkozy considers it his responsibility to Europe and the world to step up to the plate and resolve the world financial crisis. He further declared that he is the only one, given France’s EU Presidency, who can step into the breach at this time. The President blamed many of the current economic problems on mistakes made by the U.S. Government, but believes that Washington is now heeding some of his advice. In his view, this is the first time that the U.S. has not taken the lead in managing a global crisis and France will now take the helm. Sarkozy is determined that the mid-November financial summit, which he proposed, will bring drastic change to the world financial system. Finally, the French President was pleased by some progress made within the EU to ease the crisis and by his excellent working relationship with the British and Spanish prime ministers.

    Unidentified

    French leadership

    G/OO/503290-08, 291640Z

    Find this story at 29 June 2015

    WikiLeaks – Chirac, Sarkozy et Hollande : trois présidents sur écoute

    Van nieuwsblog.burojansen.nl

    WIKILEAKS Les documents obtenus par WikiLeaks et que publie «Libération» révèlent que la NSA a, au moins de 2006 à mai 2012, espionné Jacques Chirac, Nicolas Sarkozy et François Hollande.
    Un adage en vogue dans les milieux du renseignement veut qu’en matière d’espionnage, on n’ait pas d’alliés – ou, à tout le moins, qu’ils ne soient pas forcément des amis. «S’espionner entre amis, cela ne se fait pas», s’était d’ailleurs indignée Angela Merkel en apprenant en octobre 2013, par des révélations du Spiegel, que l’Agence nationale de sécurité (NSA) américaine avait ciblé son téléphone portable. Une sélection de documents que publient Libération et Mediapart en collaboration avec WikiLeaks révèle qu’en France, ce sont trois présidents successifs, et certains de leurs collaborateurs, qui ont été espionnés sur une période allant au moins de 2006, lors du second mandat de Jacques Chirac, à mai 2012, juste après l’installation à l’Elysée de François Hollande.

    Ces documents obtenus par WikiLeaks – regroupés sous le titre «Espionnage Elysée» – consistent notamment en cinq rapports d’analyse émanant de la NSA, sous l’intitulé «Global SIGINT Highlights», autrement dit, des «faits marquants» tirés du renseignement d’origine électromagnétique, les interceptions de communications. Tous sont classés «Top Secret», et destinés à des responsables de la NSA et de la communauté américaine du renseignement ; seuls deux d’entre eux, les plus anciens, sont voués à être partagés au sein des «Five Eyes», l’alliance des services de renseignement des Etats-Unis, de l’Australie, du Canada, de la Nouvelle-Zélande et du Royaume-Uni, les autres étant exclusivement à usage américain. Ces comptes rendus émanent, selon des experts interrogés par WikiLeaks, d’un bureau identifié comme étant celui des Summary Services («le service des synthèses»).

    «SÉLECTEURS»
    On peut y lire, notamment, comment Jacques Chirac a, en 2006, poussé son candidat pour le poste de sous-secrétaire général adjoint des Nations unies, mais aussi que, selon la NSA, le ministre des Affaires étrangères de l’époque, Philippe Douste-Blazy, avait une «propension […] à faire des déclarations inexactes ou inopportunes». On peut y lire aussi – ce qui ne surprendra personne – que Nicolas Sarkozy se voyait, en 2008, comme «le seul homme capable de résoudre la crise financière». Ou qu’il se plaignait, en 2010, du «recul de Washington sur sa proposition d’accord de coopération bilatérale sur le renseignement», accord que les deux interlocuteurs mentionnés dans la note, l’ambassadeur de France à Washington, Pierre Vimont, et le conseiller diplomatique, Jean-David Levitte, attribuaient précisément au «souhait des Etats-Unis de continuer à espionner la France»…

    Le mémo le plus récent date du 22 mai 2012 – soit après la mise en place d’un protocole d’échanges d’informations ­entre la Direction générale de la sécurité extérieure (DGSE) et la NSA, qui remonterait, selon le Monde, à la fin 2011 – et fait état de «réunions secrètes» pour discuter d’une possible sortie de la Grèce de la zone euro, mais également des inquiétudes de Jean-Marc Ayrault quant aux réactions d’Angela Merkel si elle venait à avoir vent de la rencontre entre le nouveau président et l’opposition allemande.

    A vrai dire, si le contenu des notes est classé comme hautement confidentiel, il ne révèle pas pour autant de secrets d’Etat. Il témoigne, en tout état de cause, de l’intérêt porté par la NSA à la France. A ce titre, l’autre type de document obtenu par WikiLeaks est au moins aussi frappant. Il s’agit d’un extrait d’une base de données de la NSA mentionnant une série de numéros de téléphone, fixes et mobiles, identifiés comme des «sélecteurs». Autrement dit, sur la base d’une collecte massive d’informations, l’agence identifie des cibles qui motivent par la suite des recherches précises de contenus. Le tout en fonction de «besoins d’information» formalisés à partir de 2002, qui touchent à la politique intérieure ou aux enjeux économiques.

    Extrait d’une base de données de la NSA montrant les personnalités politiques qu’ils ont ciblé.

    «NOUVELLES POSSIBILITÉS DE COLLECTE»
    Dans cette liste, qui date d’après nos recoupements de l’année 2010, Libération a pu identifier les numéros de portable de membres de l’exécutif – le président Nicolas Sarkozy, les secrétaires d’Etat aux Affaires européennes et au Commerce Jean-Pierre Jouyet et Pierre Lellouche –, mais aussi des cibles plus larges : le standard du ministère des Finances, celui de l’Agriculture, ainsi que l’antenne à l’Elysée du Centre de transmissions gouvernemental, qui dépend du Secrétariat général de la défense et de la sécurité nationale (SGDSN). Ce service est précisément responsable de la sécurisation des communications de l’exécutif, ainsi que de la permanence des liaisons gouvernementales, le «téléphone rouge». Rien n’indique pour autant que les liaisons sécurisées aient, elles, été compromises.

    Parmi les autres noms, la liste témoigne d’une identification plutôt précise des interlocuteurs. Les téléphones mobiles de conseillers du Président, comme le secrétaire général de l’Elysée de l’époque, Claude Guéant, ou Jean-David Levitte, sont aussi listés. Contactés par Libération, ni l’un ni l’autre ne se disent surpris. Le premier juge le procédé «inadmissible». Le second, philosophe, indique être «toujours parti du principe [qu’il était] écouté, et pas seulement par nos amis et partenaires américains».

    On trouve aussi des membres du cabinet ou de l’administration du ministère des Affaires étrangères – son porte-parole d’alors, Bernard Valero, ainsi que Laurence Tubiana, fonctionnaire au Quai d’Orsay qui a été chargée en 2009 des négociations pour la conférence sur le climat de Copenhague. A la différence des autres cibles, cette dernière ne relève d’ailleurs pas de la branche chargée d’intercepter les communications européennes, le «S2C32» (déjà identifié dans le scandale Merkel), mais d’un bureau chargé notamment d’«améliorer l’accès à la cible», d’«accroître les efforts de ciblage et d’exploitation» et de «développer de nouvelles possibi­lités de collecte». En clair, de voir dans quelle mesure il serait possible de pirater son téléphone, voire d’installer des logiciels espions dans son ordinateur.

    Cette sélection de documents ne révèle qu’une partie des activités de la NSA en matière d’espionnage des dirigeants français : rien ne permet de connaître la quantité de comptes rendus d’écoutes ayant été communiqués aux dirigeants de la NSA, et les présidents prennent également des précautions pour évoquer les sujets les plus sensibles – rencontres bilatérales ou communications chiffrées. Mais les documents confirment, en tout état de cause, à quel point les Etats-Unis peuvent s’intéresser au détail des communications de dirigeants de pays alliés. En octobre 2013, le ­député ­socialiste Jean-Jacques Urvoas, rapporteur du projet de loi sur le renseignement, se plaignait d’ailleurs dans les colonnes du Monde que «les Etats-Unis n’ont pas d’alliés, ils n’ont que des cibles ou des vassaux».

    «ZONE GRISE»
    Reste désormais à savoir si ces pratiques se sont poursuivies au-delà de la date des derniers documents que nous publions en collaboration avec WikiLeaks. Sollicité par Libération et Mediapart, l’entourage de François Hollande assure qu’au moment de la visite d’Etat du Président à Washington, en février 2014, «l’engagement a été pris [par Barack Obama] de ne plus pratiquer d’écoutes indifférenciées concernant les services de l’Etat des pays alliés». Egalement sollicités, ni la NSA ni la Maison Blanche n’avaient encore réagi, mardi soir à l’heure du bouclage.

    L’espionnage à l’étranger est l’ultime «zone grise» du renseignement – il est d’ailleurs, en France, le véritable point aveugle du projet de loi sur le renseignement, voué à être adopté ce mercredi. En avril, une résolution de l’Assemblée parlementaire du Conseil de l’Europe préconisait la mise en place d’un «code du renseignement multilatéral». On en est évidemment encore très loin.

    AMAELLE GUITON , ALEXANDRE LÉCHENET , JEAN-MARC MANACH ET AVEC JULIAN ASSANGE 23 JUIN 2015 À 21:55 (MIS À JOUR : 23 JUIN 2015 À 22:56)

    Find this story at 23 June 2015

    Copyright liberation.fr

    NSA Economic Spy Order

    Van nieuwsblog.burojansen.nl

    Information Need (IN) – France: Economic Developments
    EEI: H – Foreign Contracts/Feasibility Studies/Negotiations
    Information Need (IN) – France: Economic Developments

    Date 2012
    Classification SECRET
    WikiLeaks Synopsis
    This classified US intelligence “Information Need” spying order mandates long term economic espionage against France in order to obtain details about the economic activities of French companies and the economic policies and decisions of the French government. Information Needs (IN) are collection requirements extracted from the National SIGINT Requirements List, and are used to broadly justify the interception of communications in order to satisfy generic intelligence demands from U.S. policy makers and the U.S. Intelligence Community. This IN, identified as 2002-204 (first created in 2002 and updated for more than a decade) and referenced in the list of Top NSA French Targets previously published by WikiLeaks, shows which particular information of interest (“Essential Elements of Information”, EEI) the relevant Signals Intelligence units are instructed to collect and report about. Such requirements include France’s economic relations with the United States, other countries and international institutions, France’s financial and trade policies, and its views on G-8 and G-20 agendas. “Supported Elements” are those parts of the US government which are supported by (i.e receive intelligence reports derived from) the espionage.
    Download PDF

    IN Standard Report: S-C-2002-204

    Title : (S//REL TO USA, AUS, CAN, GBR, NZL) France: Economic Developments

    Originator Classification : SECRET//REL TO USA, AUS, CAN, GBR, NZL

    Table of Contents

    EEI A : (U//FOUO) Economic Relations with the United States
    EEI B : (S//REL TO USA, AUS, CAN, GBR, NZL) French Business Practices
    EEI C : (S//REL TO USA, AUS, CAN, GBR, NZL) French Financial/Macroeconomic Policy Development
    EEI D : (U//FOUO) Views On G-8, G-20 Developments/Issues
    EEI E : (U//FOUO) Budgetary Constraints/Contributions To NATO
    EEI F : (S//REL TO USA, AUS, CAN, GBR, NZL) French Views
    EEI G : (U//FOUO) Relations With Least Developed Countries (LDCs) And Transitional States
    EEI H : (U//FOUO) Foreign Contracts/Feasibility Studies/Negotiations
    EEI I : (U//FOUO) Relations With International Financial Institutions
    EEI J : (S//REL TO USA, AUS, CAN, GBR, NZL) French Trade Policies
    EEI K : (U//FOUO) Questionable Trade Activities

    (U//FOUO) Supported Element(s):

    CIA
    COMMERCE
    DHS
    DIA/DI
    DIA/OSR-2
    DIA/USEUCOM
    FEDERAL RESERVE BOARD
    STATE/INR
    TREASURY
    US TRADE REP
    DOE/IN
    EEI: H – Foreign Contracts/Feasibility Studies/Negotiations

    Date 2012
    Classification SECRET//NOFORN
    WikiLeaks Synopsis
    This US economic espionage order (“Essential Elements of Information) for France instructs US spies to collect information on all French sales and financing of significant projects related to telecommunications, electrical generation, gas, oil, nuclear and renewable energy and environmental and healthcare technologies. Most substantially it also mandates the interception and reportage of all French company negotiations and contracts valued at over $200 million. The results of the spying are to be reported to various US trade, political and intelligence agencies (“Supported Elements”).
    Download PDF

    EEI : H

    EEI Classification : SECRET//NOFORN

    Originator EEI Classification : SECRET//REL TO USA, AUS, CAN, GBR, NZL

    EEI Title : (U//FOUO) Foreign Contracts/Feasibility Studies/Negotiations
    Question(s) :

    1. (S//REL TO USA, AUS, CAN, GBR, NZL) Report impending French contract proposals or feasibility studies and negotiations for international sales or investments in major projects or systems of significant interest to the foreign host country or $200 million or more in sales and/or services, including financing information or projects of high interest including:

    A. Information and telecommunications facilities networks and technology?

    B. Electric power, natural gas, and oil facilities and infrastructure to include nuclear power and renewable energy generation?

    C. Transportation infrastructure and technology to include ports, airports, high-speed rail, and subways?

    D. Environmental technologies used domestically and for export?

    E. Health care infrastructure, services, and technologies, including biotechnology developments?

    Find this story at 29 June 2015

    DOSSIER: LA RÉPUBLIQUE SUR ÉCOUTE ENQUÊTE 2006-2012: Hollande, Sarkozy et Chirac écoutés

    Van nieuwsblog.burojansen.nl

    Au-delà des trois chefs d’État français, des ministres, des hauts fonctionnaires, des parlementaires et des diplomates ont été surveillés téléphoniquement pendant près d’une décennie par les services secrets américains, selon des documents obtenus par WikiLeaks.

    Les États-Unis ont placé la République sur écoute. Les présidents François Hollande, Nicolas Sarkozy et Jacques Chirac, ainsi que de nombreux ministres, des hauts fonctionnaires, des parlementaires ou des diplomates, ont été écoutés directement ou par ricochet pendant près d’une décennie par les services secrets américains, selon des documents confidentiels de la National Security Agency (NSA) obtenus par WikiLeaks (lire aussi notre version en anglais de cet article).

    D’après des notes de synthèse de la NSA auxquelles Mediapart et Libération ont eu accès, en collaboration avec WikiLeaks, dans le cadre de l’opération Espionnage Élysée, les interceptions se sont étalées de 2006 à 2012 – mais rien ne dit qu’elles n’ont pas commencé plus tôt et ne se sont pas poursuivies depuis. Toutes classifiées « top secret », ces notes détaillent les dessous d’un espionnage obsessionnel de la France par les États-Unis sur des questions diplomatiques, de politique locale ou économiques de tous ordres.

    Les trois présidents français écoutés par la NSA
    Les trois présidents français écoutés par la NSA © DR
    Que les États-Unis écoutent les principaux dirigeants d’un pays allié comme la France relève pour certains du secret de polichinelle. L’information est désormais prouvée par des documents issus du cœur de l’appareil d’État américain.

    Surtout, les éléments que nous rendons publics à partir d’aujourd’hui (voir ici l’analyse des documents) révèlent l’ampleur jusqu’ici insoupçonnée de l’espionnage états-unien, réalisé en dehors de tout cadre judiciaire et de tout réel contrôle. Car ce ne sont pas seulement les présidents de la République successifs qui ont été écoutés ces dernières années, mais toutes les strates de la puissance publique qui ont été, à un moment ou à un autre, la cible des États-Unis, qu’il s’agisse de directeurs d’administration, de ministres, de conseillers présidentiels et ministériels, de diplomates, de porte-parole. Au sein même de l’Élysée, par exemple, de très nombreuses lignes téléphoniques (fixes ou portables) ont été branchées.

    Déjà passablement écornée par les révélations de l’ancien agent Edward Snowden, l’image de la NSA et, avec elle, des États-Unis ne devrait pas sortir grandie de ces nouvelles révélations, qui jettent une lumière crue sur les pratiques agressives et déloyales de la première puissance mondiale à l’encontre d’un pays normalement considéré comme « ami ». Du moins, en façade.

    Contactée, la NSA n’a pas souhaité faire de commentaire.

    Comme ses deux prédécesseurs de droite, l’actuel président socialiste François Hollande n’a pas échappé à la curiosité des grandes oreilles de Washington. Un rapport du 22 mai 2012 de la NSA fait ainsi explicitement référence à une conversation tenue quatre jours plus tôt entre le président fraîchement élu et son premier ministre de l’époque, Jean-Marc Ayrault. La conversation porte sur la volonté de François Hollande d’organiser des « consultations secrètes » avec l’opposition allemande, concernant l’éventualité d’une sortie de la Grèce de la zone euro – un sujet toujours d’actualité.

    Les analystes de la NSA évoquent dans le même document l’existence de « précédents rapports » concernant des entretiens passés au sujet de la chancelière Angela Merkel. Ce qui laisse donc supposer que les interceptions américaines du président français ont bel et bien été monnaie courante.

    À l’Élysée, on indiquait mardi 23 juin que, sans avoir conservé la trace de cette conversation, celle-ci est « tout à fait crédible ». Mais sur le fond, la présidence de la République n’a souhaité faire aucun commentaire à ce stade. Dans l’entourage du président, on précise toutefois qu’en amont de la rencontre entre François Hollande et Barack Obama, le 11 février 2014 à Washington, puis lors de cette entrevue, « l’engagement a été pris de ne plus pratiquer d’écoutes indifférenciées des services de l’État d’un pays allié ».

    Le directeur général de LR (ex-UMP), Frédéric Péchenard, a communiqué l’information à Nicolas Sarkozy, qui « ne souhaite pas réagir pour l’instant ».

    Comme pour la plupart des documents obtenus par WikiLeaks, le rapport de mai 2012 de la NSA ciblant François Hollande est surmonté de nombreuses initiales qui, une fois décryptées, donnent la mesure du caractère ultrasensible des données désormais publiques. Estampillées « top secret » (TS), ces notes traitent de renseignements obtenus par des interceptions de signaux électroniques (SI pour SIGINT, soit “signal intelligence”) et ne doivent sous aucun prétexte être partagées avec un pays étranger (NF pour NOFORN, soit “no foreigner”).

    La note Hollande est également accompagnée, comme pour de nombreuses autres, de la mention « unconventional », une catégorie particulière dans la nomenclature de la NSA qui correspond aux opérations non conventionnelles.

    LIRE AUSSI
    Revealed: how US tapped phones of three French presidents
    PAR FABRICE ARFI ET JÉRÔME HOURDEAUX ET JULIAN ASSANGE (WIKILEAKS)

    US phone taps on France – why Paris would prefer to keep a low profile
    PAR LÉNAÏG BREDOUX ET MATHIEU MAGNAUDEIX

    WikiLeaks documents on US snooping on France – what the presidents said
    PAR LÉNAÏG BREDOUX ET ELLEN SALVI ET JULIAN ASSANGE (WIKILEAKS)

    France condemns ‘unacceptable’ spying on its presidents
    PAR LÉNAÏG BREDOUX ET MATHIEU MAGNAUDEIX ET ELLEN SALVI

    35 « leaders internationaux » espionnés par la NSA
    PAR LA RÉDACTION DE MEDIAPART

    Espionnage d’intérêts français par le renseignement allemand : la France se tait
    PAR MATHIEU MAGNAUDEIX

    Espionnage : à droite et à gauche, l’allié américain a déçu
    PAR LÉNAÏG BREDOUX ET MATHIEU MAGNAUDEIX ET ELLEN SALVI
    Toujours dans cette même note Hollande figure une petite mention supplémentaire, qui est tout sauf anodine : « Foreign Satellite ». Ce terme, FORNSAT en abrégé, désigne un réseau mondial de stations d’écoutes de la NSA réparties dans les pays alliés. Tous les regards se portent aujourd’hui, sans qu’il soit possible d’en avoir la certitude absolue, vers des antennes satellites allemandes.

    La presse a en effet plusieurs fois fait état ces derniers mois de la sous-traitance par les services secrets allemands (le BND) de l’espionnage américain, ce qui a provoqué une forte indignation en Allemagne et l’ouverture d’une enquête parlementaire qui cherche précisément le type de documents que WikiLeaks a obtenus.

    En dehors de l’actuel chef de l’État français, d’autres hautes personnalités françaises ont été écoutées. D’après les documents en notre possession, sur lesquels nous reviendrons dans les prochains jours, les anciens présidents Nicolas Sarkozy et Jacques Chirac, l’ancien ministre socialiste de l’économie Pierre Moscovici (aujourd’hui commissaire européen) ou l’ex-ambassadeur de France à Washington Pierre Vimont ont ainsi été espionnés.

    Il faut dire que l’appétit de renseignements des États-Unis pour la France relève de la boulimie. Un autre document confidentiel (voir ci-dessous) de la NSA, rédigé sous la présidence Sarkozy (2007-2012), révèle quant à lui la liste des cibles françaises définies par les États-Unis. Sont concernés, pêle-mêle : le portable personnel du président de l’époque, Nicolas Sarkozy, ceux du conseiller diplomatique Jean-David Levitte, du secrétaire général de l’Élysée Claude Guéant, du porte-parole du ministère des affaires étrangères Bernard Valero, de l’ancien ministre Jean-Pierre Jouyet (aujourd’hui secrétaire général de l’Elysée), celui d’un responsable du Quai d’Orsay non identifié, ou du ministre du commerce extérieur Pierre Lellouche.

    La liste des cibles françaises établie par la NSA sous la présidence Sarkozy
    La liste des cibles françaises établie par la NSA sous la présidence Sarkozy
    Pour Claude Guéant, ancien secrétaire général de l’Elysée et ex-ministre de l’intérieur, « cette pratique est scandaleuse ». « Le gouvernement français doit réagir comme il se doit. Au minimum, cela nécessite une explication au plus haut niveau, un engagement absolu à mettre un terme à ces pratiques. Nous nous acheminons vers un monde qui est extrêmement préoccupant, où plus personne n’a plus d’intimité, de confidentialité », se plaint ce proche de Nicolas Sarkozy.

    « Si les Américains ont écouté Merkel, on ne voit pas pourquoi les autres n’auraient pas été écoutés », commente Frédéric Péchenard, ancien patron de la police nationale et actuel directeur général des Républicains. « Mais si l’on veut être capables de se défendre, il faut que nos services soient à la hauteur. Il nous faut des moyens techniques humains et juridiques plus efficaces. Être espionné par ceux qui sont censés être nos amis, ça peut poser un problème d’ordre diplomatique », précise-t-il.

    « Moi qui étais un grand ami de l’Amérique, je le suis de moins en moins », réagit pour sa part le député Pierre Lellouche auprès de Mediapart. « Je ne suis pas surpris. Ça ne m’étonne pas d’avoir été écouté lorsque j’étais au commerce extérieur, ça intéresse beaucoup les Américains, l’espionnage industriel. On a tout le temps ce genre de conversations. C’est d’ailleurs l’argument qu’on nous rétorque en ce moment dans le cadre de la loi sur le renseignement : on est écouté par tout le monde, pourquoi s’empêcher de nous écouter ? On s’écoute de partout. Malheureusement, je le dirai à l’Assemblée nationale, on est dans un imperium global sur le plan économique, où les États-Unis n’hésitent pas à mettre en réseaux la CIA, la NSA, mais aussi la justice américaine, qui ensuite fait des saisines. Je le dénonce sans arrêt », ajoute-t-il.

    D’après les documents de la NSA, les lignes fixes des conseillers africains en poste à l’Élysée et les numéros des… standards des ministères de l’agriculture et des finances sont également visés. On trouve encore dans la liste des cibles l’antenne du Centre de transmission gouvernemental (CTG) situé à l’Élysée. Celui-ci est chargé d’assurer, à l’abri du “secret défense”, la permanence des liaisons gouvernementales et tout particulièrement celles du chef de l’État et du Premier ministre. Un autre numéro, référencé sous l’intitulé « FR VIP AIRCRAFT REL », renvoie après vérification à une ligne de la flotte aérienne du gouvernement, l’Etec, qui dépend de l’armée de l’air.

    Au-delà du scandale que peut susciter aujourd’hui cet espionnage américain, la facilité avec laquelle les États-Unis paraissent pouvoir intercepter la moindre conversation des plus hauts dirigeants français interroge aujourd’hui la faiblesse des capacités de contre-ingérence des services de renseignement français. À ce propos, l’Élysée a coutume de rappeler que sur les questions diplomatiques et militaires, il n’y a jamais eu de fuite quelle qu’elle soit, précisant que s’agissant des sujets les plus sensibles, toutes les précautions sont prises. Jusqu’à preuve du contraire.

    23 JUIN 2015 | PAR FABRICE ARFI ET JÉRÔME HOURDEAUX ET JULIAN ASSANGE (WIKILEAKS)

    Find this story at 23 June 2015

    Copyright mediapart.fr

    Espionnage Élysée (2015)

    Van nieuwsblog.burojansen.nl

    Press Release Top French NSA Targets Top French NSA Intercepts Economic Spy Order

    Today, 29 June 2015, WikiLeaks continues “Espionnage Élysée”, our ongoing publication of a collection of TOP SECRET documents from United States surveillance operations against France.

    Today’s publication comprises seven top secret documents detailing how the US has had a decade- long policy of economic espionage against France, including the interception of all French corporate contracts and negotiations valued at more than $200 million. The documents demonstrate that the US National Security Agency, far from being a rogue organisation, is carrying out an economic espionage policy created by the US Director of National Intelligence. The documents detail the intelligence process, from the tasking of the NSA with collection of desired economic information to the production of developed intelligence reports, which are sent to “Supported Elements” of the US government, including the US Department of Commerce, the US Trade Represenative, the US Treasury and the Central Intelligence Agency.

    Central within the cache of documents are two long-term spying orders (“collection requirements”) which define the kinds of intelligence the NSA is tasked with collecting in its surveillance operations against France. The documents make clear that the NSA has been tasked with obtaining intelligence on all aspects of the French economy, from government policy, diplomacy, banking and participation in international bodies to infrastructural development, business practices and trade activities. The documents establish that the US economic intelligence operations against France have run for more than a decade and started as early as 2002. Some of the documents are authorised for sharing with the “Five Eyes” partners – the group of Anglophone countries in close intelligence co-operation with the United States: Canada, New Zealand, Australia and France’s fellow member state of the European Union, the United Kingdom, strongly suggesting that the United Kingdom has also benefited from the United States’ economic espionage activities against France.

    The cache also includes five TOP SECRET intelligence summaries from US spying on the conversations and communications of French officials. The documents show US spying on the French Finance Minister, a French Senator, officials within the Treasury and Economic Policy Directorate, the French ambassador to the United States, and officials with direct responsibility for EU trade policy. The intercepts reveal internal French deliberation and policy on the World Trade Organization, the Trans-Pacific Partnership Agreement, the G7 and the G20, the 2013 French budget, the decline of the automotive industry in France, and the involvement of French companies in the Oil for Food programme in Iraq during the 1990s.

    WikiLeaks founder Julian Assange said: “The United States has been conducting economic espionage against France for more than a decade. Not only has it spied on the French Finance Minister, it has ordered the interception of every French company contract or negotiation valued at more than $200 million. That covers not only all of France’s major companies, from BNP Paribas, AXA and Credit Agricole to Peugeot and Renault, Total and Orange, but it also affects the major French farming associations. $200 million is roughly 3,000 French jobs. Hundreds of such contracts are signed every year. The United States not only uses the results of this spying itself, but swaps these intercepts with the United Kingdom. Do French citizens deserve to know that their country is being taken to the cleaners by the spies of supposedly allied countries? Mais oui!”

    For French-language interviews/comment regarding Espionnage Élysée please contact WikiLeaks’ Paris-based legal advisor, Juan Branco: Tel. +33 671 19 21 47

    Cartoon
    Today, 23 June 2015, WikiLeaks began publishing “Espionnage Élysée”, a collection of TOP SECRET intelligence reports and technical documents from the US National Security Agency (NSA) concerning targeting and signals intelligence intercepts of the communications of high-level officials from successive French governments over the last ten years.

    The top secret documents derive from directly targeted NSA surveillance of the communications of French Presidents Francois Hollande (2012–present), Nicolas Sarkozy (2007–2012), and Jacques Chirac (1995–2007), as well as French cabinet ministers and the French Ambassador to the United States. The documents also contain the “selectors” from the target list, detailing the cell phone numbers of numerous officials in the Elysee up to and including the direct cell phone of the President.

    Prominent within the top secret cache of documents are intelligence summaries of conversations between French government officials concerning some of the most pressing issues facing France and the international community, including the global financial crisis, the Greek debt crisis, the leadership and future of the European Union, the relationship between the Hollande administration and the German government of Angela Merkel, French efforts to determine the make-up of the executive staff of the United Nations, French involvement in the conflict in Palestine and a dispute between the French and US governments over US spying on France.

    A founding member state of the European Union and one of the five permanent members of the UN Security Council, France is formally a close ally of the United States, and plays a key role in a number of US-associated international institutions, including the Group of 7 (G7), the North Atlantic Treaty Organization (NATO) and the World Trade Organization (WTO).

    The revelation of the extent of US spying against French leaders and diplomats echoes a previous disclosure in the German press concerning US spying on the communications of German Chancellor Angela Merkel and other German officials. That disclosure provoked a political scandal in Germany, eventuating in an official inquiry into German intelligence co-operation with the United States, which is still ongoing.

    While the German disclosures focused on the isolated fact that senior officials were targeted by US intelligence, WikiLeaks’ publication today provides much greater insight into US spying on its allies, including the actual content of intelligence products deriving from the intercepts, showing how the US spies on the phone calls of French leaders and ministers for political, economic and diplomatic intelligence.

    WikiLeaks founder Julian Assange said: “The French people have a right to know that their elected government is subject to hostile surveillance from a supposed ally. We are proud of our work with leading French publishers Liberation and Mediapart to bring this story to light. French readers can expect more timely and important revelations in the near future.”

    Find this story at 29 June 2015

    Trade Secrets : Is the U.S.’s most advanced surveillance system feeding economic intelligence to American businesses? (1999)

    Van nieuwsblog.burojansen.nl

    No one is surprised that the United States uses sophisticated electronic spying techniques against its enemies. But Europeans are increasingly worried about allegations that the U.S. uses those same techniques to gather economic intelligence about its allies.
    The most extensive claims yet came this spring in a report written for the European Parliament. The report says that the U.S.

    National Security Agency, through an electronic surveillance system called Echelon, routinely tracks telephone, fax, and e-mail transmissions from around the world and passes on useful corporate intelligence to American companies.

    Among the allegations: that the NSA fed information to Boeing and McDonnell Douglas enabling the companies to beat out European Airbus Industrie for a $ 6 billion contract; and that Raytheon received information that helped it win a $ 1.3 billion contract to provide radar to Brazil, edging out the French company Thomson-CSF. These claims follow previous allegations that the NSA supplied U.S. automakers with information that helped improve their competitiveness with the Japanese (see “Company Spies,” May/June 1994).

    Is there truth to these allegations? The NSA is among the most secretive of U.S. intelligence agencies and won’t say much beyond the fact that its mission is “foreign signals intelligence.” The companies involved all refused to comment.

    “Since the NSA’s collection capabilities are so grotesquely powerful, it’s difficult to know what’s going on over there,” says John Pike, an analyst at the watchdog group Federation of American Scientists, who has tracked the NSA for years.

    This much is known: The NSA owns one of the largest collections of supercomputers in the world, and it’s an open secret–as documented in the European Parliament report–that Echelon vacuums up massive amounts of data from communications satellites and the Internet and then uses its computers to winnow it down. The system scans communications for keywords–“bomb,” for instance–that might tip off analysts to an interesting topic.

    Fueling allegations of corporate espionage is the fact that defense contractors and U.S. intelligence agencies are linked extensively through business relationships. Raytheon, for instance, has large contracts to service NSA equipment, according to the European report.

    Englishman Glyn Ford, the European Parliament member who initiated the study, wants the NSA to come clean about its activities in Europe. And the Europeans have some leverage on this issue, if they decide to use it. In a drive to improve surveillance, the United States is pressuring European governments to make telephone companies build eavesdropping capabilities into their new systems. But if that’s what the U.S. wants, says Ford, it’s going to have to be open about what information it’s collecting: “If we are going to leave the keys under the doormat for the United States, we want a guarantee that they’re not going to steal the family silver,” he says.

    In the meantime, congressional critics have started to wonder if all that high-powered eavesdropping is limited to overseas snooping. In April, Bob Barr (R-Ga.), a member of the House Government Reform Committee, said he was worried by reports that the NSA was engaged in illicit domestic spying.

    “We don’t have any direct evidence from the NSA, since they’ve refused to provide any reports, even when asked by the House Intelligence Committee,” Barr says. “But if in fact the NSA is pulling two million transmissions an hour off of these satellites, I don’t think there’s any way they have of limiting them to non-U.S. citizens.”

    Last May, after the NSA stonewalled requests to discuss the issue, Congress amended the intelligence appropriations bill to require the agency to submit a report to Congress. (The bill is still in a conference committee.) And the NSA will face more questions when the Government Reform Committee holds hearings on Echelon and other surveillance programs.

    “We ought to prevent any agency from the dragnet approach–where they throw out a net and drag anything in,” Barr says.

    Kurt Kleiner
    Mother Jones November 1, 1999

    Find this story at 1 November 1999

    Copyright Mother Jones

    << oudere artikelen  nieuwere artikelen >>