• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Barrett Brown Faces 105 Years in Jail; But no one can figure out what law he broke. Introducing America’s least likely political prisoner

    The mid-June sun is setting on the Mansfield jail near Dallas when Barrett Brown, the former public face of Anonymous, shuffles into the visitors hall wearing a jumpsuit of blazing orange. Once the nattiest anarchist around, Brown now looks like every other inmate in the overcrowded North Texas facility, down to his state-issued faux-Crocs, the color of candy corn.

    Who Are America’s New Political Prisoners?

    Brown sits down across from his co-counsel, a young civil-liberties lawyer named Ahmed Ghappour, and raises a triumphant fist holding several sheets of notebook paper. “Penned it out,” he says. “After 10 months, I’m finally getting the hang of these archaic tools.” He hands the article, titled “The Cyber-Intelligence Complex and Its Useful Idiots,” to his lawyer with instructions to send it to his editor at The Guardian. Brown used to write for the British daily, but since he’s been in prison, it’s written about him and his strange legal ordeal that has had him locked up for nearly a year while he awaits trial next month. Should he be found guilty of all the charges the federal government is bringing against him – 17 counts, ranging from obstruction of justice to threatening a federal officer to identity fraud – he’ll face more than 100 years in prison.

    Given the serious nature of his predicament, Brown, 32, seems shockingly relaxed. “I’m not worried or panicked,” he says. “It’s not even clear to me that I’ve committed a crime.” He describes his time here as a break from the drug-fueled mania of his prior life, a sort of digital and chemical fast in which he’s kicked opiates and indulged his pre-cyber whims – hours spent on the role-playing game GURPS and tearing through the prison’s collection of what he calls “English manor-house literature.”

    Brown has been called many things during his brief public career – satirist, journalist, author, Anonymous spokesman, atheist, “moral fag,” “fame whore,” scourge of the national surveillance state. His commitment to investigating the murky networks that make up America’s post-9/11 intelligence establishment set in motion the chain of events that culminated in a guns-drawn raid of his Dallas apartment last September. “For a long time, the one thing I was happy not to see in here was a computer,” says Brown. “It appears as though the Internet has gotten me into some trouble.”

    Encountering Barrett Brown’s story in passing, it is tempting to group him with other Anonymous associates who have popped up in the news for cutting pleas and changing sides. Brown’s case, however, is a thing apart. Although he knew some of those involved in high-profile “hacktivism,” he is no hacker. His situation is closer to the runaway prosecution that destroyed Aaron Swartz, the programmer-activist who committed suicide in the face of criminal charges similar to those now being leveled at Brown. But unlike Swartz, who illegally downloaded a large cache of academic articles, Brown never broke into a server; he never even leaked a document. His primary laptop, sought in two armed FBI raids, was a miniature Sony netbook that he used for legal communication, research and an obscene amount of video-game playing. The most serious charges against him relate not to hacking or theft, but to copying and pasting a link to data that had been hacked and released by others.

    “What is most concerning about Barrett’s case is the disconnect between his conduct and the charged crime,” says Ghappour. “He copy-pasted a publicly available link containing publicly available data that he was researching in his capacity as a journalist. The charges require twisting the relevant statutes beyond recognition and have serious implications for journalists as well as academics. Who’s allowed to look at document dumps?”

    Brown’s case is a bellwether for press freedoms in the new century, where hacks and leaks provide some of our only glimpses into the technologies and policies of an increasingly privatized national security-and-surveillance state. What Brown did through his organization Project PM was attempt to expand these peepholes. He did this by leading group investigations into the world of private intelligence and cybersecurity contracting, a $56 billion industry that consumes 70 percent of the U.S. intelligence budget.

    Meet Jacob Applelaum, the American Wikileaks Hacker

    “Barrett was an investigative journalist who was merely doing his professional duty,” says Christophe Deloire of Reporters Without Borders. “The sentence that he is facing is absurd and dangerous.”

    B
    rown grew up in the affluent North Dallas neighborhood of Preston Hollow, where, following his parents’ divorce, he lived with his New Age mother. Karen Lancaster always believed her only son was special – he once wrote that she called him “an indigo child with an alien soul.” Among her house rules was that mother and son meditate together daily. She instructed him in the predictions of Nostradamus and made sure he kept a dream journal for the purpose, as Brown described it, “of helping him divine the future by way of my external connection to the collective unconscious.” (For her part, Brown’s mother says she was progressive, but not “New Age”, and that her son’s comments were made in jest.)

    The Rise and Fall of Jeremy Hammond, Enemy of the State

    A precocious pre-adolescent reader and writer, Brown produced a newspaper on his family’s desktop computer while in elementary school. When he started writing for the student paper at his private high school in the mid-Nineties, he quickly clashed with the paper’s censors over his right to criticize the administration. “Barrett always challenged authority, even as a kid, and anytime you go up against authority, you’re going to get in trouble,” says Brown’s father, Robert. “You could sort of always see this coming.”

    By the time he reached high school, Brown had discovered Ayn Rand and declared himself an atheist. He founded an Objectivist Society at school and distinguished himself from other Randians by placing second out of 5,000 entrants in a national Ayn Rand essay contest. (Brown now expresses regret over this.) By all accounts, Brown hated everything about organized education, preferring to follow his own curricula and chat up girls on the bulletin-board systems of a still-embryonic Internet.

    After his sophomore year, Brown told his parents he wasn’t going back. He signed up for online courses and spent his junior year in Tanzania with his father, a Maserati-driving conservative, safari hunter and serial entrepreneur who was trying to launch a hardwood-harvesting business. “Barrett loved living in Africa,” says his father. “He preferred adventure to being in school with his peers. We weren’t far from the embassy that was bombed that year.”

    Brown returned to the U.S. and in 2000 joined some of his childhood friends in Austin, where he spent two semesters taking writing classes at the University of Texas. After dropping out, he spent a summer doing what one friend calls a “heroic” amount of Ecstasy and acid before settling into the charmed life of a pre-crisis Austin slacker – working part-time, smoking pot and paying cheap rent in a series of group houses with enormous porches. Brown’s roommates remember his rooms as being strewn with leaning towers of books and magazines – he especially liked Gore Vidal, P.J. O’Rourke and Hunter S. Thompson – but say he was not especially political. “After 9/11 and Iraq, there were a lot of protests in Austin,” says Ian Holmes, a childhood friend of Brown’s. “I don’t remember him participating in it or being extra vocal, but he was against it all like everyone else.”

    As Brown built up his clip book and matured as a writer, his ambitions began to outgrow Austin. In 2007, Brown moved to Brooklyn with a group of old friends that called itself “the Texadus.” Their Bushwick apartment emerged as a hub for Lone Star State refugees who liked to get high, crush beers and play video games. “People were always hanging out and coming and going,” says Caleb Pritchard, a childhood friend of Brown’s who lived with him in Austin and Brooklyn. Among the apartment’s large cast of characters were a crew of weed-delivery guys from Puerto Rico and Honduras who used the apartment as a daytime base of business operations. “They brought over an Xbox, bought us beer and food and played strategy games with us,” Pritchard says. “It was a good cultural exchange for a bunch of skinny white kids from Dallas.”

    As virtual-world games grew increasingly sophisticated, Brown spent more time in front of his computer. But he didn’t play the games like most people. In Second Life, he linked up with a group of people known as “griefers,” the term for hackers who in the mid-00s became known for generating chaos inside video-game worlds. Socializing on the bulletin board 4chan.org, they formed the first cells of what would later become Anonymous. In the documentary We Are Legion, about the hacktivist group, Brown waxes nostalgic over his griefer period, when he’d spend entire nights “on Second Life riding around in a virtual spaceship with the words ‘faggery daggery doo’ written on it, wearing Afros, dropping virtual bombs on little villages while waving giant penises around. That was the most fun time I ever had in my life.”

    When everyone else went out to the bars, Brown stayed in. Aside from video games and the odd afternoon of pick-up basketball, he also pounded out columns, diaries and blog posts for Vanity Fair, Daily Kos and McSweeney’s, as well as restaurant reviews and essays for weeklies like New York Press and The Onion’s A.V. Club. Though he had some paying gigs, he published most heavily in unpaid, self-edited community forums like Daily Kos and The Huffington Post. “Barrett wasn’t really working in New York so much as getting by with the help of friends and family,” says Pritchard. Among his unpaid gigs was his work as the spokesman for the Godless Americans PAC, which led to Brown’s first TV appearance, on the Fox News morning show Fox & Friends.

    In Brooklyn, Brown resumed shooting heroin, which he’d dabbled in off and on since he was 19. Over the years, doctors have diagnosed him with ADHD and depression. Accurate or not, the diagnoses suggest Brown was drawn to opiates for more than just the high. “When I joined him in Brooklyn in ’08, Barrett was already basically a functional junkie,” says Pritchard.

    Heroin did not mellow Brown when it came to America’s pundit class. Brown’s critique made clear he didn’t want to join the journalistic establishment so much as lash it without mercy. Then, in March 2010, he announced in a blog post the goal of replacing it, of making its institutions irrelevant and rebuilding them in the image of an overly self-confident 28-year-old junkie named Barrett Brown. It was perhaps his first public manifestation of extreme self-assurance that could come off as imperious self-importance. Brown himself did not deny it, once saying, “I don’t think arrogance is something I’m in a position to attack anyone on.”

    The project envisioned by Brown was a new kind of crowdsourced think tank to be “established with a handful of contributors who have been selected by virtue of intellectual honesty, proven expertise in certain topics and journalistic competence in general.” He named it Project PM, after a gang in William Gibson’s Neuromancer called the Panther Moderns.

    Brown conceived his new network partly as a response to what he saw as the sad state of affairs at the two main homes for his work, Daily Kos and HuffPo. After years of vibrancy, both now suffered from “the watering-down of contributor quality,” he said. At Project PM, he assured that “below-average participants will have only very limited means by which to clutter the network.”

    How Anonymous Took Down the Music Industry’s Websites

    With typical cigarette-waving flourish, Brown declared, “Never has there existed such opportunity for revolution in human affairs.”

    Had Project PM developed along the lines of Brown’s original vision – as a kind of exclusive, experts-only, friends-of-Barrett blogger network – it is extremely unlikely that Brown would now be in jail. Or that the FBI would have subpoenaed the company hired to secure its server, as it did in March. But Project PM ended up taking a different route.

    Julian Assange: The Rolling Stone Interview

    T
    he event that locked Brown’s path into a collision course with the federal government came on February 11th, 2010, when he posted an essay on Huffington Post that he grandiloquently titled “Anonymous, Australia and the Inevitable Fall of the NationState.”

    At the time, Anonymous was in the news after some of its hackers, in an action they called Operation Titstorm, brought down Australian government servers in retaliation for the government’s attempt to block certain kinds of niche pornography. For Brown, Titstorm was a world-historic game-changer, a portent of an age in which citizens could successfully challenge state power on their laptops and neutralize government propaganda and censorship.

    In the comically aggrandizing tone that had become his trademark, Brown concluded, “I am now certain that this phenomenon is among the most important and underreported social developments to have occurred in decades.”

    Among those taken by Brown’s interpretation of Titstorm was Gregg Housh, a Boston Web designer and early Anonymous associate, who had emerged as a sort of quasi-spokesman for the group. Through Housh, Brown gained entrance to the online inner sanctums of the hackers he thought were turning history on its head. Housh, who was starting to feel burned out from fielding the barrage of international media requests, saw Brown as someone who could step in and talk to reporters for Anonymous.

    “Barrett ‘got it’ in a way few journalists did,” says Housh. “Soon, he was one of us, and that pretty much set the course for everything that happened next.”

    Brown always denied holding any official capacity as the spokesman of Anonymous, maintaining such a thing was not even possible given the amorphous nature of the group. Yet he embraced the media role with relish, sometimes using the royal “we” during interviews. In March 2011, Brown described himself to a visiting NBC News crew as a “senior strategist” for Anonymous. He also, along with Housh, began writing a book about the group, detailing the transformation of Anonymous from a community of amoral videogame-playing punks into an ethical crusade, assisting street protests across the globe during the Arab Spring.

    From the beginning, Brown’s public role was a subject of internal controversy. A minority dismissed and attacked him as a preening “name fag” – Anonymous slang for people who use their real names and speak to the press. Others were more bothered that Brown was a “moral fag,” the term used by unrepentant griefers to describe the new generation of hacktivists who began flocking to the Anonymous banner in 2008. In We Are Legion, Brown makes his allegiance clear, hailing the hacktivists for turning a “nihilist, ridiculous group” into a “force for good.”

    Yet something of the old griefer remained in Brown even after his and the group’s politicization process had converged to take on the world of intelligence outsourcing. “He was just trolling the hell out of these corporate-surveillance guys,” says Joe Fionda, a New York activist who assisted Brown in his investigations. “Not just doing the serious research work no one else was doing – getting tax files and all that – but calling them at their homes to introduce himself, sometimes straight up pranking them. He’s legit funny and sees the humor and the absurd in everything.”

    Another former colleague, a Boston Web developer and activist named Lauren Pespisa, shared Brown’s love of prank calls: “Sometimes we’d drink and prank-call lobbyists for fun. We went after this one group, Qorvis, because they were helping the kingdom of Bahrain handle its image when they were shooting people. So we’d call them up and ‘dragon shout’ at them,” she says, referring to a sound effect in one of Brown’s favorite video games, The Elder Scrolls V: Skyrim.

    By combining the two ethos of Anonymous, Brown won over more people than he alienated. Part of his appeal was the act of his drily affected pseudo-aristocratic-asshole persona, which he exaggerated during media appearances. He preferred a corduroy sports jacket to the Guy Fawkes mask that Anonymous members favor. A typical portrait showed Brown’s arm slung over a chair, a Marlboro dangling off his bottom lip and a stuffed bobcat on the wall behind him. He was oth loved and hated for being one of the more colorful characters found in the Internet Relay Chat rooms where hackers gathered. He famously once conducted a strategy session while drinking red wine in a bubble bath.

    “Barrett became a bit like the court jester of Anonymous,” says Gabriella Coleman, a professor at McGill University who has written about the network. “His behavior was legendary because he was the ethical foil. Anonymous isn’t just for hackers. People like Barrett Brown can thrive: the organizer, the media-maker, the spectacle-maker.”

    W
    hen Brown met Housh, he was nearing the end of his three-year stint in Brooklyn. In the spring of 2010, Brown called his parents and told them he had a heroin problem. At their urging, he returned to Dallas and began an outpatient treatment that included the heroin replacement Suboxone. It was from a tiny Dallas apartment that Brown deepened his involvement with Anonymous. Since most of his friends lived in Austin, his new social life consisted of the IRC rooms populated by hacktivists. It was a world of nonstop, petty cyberintrigue, which to outsiders can appear like a hellish fusion of The Hollywood Squares, WarGames and Degrassi Junior High.

    Bradley Manning Explains His Motives

    Pritchard remembers the first time Brown crashed on his couch in Austin after his return to Dallas. “I’d wake up, and he’d be online having conversations with these kids on Skype or something,” he says. “Barrett would say, ‘I know what you’re doing!’ The other guy would be stroking his chin like he’s Dr. Claw, saying, ‘No, I know what you’re doing.’ It was nonstop cyberwar, with these dorks just dorking it out with each other. It seemed like a bunch of kids trolling each other.”

    Still, Pritchard appreciated that beneath the dorkery, Brown was involved in serious business. This was Brown’s first year as an unofficial spokesman for Anonymous, and it was eventful. The hackers were aiding the uprisings of the Arab Spring, and assaulted PayPal and credit-card companies in retaliation for their refusal to process donations to WikiLeaks. This latter action, called Operation PayBack, earned the attention of the Justice Department. In the summer of 2011, the FBI issued 35 search warrants and arrested 14 suspected hackers.

    The Trials of Bradley Manning

    By the time of the arrests, Brown’s focus had settled squarely on the nexus between government agencies, private intelligence firms and the information-security industry – known as InfoSec – contracted to build programs and technologies of surveillance, disruption and control that Brown suspected were in many cases unconstitutional. What’s more, he was as bratty as ever about it. He phoned CEOs and flacks at their homes and called them liars. He boasted about bringing the whole system down. As the first raids and arrests took place following Operation PayBack, some observers of Brown’s antics began to suspect that the court jester of Anonymous was not a very safe thing to be.

    “You could just tell it was going to end badly,” says an Anonymous member and veteran hacker. “When he really started making noise about going after these intel-contracting companies, I was like, ‘You’re going to get locked up, kid.'”

    A
    fter Operation Payback, Anonymous was on the radar of every private security firm looking to build a quick reputation. In the office of Aaron Barr, CEO of a struggling digital-security contractor called HBGary Federal, it was the biggest thing on the radar. Barr was convinced that taking down Anonymous before it struck again was a fast track to industry juice and massive contracts. In February 2011, he bragged to The Financial Times about the supersecret sleuthing techniques he had developed to get the goods on Anonymous. He claimed to know the identities of the group’s leaders. Implicit in Barr’s comments was the possibility of federal raids on those identified.

    Partly to avoid that outcome, and partly out of curiosity, an Anonymous cell hacked HBGary’s servers. They discovered that Barr’s techniques involved hanging out on major social-media sites and compiling lists of mostly innocent people. It wasn’t the only example of his staggering miscalculation: Within minutes, the hackers easily got around the firm’s security defenses, ransacking company servers, wiping Barr’s personal tablet and absconding with 70,000 internal e-mails. Stephen Colbert devoted a segment to the fiasco, based around the image of Barr sticking his penis in a hornets’ nest.

    Once the hackers who broke into HBGary’s servers discovered that Barr was basically a clown, they abandoned pursuit. “There were tens of thousands of e-mails and no one wanted to go through them,” says an Anonymous associate who observed the HBGary hack. “Everyone was like, ‘We’re not even going to dump these, because there’s no point.'”

    Brown disagreed. When the hackers posted the e-mails on a BitTorrent site, he used Project PM to organize the painstaking work of collating and connecting the dots to see what picture emerged.

    “Nobody was reading more than a couple of the e-mails before getting bored,” says the Anonymous associate. “But Barrett has this strangely addictive and journalistic kind of mind, so he could stare at those e-mails for 10 hours. He’d be sitting alone in the HBGary channel, yelling at everyone, ‘You’ve got to pay attention! Look at the crap I found!'” Brown quickly drew in some 100 volunteers to help him trawl through and make sense of the e-mails.

    The HBGary cache offered one of the fullest looks ever at how corporate-state partnerships were targeting groups they considered subversive or inimical to the interests of corporate America. The projects under consideration at HBGary ranged from cyberattacks and disinformation campaigns targeting civic groups and journalists to Weird Science-supermodel avatars built to infiltrate and disrupt left-wing and anarchist networks.

    Project PM volunteer investigator Joe Fionda remembers the disturbing thrill of uncovering HBGary’s use of a Maxim pinup to create online personas designed to spy for corporate and government clients. “I couldn’t believe how much crazy shit they were up to,” Fionda says. “My brain still feels like it’s going to explode.”

    The biggest fish flopping in Brown’s net was the story of a cluster of contractors known as Team Themis. The origins of Team Themis dated to Bank of America’s alarm over Julian Assange’s 2010 claim to possess documents that “could take down a bank or two.” The Department of Justice recommended Bank of America retain the services of the white-shoe D.C. law firm Hunton & Williams and the high-­powered intelligence contractor Booz Allen Hamilton. On behalf of Bank of America, Hunton & Williams turned to the large and growing world of InfoSec subcontractors to come up with a plan, settling on HBGary and two dataintelligence shops, Berico Technologies and Palantir Technologies.

    The Themis three were also preparing a proposal for Hunton & Williams on behalf of another client, the U.S. Chamber of Commerce. The leaked HBGary documents revealed that Themis was exploring ways of discrediting and disrupting the activities of organized labor and its allies for the Chamber. The potential money at stake in these contracts was considerable. According to Wired, the trio proposed that the Chamber create a $2-milliona-month sort of cyber special-forces team “of the kind developed and utilized by the Joint Special Operations Command.” They also suggested targeting a range of left-of-center organizations, including the SEIU, watchdog groups like U.S. Chamber Watch, and the Center for American Progress. (The Chamber of Commerce and Bank of America have denied ever hiring Team Themis or having any knowledge of the proposals.)

    In pursuit of the Chamber and Bank of America contracts, the Themis three devised multipronged campaigns amounting to a private-sector information-age COINTELPRO, the FBI’s program to infiltrate and undermine “subversive” groups between 1956 and 1971. Among the The mis ideas presented to Hunton & Williams: “Feed the fuel between the feuding groups. Disinformation. Create messages around actions to sabotage or discredit the opposing organization. Submit fake documents and then call out the error.”

    The revelations represented a triumph for Brown and his wiki. A group of Democratic congressmen asked four Republican committee chairs to hold hearings on the “deeply troubling” question of whether “tactics developed for use against terrorists may have been unleashed illegally against American citizens.” But the calls for investigation went nowhere. The lack of outrage in Washington or on influential editorial pages didn’t shock Brown, who had long ago lost hope in the politicians and pundits who are “clearly intent on killing off even this belated scrutiny into the invisible empire that so thoroughly scrutinizes us – at our own expense and to unknown ends.”

    It was Brown’s finest moment, but his relationship with Anonymous was rapidly deteriorating. By May 2011, Brown had begun turning on the network. “There’s little quality control in a movement like [Anonymous],” Brown told an interviewer. “You attract a lot of people whose interest is in fucking with video-game companies.”

    Brown’s haughty dismissal of the new crop of hacktivists was not a feeling shared by the FBI. The government continued to see Anonymous as a major and growing threat. And in the summer of 2011, it acquired a key piece in its operation to destroy the network. On the night of June 7th, four months after the HBGary hack, two federal agents visited the Jacob Riis publichousing project on Manhattan’s Lower East Side and introduced themselves to a 27-year-old unemployed hacker named Hector Monsegur, known inside Anonymous as “Sabu.” As a leader of an Anonymous offshoot called Lulzsec, he had hacked a number of state and corporate servers. In early 2011, he made some rookie errors that led the FBI to his door: Facing the prospect of being indicted on 12 counts of criminal conspiracy, Sabu rolled over on his old hacker associates. He signed a cooperation agreement and began feeding the FBI information on Anonymous plots. The biggest of these involved a private global intelligence contractor located in Barrett Brown’s backyard, the Austin-based Stratfor.

    I
    n early December 2011, a young Chicago Anon named Jeremy Hammond cracked Stratfor’s server and downloaded some 5 million internal documents. With the apparent blessing and supervision of the FBI, Sabu provided the server for Hammond to store the docs. Hammond then proceeded to release them to the public. Sifting through the data dump would require a massive coordinated effort of exactly the kind Project PM had been training for. Brown and his dedicated volunteers attacked the mountains of e-mails. “We had between 30 and 50 people involved, usually 15 at a time,” says Lauren Pespisa, the Boston Project PM volunteer who now helps organize Brown’s legaldefense fund.

    Did the Mainstream Media Fail Bradley Manning?

    After six months of work, Brown would discover what he considered the fattest spider amid the miles of Stratfor web: a San Diego-based cybersecurity firm called Cubic. As Brown followed the strings, he discovered links between Cubic and a data-mining contractor known as TrapWire, which had ties to CIA vets. Brown thought that he had stumbled on a major find illuminating new technologies for spying and surveillance, but the media pickup was not what Brown had hoped. Major dailies shrugged off the story, and Gawker and Slate poured cold water on his alarm, calling it “outlandish.” Brown responded to the criticism with a rambling, connect-the-conspiracy-dots YouTube video.

    It wasn’t just gossip sites that viewed Brown’s reading of the Stratfor docs with a skeptical eye. Even sympathetic students of intelligence contracting urged caution about interpreting the TrapWire materials. “I applaud anyone digging into this stuff, but you can’t really draw conclusions from what these contractors say in these e-mails because they’re bragging and they’re trying to land business,” says Tim Shorrock, whose 2008 book Spies for Hire first exposed the scope of the intelligence-contracting industry. “Some of the quote-unquote intelligence that Stratfor was reporting on was ludicrous. Why would an intelligence agency buy this stuff?”

    WikiLeaks Stratfor Emails: A Secret Indictment Against Julian Assange?

    Meanwhile, deeply buried in the TrapWire debate was the fact that included in the Stratfor docs were the credit-card numbers of 5,000 Stratfor clients. Brown likely did not give the numbers a second thought. But it’s these numbers that form the most serious charges against Brown. The government alleges that when Brown pasted a link in a chat room to the alreadyleaked documents, he was intentionally “transferring” data for the purpose of credit-card and identity fraud.

    “If the Pentagon Papers included creditcard info, then would The New York Times have been barred from researching them?” says Brown’s co-counsel Ghappour. “There is nothing to indicate Barrett wanted to profit from this information, or that he ever had the information in his possession. He was openly critical of such motives and disapproved of hacking for the sake of it. This was a big part of his rift with Anonymous – why he was considered a ‘moral fag’ by some.”

    The FBI raided Brown’s Dallas apartment on the morning of March 6th, 2012, three months after the Stratfor hack, and one day after Jeremy Hammond was arrested in Chicago. More than a dozen feds led by agent Robert Smith knocked down the door with warrants for Brown’s computers and seized his Xbox. Brown was staying at his mother’s house nearby. Later that morning, the agents appeared at the home of Brown’s mother with a second warrant. They found his laptop in a kitchen cabinet, and she was later charged with obstruction. Brown, who was in the shower preparing for a TV interview when the agents arrived, was not arrested. The agents left with his laptop.

    Among hacktivists, theories differ on the motive behind the FBI action. As one of the few public figures associated with Anonymous, Brown made a soft target with a potentially very valuable hard drive or two. Some say it was meant as a warning; others say Brown had simply pissed off too many powerful people, or was getting too close to something big.

    Then there is the theory, advanced by Gregg Housh, that Brown and Hammond were targeted out of frustration with a blown sting against WikiLeaks founder Julian Assange. After looking into the Stratfor hack, Housh believes that the FBI allowed the hack to proceed not in order to arrest Hammond but Assange. “The idea was to have Sabu sell the stolen Stratfor material to Assange,” says Housh. “This would give them a concrete charge that he had knowingly bought stolen material to distribute on WikiLeaks.”

    Housh believes Hammond got wind of Sabu’s plan to sell the documents to Assange and dumped them before the transaction could take place. While there is no proof of contact between Sabu and Assange, Sabu reportedly communicated with Sigurdur Thordarson, a teenage Icelandic WikiLeaks volunteer and an FBI informant.

    “Hammond had no idea what he’d done,” says Housh. “The FBI were a day away from having evidence against Assange, and Hammond screwed it up for them. That’s why they went after him so hard.”

    Yet Hammond, who led the Stratfor hack, faced only 30 years before cutting a plea deal for 10. Why is Brown facing 105?

    F
    ollowing the March raid, Brown continued his investigations and planned for the future of Project PM. 2012 was going to be a big year. He had a new nucleus of friends and colleagues in Boston, where he was going to move and live in an activist group house. His investigations increasingly took place outside the Anonymous network. Brown had new allies in groups like Telecomix, a collective that operated its own crowdsourcing investigations into the cybersurveillance industry. That summer, he visited New York for the Hackers on Planet Earth conference, an annual gathering of hackers and activists, where he met a few of his Project PM colleagues offline for the first time. “I remember he was wearing a full suit in this crazy heat, sweating profusely in the lobby of the Hotel Pennsylvania,” says Fionda. “He was still struggling with kicking heroin, he had tremors and looked like he was in a lot of pain. But he was full of energy. He was telling everyone, ‘We’re going to the center of the Earth with this story!'”

    But Brown’s mental state seemed to deteriorate during the summer of 2012. Having battled depression throughout his life, he had gone off his meds and was simultaneously struggling with cold-turkey breaks from Suboxone for heroin withdrawal. His YouTube channel documents the effects. In August, Brown posted a clip that showed him skeet-shooting over the words of Caligula’s lament: “If only all of Rome had just one neck.” In early September, as Brown planned his move to Boston, he struggled to contain his rage at the local FBI agent Robert Smith, who had raided his mother’s home and taken his beloved Xbox.

    In September, Brown uploaded a discombobulated three-part video series, the last one titled “Why I’m Going to Destroy FBI Agent Robert Smith.” In the videos, Brown struggles to maintain focus. He demands the return of his Xbox and warns that he comes from a military family that has trained him with weapons – weapons he says he’ll use to defend his home. He calls Smith a “fucking chickenshit little faggot cocksucker” before uttering the words he has since admitted were ill-considered, as well as the result of a chemically combustive mental state.

    Why Shouldn’t Freedom of the Press Apply to WikiLeaks?

    “Robert Smith’s life is over,” says Brown. “And when I say his life is over, I don’t say I’m going to go kill him, but I’m going to ruin his life and look into his fucking kids. How do you like them apples?”

    It takes a suspension of disbelief to hear a credible physical threat as defined by law. The rail-thin Brown appears a desperate, pathetic character in need of psychiatric help. A more humane FBI office might have sent a doctor rather than a car of armed agents. But the FBI didn’t send a shrink. That evening a team of armed agents stormed Brown’s apartment, threw him violently to the ground and arrested him for threatening a federal officer.

    WikiLeaks Releases ‘Beat the Blockade’ Benefit CD

    Over the next four months, federal grand juries issued three multicount indictments for obstruction and “access devicefraud” related to the Stratfor link. It is the last of these that concern civil-liberties activists and that could have a possible chilling effect. “One can’t apply the transfer provision of the statute to someone conducting research,” says Ghappour. “If cutting and pasting a link is the same as the transfer of the underlying data, then anyone on the Internet is prone to violating the Computer Fraud and Abuse Act.”

    The FBI has shown interest in expanding that theoretical “anyone” to include Brown’s circle of volunteers. In March, the bureau went hunting for the digital fingerprints of Project PM administrators with a subpoena. The action has shaken the group’s inner circle, as it was surely intended. “It was a pretext to sow discord and fear in Barrett’s project,” says Alan Ross, a U.K. investigator for Project PM. “They were desperate to bolster their case. After the subpoena, people began to worry about being monitored. I worry about my personal safety even though I acted within the confines of the law. I worry about travel.”

    Travel is one thing Brown does not have to worry about at the moment. Nor, if the government gets its way, will he have to worry about handling the media, his former specialty. In August, the prosecution requested a gag be placed on Brown and his lawyers, a move that suggests they understand the dangers of public scrutiny of the legal peculiarities of United States vs. Barrett Lancaster Brown.

    Meanwhile, Brown has not joined the prison tradition of mastering the law behind bars. Rather than study up on cyberfraud statutes, he has resumed his writing on intel contractors and the pundits who defend them. “Nobody talks to me here,” Brown says of his year in jail, “but I was pretty unsociable on the outside too.” One of the hardest things about incarceration for the atheist has been contending with his cellmates’ singing of hymns. “Prison is great for reading and for thought, until they start in with their Pentecostal nonsense,” says Brown. “It ruins everything.”

    His friends keep him supplied with articles and printouts, which lately have included material related to the Edward Snowden leak. Snowden gained access to information about secret NSA spying on private citizens while working for the intelligence subcontractor Booz Allen Hamilton, a company that had been on Brown’s radar long before most Americans learned of it in the wake of Snowden’s bombshells.

    “This is all much bigger than me,” Brown says in the visiting room. “What matters is this.” He leans over to tap his handwritten manuscript. The pages of the essay are messy on the table, and sticking out from under the pile is the last sentence on the last page. “This is the world that we accept if we continue to avert our eyes,” it says. “And it promises to get much worse.”

    This story is from the August 29th, 2013 issue of Rolling Stone.
    http://www.rollingstone.com/culture/news/barrett-brown-faces-105-years-in-jail-20130905

    by Alexander Zaitchik
    SEPTEMBER 05, 2013

    Find this story at 5 September 2013

    Copyright ©2013 Rolling Stone

    In Secret AT&T Deal, U.S. Drug Agents Given Access to 26 Years of Americans’ Phone Records

    The New York Times has revealed the Drug Enforcement Administration has an even more extensive collection of U.S. phone records than the National Security Agency. Under a secretive DEA program called the Hemisphere Project, the agency has access to records of every phone call transmitted via AT&T’s infrastructure dating back to 1987. That period covers an even longer stretch of time than the NSA’s collection of phone records, which started under President George W. Bush. Each day, some four billion call records are swept into the database, which is stored by AT&T. The U.S. government then pays for AT&T employees to station themselves inside DEA units, where they can quickly hand over records after agents obtain an administrative subpoena. The DEA says the collection allows it to catch drug dealers who frequently switch phones, but civil liberties advocates say it raises major privacy concerns. We speak with Scott Shane, national security reporter for The New York Times and co-author of the report, “Drug Agents Use Vast Phone Trove, Eclipsing NSA’s.”
    Transcript

    This is a rush transcript. Copy may not be in its final form.

    AMY GOODMAN: In a moment we’ll be talking about the death of David Frost with the director Ron Howard, but first we turn to news that one government agency has an even more extensive collection of U.S. phone records than the National Security Administration, the NSA. That agency is the Drug Enforcement Administration. In a front-page article, The New York Times has revealed a secretive operation inside the DEA called the Hemisphere Project. Under this program, the DEA has access to records of every phone call over AT&T’s network dating back to 1987. That period covers a longer stretch of time than the NSA’s collection of phone records, which began under President George W. Bush. Some four billion call records are gathered to the DEA’s database every day. It’s unclear if other major phone companies are involved.

    Unlike with the NSA, the DEA’s phone records are actually stored by AT&T. The U.S. government then pays for AT&T employees to station themselves inside DEA units, where they can quickly hand over data after agents obtain an administrative subpoena. The U.S. government says the program allows DEA agents to keep up with those in the drug trade who often switch phones. In a statement, Justice Department spokesperson Brian Fallon said that “subpoenaing drug dealers’ phone records is a bread-and-butter tactic in the course of criminal investigations” and that Hemisphere “simply streamlines the process.”

    The disclosure of the DEA’s Hemisphere program follows another major revelation involving the DEA and government surveillance. It was revealed last month a secretive DEA unit has used information taken from NSA wiretaps for cases unrelated to terrorism. The DEA has also provided classified intelligence obtained by the NSA and other sources to the Internal Revenue Service to help in their investigations of Americans.

    Well, for more, we’re joined by Scott Shane, national security reporter for The New York Times. His front-page article, co-written with Colin Moynihan, appeared in Monday’s New York Times, “Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s.”

    Welcome to Democracy Now!, Scott Shane. Explain exactly how it’s done and how you found out about this.

    SCOTT SHANE: Well, as you mentioned, I wrote this article with Colin Moynihan, a colleague at The New York Times, and he received from an activist in Washington state, named Drew Hendricks, a 27-slide PowerPoint, which was prepared by AT&T and government agents, apparently DEA or possibly other government agencies, and essentially they’re training slides to introduce folks who are going to be working on the Hemisphere Project, how it works and what it can do. And Drew Hendricks, the activist in Washington, got these slides as part of a series of public information requests. He’s sort of a peace activist out there, and he had been helping some folks with a lawsuit and just, you know, fired off a bunch of public information requests to police agencies in Washington state and other places on the West Coast. This set of slides came back with one of those requests.

    Drew Hendricks believes it may have been sent actually by accident, included by accident. And so—but, in fact, it’s unclassified. It’s marked “Law enforcement sensitive,” but it’s unclassified, and it actually states that the Hemisphere Project is unclassified. What’s kind of remarkable to us is that this has been going on for at least six years under the name Hemisphere Project, and it’s unclassified, but no one has ever learned about it. I couldn’t find a single reference to it in the Nexis database or on the web. And so, they’ve kept it very well hidden, and indeed some of the slides say, if you get information from Hemisphere, never reveal the source of the information. So, the government has kept this very, very well hidden, along with AT&T.

    AMY GOODMAN: And explain what exactly it is, what AT&T is keeping records of and how the government uses this information.

    SCOTT SHANE: AT&T operates what are called switches, through which telephone calls travel all around the country. And what AT&T does in this program is it collects all the—what are called the CDRs, the call data records, the so-called metadata from the calls that we’ve heard about in the NSA context. This is the phone number—phone numbers involved in a call, its time, its duration, and in this case it’s also the location. Some are cellphone calls; some are land line calls. Anything that travels through an AT&T switch, even if it’s not made by an AT&T customer—for example, if you’re using your T-Mobile cellphone but your call travels through an AT&T switch somewhere in the country, it will be picked up by this project and dumped into this database. So AT&T collects the information on all these calls, basically who called who when all over the country. And as you mentioned, there is a slide that says four billion—with a B—call data records are added to the database every day. I’m told by some technical experts that it’s possible one call can create more than one call data record. Apparently, if a cellphone, for example, in a moving car switches from one tower to another, that could be another record, so—because those numbers sound pretty high, 12—you know, maybe 12 or so calls per American per day.

    But anyway, all that call data goes into this giant database, and then when a drug agent at one of three centers around the country—in Los Angeles, Houston and Atlanta—finds a number of interest, they can ask the AT&T person sitting next to them, “Check this out.” The AT&T person accesses the database, the Hemisphere database, and they can come back with a record of, you know, “Here’s the other numbers called by this number, the number you’re interested in,” and when and where, in many cases, and then they can follow up.

    I should say that in order to access the database, the government says that the agent asking AT&T to make the search has to produce at least what’s called an administrative subpoena, which is essentially a form, a DEA form, not approved by a court or by a judge, but simply a DEA form saying, you know, here’s why we’re interested in this number. So there’s no judicial oversight, but it is—these administrative subpoenas are used routinely in a criminal investigation. So the government’s side of the story is that this is no different from kind of routine criminal investigation that happens every day.

    AMY GOODMAN: Scott Shane, very quickly, my final question is about the issue of privacy. What does this raise for Americans?

    SCOTT SHANE: Well, I think what it shows is that, apart from the program we’ve learned about with the NSA in recent months, there are many other programs that the government has, many of them related to law enforcement as well as to intelligence gathering, and also that the government works extremely closely with some telecommunications and Internet companies, sometimes using court orders but often using voluntary arrangements like this one, and often paying the companies to participate, so that the universe of data that’s gathered and has implications for American privacy goes way beyond any one agency or even beyond the government itself into the corporate sector.

    AMY GOODMAN: Scott Shane, I want to thank you for being with us, national security reporter for The New York Times. We’ll link to your front-page article yesterday, “Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s.”

    Tuesday, September 3, 2013

    Find this story at 3 September 2013

    The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.

    DEA has more extensive domestic phone surveillance op than NSA

    For at least six years, US anti-drug agents have used subpoenas to routinely gain access to an enormous AT&T database. It’s an intrusion greater in scale and longevity than the NSA’s collection of phone calls, revealed by Edward Snowden’s leaks.

    As part of the secret Hemisphere Project the government has been paying AT&T to place its employees in drug-fighting units around the country, the New York Times reports.

    The US’s largest telecoms operator has been supplying phone data to the Drug Enforcement Administration since 1987.

    The project covers every call that passes through an AT&T switch, including those made by clients of other operators, with some four billion call records added to the database on a daily basis.

    And, unlike the much debated NSA data, the Hemisphere data includes information on the location of those, making the calls.

    The New York Times found out about the surveillance program after it received slides, describing the Hemisphere Project, from peace activist, Drew Hendricks.

    The activist said he was sent the PowerPoint presentation – which is unclassified, but marked “Law enforcement sensitive” – in response to a series of public information requests to West Coast police agencies.

    The slides revealed that the program was launched back in 2007 and has been carried out in great secrecy since then.

    “All requestors are instructed to never refer to Hemisphere in any official document,” one of the slides said.

    The paper performed a search of the Nexis database, but found no reference to the program in news reports or Congressional hearings.

    The US administration has acknowledged that Hemisphere is operational in three states, adding that the project employed routine investigative procedures used in criminal cases for decades and posed no novel privacy issues.

    Justice Department spokesman, Brian Fallon, stressed that it’s crucial that the phone data is stored by AT&T, and not by the government like in the NSA case. It has requested phone numbers of interest mainly using what are called “administrative subpoenas,” those issued not by a grand jury or a judge, but by a federal agency, the DEA.

    According to the spokesman, Hemisphere proved especially effective in finding criminals, who frequently discard their cellphones in order to avoid being tracked by polices.

    “Subpoenaing drug dealers’ phone records is a bread-and-butter tactic in the course of criminal investigations,” he said in a statement.

    The 27-slide PowerPoint presentation highlights several cases, in which Hemisphere solved big crimes, with not all of them being drug-related.

    For example, this March it found the new phone number and location of a man, who impersonated a general at a San Diego Navy base and then ran over a Navy intelligence agent.

    In 2011, Hemisphere tracked Seattle drug dealers, who were rotating prepaid phones, leading to the seizure of 136 kilos of cocaine and $2.2 million.

    AT&T spokesman, Mark A. Siegel, declined to answer detailed questions on Hemisphere, only saying that AT&T “like all other companies, must respond to valid subpoenas issued by law enforcement.”

    Representatives from Verizon, Sprint and T-Mobile all declined to comment when asked by the New York Times whether their companies participated in Hemisphere or any other similar programs.

    An undisclosed federal law enforcement official told the paper the Hemisphere Project was “singular” and that he knew of no comparable program involving other phone companies.

    It’s not the first time AT&T has been involved in federal surveillance programs, the company operated a telecommunication interception facility for the NSA between 2003 and 2006.

    Published time: September 02, 2013 23:41
    Edited time: September 04, 2013 09:04

    Find this story at 4 September 2013

    © Autonomous Nonprofit Organization “TV-Novosti”, 2005–2013.

    Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s

    For at least six years, law enforcement officials working on a counternarcotics program have had routine access, using subpoenas, to an enormous AT&T database that contains the records of decades of Americans’ phone calls — parallel to but covering a far longer time than the National Security Agency’s hotly disputed collection of phone call logs.

    The Hemisphere Project, a partnership between federal and local drug officials and AT&T that has not previously been reported, involves an extremely close association between the government and the telecommunications giant.

    The government pays AT&T to place its employees in drug-fighting units around the country. Those employees sit alongside Drug Enforcement Administration agents and local detectives and supply them with the phone data from as far back as 1987.

    The project comes to light at a time of vigorous public debate over the proper limits on government surveillance and on the relationship between government agencies and communications companies. It offers the most significant look to date at the use of such large-scale data for law enforcement, rather than for national security.

    The scale and longevity of the data storage appears to be unmatched by other government programs, including the N.S.A.’s gathering of phone call logs under the Patriot Act. The N.S.A. stores the data for nearly all calls in the United States, including phone numbers and time and duration of calls, for five years.

    Hemisphere covers every call that passes through an AT&T switch — not just those made by AT&T customers — and includes calls dating back 26 years, according to Hemisphere training slides bearing the logo of the White House Office of National Drug Control Policy. Some four billion call records are added to the database every day, the slides say; technical specialists say a single call may generate more than one record. Unlike the N.S.A. data, the Hemisphere data includes information on the locations of callers.

    The slides were given to The New York Times by Drew Hendricks, a peace activist in Port Hadlock, Wash. He said he had received the PowerPoint presentation, which is unclassified but marked “Law enforcement sensitive,” in response to a series of public information requests to West Coast police agencies.

    The program was started in 2007, according to the slides, and has been carried out in great secrecy.

    “All requestors are instructed to never refer to Hemisphere in any official document,” one slide says. A search of the Nexis database found no reference to the program in news reports or Congressional hearings.

    The Obama administration acknowledged the extraordinary scale of the Hemisphere database and the unusual embedding of AT&T employees in government drug units in three states.

    But they said the project, which has proved especially useful in finding criminals who discard cellphones frequently to thwart government tracking, employed routine investigative procedures used in criminal cases for decades and posed no novel privacy issues.

    Crucially, they said, the phone data is stored by AT&T, and not by the government as in the N.S.A. program. It is queried for phone numbers of interest mainly using what are called “administrative subpoenas,” those issued not by a grand jury or a judge but by a federal agency, in this case the D.E.A.

    Brian Fallon, a Justice Department spokesman, said in a statement that “subpoenaing drug dealers’ phone records is a bread-and-butter tactic in the course of criminal investigations.”

    Mr. Fallon said that “the records are maintained at all times by the phone company, not the government,” and that Hemisphere “simply streamlines the process of serving the subpoena to the phone company so law enforcement can quickly keep up with drug dealers when they switch phone numbers to try to avoid detection.”

    He said that the program was paid for by the D.E.A. and the White House drug policy office but that the cost was not immediately available.

    Officials said four AT&T employees are now working in what is called the High Intensity Drug Trafficking Area program, which brings together D.E.A. and local investigators — two in the program’s Atlanta office and one each in Houston and Los Angeles.

    Daniel C. Richman, a law professor at Columbia, said he sympathized with the government’s argument that it needs such voluminous data to catch criminals in the era of disposable cellphones.

    “Is this a massive change in the way the government operates? No,” said Mr. Richman, who worked as a federal drug prosecutor in Manhattan in the early 1990s. “Actually you could say that it’s a desperate effort by the government to catch up.”

    But Mr. Richman said the program at least touched on an unresolved Fourth Amendment question: whether mere government possession of huge amounts of private data, rather than its actual use, may trespass on the amendment’s requirement that searches be “reasonable.” Even though the data resides with AT&T, the deep interest and involvement of the government in its storage may raise constitutional issues, he said.

    Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said the 27-slide PowerPoint presentation, evidently updated this year to train AT&T employees for the program, “certainly raises profound privacy concerns.”

    “I’d speculate that one reason for the secrecy of the program is that it would be very hard to justify it to the public or the courts,” he said.

    Mr. Jaffer said that while the database remained in AT&T’s possession, “the integration of government agents into the process means there are serious Fourth Amendment concerns.”

    Mr. Hendricks filed the public records requests while assisting other activists who have filed a federal lawsuit saying that a civilian intelligence analyst at an Army base near Tacoma infiltrated and spied on antiwar groups. (Federal officials confirmed that the slides are authentic.)

    Mark A. Siegel, a spokesman for AT&T, declined to answer more than a dozen detailed questions, including ones about what percentage of phone calls made in the United States were covered by Hemisphere, the size of the Hemisphere database, whether the AT&T employees working on Hemisphere had security clearances and whether the company has conducted any legal review of the program

    “While we cannot comment on any particular matter, we, like all other companies, must respond to valid subpoenas issued by law enforcement,” Mr. Siegel wrote in an e-mail.

    Representatives from Verizon, Sprint and T-Mobile all declined to comment on Sunday in response to questions about whether their companies were aware of Hemisphere or participated in that program or similar ones. A federal law enforcement official said that the Hemisphere Project was “singular” and that he knew of no comparable program involving other phone companies.

    The PowerPoint slides outline several “success stories” highlighting the program’s achievements and showing that it is used in investigating a range of crimes, not just drug violations. The slides emphasize the program’s value in tracing suspects who use replacement phones, sometimes called “burner” phones, who switch phone numbers or who are otherwise difficult to locate or identify.

    In March 2013, for instance, Hemisphere found the new phone number and location of a man who impersonated a general at a San Diego Navy base and then ran over a Navy intelligence agent. A month earlier the program helped catch a South Carolina woman who had made a series of bomb threats.

    And in Seattle in 2011, the document says, Hemisphere tracked drug dealers who were rotating prepaid phones, leading to the seizure of 136 kilos of cocaine and $2.2 million.

    September 1, 2013
    By SCOTT SHANE and COLIN MOYNIHAN

    Find this story at 1 September 2013

    © 2013 The New York Times Company

    Release of DEA Agent Kiki Camarena’s “Murderer” Is Game Changer for CIA

    Narco-Trafficker Rafael Caro Quintero Knows Where All the Skeletons Are Buried in the US’ Dirty Drug War

    The recent release from a Mexican prison of Rafael Caro Quintero — a godfather in Mexico’s narco-trafficking world — rips a scab off a long metastasizing tumor in the US drug war.

    A Mexican federal court on Friday, Aug. 9, overturned Caro Quintero’s 40-year sentence after 28 years served because, the court contends, he was tried wrongly in a federal court for a state offense. Caro Quintero was convicted of orchestrating the brutal torture and murder of US DEA agent Enrique “Kiki” Camarena — who was abducted on Feb. 7, 1985, after leaving the US Consulate in Guadalajara, Mexico, to meet his wife for lunch. His body was found several weeks later buried in a shallow grave some 70 miles north of Guadalajara.

    Caro Quintero’s release from prison brings to the surface once again some longstanding, unsettled questions about the US government’s role in the war on drugs. The recent mainstream media coverage of Caro Quintero’s release has focused, in the main, on the shock and anger of US officials — who are now waving the Camarena case in the public arena like a bloody flag, arguing his honor, and that of the nation’s, must be avenged in the wake of Mexico’s affront in allowing Caro Quintero to walk free.

    What is not being discussed is the US government’s complicity in Caro Quintero’s narco-trafficking business, and, yes, even in the Camarena’s gruesome murder.

    Breaking It Down

    In his definitive book about the US drug war, titled “Down by the River,” journalist Charles Bowden reveals that DEA special agent Camarena spent some time in Mexico with another DEA agent, Phil Jordan, in May 1984, prior to Camarena’s abduction. Jordan, at the time, pointed out to Camarena that they were being followed.

    Camarena replied calmly that the individuals who were tailing them worked for Mexico’s intelligence service, the Federal Security Directorate, or DFS in its Spanish initials.

    From Bowden’s book:

    Camarena brushes off Jordan’s alarm by noting that DFS is trained by the CIA and is functionally a unit in their mysterious work. And he says they are also functionally “the eyes and ears of the cartels.”

    That is a stunning revelation, that the CIA and DFS were “functionally” working in unison and simultaneously the DFS also was in league with Mexico’s narco-traffickers — which at the time included Caro Quintero along with his partners Miguel Angel Felix Gallardo and Ernesto Fonseca Carrillo, considered the top dogs in Mexico’s then-dominate drug organization, The Guadalajara Cartel.

    In fact, the DFS also was accused of being complicit in the kidnapping and murder of Camarena and the subsequent attempt to provide protection to Caro Quintero — who was eventually apprehended in Costa Rica after allegedly getting to that country with the help of the DFS.

    Caro Quintero and Fonseca Carrillo were eventually convicted and jailed for their roles in Camarena’s murder and the killing of his pilot, Alfrado Zavala Avelar. Each was sentenced to serve 40 years in a Mexican prison. Caro Quintero was 37 at the time.

    But Camarena was not the only victim of DFS corruption during that era. A famous Mexican journalist, Manuel Buendia, who in the mid-1980s was investigating the connections between corrupt Mexican officials and narco-traffickers, including Caro Quintero, was murdered in 1984 allegedly with the assistance of DFS’ leadership.

    A story by noted Mexican newspaper columnist Carlos Ramirez, translated and published by Narco News in 2000, describes the circumstances surrounding Buendia’s murder as follows:

    Buendía was assassinated on May 30, 1984, on a street near the Zona Rosa of México City. The investigation was covered-up by the Federal Security Agency [DFS]. The last investigations undertaken by Buendía into drug trafficking led him into the rural indigenous areas of the country. Buendía had responded to a newspaper ad by the Catholic bishops in the south of the country where they denounced the penetration of the narco in rural Mexico but also the complicity of the Army and police corps.

    Buendía did not finish his investigation. His assassination came almost a year before… the assassination of US anti-drug agent Enrique Camarena Salazar in Guadalajara had exposed the penetration of drug traffickers in the Mexican police.

    … Agents of the the Political and Social Investigations Agency and of the Federal Security Agency were discovered as protectors of drug trafficking in México. The Attorney General of the Republic, in the investigation of the assassination of Camarena, found credentials of the Federal Security police in the name of drug traffickers. Caro Quintero escaped to Costa Rica using a credential of the Federal Security Agency [DFS] with his photo but with another name. ….

    That which Buendía was investigating months before was confirmed by the assassination of Camerena, a DEA agent assigned to the US Consulate in Guadalajara. …

    Documents

    The DFS was disbanded in 1985, after Camarena’s murder, and integrated into Mexico’s version of the CIA, called CISEN in its Spanish initials. CISEN still works closely with US agencies and officials, including the CIA, but it is the legacy of DFS and its partnership with the CIA that is being brought to the surface once again with the recent release of Caro Quintero.

    In particular, a DEA Report of Investigation, prepared in February 1990 and obtained by Narco News, provides some detailed insight into the DFS/CIA connection. The DEA report was referenced in media coverage of the US trial of four individuals accused of playing a role in Camarena’s murder.

    From a July 5, 1990, report in the Los Angeles Times:

    The [DEA] report is based on an interview two Los-Angeles based DEA agents conducted with Laurence Victor Harrison, a shadowy figure who, according to court testimony, ran a sophisticated communications network for major Mexican drug traffickers and their allies in Mexican law enforcement in the early and mid 1980s.

    On Feb. 9, according to the report, Harrison told DEA agents Hector Berrellez and Wayne Schmidt that the CIA used Mexico’s Federal Security Directorate (DFS) “as a cover, in the event any questions were raised as to who was running the training operation.”

    That training operation, according to the DEA Report of Investigation, involved “Guatemalan Guerrillas” who “were training at a ranch owned by Rafael Caro-Quintero” in Veracruz on Mexico’s East Coast.

    More from the DEA report:

    The operations/training at the camp were conducted by the American CIA, using the DFS as cover, in the event any questions were raised as to who was running the [camp].

    …. Representatives of the DFS, which was the front for the training camp were in fact acting in consort with major drug overlords to insure a flow of narcotics through Mexico and into the United States.

    … Using the DFS as cover, the CIA established and maintained clandestine airfields to refuel aircraft loaded with weapons, which were destined for Honduras and Nicaragua.

    Pilots of these aircrafts would allegedly load up with cocaine in Barranquilla, Colombia, and in route to Miami, Florida, refuel in Mexico at narcotic trafficker operated and CIA maintained airstrips.

    Tosh Plumlee was one of the CIA contract pilots flying drug loads into the US at the time. Plumlee told Narco News that among the places where his aircraft landed while working these missions was the Caro Quintero-owned ranch in Veracruz, Mexico.

    “I was flying sanctioned operations transporting cocaine out of Colombia and into the United States,” Plumlee says. “[DEA agent Kiki] Camarena knew all about those operations.”

    Plumlee attempted to blow the whistle on the arms-and-drugs transshipment operations in the early 1980s, prior to Camarena’s death.

    The following excerpts are from a February 1991 letter written by former US Sen. Gary Hart and sent to US Sen. John Kerry, then chairman of the Subcommittee on Terrorism, Narcotics and International Communications.

    In March of 1983, Plumlee contacted my Denver Senate Office and met with Mr. Bill Holen of my Senate Staff. During the initial meeting, Mr. Plumlee raised certain allegations concerning U.S. foreign and military policy toward Nicaragua and the use of covert activities by U.S. Intelligence agencies.

    … Mr. Plumlee also stated that Mexico, Costa Rica, Guatemala and El Salvador were providing U.S. military personnel access to secret landing field and various staging areas scattered throughout Central America.

    He specifically cited the Mexican government’s direct knowledge of illegal arms shipments and narcotic smuggling activities that were taking place out of a civilian ranch in the Veracruz area which were under the control and sponsorship of Rafael Caro-Quintero and the Luis Jorge Ochoa branch of the Medellin Escobar Cartel.

    … Mr. Plumlee raised several issues including that covert U.S. intelligence agencies were directly involved in the smuggling and distribution of drugs to raise funds for covert military operations against the government of Nicaragua. …

    Heads in the Sand

    Even prior to Caro Quintero’s surprise prison release on Aug. 9, it appears he was being allowed to carry out his narco-business from a comfortable jailhouse condo with little interference from authorities in Mexico. As evidence of that fact, in June of this year DEA announced that the US Department of the Treasury had “designated 18 individuals and 15 [business] entities” as being linked to Rafael Caro Quintero.

    “Today’s action,” the DEA press release states, “pursuant to the Kingpin Act, generally prohibits US persons from conducting financial or commercial transactions with these designees, and also freezes any assets they may have under US jurisdiction.”

    In other words, the US government is alleging that even while he was incarcerated, Caro Quintero continued to run his drug empire through third parties who were laundering millions of dollars in ill-gotten gains on his behalf.

    How is that possible, unless Caro Quintero continues to have extremely good connections within the Mexican government that have an interest in assuring his drug money is laundered?

    If that’s the case, why would those same government officials have any interest in extraditing him to the US to stand trial?

    Similarly, why would those with any real juice in the US government want to put Caro Quintero on trial, at least in an open court, if he has the knowledge to expose corrupt covert US operations that played a role in the murder of a US DEA agent?

    The only way to hide that complicity would be to shield Caro Quintero’s trial from public view under a national-security cloak — even though the charges against him are criminal in nature (drug-trafficking and murder) and should not implicate national security. As further evidence of that fact, the CIA has already told the media that the allegations about the Agency’s involvement in Caro Quintero’s Veracruz ranch are bogus.

    ”The whole story is nonsense,” CIA spokesman Mark Mansfield told the Associated Press in 1990. ”We have not trained Guatemalan guerrillas on that ranch or anywhere else.”

    But its worth noting that since the CIA issued that statement, a UN-sponsored truth commission found that the US, through agencies like the CIA, did play a role in training the death squads responsible for murdering or disappearing some 200,000 Guatemalans – most of them civilians – during the course of that nation’s bloody 34-year civil war. Some 626 massacres played out in the 1980s alone, when the CIA-sponsored Veracruz, Mexico, “Guatemalan Guerrilas” training operation was allegedly underway.

    From a 1999 Washington Post story on the truth commission’s findings:

    … The commission found that the “government of the United States, through various agencies including the CIA, provided direct and indirect support for some state operations.”

    … Documenting the atrocities, the report found the army “completely exterminated Mayan communities, destroyed their dwellings, livestock and crops” and said that in the northern part of the country, where the Mayan population is largest, the army carried out a systematic campaign of “genocide.”

    Given that backdrop, it appears Caro Quintero, now 61, is clearly a man who may well know too much about US national security operations.

    The DEA issued a statement after Caro Quintero was ordered released from prison, making it clear, at least from a public-relations perspective, that the agency still very much wants to track him down and put him behind bars in the US.

    The Drug Enforcement Administration is deeply troubled to learn of the decision by a Mexican court to release infamous drug trafficker Rafael Caro-Quintero from a Mexican prison. Caro-Quintero had been serving a 40 year prison sentence in connection with the kidnapping, torture and murder of DEA Special Agent Enrique “Kiki” Camarena in February 1985.

    Caro-Quintero was the mastermind and organizer of this atrocious act. We are reminded every day of the ultimate sacrifice paid by Special Agent Camarena and DEA will vigorously continue its efforts to ensure Caro-Quintero faces charges in the United States for the crimes he committed.

    But why stop with Caro Quintero? Why not go after everyone who had a hand in the drug-war corruption that led to Camarena’s death? Why isn’t DEA clamoring for that outcome?

    I think we all know the answer to that question. And you can bet Caro Quintero does as well, and will do everything in is power to assure he isn’t held up as the lone scapegoat in some drug-war fairy tale.

    So what are our drug-war warriors to do when faced with such a house of mirrors? Well, that’s what rival narco-traffickers and shadowy intelligence-agency assets are used for in the Big Game, no?

    Posted by Bill Conroy – August 10, 2013 at 10:17 pm

    Find this story at 10 August 2013

    Our Policy on Comment Submissions: Co-publishers of Narco News (which includes The Narcosphere and The Field) may post comments without moderation. A ll co-publishers comment under their real name, have contributed resources or volunteer labor to this project, have filled out this application and agreed to some simple guidelines about commenting.

    Narco News has recently opened its comments section for submissions to moderated comments (that’s this box, here) by everybody else. More than 95 percent of all submitted comments are typically approved, because they are on-topic, coherent, don’t spread false claims or rumors, don’t gratuitously insult other commenters, and don’t engage in commerce, spam or otherwise hijack the thread. Narco News reserves the right to reject any comment for any reason, so, especially if you choose to comment anonymously, the burden is on you to make your comment interesting and relev ant. That said, as you can see, hundreds of comments are approved each week here. Good luck in your comment submission!

    The NSA-DEA police state tango; This week’s DEA bombshell shows us how the drug war and the terror war have poisoned our justice system

    So the paranoid hippie pot dealer you knew in college was right all along: The feds really were after him. In the latest post-Snowden bombshell about the extent and consequences of government spying, we learned from Reuters reporters this week that a secret branch of the DEA called the Special Operations Division – so secret that nearly everything about it is classified, including the size of its budget and the location of its office — has been using the immense pools of data collected by the NSA, CIA, FBI and other intelligence agencies to go after American citizens for ordinary drug crimes. Law enforcement agencies, meanwhile, have been coached to conceal the existence of the program and the source of the information by creating what’s called a “parallel construction,” a fake or misleading trail of evidence. So no one in the court system – not the defendant or the defense attorney, not even the prosecutor or the judge – can ever trace the case back to its true origins.

    On one hand, we all knew more revelations were coming, and the idea that the government would go after drug suspects with the same dubious extrajudicial methods used to pursue terrorism suspects is a classic and not terribly surprising example of mission creep. Both groups have been held up as bogeymen for years, in order to scare the public into accepting ever nastier and more repressive laws. This gives government officials another chance to talk to us in their stern grown-up voices about how this isn’t civics class, and sometimes they have to bend the rules to catch Really Bad People.

    On the other hand, this is a genuinely sinister turn of events with a whiff of science-fiction nightmare, one that has sounded loud alarm bells for many people in the mainstream legal world. Nancy Gertner, a Harvard Law professor who spent 18 years as a federal judge and cannot be accused of being a radical, told Reuters she finds the DEA story more troubling than anything in Edward Snowden’s NSA leaks. It’s the first clear evidence that the “special rules” and disregard for constitutional law that have characterized the hunt for so-called terrorists have crept into the domestic criminal justice system on a significant scale. “It sounds like they are phonying up investigations,” she said. Maybe this is how a police state comes to America: Not with a bang, but with a parallel construction.

    By Andrew O’Hehir
    Saturday, Aug 10, 2013 06:30 PM +0200

    Find this story at 10 August 2013

    Copyright © 2013 Salon Media Group, Inc.

    Exclusive: IRS manual detailed DEA’s use of hidden intel evidence

    WASHINGTON (Reuters) – Details of a U.S. Drug Enforcement Administration program that feeds tips to federal agents and then instructs them to alter the investigative trail were published in a manual used by agents of the Internal Revenue Service for two years.

    The practice of recreating the investigative trail, highly criticized by former prosecutors and defense lawyers after Reuters reported it this week, is now under review by the Justice Department. Two high-profile Republicans have also raised questions about the procedure.

    A 350-word entry in the Internal Revenue Manual instructed agents of the U.S. tax agency to omit any reference to tips supplied by the DEA’s Special Operations Division, especially from affidavits, court proceedings or investigative files. The entry was published and posted online in 2005 and 2006, and was removed in early 2007. The IRS is among two dozen arms of the government working with the Special Operations Division, including the Federal Bureau of Investigation, the National Security Agency and the Central Intelligence Agency.

    An IRS spokesman had no comment on the entry or on why it was removed from the manual. Reuters recovered the previous editions from the archives of the Westlaw legal database, which is owned by Thomson Reuters Corp, the parent of this news agency.

    As Reuters reported Monday, the Special Operations Division of the DEA funnels information from overseas NSA intercepts, domestic wiretaps, informants and a large DEA database of telephone records to authorities nationwide to help them launch criminal investigations of Americans. The DEA phone database is distinct from a NSA database disclosed by former NSA contractor Edward Snowden.

    Monday’s Reuters report cited internal government documents that show that law enforcement agents have been trained to conceal how such investigations truly begin – to “recreate” the investigative trail to effectively cover up the original source of the information.

    DEA officials said the practice is legal and has been in near-daily use since the 1990s. They have said that its purpose is to protect sources and methods, not to withhold evidence.

    NEW DETAIL

    Defense attorneys and some former judges and prosecutors say that systematically hiding potential evidence from defendants violates the U.S. Constitution. According to documents and interviews, agents use a procedure they call “parallel construction” to recreate the investigative trail, stating in affidavits or in court, for example, that an investigation began with a traffic infraction rather than an SOD tip.

    The IRS document offers further detail on the parallel construction program.

    “Special Operations Division has the ability to collect, collate, analyze, evaluate, and disseminate information and intelligence derived from worldwide multi-agency sources, including classified projects,” the IRS document says. “SOD converts extremely sensitive information into usable leads and tips which are then passed to the field offices for real-time enforcement activity against major international drug trafficking organizations.”

    The 2005 IRS document focuses on SOD tips that are classified and notes that the Justice Department “closely guards the information provided by SOD with strict oversight.” While the IRS document says that SOD information may only be used for drug investigations, DEA officials said the SOD role has recently expanded to organized crime and money laundering.

    According to the document, IRS agents are directed to use the tips to find new, “independent” evidence: “Usable information regarding these leads must be developed from such independent sources as investigative files, subscriber and toll requests, physical surveillance, wire intercepts, and confidential source information. Information obtained from SOD in response to a search or query request cannot be used directly in any investigation (i.e. cannot be used in affidavits, court proceedings or maintained in investigative files).”

    The IRS document makes no reference to SOD’s sources of information, which include a large DEA telephone and Internet database.

    CONCERN IN CONGRESS

    House Intelligence Committee Chairman Mike Rogers, R-Michigan, expressed concern with the concept of parallel construction as a method to hide the origin of an investigation. His comments came on the Mike Huckabee Show radio program.

    “If they’re recreating a trail, that’s wrong and we’re going to have to do something about it,” said Rogers, a former FBI agent. “We’re working with the DEA and intelligence organizations to try to find out exactly what that story is.”

    Spokespeople for the DEA and the Department of Justice declined to comment.

    Sen. Rand Paul, R-Kentucky, a member of the Homeland Security and Government Affairs Committee, said he was troubled that DEA agents have been “trying to cover up a program that investigates Americans.”

    “National security is one of government’s most important functions. So is protecting individual liberty,” Paul said. “If the Constitution still has any sway, a government that is constantly overreaching on security while completely neglecting liberty is in grave violation of our founding doctrine.”

    Officials have stressed that the NSA and DEA telephone databases are distinct. The NSA database, disclosed by Snowden, includes data about every telephone call placed inside the United States. An NSA official said that database is not used for domestic criminal law enforcement.

    The DEA database, called DICE, consists largely of phone log and Internet data gathered legally by the DEA through subpoenas, arrests and search warrants nationwide. DICE includes about 1 billion records, and they are kept for about a year and then purged, DEA officials said.

    (Research by Hilary Shroyer of West, a Thomson Reuters business. Additional reporting by David Lawder. Edited by Michael Williams)

    © Thomson Reuters 2011. All rights reserved. Users may download and print extracts of content from this website for their own personal and non-commercial use only. Republication or redistribution of Thomson Reuters content, including by framing or similar means, is expressly prohibited without the prior written consent of Thomson Reuters. Thomson Reuters and its logo are registered trademarks or trademarks of the Thomson Reuters group of companies around the world.

    Thomson Reuters journalists are subject to an Editorial Handbook which requires fair presentation and disclosure of relevant interests.

    Wed, Aug 7 2013
    By John Shiffman and David Ingram

    Find this story at 7 August 2013

    © Thomson Reuters

    DEA and NSA Team Up to Share Intelligence, Leading to Secret Use of Surveillance in Ordinary Investigations

    UPDATE: Add the IRS to the list of federal agencies obtaining information from NSA surveillance. Reuters reports that the IRS got intelligence tips from DEA’s secret unit (SOD) and were also told to cover up the source of that information by coming up with their own independent leads to recreate the information obtained from SOD. So that makes two levels of deception: SOD hiding the fact it got intelligence from the NSA and the IRS hiding the fact it got information from SOD. Even worse, there’s a suggestion that the Justice Department (DOJ) “closely guards the information provided by SOD with strict oversight,” shedding doubt into the effectiveness of DOJ earlier announced efforts to investigate the program.

    A startling new Reuters story shows one of the biggest dangers of the surveillance state: the unquenchable thirst for access to the NSA’s trove of information by other law enforcement agencies.

    As the NSA scoops up phone records and other forms of electronic evidence while investigating national security and terrorism leads, they turn over “tips” to a division of the Drug Enforcement Agency (“DEA”) known as the Special Operations Division (“SOD”). FISA surveillance was originally supposed to be used only in certain specific, authorized national security investigations, but information sharing rules implemented after 9/11 allows the NSA to hand over information to traditional domestic law-enforcement agencies, without any connection to terrorism or national security investigations.

    But instead of being truthful with criminal defendants, judges, and even prosecutors about where the information came from, DEA agents are reportedly obscuring the source of these tips. For example, a law enforcement agent could receive a tip from SOD—which SOD, in turn, got from the NSA—to look for a specific car at a certain place. But instead of relying solely on that tip, the agent would be instructed to find his or her own reason to stop and search the car. Agents are directed to keep SOD under wraps and not mention it in “investigative reports, affidavits, discussions with prosecutors and courtroom testimony,” according to Reuters.

    “Parallel construction” is really intelligence laundering

    The government calls the practice “parallel construction,” but deciphering their double speak, the practice should really be known as “intelligence laundering.” This deception and dishonesty raises a host of serious legal problems.

    First, the SOD’s insulation from even judges and prosecutors stops federal courts from assessing the constitutionality of the government’s surveillance practices. Last year, Solicitor General Donald Verilli told the Supreme Court that a group of lawyers, journalists and human rights advocates who regularly communicate with targets of NSA wiretapping under the FISA Amendments Act (FAA) had no standing to challenge the constitutionality of that surveillance. But Verrilli said that if the government wanted to use FAA evidence in a criminal prosecution, the source of the information would have to be disclosed. When the Supreme Court eventually ruled in the government’s favor, finding the plaintiffs had no standing, it justified its holding by noting the government’s concession that it would inform litigants when FAA evidence was being used against them.

    Although the government has been initially slow to follow up on Verrilli’s promises, it has begrudgingly acknowledged its obligation to disclose when it uses the FAA to obtain evidence against criminal defendants. Just last week DOJ informed a federal court in Miami that it was required to disclose when FAA evidence was used to build a terrorism case against a criminal defendant.

    Terrorism cases make up a very small portion of the total number of criminal cases brought by the federal government, counting for just 0.4 percent of all criminal cases brought by all U.S. Attorney offices across the country in 2012. Drug cases, on the other hand, made up 20 percent of all federal criminal cases filed in 2012, the second most prosecuted type of crime after immigration cases. If the government acknowledges it has to disclose when FAA evidence has been used to make a drug case—even if it’s a tip leading to a pretextual traffic stop—the number of challenges to FAA evidence will increase dramatically.

    SOD bypasses the Constitution

    Even beyond the larger systemic problem of insulating NSA surveillance from judicial review, criminal defendants whose arrest or case is built upon FISA evidence are now deprived of their right to examine and challenge the evidence used against them.

    Taken together, the Fifth and Sixth Amendments guarantee a criminal defendant a meaningful opportunity to present a defense and challenge the government’s case. But this intelligence laundering deprives defendants of these important constitutional protections. It makes it harder for prosecutors to comply with their ethical obligation under Brady v. Maryland to disclose any exculpatory or favorable evidence to the defense—an obligation that extends to disclosing evidence bearing on the reliability of a government witness. Hiding the source of information used by the government to initiate an investigation or make an arrest means defendants are deprived of the opportunity to challenge the accuracy or veracity of the government’s investigation, let alone seek out favorable evidence in the government’s possession.

    Courts must have all the facts

    The third major legal problem is that the practice suggests DEA agents are misleading the courts. Wiretaps, search warrants, and other forms of surveillance authorizations require law enforcement to go to a judge and lay out the facts that support the request. The court’s function is to scrutinize the facts to determine the appropriate legal standard has been met based on truthful, reliable evidence. So, for example, if the government is using evidence gathered from an informant to support its request for a search warrant, it has to establish to the court that the informant is reliable and trustworthy so that the court can be convinced there is probable cause to support the search. But when law enforcement omits integral facts—like the source of a tip used to make an arrest—the court is deprived of the opportunity to fulfill its traditional role and searches are signed off without the full knowledge of the court.

    Ultimately, if you build it, they will come. There’s no doubt that once word got out about the breadth of data the NSA was collecting and storing, other law enforcement agencies would want to get their hands in the digital cookie jar. In fact, the New York Times reported on Sunday that other agencies have tried to get information from the NSA to “curb drug trafficking, cyberattacks, money laundering, counterfeiting and even copyright infringement.”

    Teaming up to play fast and loose with criminal defendants and the court, the DEA and NSA have made a mockery of the rule of law and the legal frameworks intended to curb abuses.

    August 6, 2013 | By Hanni Fakhoury

    Find this story at 6 August 2013

    © www.eff.org

    A Domestic Surveillance Scandal at the DEA? Agents Urged to Cover Up Use of NSA Intel in Drug Probes

    The U.S. Department of Justice has begun reviewing a controversial unit inside the Drug Enforcement Administration that uses secret domestic surveillance tactics — including intelligence gathered by the National Security Agency — to target Americans for drug offenses. According to a series of articles published by Reuters, agents are instructed to recreate the investigative trail in order to conceal the origins of the evidence, not only from defense lawyers, but also sometimes from prosecutors and judges. “We are talking about ordinary crime: drug dealing, organized crime, money laundering. We are not talking about national security crimes,” says Reuters reporter John Shiffman. Ethan Nadelmann, executive director of the Drug Policy Alliance, says this is just the latest scandal at the DEA. “I hope it is a sort of wake-up call for people in Congress to say now is the time, finally, after 40 years, to say this agency really needs a close examination.”
    Transcript

    This is a rush transcript. Copy may not be in its final form.

    AMY GOODMAN: The Justice Department has begun reviewing a controversial unit inside the U.S. Drug Enforcement Administration that uses secret domestic surveillance tactics, including intelligence gathered by the National Security Agency, to target Americans for drug offenses. According to a series of articles published by the Reuters news agency, agents are instructed to recreate the investigative trail in order to conceal the origins of the evidence—not only from defense lawyers but also sometimes from prosecutors and judges. DEA training documents instruct agents to even make up alternative versions of how such investigations truly begin, a process known as “parallel construction.”

    On Monday, White House Press Secretary Jay Carney was asked about the Reuters investigation.

    PRESS SECRETARY JAY CARNEY: It’s my understanding, our understanding, that the Department of Justice is looking at some of the issues raised in the story. But for more, I would refer you to the Department of Justice.

    AMY GOODMAN: The unit of the DEA that distributes the secret intelligence to agents is called the Special Operations Division, or SOD. Two dozen partner agencies comprise the unit, including the FBI, CIA, NSA, Internal Revenue Service and the Department of Homeland Security. The unit was first created two decades ago, but it’s coming under increased scrutiny following the recent revelations about the NSA maintaining a database of all phone calls made in the United States. One former federal judge, Nancy Gertner, said the DEA program sounds more troubling than recent disclosures that the NSA has been collecting domestic phone records. She said, quote, “It is one thing to create special rules for national security. Ordinary crime is entirely different. It sounds like they are phonying up investigations.”

    For more, we’re joined by the reporter who broke this story, John Shiffman, correspondent for Reuters, which published his exclusive story Monday, “U.S. Tells Agents to Cover Up Use of Wiretap Program.”

    Welcome to Democracy Now!, John. Why don’t you start off by just laying it out and what exactly this cover-up is.

    JOHN SHIFFMAN: Thanks very much for having me.

    Well, my colleague Kristina Cooke and I spoke with about a dozen or two dozen agents and obtained some internal documents that showed that what federal agents, not just DEA agents but other agents who work with the DEA and do drug investigations—what they’re doing is, is they are starting—they are claiming that their investigations start, say, at step two. They are withholding step one from the investigations. And, I should say, it’s not just NSA intercepts. It’s informant information, information obtained from court-ordered wiretaps in one case, and using those for information in a second case. They also have a large database of phone records. Whenever the DEA subpoenas or does a search warrant and gets phone records for someone suspected of involvement in drugs or gang involvement, they put all those numbers into one giant database they call DICE, and they use that information to compare different cases. All of the collection is—seems perfectly legitimate, in terms of being court-ordered. What troubles some critics is the fact that they are hiding that information from drug defendants who face trial. The problem with that is that—is that these defendants won’t know about some potentially exculpatory information that may affect their case and their right to a fair trial.

    AMY GOODMAN: So explain exactly how this information is being hidden from judges, prosecutors and sometimes defense attorneys, as well.

    JOHN SHIFFMAN: Sure. Well, just to give an example, through any of these four different ways, including the NSA intercepts, the DEA’s Special Operations Division will send the information to a DEA agent in the field or a FBI agent or an ICE agent or state policeman, and they’ll give him the information. Then they’ll say, “Look, you know, we understand that there will be a truck going to a certain park in Texas at a certain time. It’s a red truck. It’ll be two people involved.” And the state trooper or the DEA will find you reason to pull the truck over, say for a broken tail light or for speeding, that sort of thing. And, lo and behold, inside the trunk they’ll find, you know, a kilo of cocaine. The people who have been arrested will never know that—why the police or the DEA pulled them over. They’ll think it’s just luck. And that’s important because if those people try to go to trial, there are pieces of information about how that evidence was obtained and what it shows and what other pieces of it show—might affect their trial.

    AMY GOODMAN: On Monday, I spoke with Guardian columnist Glenn Greenwald just after your story broke about how the DEA is using material gathered in part by the NSA in its surveillance of Americans. Glenn Greenwald has, of course, broken several major stories about the NSA’s domestic activity. This was his response.

    GLENN GREENWALD: So this should be a huge scandal for the following reason. The essence of the Constitution is that the government cannot obtain evidence or information about you unless it has probable cause to believe that you’ve engaged in a crime and then goes to a court and gets a warrant. And only then is that evidence usable in a prosecution against you. What this secret agency is doing, according to Reuters, it is circumventing that process by gathering all kinds of information without any court supervision, without any oversight at all, using surveillance technologies and other forms of domestic spying. And then, when it gets this information that it believes it can be used in a criminal prosecution, it knows that that information can’t be used in a criminal prosecution because it’s been acquired outside of the legal and constitutional process, so they cover up how they really got it, and they pretend—they make it seem as though they really got it through legal and normal means, by then going back and retracing the investigation, once they already have it, and re-acquiring it so that it looks to defense counsel and even to judges and prosecutors like it really was done in the constitutionally permissible way. So they’re prosecuting people and putting people in prison for using evidence that they’ve acquired illegally, which they’re then covering up and lying about and deceiving courts into believing was actually acquired constitutionally. It’s a full-frontal assault on the Fourth, Fifth and Sixth Amendments and on the integrity of the judicial process, because they’re deceiving everyone involved in criminal prosecutions about how this information has been obtained.

    AMY GOODMAN: John Shiffman, if you could elaborate on that and also talk about the differences between what the DEA is doing and what Glenn Greenwald exposed around the NSA?

    JOHN SHIFFMAN: Sure. These are two very—I think they’re different topics, for one main reason, which is that the NSA revelations by Mr. Greenwald and Mr. Snowden are related to terrorism—or at least that’s what we’re told by the government. And the DEA, what the DEA is doing is only—very rarely do they get involved in terrorism. I mean, they do some narcoterrorism, but inside the United States we’re talking about ordinary crime. We’re talking about drug dealing, organized crime, money laundering. We’re not talking about national security crimes.

    The one thing I would say is that the defense analysts I’ve spoken with, meaning defense attorney analysts, they emphasize less the probable cause aspect of it than they find—they don’t find that as troubling. What they find really troubling is the pretrial discovery aspects of this and a prosecutor’s, you know, obligation to turn over any exculpatory evidence. What they really have a problem with is that this program systematically excludes or appears to systematically exclude all evidence obtained, you know, that’s hidden from view, so the defense doesn’t know to request it. They find that a lot more troubling than the probable cause aspects of it. The Supreme Court has given a pretty wide pro-police interpretation of when probable cause can be obtained, and there are a variety of exceptions. But it’s really the pretrial discovery part of it that seems to trouble a lot of the former judges and defense attorneys and prosecutors.

    AMY GOODMAN: One of the two slides Reuters obtained that were used to train agents with the Drug Enforcement Agency instructs them in the use of parallel construction. According to the slide, this is, quote, “the use of normal investigative techniques to recreate the information provided by the [Special Operations Division],” such as subpoenaed domestic telephone calls. A second slide instructs agents that such evidence, quote, “cannot be revealed or discussed.” The slide is titled “Special Operations Division Rules.” Describe what you uncovered about those rules and this concept of parallel construction, which until now had not been publicly discussed in writing.

    JOHN SHIFFMAN: Well, what really surprised me was talking to agents, current and former agents, who said, “Sure, we do that.” They—half of them said, “Yeah, you know, I could see how people might have a problem with that.” The other half said, “You know, look, this is a hard job that we do, and we’re going after criminals and drug dealers.” The people that got the most offended, I think, were the lawyers, the prosecutors and the—you know, and the judges and the former judges. One current prosecutor told me that he had a case where—in Florida, where a DEA agent came to him with a case and said that it began with an informant. So they were proceeding with the case, and the prosecutor asked the DEA agent more information. He said, you know, “I need to know more about your informant.” Turns out, ultimately, that he found out that there was no informant. It was an NSA wiretap. And what—overseas. And that really upset the prosecutor, because he said that it really offended his sense of fair play and honesty. And he said, “It’s just a bad way of starting an investigation, if you’re going to start with a lie.”

    AMY GOODMAN: I wanted to bring Ethan Nadelmann into this discussion, executive director of the Drug Policy Alliance. Ethan, why is—are the revelations by Reuters, John Shiffman’s investigation, so significant for your work?

    ETHAN NADELMANN: Well, I think what it plays into, Amy, is that there’s been this remarkable lack of oversight of DEA by Congress, by other federal oversight agencies, for decades now. I mean, this year marks the 40th anniversary of the DEA, which Nixon created as a merger of police agencies, of drug enforcement agencies, back during the—one of the earlier drug wars. And what you see is an organization with a budget of over $2 billion. You see an organization getting involved in all sorts of shenanigans, hiring informants who land up to be tied up with murderers, you know, locking up some poor drug—you know, I don’t think even drug dealer, drug—low-level offender, and forgetting about him in a prison cell in this case of Daniel Chong, who was left in a prison cell for five days and forgotten. But beyond that, you have the agency serving as a propaganda agency, with no—with none of its statements being compared or held to any sort of scientific standards. You have an administrator who testifies before Congress and is almost a laughing stock when it comes to talking about drugs. So I think that this report by Reuters and by John Shiffman—I hope it’s a sort of wake-up call for people in Congress to say, “Now is the time, finally, after really 40 years, to say this agency really needs a close examination.”

    AMY GOODMAN: Ethan, the Drug Enforcement Administration has agreed to pay $4.1 million in a settlement to a San Diego college student who nearly lost his life after being left handcuffed in his cell for more than four days without food or water. He ultimately drank his urine as he lay there, yelling out to agents right outside. His name was Daniel Chong. He was arrested for a 420 celebration of marijuana culture. He was never charged with any crime, and ultimately he was released.

    ETHAN NADELMANN: You know, I think—I mean, that’s the case I was mentioning before. I mean, part of—you know, one can say, “Oh, this is just an accident, and accidents happen.” But, of course, accidents like that should never happen when you’re talking about a police agency, much less a federal police agency, being allowed to just sort of forget about somebody. And in the end, what happens? The taxpayers bail out the DEA for almost killing somebody for no cause whatsoever. So, you know, each year the DEA goes through its own little, you know, appropriations hearings in Congress. Each year it gets approved. And each year they just sort of get a ride. I think these things are piling up in a way that can no longer be sustained—should no longer be sustained.

    AMY GOODMAN: So what has been, John Shiffman, the response to your investigation by the DEA, by the NSA, by the FBI and others?

    JOHN SHIFFMAN: Well, they say it’s perfectly legal, what they do. And they say that—one DEA official told us that, you know, “This is a bedrock principle, parallel construction. We use it every day.” They’re pretty unabashed about it and said that—you know, that they’ve been doing this since the late ’90s, and there’s really nothing wrong with it. Yesterday the Justice Department said they are going to review it. But DEA has said, you know, there’s no problem with this.

    AMY GOODMAN: How many people does this impact?

    JOHN SHIFFMAN: Well, it would impact—I would think it would impact everyone, because, you know, it’s—we’re talking about a principle of law here. Not to get too legal, but, I mean, if you’re arrested, one of the fundamental rights that you have is to see the evidence against you. You know, when I was at the DEA and doing the interview, they cited the Ted Stevens case, which involved prosecutorial misconduct, which had—in which the senator’s charges were thrown out, because evidence was concealed. They said that after that there had been a review of all of the discovery procedures throughout the Justice Department, including at Special Operations Division. But they said that—and so I asked, I said, “Great, can I see a copy of the review?” And they said, “No.”

    AMY GOODMAN: So, Ethan Nadelmann, it’s all legal.

    ETHAN NADELMANN: Well, you know, that’s what happens when any agency gets to just do what it wants to do for years and years and years without anybody looking over its shoulder. You know, I mean, Amy, this agency has also done things in the areas of medical marijuana, scientific research, the scheduling process of drugs, whereby they will go through an entirely legal process, through their own administrative law process hearings. It will have an internal judge, an administrative law judge, come down with recommendations that are scientifically based, that are credible, and then they will have the politically appointed head of this agency overrule those recommendations for no purpose whatsoever.

    Once again, Congress is not asking any questions. It’s their job to look at the—I mean, obviously, it’s the Obama administration’s job, as well, and Eric Holder’s job, as well, but it’s ultimately Congress, as well, that has to care about these things. And I’m hoping that it’s not just Democrats in the Senate, but also Republicans in the House, who will say, “This agency has gone too far.” Republicans have never been great friends of overextensions of federal police power, and I hope they can find some common cause with Democrats, saying, “Wait a second. Let’s call the DEA in here. Let’s look at what—you know, what John Shiffman has found with his investigative report. Let’s look at all these other patterns of abuse and misbehavior.”

    AMY GOODMAN: We want to thank you both for being with us, John Shiffman, for your reporting at Reuters, and Ethan Nadelmann. Thanks so much for joining us. We’ll link to the story at democracynow.org.

    JOHN SHIFFMAN: Thanks.

    AMY GOODMAN: Ethan Nadelmann, executive director of the Drug Policy Alliance. When we come back, we’re going to Richmond, California, to speak with the mayor. Stay with us.

    Tuesday, August 6, 2013

    Find this story at 6 August 2013

    The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.

    ‘Everyday Racism’; Turkish Community Responds to NSU Report

    The Turkish Community in Germany has published a report responding to a series of racist murders authorities failed to detect for years. The paper is intended to complement recommendations put forward by a parliamentary committee.

    In response to recommendations published last week by a committee in the Bundestag, Germany’s federal parliament, the Turkish Community in Germany (TGD) has put out its own report on the crimes of the National Socialist Underground (NSU) — the murderous neo-Nazi terrorist cell uncovered nearly two years ago.

    The 80-page report, presented by TGD chairman Kenan Kolat at a Berlin press conference on Tuesday, calls for Germans to develop “a new sensitivity for hidden forms of everyday prejudice”. It also advocates a complete overhaul of the country’s domestic security operations.

    The NSU is believed to have committed 10 murders between 2000 and 2007, and eight of the victims were of Turkish origin. Rather than looking into racial motivations for the murders, police in a number of the slayings immediately suspected the victims were involved in organized crime and drug trafficking.

    Time For Change

    The TGD report, which was researched and co-authored by Hajo Funke — a well-known political scientist with a focus on right-wing extremism in Germany — suggests a fundamental overhaul of the country’s domestic security operations is necessary.

    It recommends that the Federal Office for the Protection of the Constitution — the body tasked with gathering intelligence on racially motivated crimes in Germany — be disbanded. A new, independent and fully financed investigative body, as well as a series of new recruits with fresh ideas would be the only way to institute change, said Kolat.

    Also notable among the Turkish Community’s recommendations is a proposed ban on racial profiling by police and other security officials, the elimination of the government’s large network of undercover informants within the far-right scene and the introduction of a permanent parliamentary committee tasked with overseeing racially motivated crime investigations. The report also suggests erecting a memorial site in the German capital to commemorate the victims.

    An Institutional Problem

    The news comes in response to a report issued last week by a committee of German lawmakers, detailing how members of the NSU were able to commit dozens of crimes without arousing the suspicion of law enforcement.

    The report, which lays out 47 recommendations on how to improve the German state security system, has been heavily criticized. In addition to the fact that its suggestions are non-binding, critics also argue they would be difficult to implement on a nationwide basis. In Germany’s decentralized system of federal states, any kind of affirmative action program would face immense challenges.

    The report also came under fire from lawyers representing the families of those murdered by the NSU for not addressing what they view as the “decisive problem” in the investigation into the slayings — namely “institutional racism” within the German police and government authorities. Sebastian Edathy, chairman of the parliamentary committee with the center-left Social Democratic Party (SPD), was quick to dismiss the criticism. “I wouldn’t refer to it as institutional racism,” he said in an interview with the Frankfurter Allgemeine Zeitung newspaper last week. “There were isolated cases of racists in our police force who do not belong there.”

    ‘Structural Racial Prejudices’

    Although the Bundestag report does include one recommendation stating that “German society is diverse — and that this diversity should be reflected by the police authorities, who must also be able to competently deal with this diversity,” it does not make any explicit mention of the possibility of institutionalized racism within the police or government agencies. The only such comments come at the end of the report, where individual political parties provided responses.

    Neither Merkel’s conservative Christian Democrats, her government’s junior coalition partner, the Free Democratic Party, nor the Green Party said anything in the report on the possibility of institutionalized racism. However, the opposition SPD and Left Party both commented extensively on the phenomenon — at least as it pertains to the NSU investigation.

    The SPD wrote that “structural racial prejudices had been a major cause of the lack of openness in the investigation into the murders and bombing attacks committed by the NSU.” The party also lamented “prejudiced routines in the police’s work” that led to “routine prejudicial structures against people with immigrant backgrounds,” although the party said it was a “structural” rather than intentional problem. Such routines, it said, were often racist. The Left Party lamented that “structural and institutional racism had been a trait of the” police work relating to the NSU series of murders. The Green Party does, however, call in the report for regular “anti-racism training” for police, prosecutors and judges.

    Kenan Kolat, meanwhile, has been more explicit in his assertions. The aim of the Turkish Community’s efforts, Kolat said at Tuesday’s press conference, was to eliminate “everyday racism, which also exists within institutions.”

    08/28/2013 04:38 PM

    Find this story at 28 August 2013

    © SPIEGEL ONLINE 2013

    Neonazi Kai-Uwe Trinkaus; Der V-Mann und die Brandstifter

    Der Thüringer Verfassungsschutz setzte den Neonazi Kai-Uwe Trinkaus als Informanten ein – und verstieß damit einem Gutachten zufolge massiv gegen Dienstvorschriften. Und dann kündigte der ehemalige NPD-Spitzenfunktionär einen Gewaltakt an. Doch niemand reagierte.

    Kai-Uwe Trinkaus bot seine Dienste selbst an. Der berüchtigte Neonazi und NPD-Funktionär rief am 31. Mai 2006 beim Thüringer Landesamt für Verfassungsschutz an und sagte, er wäre bereit, Informationen aus der Szene und der Partei auszuplaudern. Der Geheimdienst zögerte nicht lange: Es gab Gespräche und Stichproben und ab dem 8. März 2007 bekam Trinkaus den Namen “Ares” verpasst und wurde offiziell als Quelle des Verfassungsschutzes geführt – für 1000 Euro im Monat, wie Trinkaus behauptet. Für 41 Berichte soll er 16.200 Euro erhalten haben. Mit dem Geld habe er Aktivitäten der NPD bezahlt, später wechselte er zur DVU.

    Trinkaus als Spitzel einzukaufen war ein Fehler – zu dem Ergebnis kommt das sogenannte Engel-Gutachten. Norbert Engel, ehemaliger Abteilungsleiter im Thüringer Landtag, hat seit Beginn des Jahres die Affäre Trinkaus im Auftrag der Parlamentarischen Kontrollkommission (PKK) untersucht. Sein 80-seitiges Gutachten wurde nun nach Informationen von MDR Thüringen am Dienstag hinter verschlossenen Türen in einer geheimen PKK-Sitzung vorgelegt. Es belegt schwere Versäumnisse von Geheimdienst und der Fachaufsicht im Thüringer Innenministerium.

    Demnach hatten die Verfassungsschützer von Trinkaus’ vormaligen politischen Aktivitäten keinen blassen Schimmer: “Dies gilt insbesondere, weil klar sein musste, dass aufgrund seines politischen Werdegangs Herr Trinkaus persönliche Kontakte zu führenden Mitgliedern der Linkspartei.PDS hatte. Obwohl solche Kontakte für die Zuverlässigkeit zur Verwendung als V-Mann von hoher Bedeutung sind, wurde […] nach ihnen nicht einmal gefragt.” Engels Fazit an dieser Stelle: Ein ehemaliger Funktionär der Linkspartei, der in die NPD wechselte und sich selbst beim Verfassungsschutz anbietet, hätte nicht als V-Mann eingesetzt werden dürfen.

    Die Behörde hat laut Gutachter damals unter großem Druck gestanden: Eine weitere Quelle im Bereich der NPD – besonders im regionalen Bereich von Erfurt und Mittelthüringen – sei “unbedingt” nötig gewesen, “lieber ein problematischer Zugang als gar keine Quelle”.

    Und offensichtlich galt auch: lieber viele Informationen als gute. Denn laut Engel hat Trinkaus dem Verfassungsschutz zwar eine “beachtliche” Menge an Informationen gegeben, diese seien jedoch nicht so profund gewesen, dass sie die Nachteile der “Verwendung von Herrn Trinkaus gerechtfertigt hätten”. Das sei vor allem darauf zurückzuführen, dass Trinkaus nie in den wirklich vertraulichen Runden des Landesvorstandes der Thüringer NPD mitgemischt habe.

    Wer legte Feuer im Haus “Topf & Söhne” in Erfurt?

    Einmal habe Trinkaus eine Aktion von gewaltbereiten Neonazis verraten: Einen Angriff auf das besetzte Haus “Topf & Söhne” in Erfurt. Laut den Bewohnern legten Brandstifter im April 2007 in dem Gebäude Feuer, etwa 40 Menschen hielten sich zu dem Zeitpunkt darin auf. Bis heute wurden keine Täter ermittelt.

    Damals spekulierten die Besetzer über einen rechtsextremen Hintergrund der Tat – Tattag war der Geburtstag Adolf Hitlers. Trinkaus soll laut Mitgliedern des Ausschusses seinem V-Mann-Führer berichtet haben, dass Neonazis einen Angriff auf das Hausprojekt gemeinsam mit sächsischen Kameraden trainierten. Ob vor oder nach der Tat, ist unklar. Aus weiteren Unterlagen, die dem Ausschuss vorliegen, finden sich keine Hinweise über die Weitergabe dieser Informationen an das Landeskriminalamt (LKA) oder die örtliche Polizei.

    Dabei soll Trinkaus auch davon gesprochen haben, dass es nicht ausgeschlossen sei, dass das Gebäude abgebrannt werde, wie SPIEGEL ONLINE von Ausschussmitgliedern erfuhr. Damals erlosch das Feuer von selbst, es gab keine Verletzten.

    Trinkaus ging auf in seinem Doppelleben als Neonazi und V-Mann: Er gründete oder unterwanderte Vereine, die nach außen hin unscheinbar wirkten, in denen sich aber tatsächlich Rechtsextremisten organisierten. Laut Gutachten hatte der Thüringer Verfassungsschutz auch davon keine oder nur ansatzweise Ahnung.

    Auch habe Trinkaus die Anweisung seiner V-Mann-Führer, Provokationen gegenüber der Linkspartei und anderen politischen Parteien zu unterlassen, ignoriert. Erst im September 2010 wurde Trinkaus abgeschaltet, als durch einen MDR-Bericht bekannt geworden war, dass Trinkaus einen getarnten Neonazi als Praktikanten in die Linksfraktion eingeschleust hatte.

    Gab der Verfassungsschutz Interna an Trinkaus weiter?

    Trinkaus’ doppeltes Spiel sei “einmalig” im Verfassungsschutz, resümiert Engel. Ermöglicht habe dies auch die mangelnde Kontrolle des zuständigen Referats im Verfassungsschutz. Der Grund: Der verantwortliche Mitarbeiter war ein Jahr lang krank, Ersatz für ihn gab es keinen.

    Engels Vorwürfe richten sich auch gegen das Thüringer Innenministerium, dem die Fachaufsicht für den Verfassungsschutz untergeordnet ist. Das Verhalten des Innenministeriums sei “nicht akzeptabel”. Der damalige Abteilungsleiter ist der heutige Innenstaatssekretär Bernhard Rieder, der von Beginn an in den kompletten Fall Trinkaus eingebunden war. Aber auch der damalige Innenminister Karl-Heinz Gasser soll informiert gewesen sein: Die Informationen erhielt er vom ehemaligen Verfassungsschutzchef Thomas Sippel.

    Das Gutachten rückt den Thüringer Verfassungsschutz zudem in den Verdacht, Trinkaus mit polizeilichen Ermittlungsunterlagen versorgt zu haben: Im Juni 2007 hatten Linksautonome einen Neonazi-Treff in Erfurt überfallen. Die interne Polizeiliste mit den Namen und Adressen der Verdächtigen tauchte im Oktober 2007 auf der Internetseite der Thüringer NPD auf.

    Laut Engel deuten “gewisse Indizien” darauf hin, dass Trinkaus die Liste aus dem Thüringer Verfassungsschutz bekommen hat. Engel hatte die Originalliste der Polizei mit der damaligen Internetveröffentlichung verglichen. Dabei stellte er fest, dass auf der NPD-Homepage drei Namen fehlten. Laut Gutachten waren diese drei Personen in einer geheimen Datenbank des Verfassungsschutzes als Rechtsextremisten eingestuft. Die Einstufung sei nur dem Geheimdienst bekannt gewesen. Weil exakt diese drei Namen auf der NPD-Internetseite fehlten, kommt Engel zu dem Schluss, das Trinkaus “diese Information nur aus dem TLfV haben” konnte.

    Trinkaus hatte bei seiner Enttarnung im Dezember 2012 MDR Thüringen gesagt, dass er die Liste von seinem V-Mann-Führer abgeschrieben habe. Der Verfassungsschutz bestreitet entschieden, die Namen an Trinkaus gegeben zu haben. Die Staatsanwaltschaft Erfurt hatte erfolglos versucht zu klären, wie die Liste auf die NPD-Internetseite gekommen war.

    27. August 2013, 19:08 Uhr
    Von Maik Baumgärtner und Julia Jüttner

    Find this story at 27 August 2013

    © SPIEGEL ONLINE 2013

    Prozess in München; Hat ein V-Mann den NSU radikalisiert?

    Überraschung im NSU-Prozess: Wenn Beate Zschäpe, Uwe Mundlos und Uwe Böhnhardt mit Weggefährten über den Einsatz von Gewalt diskutierten, war ein V-Mann des Thüringer Verfassungsschutzes dabei. Das Bundeskriminalamt geht davon aus, dass Tino Brandt zu denen gehörte, die Gewalt befürworteten.
    Aus dem Gericht von Annette Ramelsberger

    Möglicherweise hat ein V-Mann des Verfassungsschutzes die Mitglieder des NSU überhaupt erst in die Gewalt getrieben. Wie nun überraschend im NSU-Prozess vor dem Oberlandesgericht in München bekannt wurde, hat Tino Brandt, der langjährige V-Mann des Thüringer Landesamtes für Verfassungsschutz in der rechten Szene, mitdiskutiert, wenn Beate Zschäpe, Uwe Mundlos und Uwe Böhnhardt mit ihren Weggefährten in den neunziger Jahren darüber redeten, ob man Gewalt anwenden müsse oder nicht. Das Bundeskriminalamt geht davon aus, dass Brandt zu denen gehörte, die Gewalt befürworteten.

    Bisher war nur bekannt gewesen, dass es solche Diskussionen zwischen Zschäpe, Mundlos und Böhnhardt auf der einen und dem früheren NPD-Funktionär Ralf Wohlleben und dem wegen Beihilfe angeklagten Holger G. auf der anderen Seite gab. Dass Brandt bei diesen Debatten dabei war, davon war bisher nie die Rede gewesen. Ein BKA-Beamter sagte nun vor Gericht: “Wir sind davon ausgegangen, dass Tino Brandt auf der Seite der Gewalt war.”

    Holger G. habe immer nur betont, wer nicht für Gewalt gewesen sei – nämlich er selbst und der Mitangeklagte Wohlleben. Die anderen seien für Gewalt gewesen. Im Umkehrschluss ging das BKA davon aus, dass Brandt auch zu denen gehörte, die Gewalt befürworteten.

    Herausgearbeitet hat diesen Zusammenhang die Anwältin von Ralf Wohlleben. Der Verteidigung ist daran gelegen, den Einfluss des Staates auf die Szene deutlich zu machen. Brandt gilt dabei als Dreh- und Angelpunkt. Er hat quasi im Auftrag des Staates den Thüringer Heimatschutz, ein rechtsradikales Sammelbecken, gegründet – und sich damit gebrüstet, seinen Spitzellohn für den Aufbau rechter Netzwerke verwendet zu haben.

    Anzeige
    SCHILLER OPUS
    Das neue Album. Zeitlos schöne Musik
    Jetzt bestellen
    Espresso Kapsel ab 0,24€!
    Sparen Sie über 30% mit alternativen Kaffee Kapseln für Ihre Nespresso® Maschine!
    Jetzt zu Gourmesso!
    Sparen auf TUIfly.com.
    Schnell & günstig buchen und schon ab 37€* in die Sonne fliegen.
    Mehr erfahren.

    Wenn er nun auch noch zur Radikalisierung der mutmaßlichen NSU-Mitglieder beigetragen hat, könnte sich das auf die Bewertung der Schuld der Angeklagten und auf das Strafmaß auswirken.

    Bundesanwalt Herbert Diemer bestätigte am Abend am Rande des Prozesses, dass es eine Stelle in den Vernehmungen von Holger G. gibt, wo der Angeklagte darauf hinweist, dass der später als V-Mann enttarnte Brandt bei den Theoriedebatten des rechten Zirkels über Gewalt dabei war. Allerdings wertete die Bundesanwaltschaft diesen Hinweis nicht als Beitrag des V-Manns zur Radikalisierung der Gruppe. “Nach unseren bisherigen Ermittlungen gib es keine Anhaltspunkte, dass Brandt die drei radikalisiert oder unterstützt hat. Wäre es so, dann säße er hier auf der Anklagebank”, sagte Bundesanwalt Diemer.

    Annette Ramelsberger
    18. Juli 2013 17:17

    Find this Story at 18 July 2013
    © 2013 Süddeutsche.de

    Döner-Morde: Aufklärung verhindert; Offenbar hat ein Informant angeboten, die Tatwaffe der „Döner-Morde“ zu liefern. Weil die Ermittler seine Bedingungen nicht akzeptierten, soll er untergetaucht sein.

    Eine mit der Mordwaffe baugleiche Pistole wird im Polizeipräsidium in Dortmund vor eine Bilderwand mit den Porträts von Opfern einer deutschlandweiten Mordserie, der so genannten Döner- Morde

    Der Schlüssel zu einer der unheimlichsten Mordserien Deutschlands ist eine tschechische Pistole, Marke Ceska, Typ 83, Kaliber 7,65 Millimeter. Mit dieser Waffe wurden von 2000 bis 2006 neun Männer umgebracht. Der Münchner Gemüsehändler Habil K. zum Beispiel. Oder die beiden Nürnberger Opfer: Enver S., ein Blumenhändler, und Ismayl Y., Inhaber einer Dönerbude. Zuletzt wurde im April 2006 der 21-jährige Betreiber eines Internetcafés in Kassel erschossen. Acht der Opfer waren Türken, eines ein Grieche, sie alle wurden in ihren kleinen Läden erschossen, mitten ins Gesicht, am helllichten Tag.

    Warum sie sterben mussten, ist ungeklärt. Möglicherweise sind kriminelle Geschäfte der Hintergrund. Die Soko „Bosporus“, die ihren Sitz in Nürnberg hatte, ist inzwischen aufgelöst – endgültig zu den Akten sind die Fälle aber noch nicht gelegt. Jetzt waren die Ermittler offenbar ganz nah dran, die sogenannten Döner-Morde aufzuklären – doch laut einem „Spiegel“-Bericht hat die Staatsanwaltschaft einen wichtigen Informanten verprellt.

    Wie das Magazin in seiner aktuellen Ausgabe berichtet, hatte ein Mann Ende 20 den Ermittlern angeboten, die mögliche Mordwaffe zu liefern. Der Informant namens Mehmet stamme aus dem Milieu mafiöser türkischer Nationalisten und arbeite seit längerem mit dem Verfassungsschutz zusammen – auch, um aus der Organisation auszusteigen. Mehmet, so schreibt der „Spiegel“, wollte die Ermittler zu einer Schweizer Villa nahe des Bodensees führen, „hinter deren Mauern sich angeblich der Schlüssel zur Lösung“ verberge. Tatsächlich gehen die Ermittler davon aus, dass die Tatwaffe in den Döner-Morden zu einer Lieferung von 24 Pistolen desselben Typs gehörte, die 1993 von dem tschechischen Hersteller an einen Schweizer Waffenimporteur verschickt wurde. Die meisten Pistolen aus dieser Lieferung konnten die Beamten aufspüren und als Tatwaffe ausschließen. Bis Frühjahr dieses Jahres waren acht Waffen noch nicht auffindbar.

    Der Informant hatte also eine heiße Spur geliefert – und stellte dafür auch seine Bedingungen. Mehmet soll laut „Spiegel“ 40 000 Euro und die Umwandlung seiner drohenden zweijährigen Gefängnisstrafe in eine Bewährungsstrafe gefordert haben – der vorbestrafte Mann war mit einem gefälschten Führerschein Auto gefahren. Mit der Belohnung seien die Ermittler einverstanden gewesen, die andere Forderung schlugen sie aus. Man könne höchstens Mehmets Mitarbeit dem Richter gegenüber loben. Die Ermittler wollten den Mann laut Bericht dazu überreden, die Waffe selbst zu holen, über die Grenze nach Deutschland zu bringen und sie an einem Rastplatz zu deponieren. Sollte er dabei bei zufälligen Kontrollen erwischt werden, wolle man „nur zum Schein“ gegen ihn ermitteln, heißt es in dem Bericht. Die Staatsanwaltschaft Nürnberg bestätigte dem „Spiegel“, dass es Verhandlungen mit dem V-Mann gegeben hatte, erklärte jedoch, eine Einflussnahme auf Gerichte komme nicht in Frage.

    Dem Informant wurde der Fall offenbar zu heiß. Er beendete die Zusammenarbeit mit der Polizei. Und die Aufklärung der rätselhaften Döner-Morde rückt möglicherweise wieder in die Ferne.

    Carina Lechner
    Nürnberg – 21.08.11 Bayern

    Find this story at 21 August 2013

    © www.merkur-online.de

    Libya — the Benghazi Attacks Chronology

    News about Libya — the Benghazi Attacks, including commentary and archival articles published in The New York Times.

    Seif al-Islam el-Qaddafi, son of the late Libyan dictator Muammar el-Qaddafi, and his spy chief Abdullah al-Senoussi are among those charged with murder in relation to country’s 2011 civil war.MORE »
    Aug. 21, 2013

    Four midlevel State Department officials placed on administrative leave after deadly 2012 attack on United States mission in Benghazi, Libya, have been reinstated by Sec of State John Kerry and given new assignments; Republican Rep Darrell Issa of California accuses State Department of shirking accountability.MORE »
    Aug. 7, 2013

    Federal law enforcement authorities have filed murder charges against Ahmed Abu Khattala, prominent militia leader in Benghazi, Libya, in connection with Sept 11, 2012, attacks on diplomatic mission there that killed Ambassador J Christopher Stevens and three other Americans; apprehending suspects is likely to prove both diplomatically and practically difficult.MORE »
    Jul. 28, 2013

    More than 1,000 prisoners escape from Libyan prison amid protests over wave of political assassinations and attacks on political offices across country.MORE »
    Jul. 11, 2013

    Libyan government takes back control of its Interior Ministry from an armed group that had besieged building for a week.MORE »
    Jun. 28, 2013

    Libyan Defense Min Mohammed al-Bargathi will be removed from his post after clashes between rival armed militias in Tripoli leave 10 people dead and more than 100 wounded.MORE »
    Jun. 22, 2013

    Weapons formerly in Col Muammar el-Qaddafi’s stockpile are making their way to antigovernment forces in Syria, financed largely by Qatar, which has strong ties with Libyan rebel groups; Libya’s former fighters sympathize with Syria’s rebels.MORE »
    Jun. 16, 2013

    Six Libyan soldiers are killed in Benghazi in overnight attacks believed to be retaliation for expulsion from city of powerful militia Libya Shield.MORE »
    Jun. 15, 2013

    Libya’s first independent television channel Libya Al-Hurra says that hand grenade was hurled at its building in Benghazi, injuring one employee.MORE »
    Jun. 12, 2013

    Salem al-Gnaidy, Libya’s new army chief of staff, calls for militias to put themselves under command of the Libyan Army after clashes in which 31 people were killed.MORE »
    Jun. 11, 2013

    Op-Ed article by Frederic Wehrey, former United States military attache in Libya, criticizes plan by Libyan Prime Min Ali Zeidan to establish general-purpose military force, consisting entirely of ‘nonmilitia’ recruits; argues plan is highly risky and could throw country deeper into strife.MORE »
    Jun. 10, 2013

    Massacre of 30 civilian protesters by powerful Libyan militia threatens to provoke backlash that could finally cow country’s freewheeling brigades into submitting to central government; militia leaders argue that weak transitional government still badly needs their superior firepower, but violence against civilians is beginning to erode their political power.MORE »
    Jun. 9, 2013

    At least dozen people are killed and many more wounded in Benghazi, Libya, when powerful militia known as Libya Shield fires on protesters surrounding group’s headquarters.MORE »
    Jun. 5, 2013

    NATO is sending team of experts to Libya to assess how alliance can provide security assistance, notably military training, to help nation combat Islamist militants claiming allegiance to Al Qaeda and other threats.MORE »
    Jun. 1, 2013

    International Criminal Court orders Libya to hand over Seif al-Islam el-Qaddafi, son of Col Muammar el-Qaddafi.MORE »
    May. 30, 2013

    Susan E Rice and Victoria Nuland, two high-ranking diplomats, are facing different fates amid political tempest over deadly attacks on American diplomatic compound in Benghazi, Libya; internal roles of both were put on display in emails released by administration, but Nuland has escaped kind of harsh criticism leveled against Rice.MORE »
    May. 29, 2013

    Mohammed al-Megarif, speaker of Libyan Parliament who served under Col Muammar el-Qaddafi before becoming opposition leader in exile, resigns just weeks after lawmakers passed bill banning former Qaddafi officials from senior posts.MORE »
    May. 23, 2013

    Editorial holds Central Intelligence Agency’s role in attack on United States consulate in Benghazi, Libya, and its aftermath needs to be examined to understand what happened and how to better protect Americans.MORE »
    May. 18, 2013

    Rep Darrell Issa, chairman of House Oversight and Government Reform Committee, issues subpoena to Thomas R Pickering, chairman of independent panel that investigated attacks on American diplomatic mission in Benghazi, Libya.MORE »
    May. 18, 2013

    White House press secretary Jay Carney, first full-time reporter to make jump to White House in a generation, fully embraces his role as spokesman in dealing with number of controversies, like attack on American mission in Benghazi, Libya, and Internal Revenue Service targeting conservative groups.MORE »
    May. 14, 2013

    Visit to Libya by Rep Jason Chaffetz, Republican of Utah, shortly after 2012 attack on American diplomatic compound in Benghazi, is believed to have prompted concerns in State Department that Republicans were looking to use attack as political club against Pres Obama and Secretary of State Hillary Clinton.MORE »
    May. 14, 2013

    Editorial holds that Republican obsession with Obama administration’s inept initial talking points in wake of attack in Benghazi, Libya, is ultimately an act of political vengeance; argues that focus on talking points and baseless allegations of administration coverup are distractions from serious issues surrounding attack that need to be addressed.MORE »
    May. 14, 2013

    David Brooks Op-Ed column defends record of State Department spokeswoman Victoria Nuland, arguing that she is being made into scapegoat by Republicans critical of Obama administration’s handling of Benghazi and intelligence officials who want to shift blame for Benghazi onto State Department.MORE »
    May. 14, 2013

    Op-Ed article by Ethan Chorin, former Foreign Service officer in Libya, argues that diplomatic security lapses that led to fatal 2012 attack on embassy in Benghazi are negligible when compared to flawed reasoning behind American military intervention there; holds that United States underestimated regional importance of Libya, and that lack of plan for reconstruction and reconciliation has fostered an environment in which terrorists can thrive.MORE »
    May. 14, 2013

    Car explodes on a busy street in Benghazi, Libya, killing at least four people; attack stirs new anger at failure of country’s transitional government to fill security vacuum left by ouster of Col Muammar el-Qaddafi.MORE »
    May. 14, 2013

    Pres Obama, facing re-energized Republican adversaries and new questions about administration’s conduct, dismisses furor over handling of 2012 attacks in Benghazi, Libya; does, however, join bipartisan chorus of outrage over disclosures that Internal Revenue Service had singled out conservative groups for special scrutiny.MORE »
    May. 13, 2013

    Thomas R Pickering, who led State Department board’s inquiry into the attack on United States diplomatic compound in Benghazi, Libya, says there had been no need to interview then Secretary of State Hillary Rodham Clinton, because it had already decided responsibility lay below her level.MORE »
    May. 12, 2013

    Maureen Dowd Op-Ed column examines controversy surrounding attack on consulate in Benghazi, Libya, and way in which competing fiefs, from Republicans to Hillary Clinton’s and Barack Obama’s supporters, are protecting mythologies they have created.MORE »
    May. 11, 2013

    Disclosure of e-mails show White House was more deeply involved in revising talking points about attack in Benghazi, Libya, than officials have previously acknowledged; e-mails, which administration turned over to Congress, show White House coordinating an intensive process with the State Department, CIA, FBI and other agencies to obtain final version of the talking points, used by Susan E Rice, ambassador to the United Nations, in television appearances after the attack.MORE »
    May. 11, 2013

    Bombs explode outside two police stations in Libya’s eastern city Benghazi, prompting Britain to temporarily cut staff at its embassy in Tripoli.MORE »
    May. 10, 2013

    House Republicans intensify their criticism of Obama administration for its handling of the assault on the diplomatic compound in Benghazi, with Speaker John A Boehner calling for release of an e-mail that he says shows State Dept officials believed from the start that ‘Islamic terrorists’ were linked to attack but have declined to say so publicly.MORE »
    May. 10, 2013

    Editorial criticizes Republicans in Congress for their relentless effort to discredit Pres Obama and former Secretary of State Hillary Clinton with hearings on attack on American consulate in Benghazi, Libya; contends that hearings have not proved an administration cover-up or other hysterical allegations, and asserts that real scandal is that serious follow-up on security in Libya is going unaddressed.MORE »
    May. 9, 2013

    Veteran diplomat Gregory Hicks, testifying before Congress, gives riveting minute-by-minute account of lethal terrorist attack on diplomatic compound in Benghazi, Libya, then describes its contentious aftermath; says that after raising questions about the account of what happened, he felt distinct chill from State Department superiors.MORE »
    May. 8, 2013

    Congressional Republicans are anticipating official testimony of State Department official Gregory Hicks as damning indictment of White House response to attacks on American diplomatic compound in Benghazi, Libya.MORE »
    May. 6, 2013

    Libya’s transitional General National Congress, bowing to pressure from armed Islamists and other militiamen, passes law to exclude former officials of Qaddafi era from public office; text is so broadly written that it could force out many top officials but will certainly exclude from power Mahmoud Jibril, politician who leads main coalition in congress opposed to Islamists.MORE »
    May. 2, 2013

    FBI releases photos of three men wanted for questioning in connection with attacks on United States diplomatic mission and CIA outpost in Benghazi, Libya.MORE »
    Apr. 29, 2013

    Gunmen surround Libya’s Foreign Ministry in Tripoli, calling for a law banning officials who worked for deposed dictator Col Muammar el-Qaddafi from senior positions in the new administration.MORE »
    Apr. 24, 2013

    Car bomb destroys about half of French Embassy in Libya, in most significant attack against Western interest in the country since September killing of American ambassador J Christopher Stevens; attack is new blow to transitional government’s hope of improving sense of public security after ouster of Col Muammar el-Qaddafi in 2011.MORE »
    Apr. 4, 2013

    Egyptian court rules against extradition to Libya of Ahmed Qaddaf al-Dam, former close aide of ousted dictator Col Muammar el-Qaddafi.MORE »
    Mar. 30, 2013

    Libyan security officials say they have arrested two men in kidnapping of five British aid workers.MORE »
    Mar. 25, 2013

    Libya’s transitional government is completing agreement with Egypt to deposit $2 billion in the Egyptian central bank; timing of what amounts to loan comes after at least Qaddafi loyalists in Cairo are rounded up for possible extradition.MORE »
    Mar. 14, 2013

    Pres Obama names career diplomat Deborah K Jones as new envoy to Libya, filling job that has been vacant since death of Ambassador J Christopher Stevens during attack on diplomatic compound in Benghazi; meets with Libya’s Prime Min Ali Zeidan, emphasizing need for his country’s help in finding attackers who carried out assault.MORE »
    Feb. 8, 2013

    Judges at International Criminal Court order Libyan government to immediately hand over Col Muammar el-Qaddafi’s former intelligence chief Abdullah al-Senussi, who has been charged with crimes against humanity; order rejects Libya’s request for more time to argue case for trying Senussi in Libya.MORE »
    Feb. 1, 2013

    British Prime Min David Cameron returns from trips to Algiers and Tripoli, Libya, with promises of further partnerships in fields of defense, counterterrorism and intelligence-sharing, but some worry that he is overextending Britain’s foreign

    Aug. 28, 2013

    Find this story at 28 August 2013

    © 2013 The New York Times Company

    Exclusive: US security flaws exposed in Libya

    Documents show State Department knew of security problems in Benghazi but failed to fix them.

    Creation of an Undersecretary for Diplomatic Security

    Exemptions of Security Requirements for Benghazi

    Source Document Complete Report of the Benghazi Panel

    State Department Memo Recommends Reforms

    The US Department of State has known for decades that inadequate security at embassies and consulates worldwide could lead to tragedy, but senior officials ignored the warnings and left some of America’s most dangerous diplomatic posts vulnerable to attack, according to an internal government report obtained exclusively by Al Jazeera’s Investigative Unit.

    The report by an independent panel of five security and intelligence experts describes how the September 11, 2012, attack on the US Special Mission in Benghazi, Libya, which left Ambassador J Christopher Stevens and three other Americans dead, exploited the State Department’s failure to address serious security concerns at diplomatic facilities in high-risk areas.

    Among the most damning assessments, the panel concluded that the State Department’s failure to identify worsening conditions in Libya and exemptions from security regulations at the US Special Mission contributed to the tragedy in Benghazi. Undersecretary for Management Patrick Kennedy approved using Benghazi as a temporary post despite its significant vulnerabilities, according to an internal State Department document included with the report.

    The panel cataloged a series of failures by State Department officials to address security issues and concluded that many Foreign Service officers are unclear about who is in charge of security.

    Among the problems Sullivan’s panel identified in the report:
    The State Department’s management of its security structure has led to blurred authority and a serious lack of accountability. The undersecretary for management oversees security issues while also handling many other responsibilities. A newly created undersecretary for diplomatic security would allow the State Department to better focus on security issues affecting diplomatic posts around the world, according to the report. Left unaddressed, the control problem “could contribute to future security management failures, such as those that occurred in Benghazi.”
    The Bureau of Diplomatic Security, the State Department security arm created following the 1983 bombings of the US Embassy and Marine barracks in Beirut, does not have a review process in place to learn from previous security failures. Inexplicably, Diplomatic Security officials never conducted what is known as a “hot wash” debriefing of Benghazi survivors to learn from their experience.
    No risk management model exists to determine whether high-threat posts, such as the one in Benghazi, are necessary given the danger to US officials. Risk decisions are made based on “experience and intuition,” not established professional guidelines.
    None of the five high-risk diplomatic facilities the panel visited in the Middle East and Africa had an intelligence analyst on staff, described as a “critical” need.
    Diplomatic security training is inadequate, with no designated facility available to train agents to work at high-risk diplomatic posts.
    Even low-risk diplomatic posts are vulnerable. The Obama administration, concerned about potential attacks, ordered the closure of diplomatic posts in the Middle East and North Africa in August 2013. Of the 19 posts closed, only four were designated as high threat.

    Sullivan’s panel noted that its findings and recommendations are not new to State Department officials. A 1999 report by government contractor Booz Allen Hamilton recommended similar reforms, including an undersecretary for security. Madeleine Albright, then the secretary of state, approved the recommendation – but it was never implemented. “This report,” the panel wrote, “was largely ignored by the Department.”

    Even when the State Department has enacted security reforms, agency officials have failed to comply with them or otherwise have exempted themselves from the new standards, Sullivan’s panel determined.

    Following the 1983 Beirut bombings, for example, the State Department implemented building safety standards for missions in high-risk areas, which became known as Inman standards, developed by a review panel headed by Bobby R Inman, the former director of the National Security Agency.

    “Thirty years later, neither the US Embassy chancery in Beirut nor a significant number of other US diplomatic facilities in areas designated as ‘high threat’ meet Inman standards,” Sullivan’s panel wrote.

    Security problems at diplomatic posts aren’t isolated, the panel said, pointing out that safety concerns can be found at US facilities worldwide. For decades, the State Department has failed to address these vulnerabilities, the panel said, suggesting that Benghazi was a tragedy that might have been avoided.

    Security standards exempted

    At best, security at the US Special Mission in Benghazi was porous. The mission took lease of a 13-acre walled compound on June 21, 2011, two months before the ouster of Libyan leader Muammar Gaddafi and after the shuttering of the US Embassy in Tripoli due to increased fighting in the capital.
    Explosions target Benghazi judicial buildings

    Although the State Department reopened the embassy on Sept. 22, 2011, the Special Mission in Benghazi remained open despite serious security concerns. In December 2011, Undersecretary for Management Kennedy approved a one-year extension of the Benghazi post.

    A career diplomat, Kennedy was aware of the security problems in Benghazi. The number of Diplomatic Security officers there ranged from five to as few as one, and security was augmented by the February 17 Brigade, a ragtag group of Libyan militants who at the time of the 2012 attack were working under an expired contract and complaining about poor pay and long hours. In addition, the US Special Mission did not have adequate barriers to slow a ground assault.

    “Benghazi has demonstrated yet again the vulnerability of US facilities in countries where there is a willingness to protect US interests, but very little capacity to do so,” the panel wrote.

    The Benghazi post’s failure to meet security standards did not prevent its operation. State Department officials effectively waived the security requirements. For years, the State Department has fostered a culture of waiving such requirements when officials choose not to meet them.

    “Waivers for not meeting security standards have become commonplace in the Department; however, without a risk management process to identify and implement alternate mitigating measures after a waiver has been given, Department employees, particularly those in high threat areas, could be exposed to an unacceptable level of risk,” Sullivan’s panel wrote.

    The panel added: “It is unlikely that temporary facilities, in areas such as Benghazi, will ever meet Inman standards. The Department therefore identifies missions with special terminology to avoid its own high, but unattainable, standards and then approves waivers to circumvent those standards, thus exposing those serving under Chief of Mission authority to an unacceptable level of risk.”

    No ‘ground truth’

    In the six months leading up to the attack in Benghazi, the warning signs were ominous: security in the city had deteriorated and threats against Western officials were increasing.
    Inside Story – The battle for security in Libya

    From March through August 2012, 20 significant acts of violence occurred, including a homemade explosive device thrown over the wall of the US Special Mission and an attack on the Benghazi International Committee of the Red Cross with rocket-propelled grenades.

    On the morning of Sept. 11, 2012, diplomatic security officers issued a report that described Libyan security forces as “too weak to keep the country secure.”

    Yet no one at the State Department connected the intelligence dots to offer concerns about worsening security in Benghazi. According to Sullivan’s panel, this oversight occurred because the Benghazi facility did not have an intelligence analyst on site to determine the “ground truth.”

    Benghazi wasn’t unique in this. Sullivan’s panel visited high-risk embassies in Nairobi, Kenya; Juba, South Sudan; Cairo; Beirut; and Sanaa, Yemen. None had an intelligence analyst on staff.

    By contrast, the British Foreign and Commonwealth Office and the United Nations employ experienced intelligence analysts in country to identify security concerns from the ground.

    Training problems

    While documenting security problems, Sullivan’s panel said that the Bureau of Diplomatic Security, known as DS, is viewed as the “gold standard” among federal law enforcement and security officials.

    The State Department’s security arm protects 35,000 US employees worldwide, as well as 70,000 employee family members and up to 45,000 local civilian staff members.

    Sullivan’s panel viewed additional training of security agents as “critical” to addressing the problems identified in the report. But today the Bureau of Diplomatic Security is having difficulty handling its training load.

    The reason: the State Department, unlike other agencies, does not have a designated training facility for security agents. The department is now trying to identify a site near Washington, D.C., on which to build a Foreign Affairs Security Training Center.

    Until a center is built, the State Department must continue “begging hat-in-hand for use of others’ facilities,” the report stated.

    “The establishment of such an integrated, state-of-the-art facility is a best practice adopted long ago by the Federal Bureau of Investigation, United States Secret Service, and the Drug Enforcement Administration,” the panel wrote.

    Repeated security failures

    For the State Department, Benghazi became the latest in a long string of security failures. From 1998 to 2012, 273 significant attacks against US diplomatic facilities and personnel occurred.

    In 1998, concerned about increasing threats to the embassy in Kenya, Ambassador Prudence Bushnell and the US Department of Defence asked to be moved to a safer building. State Department officials denied the request, citing budgetary concerns.

    On August 7, 1998, simultaneous truck bombs exploded at the United States embassies in Dar es Salaam, Tanzania, and Nairobi, Kenya, killing more than 250 people, including 12 Americans.

    A State Department review after the attacks found that at least two-thirds of the 262 US diplomatic facilities were so vulnerable to attack that they needed to be rebuilt or relocated.

    Ten years after the East Africa bombings, on September 16, 2008, in a diplomatic cable obtained by WikiLeaks, the regional security officer in Sanaa, Yemen, informed his counterparts in Washington about a threat that British officials had intercepted and forwarded.

    The threat, written in Arabic, discussed a car bomb targeting American and British interests in Yemen.

    The next day, at about 9:15 am, a vehicle with men dressed in military uniforms shot through the gate of the US Embassy in Sanaa and detonated a car bomb. A second car breached the security gates and also exploded.

    An al-Qaeda-affiliated group claimed responsibility for the attack, which killed 18 people, including one American.

    Four years later, Benghazi happened.

    Members of Al Jazeera’s Investigative Unit contributed to this report.

    Trevor Aaronson Last Modified: 04 Sep 2013 16:40

    Find this story at 4 September 2013

    © www.aljazeera.com

    << oudere artikelen  nieuwere artikelen >>