• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Meet the Arab-American lawyer who the NSA spied on–back in 1967

    Abdeen Jabara was hardly shocked when the scandal over the National Security Agency’s global surveillance dragnet broke in June.

    “I was not at all surprised by the Snowden revelations about the NSA,” Jabara, a prominent lawyer and a founder of the American-Arab Anti-Discrimination Committee, told me in a phone interview. “The United States has this huge, huge international surveillance apparatus in place and after 9/11 they were going to use it as much as they could as part of the war on terror. It was just too tempting.”

    He would know–he’s lived it. Jabara is one of many Americans to have been personally spied on by the NSA decades ago. A court battle that started in 1972 eventually forced the secretive surveillance agency to acknowledge that it pried into the life of an American in an effort that began in August 1967. The disclosure was the first time the U.S. admitted it had spied on an American.

    Jabara’s story lays bare the deep roots of the NSA’s surveillance. Today, with the NSA operating under the ethos of “collect it all,” there’s much more surveillance of Americans when compared to prior decades. But the current spying occurs in a less targeted way.

    Documents published by The Guardian have revealed that virtually every American’s communications are swept up by phone and Internet surveillance, though the government is not targeting individual Americans. Instead, the NSA is targeting foreigners but has retained–and sometimes searched– information about Americans in communication with foreign subjects of spying. In contrast, Jabara was working as a lawyer at a time when the NSA was specifically targeting domestic dissidents.

    In 1972, Jabara filed suit against the government for prying into his life. A young Detroit-based attorney at the time, Jabara represented people from the Arab-American community caught up in legal trouble. He also took on the cases of people harassed by the Federal Bureau of Investigation, which had stepped up efforts to surveil Arab activists in the aftermath of the 1967 war, when the U.S. alliance with Israel was solidified. Jabara was caught up in what was called “Operation Boulder,” a Nixon administration-era program that put Arabs under surveillance. “Operation Boulder,” which was sparked by the murder of Israeli athletes at the Munich Olympics in 1972, went after domestic activist groups and was instrumental in the deportation of hundreds of people on technical irregularities.

    Jabara was spied on without a warrant, albeit incidentally–the U.S. government never targeted him, but surveilled phone calls and telegrams from his clients. His case forced the government to disclose that Jabara was spied on and that non-governmental domestic groups shared information on Jabara with the U.S. The FBI was the primary agency tracking him, but it was the NSA that furnished the federal law enforcement agency with records of Jabara’s phone conversations.

    In 1979, a federal district court judge handed Jabara and his legal team a victory with a ruling that said the U.S. had violated Jabara’s Fourth Amendment and privacy rights. The federal government appealed, and a separate court delivered a setback to Jabara. In 1982, an appeals court ruled that the government can intercept conversations between U.S. citizens and people overseas–even if there is no reason to believe the citizen is a “foreign agent.” The final step in the case came in 1984, when the FBI agreed to destroy all the files on Jabara and stipulated that the lawyer did not engage in criminal activity.

    The timeline of Jabara’s case traverses a changing legal landscape governing surveillance. When Jabara first filed suit, there was no legal framework prohibiting the government from spying on Americans without a warrant. But in the wake of disclosures about the NSA keeping a “watch list” of some 1,650 anti-war activists and other evidence of domestic surveillance, the Foreign Intelligence Surveillance Act was passed in 1979. The act required intelligence agencies to go to a secretive court–where the judges are handpicked by the Supreme Court’s Chief Justice–in order to target Americans. It’s an open question whether the secretive court, criticized for being deferential to government claims, would have denied the NSA’s and FBI’s bid to spy on Jabara. But it would have had to show probable cause that Jabara was an agent of a foreign power–an assertion that federal judges eventually rejected.

    Parallels between current-day surveillance and the spying on Jabara are easy to come by. The U.S. government attempted to shield disclosing data on surveilling Jabara by asserting the “state secrets” privilege. The Obama administration used the same argument to try to dismiss a lawsuit against the NSA. Both surveillance efforts raise the question of how to square a secret spying regime with a Constitution that ostensibly protects privacy. And the government revealed that it shared information on Jabara with three foreign governments–a foreshadowing of revelations that the U.S. shares intelligence information with allies, including the Israeli government. (Jabara suspected that the U.S. shared data on him with Israel, though the government denied that.)

    Lee Tien, a senior staff attorney with the Electronic Frontier Foundation, said that not much had shifted since the government spied on Jabara. “What has changed is that the intelligence community is doing even more surveillance,” Tien told me in an interview. “What didn’t change? They’re still surveilling people in the United States and they’re doing it illegally.”

    Now, the question is whether more legal checks will be put on the NSA’s surveillance regime. The secretive agency is battling civil liberties groups in courts and could be reined in by new legislation proposed by elected officials. But Jabara’s case–and the long history of NSA spying–shows that despite reform efforts, spying on Americans continues unabated.

    Alex Kane on October 3, 2013

    Find this story at 3 October 2013

    © 2013 Mondoweiss

    Arab-American Attorney Abdeen Jabara: I Was Spied on by the National Security Agency 40 Years Ago

    As more revelations come to light about the National Security Agency, we speak to civil rights attorney Abdeen Jabara, co-founder of the American-Arab Anti-Discrimination Committee. He was involved in a groundbreaking court case in the 1970s that forced the NSA to acknowledge it had been spying on him since 1967. At the time of the spying, Jabara was a lawyer in Detroit representing Arab-American clients and people being targeted by the FBI. The disclosure was the first time the NSA admitted it had spied on an American.
    Transcript

    This is a rush transcript. Copy may not be in its final form.

    AMY GOODMAN: I want to turn now to a—perhaps related, but certainly to the climate, I want to end today’s show on the National Security Agency. Our guest here in New York, Abdeen Jabara, who was co-founder of the American-Arab Anti-Discrimination Committee, was involved in a groundbreaking court case in the 1970s that forced the National Security Agency to acknowledge it had been spying on him since 1967. The disclosure was the first time, I believe, that the NSA admitted it had spied on an American. I mean, this is at a time, Abdeen Jabara, that most people had no idea what the NSA was. This is not like these last few months.

    ABDEEN JABARA: Well, it was—this is very interesting. I didn’t know what the NSA was. I mean, I started a lawsuit against the FBI, because I thought that the FBI had been spying on me and monitoring my activities—

    AMY GOODMAN: Why?

    ABDEEN JABARA: —and that of my clients. Well, I’ll tell you why. Because I had been very, very active in Palestinian support work. And one day I read in Newsweek magazine, in the Periscope section, that 26 Arabs in the United States had been targeted for surveillance, electronic surveillance. So, I thought, surely, some of those had been clients of mine or had talked to me on the phone about issues and so forth. And that’s when I brought the lawsuit. And—

    AMY GOODMAN: So you sued the FBI in 1972.

    ABDEEN JABARA: Right, I sued the FBI in 1972, and the FBI answered. And on the issue about electronic surveillance, they declined to answer on the basis that it was privileged and state secret. At that point in time, the ACLU came in to represent me, and we forced them to answer that question. They admitted that there had been some overhears, alright, that I had not been personally targeted for electronic surveillance, but there had been overhears of my conversations with some of my clients. And they also said they received information from other federal agencies. And they didn’t want to answer that, who that agency was. And the court compelled them to answer. And it turned out that other agency was the NSA. And we didn’t know, you know, what the NSA was. Jim Bamford’s book, The Puzzle Palace, hadn’t yet been published. And we found out that the FBI had requested any information that the NSA had, and the NSA had six different communications that I had made. I was president of the Association of American Arab University Graduates in 1972, so I had a great deal of work on my plate as the president of the association. And I don’t know what these communications were.

    And the district court, Judge Ralph Freeman, held that my First Amendment and my Fourth Amendment rights had been violated. An appeal was made to the Sixth Circuit Court of Appeals in Cincinnati. And the Sixth Circuit set aside part of that ruling, saying that there is no violation of a Fourth Amendment right by the National Security Agency to surveil an American’s communications overseas, even though the person is not a foreign agent. And, in fact, five years ago, Congress codified that, where they have said—and there’s an article in today’s New York Times about this—by saying that there’s no warrant requirement where the target is a foreign target, even though an American citizen is communicating overseas.

    So, this whole issue, I was surprised, after all the revelations about the Snowden-NSA brouhaha, that nobody had looked back at what had occurred back in the—in the ’70s to show that at that time it came out in the press that over 1,600 Americans had been surveilled by the NSA. And this was before the passage of FISA, Foreign Intelligence Surveillance Act. Out of that issue in the ’70s, they passed this FISA Act, which said that—and they set up a secret court, which is the national security court. The judges of that are appointed by the chief justice of the Supreme Court.

    AMY GOODMAN: We have less than a minute. So—

    ABDEEN JABARA: Yes.

    AMY GOODMAN: —keep going.

    ABDEEN JABARA: So, they set that up, and they said that that will create safeguards, alright? This will create safeguards, and that the only targets can be foreign agents.

    AMY GOODMAN: Finally, Abdeen Jabara, so there are all these records on you, not only that the FBI and NSA had. How many other agencies had them? And did you get them expunged?

    ABDEEN JABARA: As a matter of fact, I did. After the case was remanded to the trial court, the district in Detroit, we entered into a settlement with the FBI whereby they acknowledged that I had not been in violation of any U.S. laws, that I had been exercising my constitutional rights, and that they would destroy the entire file that they had collected on me.

    AMY GOODMAN: How many agencies had they shared this file with?

    ABDEEN JABARA: They had shared it with three foreign governments and 17—

    AMY GOODMAN: Which governments?

    ABDEEN JABARA: —17 domestic agencies.

    AMY GOODMAN: Which governments?

    ABDEEN JABARA: Well, they didn’t tell us.

    AMY GOODMAN: Ah—

    ABDEEN JABARA: But you can just surmise.

    AMY GOODMAN: I want to thank you all for being with us. Thank you so much, Abdeen Jabara, former vice chair of the ADC, one of the founders of the American-Arab Anti-Discrimination Committee; Albert Mokhiber, former president of the ADC; and Congressmember John Conyers. Congratulations on your almost 50 years of service.

    I’ll be speaking on Saturday at 2:00 at the Green Fest in Los Angeles, and at 6:00 at Newport Beach Marriott in California.

    The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.

    Thursday, October 17, 2013

    Find this story at 17 October 2013

    Spy Copters, Lasers, and Break-In Teams; How the FBI keeps watch on foreign diplomats.

    Between 2006 and 2009, surveillance helicopters conducted daily flights over northwest Washington, D.C., taking high-resolution photographs of the new Chinese Embassy being constructed on Van Ness Street. The aircraft belonged to the Federal Bureau of Investigation, which wanted to determine where the embassy’s communications center was being located. But the Chinese construction crews hid their work on this part of the building by pulling tarpaulins over the site as it was being constructed.

    The FBI also monitored the movements and activities of the Chinese construction workers building the embassy, who were staying at a Days Inn on Connecticut Avenue just north of the construction site, in the hopes of possibly recruiting one or two of them. According to one Chinese diplomat, his fellow officials detected individuals who they assumed to be FBI agents covertly monitoring the construction materials and equipment being used to build the embassy, which were stored on the University of the District of Columbia’s soccer field across the street from where the Chinese Embassy currently stands. The diplomat added that Chinese security officials assumed that the FBI agents were trying to determine whether it was possible to plant eavesdropping devices inside the construction materials stored at the site.

    In recent weeks, the U.S. National Security Agency’s efforts to monitor foreign diplomats have become the stuff of worldwide headlines. But the FBI has been in the business of spying on diplomats and breaking their codes for far longer than the NSA has. The surveillance of the Chinese Embassy was just one piece of a far larger espionage operation. The FBI not only endeavors to steal or covertly compromise foreign government, military, and commercial computer, telecommunications, and encryption systems being used in the United States, but the FBI and NSA work closely to intercept the communications of all diplomatic missions and international organizations located on American soil. In some important respects, the FBI’s cryptologic work is more secretive than that being performed by the NSA because of the immense diplomatic sensitivity of these operations if they were to ever be exposed publicly.

    The Bureau of Investigation, the predecessor to today’s FBI, has been monitoring diplomatic communications since at least 1910, when it periodically solved Mexican government and revolutionary group cable traffic coming in and out of the United States. And for over a century, the FBI and its predecessors have been aggressive practitioners of the age-old art of stealing codes and ciphers. In June 1916, Bureau of Investigations agents surreptitiously obtained a copy of the new Mexican consular code by picking the pockets of a Mexican diplomatic courier while he cavorted with “fast women” in one of the innumerable border fleshpots along the Rio Grande.
    More FP Coverage
    the NSA Leaks
    Meet the Spies Doing the NSA’s Dirty Work
    Exclusive: Inside America’s Plan to Kill Online Privacy Rights Everywhere
    The FBI is Helping the NSA Spy, but Senators Don’t Want to Know About It

    Little has changed in the intervening century. Despite the creation of the NSA in 1952 to centralize in one agency all U.S. government signals intelligence (SIGINT) collection and processing work, the FBI, which did not respond to requests for comment for this story, has never ceased its own independent cryptologic efforts, especially when those efforts have been aim at diplomats on American soil.

    ***

    The number of foreign government targets that the FBI monitors inside the United States is huge and growing. State Department records show that 176 countries maintain embassies in Washington, not including Cuba and Iran, which the U.S. government does not have diplomatic relations with but which maintain interest sections inside the Swiss and Pakistani embassies, respectively.

    In addition, 115 of the 193 members of the United Nations maintain diplomatic missions of varying sizes in New York City. There are also 62 consulates in Los Angeles, 52 in Chicago, 42 in San Francisco, 38 in Houston, 35 in Miami, and 26 in Boston and Atlanta.

    All told, there are almost 600 foreign government embassies, consulates, missions, or representative offices in the United States, all of which are watched to one degree or another by the counterintelligence officers of the FBI. Only eight countries do not maintain any diplomatic presence in the United States whatsoever, the most important of which is nuclear-armed North Korea.

    Every one of these embassies and consulates is watched by the FBI’s legion of counterintelligence officers to one degree or another. But some countries’ receive the vast majority of the FBI’s attention, such as Russia, China, Libya, Israel, Egypt, Syria, Jordan, Lebanon, Saudi Arabia, Iraq, Afghanistan, India, Pakistan, and Venezuela. The Cuban and Iranian interests section in Washington — and their missions to the United Nations in New York — of course receive special attention as well.

    Unsurprisingly, most of the FBI’s surveillance is technical in nature. For example, with substantial technical assistance from the NSA and the “big three” American telecommunications companies (AT&T, Verizon, and Sprint), the FBI taps the phones (including cell phones) of virtually every embassy and consulate in the United States. The FBI also intercepts the home phones and emails of many diplomats. The FBI’s Washington and New York field offices have special wiretap centers that specialize in collecting all telephone, email, instant messaging, text messaging, and cellular telephone traffic coming in and out of all high-priority diplomatic targets in the United States 24 hours a day, seven days a week. According to a former Justice Department source, over the past decade these extremely sensitive intercepts have identified a number of spies working for governments that were caught in the act of stealing U.S. government secrets, as well as a larger number of cases involving the theft of industrial secrets from American companies.

    Since 1978, all electronic communications, both plaintext and encrypted, between these embassies and their home countries have been routinely intercepted by the NSA’s BLARNEY fiber-optic-cable intercept program. The NSA provides copies of all these intercepts, including telephone calls and emails, to the FBI’s secretive signals-intelligence unit, the Data Intercept Technology Unit (DITU) at the Quantico Marine Corps base in Northern Virginia, and to the FBI’s electronic-eavesdropping centers in Washington and New York.

    The FBI also uses a wide range of vehicles and airborne surveillance assets to monitor the movements and activities of foreign diplomats and intelligence operatives in Washington and New York. Some of the vans, aircraft, and helicopters used by the FBI for this purpose are equipped with equipment capable of intercepting cell-phone calls and other electronic forms of communication. And when that doesn’t work, the FBI calls in the burglars.

    ***

    Another important part of the FBI’s surveillance effort is dedicated to trying to surreptitiously get inside these diplomatic establishments on behalf of the NSA, which increasingly depends on the FBI to penetrate the computer and telecommunications networks used by these embassies and compromise their information security systems.

    The FBI perfected this clandestine technique, known as the Surreptitious Entry Program operation, during Cold War intelligence-gathering operations directed at the Soviet Union and its Eastern European allies. These missions remain highly classified because of the diplomatic sensitivity surrounding breaking into the embassies of friends and enemies alike. In one instance during the 1960s, FBI agents reportedly drove a garbage truck into the central courtyard of the Czech Embassy in the middle of the night and spirited away one of the embassy’s cipher machines for study by the NSA’s code breakers.

    The FBI is still conducting these highly sensitive operations. Specially trained teams of FBI agents are still periodically breaking into foreign embassies and consulates in the United States, primarily in New York and Washington. In New York, a special team of FBI burglars is based in a converted warehouse in Long Island City in Queens, according to a former FBI employee who worked there. The nondescript facility is large enough that the FBI can build mock-ups of the exteriors and interiors of embassies being targeted for break-ins. The FBI has a similar facility in Northern Virginia, where full-size mock-ups of embassies in Washington are constructed to train FBI teams prior to conducting black-bag jobs of the facilities.

    To facilitate these operations, the FBI has a huge library of architectural drawings, floor plans, building permits, and any other documents that it can lay its hands on concerning the layouts of every embassy and consulate in the United States. Many of these documents were obtained in close conjunction with the diplomatic security staff of the State Department and the uniformed branch of the Secret Service, which is responsible for providing security for foreign diplomatic establishments in the United States. The FBI also interviews the repair and maintenance personnel who service the leased computers and telecommunications equipment used by a host of embassies and other diplomatic establishments in Washington and New York.

    Since the 9/11 terrorist attacks, the tempo of FBI clandestine operations designed to steal, compromise, or influence foreign computer, telecommunications, or encryption systems has increased by several orders of magnitude. According to a former Justice Department official, over the past decade clandestine human-intelligence operations run by the FBI’s Washington and New York field offices have been enormously successful in compromising a wide range of computer systems and encryption technology used by foreign governments and corporate entities. In a number of important cases, these FBI operations have allowed the NSA’s code-breakers to penetrate foreign encryption systems that had defied the ability of the code-breakers to solve through conventional cryptanalytic means. For example, the FBI was able to give the NSA the daily changes in cipher keys for an encryption system used by a country in the developing world. In another case, the FBI was able to covertly insert spyware into the operating system of a computer being used by a foreign mission in New York, allowing the NSA to read the plaintext versions of cables before they were encrypted.

    ***

    But by far the most productive and sensitive intelligence source about what is going on inside embassies and consulates in the United States is a joint FBI-NSA electronic-eavesdropping program known as Close Access SIGINT. It enables the FBI and NSA to listen to what is transpiring inside these buildings by using a wide range of covert technical sensors that are monitored in real time from covert listening posts located in close proximity to the targets.

    Some of these operations involve spyware software that has been covertly planted inside the computer systems of embassies and consulates, which allows the NSA’s computer-hacking organization, the Office of Tailored Access Operations (TAO), to read in real time everything that is being stored on individual computers or on the computer network itself. Some of these implants are designed and operated by TAO. Others are designed by the FBI’s SIGINT unit, the DITU. Some sensors periodically copy the contents of computer hard drives; another sensor takes screen shots of documents being processed or reviewed on compromised computer systems. The FBI is also using sophisticated laser and acoustic systems to image and record the sounds of what is being typed on computers, according to a source with access to the trove of documents leaked to the media by former NSA contractor Edward Snowden.

    To pick up the signals from these clandestine sensors, the FBI uses front companies to lease office space within line of sight of nearly 50 embassies and consulates in Washington and New York. In other instances, the FBI and NSA have installed disguised receivers on building rooftops near these embassies to pick up the data signals from clandestine sensors implanted inside these embassies and consulates. Some of these disguised receivers can clearly be seen on the rooftop of a building located within line of sight of the Chinese, Israeli, and Pakistani embassies on Van Ness Street in northwest Washington. It’s a neighborhood that’s awfully familiar to the FBI and its eavesdroppers.
    Save big when you subscribe to FP.

    MICHAEL BRADLEY/AFP/Getty Images

    Matthew M. Aid is the author of Intel Wars: The Secret History of the Fight Against Terror and The Secret Sentry: The Untold History of the National Security Agency.

    BY MATTHEW M. AID | NOVEMBER 19, 2013

    Find this story at 19 November 2013

    © 2013 The Slate Group, LLC. All rights reserved.

    UNLEASHED AND UNACCOUNTABLE; The FBI’s Unchecked Abuse of Authority

    The Federal Bureau of Investigation serves a crucial role in securing the United States from
    criminals, terrorists, and hostile foreign agents. Just as importantly, the FBI also protects civil
    rights and civil liberties, ensures honest government, and defends the rule of law. Its agents serve
    around the country and around the world with a high degree of professionalism and competence,
    often under difficult and dangerous conditions. But throughout its history, the FBI has also
    regularly overstepped the law, infringing on Americans’ constitutional rights while
    overzealously pursuing its domestic security mission.
    After the September 11, 2001 terrorist attacks, Congress and successive attorneys general
    loosened many of the legal and internal controls that a previous generation had placed on the FBI
    to protect Americans’ constitutional rights. As a result, the FBI is repeating mistakes of the past
    and is again unfairly targeting immigrants, racial and religious minorities, and political dissidents
    for surveillance, infiltration, investigation, and “disruption strategies.”
    But modern technological innovations have significantly increased the threat to American liberty
    by giving today’s FBI the capability to collect, store, and analyze data about millions of innocent
    Americans. The excessive secrecy with which it cloaks these domestic intelligence gathering
    operations has crippled constitutional oversight mechanisms. Courts have been reticent to
    challenge government secrecy demands and, despite years of debate in Congress regarding the
    proper scope of domestic surveillance, it took unauthorized leaks by a whistleblower to finally
    reveal the government’s secret interpretations of these laws and the Orwellian scope of its
    domestic surveillance programs.
    There is evidence the FBI’s increased intelligence collection powers have harmed, rather than
    aided, its terrorism prevention efforts by overwhelming agents with a flood of irrelevant data and
    false alarms. Former FBI Director William Webster evaluated the FBI’s investigation of Maj.
    Nadal Hasan prior to the Ft. Hood shooting and cited the “relentless” workload resulting from a
    “data explosion” within the FBI as an impediment to proper intelligence analysis. And members
    of Congress questioned several other incidents in which the FBI investigated but failed to
    interdict individuals who later committed murderous terrorist attacks, including the Boston
    Marathon bombing. While preventing every possible act of terrorism is an impossible goal, an
    examination of these cases raise serious questions regarding the efficacy of FBI methods. FBI
    data showing that more than half of the violent crimes, including over a third of the murders in
    the U.S., go unsolved each year calls for a broader analysis of the proper distribution of law
    enforcement resources.
    With the appointment of Director James Comey, the FBI has seen its first change in leadership
    since the 9/11 attacks, which provides an opportunity for Congress, the president, and the
    attorney general to conduct a comprehensive evaluation of the FBI’s policies and programs. This
    report highlights areas in which the FBI has abused its authority and recommends reforms to ensure the FBI fulfills its law enforcement and security missions with proper public oversight
    and respect for constitutional rights and democratic ideals.
    The report describes major changes to law and policy that unleashed the FBI from its traditional
    restraints and opened the door to abuse. Congress enhanced many of the FBI’s surveillance
    powers after 9/11, primarily through the USA Patriot Act and the Foreign Intelligence
    Surveillance Act Amendments. The recent revelations regarding the FBI’s use of Section 215 of
    the USA Patriot Act to track all U.S. telephone calls is only the latest in a long line of abuse.
    Five Justice Department Inspector General audits documented widespread FBI misuse of Patriot
    Act authorities in 2007 and 2008. Congress and the American public deserve to know the full
    scope of the FBI’s spying on Americans under the Patriot Act and all other surveillance
    authorities.
    Attorney General Michael Mukasey rewrote the FBI’s rule book in 2008, giving FBI agents
    unfettered authority to investigate anyone they choose without any factual basis for suspecting
    wrongdoing. The 2008 Attorney General’s Guidelines created a new kind of intrusive
    investigation called an “assessment,” which requires no “factual predicate” and can include
    searches through government or commercial databases, overt or covert FBI interviews, and
    tasking informants to gather information about anyone or to infiltrate lawful organizations. In a
    two-year period from 2009 to 2011, the FBI opened over 82,000 “assessments” of individuals or
    organizations, less than 3,500 of which discovered information justifying further investigation.
    The 2008 guidelines also authorized the FBI’s racial and ethnic mapping program, which
    allows the FBI to collect demographic information to map American communities by race and
    ethnicity for intelligence purposes, based on crass racial stereotypes about the crimes each group
    commits. FBI documents obtained by the American Civil Liberties Union show the FBI mapped
    Chinese and Russian communities in San Francisco for organized crime purposes, all Latino
    communities in New Jersey and Alabama because there are street gangs, African Americans in
    Georgia to find “Black separatists,” and Middle-Eastern communities in Detroit for terrorism.
    The FBI also claimed the authority to sweep up voluminous amounts of information secretly
    from state and local law enforcement and private data aggregators for data mining purposes. In
    2007, the FBI said it amassed databases containing 1.5 billion records, which were predicted to
    grow to 6 billion records by 2012, which is equal to 20 separate “records” for every person in the
    United States. The largest of these databases, the Foreign Terrorist Tracking Task Force,
    currently has 360 staff members running 40 separate projects. A 2013 Inspector General audit
    determined it “did not always provide FBI field offices with timely and relevant information.”
    The next section of the report discusses the ways the FBI avoids accountability by skirting
    internal and external oversight. The FBI, which Congress exempted from the Whistleblower
    Protection Act, effectively suppresses internal dissent by retaliating against employees who
    report waste, fraud, abuse, and illegality. As a result, 28 percent of non-supervisory FBI employees surveyed by the Inspector General said they “never” reported misconduct they saw or
    heard about on the job. The FBI also aggressively investigates other government whistleblowers,
    which has led to an unprecedented increase in Espionage Act prosecutions over the last five
    years. And the FBI’s overzealous pursuit of government whistleblowers has also resulted in the
    inappropriate targeting of journalists for investigation, infringing on free press rights. Recent
    coverage of overbroad subpoenas for telephone records of Associated Press journalists and an
    inappropriate search warrant for a Fox News reporter are only the latest examples of abuse. In
    2010 the Inspector General reported the FBI used an illegal “exigent letter” to obtain the
    telephone records of 7 New York Times and Washington Post reporters. And the FBI thwarts
    congressional oversight with excessive secrecy and delayed or misleading responses to
    questions from Congress.
    Finally, the report highlights evidence of abuse that requires greater regulation, oversight, and
    public accountability. These include many examples of the FBI targeting First Amendment
    activities by spying on protesters and religious groups with aggressive tactics that infringe on
    their free speech, religion, and associational rights. In 2011, the ACLU exposed flawed and
    biased FBI training materials that likely fueled these inappropriate investigations.
    The FBI also operates increasingly outside the United States, where its activities are more
    difficult to monitor. Several troubling cases indicate the FBI may have requested, facilitated,
    and/or exploited the arrests of U.S. citizens by foreign governments, often without charges, so
    they could be held and interrogated, sometimes tortured, and then interviewed by FBI agents.
    The ACLU represents two proxy detention victims, including Amir Meshal, who was arrested
    at the Kenya border in 2007 and subjected to more than four months of detention in three
    different East African countries without charge, access to counsel, or presentment before a
    judicial officer, at the behest of the U.S. government. FBI agents interrogated Meshal more than
    thirty times during his detention.
    Other Americans traveling abroad discover that their government has barred them from flying;
    the number of U.S. persons on the No Fly List has doubled since 2009. There is no fair
    procedure for those mistakenly placed on the list to challenge their inclusion. Many of those
    prevented from flying home have been subjected to FBI interviews after seeking assistance from
    U.S. Embassies. The ACLU is suing the government on behalf of 10 American citizens and
    permanent residents who were prevented from flying to the U.S., arguing that barring them from
    flying without due process is unconstitutional.
    These FBI abuses of authority must end. We call on President Barack Obama and Attorney
    General Eric Holder to tighten FBI authorities to prevent unnecessary invasions of Americans’
    privacy; prohibit profiling based on race, ethnicity, religion and national origin; and protect First
    Amendment activities. And we call on Congress to make these changes permanent through
    statute and improve oversight to prevent future abuse. The FBI serves a crucial role in protecting
    Americans, but it must protect our rights as it protects our security.

    Find this story at 17 September 2013

    © ACLU

    FBI Taps Hacker Tactics to Spy on Suspects

    Law-Enforcement Officials Expand Use of Tools Such as Spyware as People Under Investigation ‘Go Dark,’ Evading Wiretaps

    Law-enforcement officials in the U.S. are expanding the use of tools routinely used by computer hackers to gather information on suspects, bringing the criminal wiretap into the cyber age.

    Federal agencies have largely kept quiet about these capabilities, but court documents and interviews with people involved in the programs provide new details about the hacking tools, including spyware delivered to computers and phones through email or Web links—techniques more commonly associated with attacks by criminals.

    People familiar with the Federal Bureau of Investigation’s programs say that the use of hacking tools under court orders has grown as agents seek to keep up with suspects who use new communications technology, including some types of online chat and encryption tools. The use of such communications, which can’t be wiretapped like a phone, is called “going dark” among law enforcement.

    A spokeswoman for the FBI declined to comment.

    The FBI develops some hacking tools internally and purchases others from the private sector. With such technology, the bureau can remotely activate the microphones in phones running Google Inc.’s GOOG +0.10% Android software to record conversations, one former U.S. official said. It can do the same to microphones in laptops without the user knowing, the person said. Google declined to comment.

    The bureau typically uses hacking in cases involving organized crime, child pornography or counterterrorism, a former U.S. official said. It is loath to use these tools when investigating hackers, out of fear the suspect will discover and publicize the technique, the person said.

    The FBI has been developing hacking tools for more than a decade, but rarely discloses its techniques publicly in legal cases.
    Related

    Earlier this year, a federal warrant application in a Texas identity-theft case sought to use software to extract files and covertly take photos using a computer’s camera, according to court documents. The judge denied the application, saying, among other things, that he wanted more information on how data collected from the computer would be minimized to remove information on innocent people.

    Since at least 2005, the FBI has been using “web bugs” that can gather a computer’s Internet address, lists of programs running and other data, according to documents disclosed in 2011. The FBI used that type of tool in 2007 to trace a person who was eventually convicted of emailing bomb threats in Washington state, for example.

    The FBI “hires people who have hacking skill, and they purchase tools that are capable of doing these things,” said a former official in the agency’s cyber division. The tools are used when other surveillance methods won’t work: “When you do, it’s because you don’t have any other choice,” the official said.

    Surveillance technologies are coming under increased scrutiny after disclosures about data collection by the National Security Agency. The NSA gathers bulk data on millions of Americans, but former U.S. officials say law-enforcement hacking is targeted at very specific cases and used sparingly.

    Still, civil-liberties advocates say there should be clear legal guidelines to ensure hacking tools aren’t misused. “People should understand that local cops are going to be hacking into surveillance targets,” said Christopher Soghoian, principal technologist at the American Civil Liberties Union. “We should have a debate about that.”

    Mr. Soghoian, who is presenting on the topic Friday at the DefCon hacking conference in Las Vegas, said information about the practice is slipping out as a small industry has emerged to sell hacking tools to law enforcement. He has found posts and resumes on social networks in which people discuss their work at private companies helping the FBI with surveillance.

    A search warrant would be required to get content such as files from a suspect’s computer, said Mark Eckenwiler, a senior counsel at Perkins Coie LLP who until December was the Justice Department’s primary authority on federal criminal surveillance law. Continuing surveillance would necessitate an even stricter standard, the kind used to grant wiretaps.

    But if the software gathers only communications-routing “metadata”—like Internet protocol addresses or the “to” and “from” lines in emails—a court order under a lower standard might suffice if the program is delivered remotely, such as through an Internet link, he said. That is because nobody is physically touching the suspect’s property, he added.

    An official at the Justice Department said it determines what legal authority to seek for such surveillance “on a case-by-case basis.” But the official added that the department’s approach is exemplified by the 2007 Washington bomb-threat case, in which the government sought a warrant even though no agents touched the computer and the spyware gathered only metadata.

    In 2001, the FBI faced criticism from civil-liberties advocates for declining to disclose how it installed a program to record the keystrokes on the computer of mobster Nicodemo Scarfo Jr. to capture a password he was using to encrypt a document. He was eventually convicted.

    A group at the FBI called the Remote Operations Unit takes a leading role in the bureau’s hacking efforts, according to former officials.

    Officers often install surveillance tools on computers remotely, using a document or link that loads software when the person clicks or views it. In some cases, the government has secretly gained physical access to suspects’ machines and installed malicious software using a thumb drive, a former U.S. official said.

    The bureau has controls to ensure only “relevant data” are scooped up, the person said. A screening team goes through all of the data pulled from the hack to determine what is relevant, then hands off that material to the case team and stops working on the case.

    The FBI employs a number of hackers who write custom surveillance software, and also buys software from the private sector, former U.S. officials said.

    Italian company HackingTeam SRL opened a sales office in Annapolis, Md., more than a year ago to target North and South America. HackingTeam provides software that can extract information from phones and computers and send it back to a monitoring system. The company declined to disclose its clients or say whether any are in the U.S.

    U.K.-based Gamma International offers computer exploits, which take advantage of holes in software to deliver spying tools, according to people familiar with the company. Gamma has marketed “0 day exploits”—meaning that the software maker doesn’t yet know about the security hole—for software including Microsoft Corp.’s Internet Explorer, those people said. Gamma, which has marketed its products in the U.S., didn’t respond to requests for comment, nor did Microsoft.

    The Wall Street Journal
    August 1, 2013, 6:59 p.m. ET
    By JENNIFER VALENTINO-DEVRIES and DANNY YADRON

    Find this story at 1 August 2013

    Copyright ©2013 Dow Jones & Company, Inc.

    Jeremy Hammond: FBI directed my attacks on foreign government sites

    Anonymous hacktivist told court FBI informant and fellow hacker Sabu supplied him with list of countries vulnerable to cyber-attack

    Hammond said: ‘I took responsibility by pleading guilty, but when will the government be made to answer for its crimes?’ Photograph: Michael Gottschalk/AFP

    The Anonymous hacktivist sentenced on Friday to 10 years in federal prison for his role in releasing thousands of emails from the private intelligence firm Stratfor has told a Manhattan court that he was directed by an FBI informant to break into the official websites of several governments around the world.

    Jeremy Hammond, 28, told a federal court for the southern district of New York that a fellow hacker who went under the internet pseudonym “Sabu” had supplied him with lists of websites that were vulnerable to attack, including those of many foreign countries. The defendant mentioned specifically Brazil, Iran and Turkey before being stopped by judge Loretta Preska, who had ruled previously that the names of all the countries involved should be redacted to retain their secrecy.

    Within a couple of hours of the hearing, the three countries had been identified publicly by Forbes, the Huffington Post and Twitter feeds serving more than a million followers. “I broke into numerous sites and handed over passwords and backdoors that enabled Sabu – and by extension his FBI handlers – to control these targets,” Hammond told the court.

    The 28-year-old hacker has floated the theory in the past that he was used as part of an effective private army by the FBI to target vulnerable foreign government websites, using the informant Sabu – real name Hector Xavier Monsegur – as a go-between. Sabu, who was a leading figure in the Anonymous-affiliated hacking group LulzSec, was turned by the FBI into one of its primary informants on the hacker world after he was arrested in 2011, about six months before the Stratfor website was breached.

    Referring to the hacking of foreign government websites, Hammond said that in one instance, he and Sabu provided details on how to crack into the websites of one particular unidentified country to other hackers who then went on to deface and destroy those websites. “I don’t know how other information I provided to [Sabu] may have been used, but I think the government’s collection and use of this data needs to be investigated,” he told the court

    He added: “The government celebrates my conviction and imprisonment, hoping that it will close the door on the full story. I took responsibility for my actions, by pleading guilty, but when will the government be made to answer for its crimes?”

    Hammond’s 10-year federal prison service makes it one of the longest punishments dished out for criminal hacking offences in US history. It joins a lengthening line of long jail terms imposed on hackers and whistleblowers as part of the US authorities’ attempt to contain data security of government agencies and corporations in the digital age.

    Preska also imposed a three-year period of probationary supervision once Hammond is released from jail that included extraordinary measures designed to prevent him ever hacking again. The terms of the supervision state that when he is out of prison he must: have no contact with “electronic civil disobedience websites or organisations”; have all his internet activity monitored; subject himself to searches of his body, house, car or any other possessions at any time without warrant; and never do anything to hide his identity on the internet.

    Hammond’s 10-year sentence was the maximum available to the judge after he pleaded guilty to one count of the Computer Fraud and Abuse Act (CFAA) relating to his December 2011 breach of the website of the Austin, Texas-based private intelligence company Strategic Forecasting, Inc. Delivering the sentence, Preska dismissed the defendant’s explanation of his motivation as one of concern for social justice, saying that he had in fact intended to create “maximum mayhem”. “There is nothing high-minded and public-spirited about causing mayhem,” the judge said.

    She quoted from comments made by Hammond under various internet handles at the time of the Stratfor hack in which he had talked about his goal of “destroying the heart, hoping for bankruptcy, collapse”. She criticised what she called his “unrepentant recidivism – he has an almost unbroken record of offences that demonstrate an almost total disrespect for the law.”

    Before the sentence came down, Hammond read out an outspoken statement to court in which he said he had been motivated to join the hacker group Anonymous because of a desire to “continue the work of exposing and confronting corruption”. He said he had been “particularly moved by the heroic actions of Chelsea Manning, who had exposed the atrocities committed by US forces in Iraq and Afghanistan. She took an enormous personal risk to leak this information – believing that the public had a right to know and hoping that her disclosures would be a positive step to end these abuses.”

    In his own case, he said that as a result of the Stratfor hack, “some of the dangers of the unregulated private intelligence industry are now known. It has been revealed through Wikileaks and other journalists around the world that Stratfor maintained a worldwide network of informants that they used to engage in intrusive and possibly illegal surveillance activities on behalf of large multinational corporations.”

    Margaret Kunstler, a prominent member of the Hammond’s defence team, told the Guardian after the sentencing that the maximum punishment was “not a great surprise”. She said that Preska had turned Hammond’s own comments in web chats against him, “but I think she doesn’t understand the language that’s used in chat rooms and the internet – for her to have used such language against him and not understand what his comments meant seemed piggy to say the least.”

    • This article was amended on 17 November 2013. An earlier version incorrectly described Margaret Kunstler as Hammond’s lead defence lawyer.

    Ed Pilkington in New York
    theguardian.com, Friday 15 November 2013 20.22 GMT

    Find this story at 15 November 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Jeremy Hammond: Stung or entrapped? The case of the Stratfor hacker raises troubling questions about FBI’s involvement in catching or creating crime

    On the day he learned he was to spend 10 years in federal prison for his involvement in an Anonymous hack, 28-year-old Jeremy Hammond read a statement to the Manhattan court. As well as framing his hacktivism as a public service, aimed at revealing the shadier operations of corporate intelligence firms, Hammond told the court that the FBI had played a significant role in cyberattacks in which he had participated, using infamous Anonymous snitch Sabu to provide information to hackers.

    Hammond specifically noted that the FBI informant had provided him with information on vulnerabilities within the official websites of various governments around the world, including Brazil, Syria, Iran and Turkey. (The names of the nations were redacted from the court statement, but soon emerged online.)

    Hammond stated: “I broke into numerous sites and handed over passwords and back doors that enabled Sabu — and by extension his FBI handlers — to control these targets … The government celebrates my conviction and imprisonment, hoping that it will close the door on the full story. I took responsibility for my actions, by pleading guilty, but when will the government be made to answer for its crimes?”

    The hackivist’s contention here is that the U.S. government used hackers to garner information on, and cyber-advantage over, foreign governments. The hackers were then condemned as criminal, having unwittingly performed services for the U.S. government through illegal hacks. Whether or not the targets provided by Sabu were actually of interest to U.S. national intelligence, or whether they were simply valueless sting bate for hackers is unclear. What is evident, however, is that without government assistance, a number of illegal hacks would not have been carried out as they were. The decades-old question thus arises of when a government sting crosses the boundary into entrapment. In the years since 9/11, little more than a faint line in the sand seems to distinguish (legal) stings and (illegal) entrapment operations by the FBI.
    advertisement

    The criterion purportedly dividing sting and entrapment operations is weak. An operation counts as a sting (as opposed to entrapment) if it can be shown that a suspect would have carried out the crime, given the chance. It’s a perverse logic of hypotheticals when the government provides all the conditions for a crime to take place (e.g., providing talented hackers with government targets) — conditions that would not have been in place otherwise. A number of recent FBI cases relating to political activism have reeked of entrapment, but have been framed as stings. Recall, for example, the group of young Cleveland anarchists, strung along by an FBI agent into agreeing on a plan to blow up a bridge. The young men were, at every turn, prompted and offered materials by an FBI informant. “The alleged terrorist masterminds end up seeming, when the full story comes out, unable to terrorize their way out of a paper bag without law enforcement tutelage,” noted Rick Perlstein on the case in Rolling Stone last year.

    Hammond’s case is different. The 28-year-old is a smart, articulate and experienced activist and hacker. As his guilty plea made clear, he knew what he was doing and he acted in what he felt was the public interest, to expose and hold accountable the private intelligence industry. However, Hammond also engaged in wholly government-prompted hacks and is now being ferociously punished. If it can be shown that the U.S. government used information gathered by hackers on Sabu’s tips, crucial questions arise about why the hackers and not the government agencies that used their skills are being persecuted. If, however, Sabu’s information about foreign government sites’ vulnerabilities were no more than a lure, questions of entrapment should be raised. Either way, as Hammond begins his lengthy federal prison sentence for a nonviolent crime, through which he received no personal enrichment, the FBI’s role in catching the hacktivist deserves greater scrutiny.

    monday, Nov 18, 2013 05:51 PM +0100
    Natasha Lennard

    Find this story at 18 November 2013

    © 2013 Salon Media Group, Inc.

    Jailed Anonymous hacker Jeremy Hammond: ‘My days of hacking are done’

    Hammond calls his 10-year sentence a ‘vengeful, spiteful act’ by US authorities eager to put a chill on political hacking

    ‘I knew when I started out with Anonymous that being put in jail and having a lengthy sentence was a possibility,’ Hammond said. Photo: AP

    Jeremy Hammond, the Anonymous hacktivist who released millions of emails relating to the private intelligence firm Stratfor, has denounced his prosecution and lengthy prison sentence as a “vengeful, spiteful act” designed to put a chill on politically-motivated hacking.

    Hammond was sentenced on Friday at federal court in Manhattan to the maximum 10 years in jail, plus three years supervised release. He had pleaded guilty to one count under the Computer Fraud and Abuse Act (CFAA) flowing from his 2011 hack of Strategic Forecasting, Inc, known as Stratfor. In an interview with the Guardian in the Metropolitan Correction Center in New York, conducted on Thursday, he said he was resigned to a long prison term which he sees as a conscious attempt by the US authorities to put a chill on political hacking.

    He had no doubt that his sentence would be long, describing it as a “vengeful, spiteful act”. He said of his prosecutors: “They have made it clear they are trying to send a message to others who come after me. A lot of it is because they got slapped around, they were embarrassed by Anonymous and they feel that they need to save face.”

    Most pointedly, Hammond suggested that the FBI may have manipulated him to carry out hacking attacks on “dozens” of foreign government websites. During his time with Anonymous, the loose collective of hackers working alongside WikiLeaks and other anti-secrecy groups, he was often directed by a individual known pseudonomously on the web as “Sabu”, the leader of the Anonymous-affiliated group Lulzsec, who turned out to be an FBI informant.

    Hammond, who is under court orders restricting what he says in public, told the Guardian that Sabu presented him with a list of targets, including many foreign government sites, and encouraged him to break into their computer systems. He said he was not sure whether Sabu was in turn acting on behalf of the FBI or other US government agency, but it was even possible that the FBI was using Sabu’s internet handle directly as contact between the two hackers was always made through cyberspace, never face-to-face.

    “It is kind of funny that here they are sentencing me for hacking Stratfor, but at the same time as I was doing that an FBI informant was suggesting to me foreign targets to hit. So you have to wonder how much they really care about protecting the security of websites.”

    In the interview, conducted in a secure prison meeting room hours before the 28-year-old Chicagoan was sentenced, he was sanguine about his prospects. “I knew when I started out with Anonymous that being put in jail and having a lengthy sentence was a possibility. Given the nature of the targets I was going after I knew I would upset a lot of powerful people.”

    Dressed in a brown prison jump suit, and with a long wispy goatee and moustache (he planned to shave both off before the sentencing hearing), Hammond was scathing about the way the CFAA was being twisted in his view for political ends. “They are widening the definition of what is covered by the Act and using it to target specifically political activists,” he said.

    He invoked the memory of Aaron Swartz, the open-data crusader who killed himself in January while awaiting trial under the CFAA for releasing documents from behind the subscription-only paywall of an online research group. “The same beast bit us both,” Hammond said. “They went after Aaron because of his involvement in legitimate political causes – they railroaded charges against him, and look what happened.”

    Hammond has been in custody since March 2012 having been arrested in Chicago on suspicion of the Stratfor leak of millions of emails that were eventually released by WikiLeaks as the Global Intelligence Files. His sentence is an indication of the aggression with which prosecutors have been pursuing political hackers in the US – other Anonymous members in Britain involved in the breach of Stratfor were sentenced to much shorter jail terms.

    Hammond stressed that he had not benefitted personally in any way from the Stratfor email release, that exposed surveillance by private security firms on activists including Anonymous members themselves, Occupy protesters and campaigners in Bhopal, India involved in the push for compensation for victims of the 1984 industrial catastrophe. “Our main purpose in carrying out the Stratfor hack was to find out what private security and intelligence companies were doing, though none of us had any idea of the scale of it.”

    Paradoxically, Hammond insists that he would never have carried out the breach of Stratfor’s computer system had he not been led into doing it by Sabu – real name Hector Xavier Monsegur – the fellow hacker who is himself awaiting sentencing having pleaded guilty to 12 hacking-related criminal charges. “I had never heard of Stratfor until Sabu brought in another hacker who told me about it. Practically, I would never have done the Stratfor hack without Sabu’s involvement.”

    Hammond discovered that Monsegur was an FBI informant the day after his own arrest. As he was reading the criminal complaint against him, he saw quotes marked CW for “co-operating witness” that contained details that could only have come from Sabu.

    “I felt betrayed, obviously. Though I knew these things happen. What surprised me was that Sabu was involved in so much strategic targeting, in actually identifying targets. He gave me the information on targets.”

    Part of Sabu’s interest in him, he now believes, was that Hammond had access to advanced tools including one known as PLESK that allowed him to break into web systems used by large numbers of foreign governments. “The FBI and NSA are clearly able to do their own hacking of other countries. But when a new vulnerability emerges in internet security, sometimes hackers have access to tools that are ahead of them that can be very valuable,” he said.

    Looking back on his involvement with anonymous, the Chicagoan said that he had been drawn to work with Anonymous, because he saw it as “a model of resistance – it was decentralised, leaderless.” He grew increasingly political in his hacking focus, partly under the influence of the Occupy movement that began in Wall Street in September 2011 and spread across the country.

    Chelsea Manning, the US soldier formerly known as Bradley who leaked a massive trove of state secrets to WikiLeaks now serving a 35-year sentence in military jail, was a major influence on him. Manning showed him that “powerful institutions – whether military or private security firms – are involved in unaccountable activities that the public is totally unaware of that can only be exposed by whistleblowers and hackers”.

    Hammond has often described himself as an anarchist. He has a tattoo on his left shoulder of the anarchy symbol with the words: “Freedom, equality, anarchy”. Another tattoo on his left forearm shows the Chinese representation of “leader” or “army”, and a third tattoo on his right forearm is a glider signifying the hacking open-source movement that is drawn from the computer simulation Game of Life .

    He says he plans to use his time in prison “reading, writing, working out and playing sports – training myself to become more disciplined so I can be more effective on my release”. As to that release, he says he cannot predict how he will be thinking when he emerges from jail, but doubts that he would go back to hacking. “I think my days of hacking are done. That’s a role for somebody else now,” he said.

    Ed Pilkington in New York
    theguardian.com, Friday 15 November 2013 17.12 GMT

    Find this story at 15 November 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    A Conversation With Jeremy Hammond, American Political Prisoner Sentenced to 10 Years

    Jeremy Hammond, the Chicago activist and hacktivist (an activist who uses computer networks for political
    protests and other actions), was sentenced last week to 10 years in prison and three years of supervised release for hacking into the intelligence contractor Strategic Forcasting (or Stratfor) and other government, law enforcement and military suppliers’ websites.

    The Stratfor hack resulted in a cache of 5.2 million leaked emails and account information for approximately 860,000 Stratfor subscribers and clients, including information from 60,000 credit cards. To list a few of the many revelations, the emails revealed domestic spying on activists, including Occupy Wall Street; surveillance through persona management programs or fake online personas (“sock puppets”); and attempts to link American activist and journalist Alexa O’Brien to al-Qaeda. The Stratfor hack pullled back the curtain on the ofttimes illegal goings-on in the shadowy world of intelligence contractors.

    Mr. Hammond’s supervised release includes limited computer access and prohibits him using encryption and from associating with civil disobedience groups. The ban on encryption shows a fundamental misunderstanding of how the Internet works. Encryption is used in nearly every online transaction, such as email, social networking and online banking. The broad ban on freedom of association raises potential Constitutional issues. At the time of his arrest, Mr. Hammond was working under the banner of AntiSec, an offshoot of the hacktivist collective Anonymous.

    Jeremy Hammond, American Political Prisoner, courtesy of @FreeAnons.

    The packed courtroom looked more like a church wedding than a sentencing, with dozens of Westpoint cadets on a field trip sitting on the left and Mr. Hammond’s parents, friends and supporters — who caravanned from all over the U.S. to show solidarity for their fallen comrade — sitting on the right. Mr. Hammond, his attorneys, Sarah, Emily and Margaret Kunstler and Susan Kellman faced the stoic Judge Loretta Preska presiding over the solemn ceremony.

    On September 10th I visited Jeremy Hammond at Manhattan Correctional Center where he had been incarcerated for 18 months. Mr. Hammond, who was denied bail, was also disallowed all visitors, including family members. I am the first journalist with whom Mr. Hammond met since his arrest in March 2012. This interview was held months before sentencing. At the request of Mr. Hammond’s attorneys, who feared his words would be used at sentencing against him, I delayed publishing.
    ____________________________

    Vivien Lesnik Weisman: You are both a boots on the ground activist and a hacktivist. Can you explain hacktivisim, hacking for political purposes and off line activism?

    Jeremy Hammond: Hackers are by nature critical of systems, hacking is activism. The very act of hacking is inherently activist and political.

    VLW: How effective is activism without the added thread of technology, or hacktivism, in the modern world? Which is more effective?

    JH: Hacking is never going to take the place of grassroots community organizing. They complement each other.

    There is more to it of course than hacking. Hacktivism involves online social networking, sharing ideas. Protest is predictable; they know how to contain it. The government knows how to ignore it. Both direct action and civil disobedience are unpredictable. I’m all for it.

    I see hacktivism as a direct action tool. Offensive hacking with political intent is really nothing more than one more direct action tool. What you do when you get the information is what determines its efficacy as a direct action tool.

    And now because of the state of the world — foreclosures, the wars — hackers are becoming politicized. We break into systems and then movements like Occupy deliver the message. It all works together. There is street protest. There is direct action, and hacking is one more tool.

    Subverzo, hacktivist, at post-sentencing rally, Foley Square. Photo credit: Still from The Reality Wars, A.J. Abucay DP

    VLW: How did the decision to target the intelligence contractor, Stratfor, come about and what was your involvement?

    JH: Another hacker, who has not been indicted and therefore I will not name, brought the vulnerability. He had the credit cards already, before I ever got involved, on the Dec 5th. He chose Stratfor and brought it to us. There were 12 of us in the IRC (chat room) at that time.

    Stratfor was chosen by that hacker because Stratfor had targeted Anonymous and specifically #OpCartel (Anonymous action against Mexican drug cartels).

    Then the 12 of us in a private IRC channel approved it on the merits, as a meritocracy, the Anon way.

    None of the 12 in that chat room that included me and Sabu [hacker leader turned FBI informant] have ever been caught.

    Amongst the 12 were not only hackers. Some were social media types who brought attention to the actions.

    I did the Stratfor hack all by myself except for the original vulnerability. I was the main hacker in Anti-Sec.

    Sabu refers to Hetcor Xavier Monsegur, hacker and leader of LulzSec, an offshoot of Anonymous. LulzSec was an elite hacker collective that obtained notoriety as much for their high profile targets as for their clever self-promotion. Sabu was arrested by the FBI and began working for them that day. The following day he announced the formation of AntiSec, “the biggest unified collective of hackers in history.” Both in private IRC and through his various public Twitter accounts he encouraged hackers to join AntiSec and commit hacking crimes. Many hacktivists and rights organizations see these — including the Statfor hack — as government created crimes given that Sabu was working for his FBI handlers at the time he was inciting hackers to join AntiSec. After Sabu was turned, all of his actions can be seen as government actions. In essence, the name Sabu and the government can be used interchangeably in this context.

    He is responsible for the arrests of many Anons including Jeremy Hammond.

    Hector Xavier Monsegur Jr, hacker known by his nom de guerre Sabu, FBI informant.

    VLW: Did you ever suspect that Sabu was a Fed (FBI informant) before that became public?

    JH: I was in a chat room with 12 hackers. Chances are someone in there was a Fed. I don’t work with anyone who has not taken risks alongside me. Sabu had taken risks and hacked himself. Still, I could have done this all on my own. I was the main hacker in Anti-Sec.

    VLW: And that hacker who provided the exploits also came with the credit cards? And were the credit cards live?

    JH: Yes. The credit cards were live. We all spoke on Dec 6th and planned a coordinated day of action when we would choose charities and use the credit cards to make donations for Christmas to these charities, Christmas donations.

    VLW: LulzXmas?

    JH: Yes.

    Jeremy Hammond is often referred to as a digital Robin Hood for his participation in LulzXmas. Margaret Ratner Kunstler, Hammond’s attorney, clarified that her client did not himself make any donations or use the credit cards. He also did not personally profit from the hacked credit cards.

    JH: But our main focus was the emails, to reveal the spying. Stratfor was spying on the world. We revealed the anti-WikiLeaks actions by Stratfor. Stratfor was spying on Occupy Wall Street, WikiLeaks, and Anonymous.

    We didn’t even know about the Venezuelan coup discussions proving U.S. involvement in the attempted coup until we saw that in the Strafor emails later.

    It was all revealed on WikLeaks but I had moved on. I’d rather be hacking.

    [He smiles.]

    VLW: There is speculation that the Stratfor hack was designed by the government and carried out by their informant Sabu as an attempt to entrap Julian Assange by getting him to solicit information or even sell him information. Were you aware of such a plan and if so did you make a conscious decision to foil that plan by dumping on the Pirate Bay before the transaction could be completed?

    JH: No, that did not happen. Julian Assange and WikiLeaks was not a factor.

    In fact, many hacktivists make the claim that the Stratfor hack was designed to entrap Julian Assange. Hammond is not necessarily in a position to know whether that was the case or not.

    VLW: Stratfor was notified by the government that they had been penetrated and told to do nothing. Why did they allow Stratfor to be sacrificed?

    JH: We do not know to what degree they notified Stratfor. Interesting question, but we don’t know.

    VLW: Why did the Stratfor hack take so long to complete? And why destroy the servers?

    JH: I had to get to the mail servers. It takes time. We always destroy the servers.

    First you deface, then you take the information, then you destroy the server, for the Lulz [for fun], and so they can’t rebuild the system. We don’t want them to rebuild. And to destroy forensic information that could be used to find out who did it and how it was done.

    VLW: What are your preferred targets?

    JH: My preferred targets are military contractors, military suppliers and law enforcement.

    VLW: Intelligence contractors like Stratfor?

    JH: Tech intelligence firms are a preferred target. Tech firms — where white hat hackers are paid to target the 99% for their corporate overlord clients.

    Chris Hedges, journalist, TruthDig columnist, speaks at Hammond Rally. Photo credit: Still from The Reality Wars, A.J. Abucay DP

    Those firms also contain the keys to their corporate clients so there is a big payoff — Endgame Systems and Palantir, for example.

    Endgame Systems is the subject of much discussion. Engame Systems is self-described as providing offensive and defensive vulnerability research, mitigation of cyber-threats and cyber operations platforms. It is in the business of selling “zero day exploits.” That is, the vulnerabilities that have not yet been detected. According to a Business Week article, these zero day exploits are militarized and include entire blueprints of the computer systems of airports and other critical infrastructure including that of our western allies for example Paris’s Charles De Gaulle Airport. It is difficult to see how the sale of these exploits makes us more secure.

    A package of these zero day exploits can be purchased for 2.5 million dollars a year. The price list was revealed in a cache of emails in the HBGary hack, an earlier Anonymous operation. Endgame weaponry is sold by region — China, the Middle East, Russia, Latin America, and Europe. There are even target packs for European and other allies. That raises the question of whether these exploits are being sold to foreign actors. Even if not sold directly to enemies of the U.S., cyber munitions like conventional arms have a way of showing up in unintended places. Once these exploits are out there they are vulnerable to rouge hackers and rogue states.

    JH: White hat hackers are being paid to do supposedly defensive actions but they are offensive. White hat hackers are supposed to identify a vulnerability and then announce. But instead they sell the vulnerability, the exploits. So if you hack for the thrill it’s not ok. But for money, like Endgames, then somehow it is. And instead of going to jail for hacking you get awarded a government contract.

    At least, the NSA is supposed to — and that is a big “supposed to” — have some kind of government oversight and again that’s overstated; these government contractors, intel firms and tech firms like Stratfor have no oversight whatsoever. They are not bound by any laws. They are above the law. No FOIA (request for classified or other non-public information from the government under the Freedom Of Information Act) can compel them to reveal what they do. Rogue hackers have better access to vulnerabilities than government hackers.

    VLW: That reminds me of The Conscience of a Hacker by the Mentor. Did you read that?

    Known as the Hacker Manifesto, it could just be Jeremy Hammond’s ethos.

    It reads:
    You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it’s for our own good, yet we’re the criminals.

    Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like.

    My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can’t stop us all… after all, we’re all alike.

    JH: From the 90’s? You hate me because I’m better than you are. Yeah, yeah.

    [He smiles.]

    Citizen journalist/activist and Hammond supporter Tara Jill Livestreams outside the court house. Photo credit: Still from The Reality Wars, A.J. Abucay DP

    VLW: What do you think about the new battlefield, or cyberwarfare?

    JH: The government calls it cybersecurity, but it’s really offensive hacking not just defensive.

    The Department of Defense deals in war and aggression but it is not called Department of War is it? The government calls what they do mitigation of the threat of a cyber offensive. But these are offensive acts. They are acts of war. This is the new terrain. The new battlefield.

    The war is on and it’s for the Internet. They spy on us, they spy on others, intellectual property rights wars, censorship….

    For example, when encryption first came out PGP (Pretty Good Privacy, the first publicly available encryption software) it was called a munition and they immediately tried to ban it.

    Encryption is part of our arsenal. It trumps the surveillance state.

    As Mr. Hammond was waiting to be handcuffed in order for me to be escorted out of the small room at Manhattan Correctional Center where Mr. Hammond and I had conversed for over 4 hours, I asked him one last question.

    VLW: You want to challenge the political system in the US and the world with technology. Is technology your weapon in the same way rifles were weapons in the past? Are you willing to die for your cause?

    Handcuffed and standing before me with the guard awaiting my exit he pondered the question. As the guard ushered me out he responded.

    JH: Die for my cause? Yes.
    Go to prison, die for my cause… or choose to live a life of submission.
    ____________________________

    Mr. Hammond’s bold and principled stand is sure to inspire others to make a similar choice.

    This is part one of a two part article.

    I am currently working on The Reality Wars, a feature length documentary about the targeting of activists, hacktivists and journalists by the US government and the nexus between intelligence contractors and the surveillance state. Jeremy Hammond and the Stratfor hack are covered in my film.

    Posted: 11/19/2013 10:18 am

    Find this story at 19 November 2013

    © 2013 TheHuffingtonPost.com, Inc.

    Cyber-Activist Jeremy Hammond Sentenced to 10 Years In Prison; The hacker, who pleaded guilty in May, is given the maximum sentence by a federal judge

    Cyber-activist Jeremy Hammond was sentenced to 10 years in federal prison this morning by Judge Loretta A. Preska in a federal courtroom in lower Manhattan for hacking the private intelligence firm Stratfor. When released, Hammond will be placed under supervised control, the terms of which include a prohibition on encryption or attempting to anonymize his identity online.

    Hammond has shown a “total lack of respect for the law,” Judge Preska said in her ruling, citing Hammond’s criminal record – which includes a felony conviction for hacking from when he was 19 – and what she called “unrepentant recidivism.” There is a “desperate need to promote respect for the law,” she said, as well as a “need for adequate public deterrence.”

    Read ‘Enemy of the State,’ Our 2012 Feature on Jeremy Hammond’s Rise and Fall

    As Hammond was led into the courtroom, he looked over the roughly 100 supporters who had shown up, smiled, and said, “What’s up, everybody?” Prior to the verdict, he read from a prepared statement and said it was time for him to step away from hacking as a form of activism, but recognized that tactic’s continuing importance. “Those in power do not want the truth exposed,” Hammond said from the podium, wearing black prison garb. He later stated that the injustices he has fought against “cannot be cured by reform, but by civil disobedience and direct action.” He spoke out against capitalism and a wide range of other social ills, including mass incarceration and crackdowns on protest movements.

    The Stratfor hack exposed previously unknown corporate spying on activists and organizers, including PETA and the Yes Men, and was largely constructed by the FBI using an informant named Hector Monsegur, better known by his online alias Sabu. Co-defendants in the U.K. were previously sentenced to relatively lighter terms. Citing Hammond’s record, Judge Preska said “there will not be any unwarranted sentencing disparity” between her ruling and the U.K. court’s decision.

    Hammond’s supporters and attorneys had previously called on Judge Preska to recuse herself following the discovery that her husband was a victim of the hack she was charged with ruling on. That motion was denied. (Full disclosure: This reporter previously spoke at a rally calling on Judge Preska to recuse herself.)

    Hammond’s defense team repeatedly stressed that their client was motivated by charitable intentions, a fact they said was reflected in his off-line life as well. Hammond has previously volunteered at Chicago soup kitchens, and has tutored fellow inmates in GED training during his incarceration.

    Rosemary Nidiry, speaking for the prosecution, painted a picture of a malicious criminal motivated by a desire to create “maximum mayhem,” a phrase Hammond used in a chat log to describe what he hoped would come from the Stratfor hack. Thousands of private credit card numbers were released as a result of the Stratfor hack, which the government argued served no public good.

    Sarah Kunstler, a defense attorney for Hammond, takes issue with both the prosecution and judge’s emphasis on the phrase “maximum mayhem” to the exclusion of Hammond’s broader philosophy shows an incomplete picture. “Political change can be disruptive and destructive,” Kunstler says. “That those words exclude political action is inaccurate.”

    Many supporters see Hammond’s case as part of a broader trend of the government seeking what they say are disproportionately long sentences for acts that are better understood as civil disobedience than rampant criminality. Aaron Swartz, who faced prosecution under the Computer Fraud and Abuse Act – the same statute used to prosecute Hammond – took his own life last year, after facing possible decades in prison for downloading academic journals from an MIT server. “The tech industry promised open access and democratization,” says Roy Singham, Swartz’s old boss and executive chairman of ThoughtWorks, a software company that advocates for social justice. “What we’ve given the world is surveillance and spying.” Singham says it’s “shameful” that “titans of the tech world” have not supported Hammond.

    Following his first conviction for hacking, Hammond said, he struggled with returning to that life, but felt it was his responsibility. That decision ultimately lead to the Stratfor hack. “I had to ask myself, if Chelsea Manning fell into the abysmal nightmare of prison fighting for the truth, could I in good conscience do any less, if I was able?” he said, addressing the court. “I thought the best way to demonstrate solidarity was to continue the work of exposing and confronting corruption.”

    by John Knefel
    NOVEMBER 15, 2013

    Find this story at 15 November 2013

    ©2013 Rolling Stone

    105 Years in Jail for Posting a Link? That’s what Barrett Brown is facing.

    A few months ago [1] I passed along the story of Barrett Brown, a young journalist/activist who relentlessly followed up on documents leaked by Anonymous, was targeted for this by the FBI, and who was eventually harassed enough that he cracked—which took the unfortunate form of recording a YouTube rant promising to “destroy” one of his tormentors.

    Brown was indicted for posting the YouTube threats, and there’s no question that it was an ill-advised rant regardless of the FBI instigation. But David Carr follows up with more today. It turns out that only three of the charges against Brown are related to the video. Twelve more are related to a link he posted in a chat room: [2]

    In December 2011, approximately five million e-mails from Stratfor Global Intelligence, an intelligence contractor, were hacked by Anonymous and posted on WikiLeaks. The files contained revelations about close and perhaps inappropriate ties between government security agencies and private contractors. In a chat room for Project PM, Mr. Brown posted a link to it.

    Among the millions of Stratfor files were data containing credit cards and security codes, part of the vast trove of internal company documents….According to one of the indictments, by linking to the files, Mr. Brown “provided access to data stolen from company Stratfor Global Intelligence to include in excess of 5,000 credit card account numbers, the card holders’ identification information, and the authentication features for the credit cards.”

    ….But keep in mind that no one has accused Mr. Brown of playing a role in the actual stealing of the data, only of posting a link to the trove of documents….“The YouTube video was a mistake, a big one,” said Gregg Housh, a friend of Mr. Brown’s who first introduced him to the activities of Anonymous. “But it is important to remember that the majority of the 105 years he faces are the result of linking to a file. He did not and has not hacked anything, and the link he posted has been posted by many, many other news organizations.”

    This is almost a textbook case of prosecutorial overreach. As Carr points out, the guy who actually stole the Stratfor information is facing a sentence of only ten years. So why is Brown facing 105 years? Certainly not for a video posted while he was in withdrawal from heroin addiction. More likely, it’s because the government considers him a thorn in their side and wants to send a message to anyone else planning to follow in Brown’s footsteps. That just ain’t right. As Carr says, “Punishment needs to fit the crime and in this instance, much of what has Mr. Brown staring at a century behind bars seems on the right side of the law, beginning with the First Amendment of the Constitution.”

    Links:
    [1] http://www.motherjones.com/kevin-drum/2013/03/barrett-brown-and-fbi
    [2] http://www.nytimes.com/2013/09/09/business/media/a-journalist-agitator-facing-prison-over-a-link.html?ref=business&pagewanted=all

    By Kevin Drum | Mon Sep. 9, 2013 8:47 AM PDT
    Social Title:
    105 years in jail for posting a link?

    Find this story at 9 September 2013

    Copyright ©2013 Mother Jones and the Foundation for National Progress.

    Barrett Brown’s Mother Will Be Sentenced Today

    The mother of Anonymous-affiliated activist Barrett Brown, Karen Lancaster McCutchin, will be sentenced today, November 8, the Associated Press reports.

    Back in May, she admitted to helping her son hide two laptops from federal agents that were investigating the activist. The laptops were hidden in a kitchen cabinet just as FBI agents were executing a search warrant.

    As per the plea agreement, McCutchin faces up to 12 months in prison and a fine of up to $100,000 (€75,000).

    In the meantime, the case of Barrett Brown continues. He is accused, among other things, of threatening a federal agent in a video published on YouTube, and posting links to information stolen by Anonymous hackers from the think tank Stratfor.

    He faces up to 105 years in prison and substantial fines.

    November 8th, 2013, 13:49 GMT · By Eduard Kovacs, November 8, 2013 [AP]

    Find this story at 8 November 2013

    © 2001 – 2013 Softpedia. All rights reserved.

    Moscow Denies U.S.-Based Diplomat Sought Young Spies

    Moscow has angrily denied that one of its diplomats in Washington tried to recruit young Americans to spy for Russian intelligence agencies, calling the allegations a “horror story” reminiscent of the Cold War.

    The spy flap centering around the 59-year-old head of a Kremlin-funded cultural exchange program raises the specter of a new dispute rocking already stormy relations between Russia and the U.S.

    The FBI is investigating whether Yury Zaitsev, head of the Russian Center for Science and Culture, is a Russian intelligence officer who arranged all-expense-paid trips to Russia aimed at grooming young Americans, including students, political aides, nonprofit sector workers and business executives, according to Mother Jones magazine, which first broke the story.

    The Russian Embassy in Washington and Zaitsev himself rejected the allegations and expressed concern that unknown people were trying to ruin efforts by Presidents Barack Obama and Vladimir Putin to mend and expand ties.

    “It’s a shame that Russian-American relations periodically echo the Cold War,” Zaitsev, who refused to speak to Mother Jones on the issue, said late Wednesday in an interview with state news agency Itar-Tass. “Someone apparently wants to see the Iron Curtain fall between our two countries once again.”

    “This kind of horror story very much resembles the Cold War era,” embassy spokesman Yevgeny Khorishko said in a statement released to Russian media. “A blunt attempt is being made to distort and discredit the activities of the Russian cultural center, which focuses on developing trust and cooperation between our two countries and people.”

    He warned that “somebody intends to torpedo” a goal set by Obama and Putin at a Group of Eight summit in June to expand direct contracts between Americans and Russians so as to raise relations to a new level.

    But Khorishko vowed that Moscow would not be deterred by the spy allegations. ”The Russian cultural center has been working to expand contacts and improve understanding between Russian and American citizens and will continue to do this work,” he said.

    The Russian center is housed in a 1895 mansion purchased by Moscow in 1957. (rccusa.org)

    Mother Jones and other U.S. media reported that FBI officials had met with people who traveled to Moscow and St. Petersburg on trips organized by the Russian cultural center and quizzed them on whether Zaitsev worked for Russian intelligence and whether any attempts had been made to recruit them during their stay. The media reports, citing trip participants, said all had denied that the Russians had sought to recruit them.

    The FBI refused to comment on whether it had opened an investigation into Zaitsev.

    Zaitsev has diplomatic immunity, so U.S. prosecutors could not press charges against him if the FBI were to conclude that he broke the law. But the State Department could withdraw his immunity, forcing the Russian Foreign Ministry to recall him to Moscow.

    The cultural center has brought 128 Americans on “short-term, fact-finding trips” to Russia since the exchange program was created under a presidential decree in 2011, according to program information on the center’s website. The global program, which seeks participants aged 25 to 35, has also invited 1,219 people from other countries, including 283 from Europe, 157 from Asia and the Middle East, 29 from Africa and South America and 750 from other former Soviet republics.

    About 25 people participated in each trip from the U.S., and they stayed at five-star hotels and met with senior politicians like the mayors of Moscow and St. Petersburg and Federation Council Deputy Speaker Alexander Torshin, Mother Jones said.

    Zaitsev, a St. Petersburg native, said in the interview that trip participants were being targeted in a “witch hunt” rooted in a U.S. fear of Russia. “I think it is simply unacceptable that they are ordered to tell what, why, how and why,” he said.

    In a reminder of lingering suspicions in both countries, Zaitsev pointed out that the U.S. government also organizes exchange programs that bring young Russians to the United States, and he insisted that his program was as transparent as any of those. “All of the information about our programs and projects is publicly available on our website,” he said.

    Zaitsev’s path to Washington is not clear from his organization’s website. He received a doctorate in economics from the Leningrad Technological Institute in 1980 and then worked in several government-run student organizations until the Soviet collapse, according to his online biography. He worked in unspecified “leadership positions in private companies” from 1992 until he was appointed head of the cultural center in July 2010. He is married and has one adult son.

    The center’s second floor has a space library focusing on Russian-U.S. cooperation. (rccusa.org)

    But Zaitsev faces a formidable task. Relations between the Russia and the U.S. have soured since Putin returned to the presidency last year, with Washington deploring a Kremlin crackdown on the opposition and a ban on U.S. parents adopting Russian children. Moscow for its part has assailed the U.S. Magnitsky blacklist of Russian officials accused of human rights violations.

    The tensions have cast a shadow over yearlong events mean to celebrate the 80th anniversary of diplomatic relations.

    The Russian cultural center, also known as Rossotrudnichestvo, is “the official home of Russian culture in the United States” and was created in 2001 under a bilateral agreement aimed at fostering relations, according to its website.

    It is housed in a 1895 mansion located 20 minutes by foot from the White House that the Soviet government bought in 1957 and used for the embassy’s consular services for 40 years.

    The first floor contains the Moscow Room, decorated in cream and gold leaf and with paintings of the Bolshoi Theater, the Kremlin, Moscow State University and Christ the Savior Cathedral; as well as the Hall of Mirrors, with two gala portraits of Peter the Great and Catherine the Great; and the Russian-American Room, with a colorful panorama depicting key moments in Russian-American relations.

    The second floor hosts the Pushkin Library, with more than 2,000 books, 300 movies on video and DVD and more than 100 audiobooks; a space library focusing on Russian-U.S. cooperation in space exploration; and classrooms offering Russian-language lessons.

    The third floor contains two guest rooms, while the basement has a kitchen that prepares meals for the center’s receptions and offers classes on Russian cuisine.

    25 October 2013 | Issue 5242
    By Andrew McChesney

    Find this story at 25 October 2013

    © Copyright 1992-2013. The Moscow Times.

    Head of D.C.-based Russian cultural center being investigated as possible spy

    The FBI is investigating whether the U.S.-based director of a Russian government-run cultural exchange program was clandestinely recruiting Americans as possible intelligence assets, according to law enforcement officials.

    FBI agents have been interviewing Americans who participated in the Rossotrudnichestvo exchange program run by Yury Zaytsev, who also heads the Russian Center for Science and Culture in Washington. For the past 12 years, the program has paid for about 130 Americans to visit Russia.

    Latest from National Security
    Senior Navy civilians investigated in alleged fraud

    Craig Whitlock 2:27 AM ET

    Court records show $1.6 million was paid to an auto mechanic who produced rifle silencers for $8,000.
    Two admirals face inquiry in Navy bribery scheme

    Craig Whitlock NOV 9

    The Navy put the pair, including its top intelligence official, on leave and suspended their access to classified material.
    After teenager flees to Syria, family fights to bring him back

    Michael Birnbaum and Souad Mekhennet NOV 12

    A Muslim family living in Germany “kidnaps” the youth, who had jihadi aspirations, close to Syria’s border.
    NSA Secrets

    Full coverage of the revelations and debate surrounding National Security Agency surveillance programs.

    FBI spokeswoman Amy Thoreson declined to comment on whether there was an investigation or to discuss the bureau’s role. A woman who answered the phone at the cultural center said that neither Zaytsev nor the center would comment.

    “We know that the boys and girls are speaking,” said the woman, referring to the young Americans who participated in the program and have been interviewed by the FBI. “There are many. But we shall not put out a comment.”

    “We are clean and transparent, friendly and true,” said the woman, who did not give her name or title.

    The center, at Phelps Place in the Kalorama neighborhood of northwest Washington, offers language lessons and cultural programs, according to its Web site.

    A spokesman for the Russian Embassy in Washington denied that the cultural center was involved in the recruitment of spies.

    “All such ‘scaring information’ very much resembles Cold War era,” the spokesman, Yevgeniy Khorishko, said in an e-mail. He added that such allegations were being leveled only to “distort and to blacken activities of the Russian Cultural Center.”

    The FBI investigation of Zaytsev was first reported by Mother Jones magazine on its Web site.

    Law enforcement officials said the FBI is investigating whether Zaytsev and Rossotrudnichestvo have used trips to Russia to recruit Americans. Rossotrudnichestvo paid for all their expenses, including meals, travel, visa fees and lodging. Most of the trips involved about 25 participants, who sometimes stayed in luxury hotels and met with Russian government officials.

    Zaytsev did not go on the exchange trips, said one law enforcement official, but he created files on some of the participants, allegedly to cultivate them as future intelligence assets. Law enforcement officials would not comment on whether the FBI has any evidence that Zaytsev was successful in recruiting any assets.

    As part of their probe, FBI special agents are trying to interview the Americans who participated in the program, including graduate students, business executives, political aides and nonprofit workers. Rossotrudnichestvo also has cultural exchanges for young people in Europe, Africa, Latin America and Asia.

    Richard Portwood, the executive director of the Center for American-Russian Engagement of Emerging Leaders and a participant in the cultural exchange program, said he was interviewed by the FBI this month and was told that Zaytsev was a foreign intelligence officer.

    “These revelations came as a total surprise,” Portwood said in a statement. “My sincere hope is that Mr. Zaytsev’s alleged activities do not prevent U.S.-Russia cultural exchanges in the future.”

    Portwood, 27, a graduate student at Georgetown University’s School of Foreign Service, said in a telephone interview that he took two trips to Russia through the exchange program, each lasting a little more than a week, in December 2011 and in June 2012. He said the FBI wanted to know what he and others traveling with him did on the trips, whom they met with and whether they saw anything suspicious. Portwood said the trips did not raise any suspicions. But he added: “Cold War spy games have existed for decades between the U.S. and Russia. We’re not naive to that history.”

    Zaytsev, who is on a State Department list of foreign mission staff, has diplomatic immunity, according to an administration official. The United States could revoke his immunity, which would force him to return to Russia, a law enforcement official said.

    By Sari Horwitz, Published: October 23 E-mail the writer
    Nick Anderson contributed to this report.

    Find this story at 23 October 2013

    © 1996-2013 The Washington Post

    FBI Probing Whether Russia Used Cultural Junkets to Recruit American Intelligence Assets

    Did a senior Russian embassy officer set up exchange trips to Moscow to cultivate young, up-and-coming Americans as Russian intelligence assets?

    On September 30, Richard Portwood, a 27-year-old Georgetown University graduate student, received a phone call from an FBI agent who said the bureau wanted to meet with him urgently. Portwood didn’t know why the FBI would have any interest in him, but two days later he sat down with a pair of agents at a coffee shop near his apartment. They told him they suspected that Yury Zaytsev, the US director of a Russian government-run cultural exchange program that Portwood had participated in, was a spy.

    Since 2001, Zaytsev’s organization, Rossotrudnichestvo, has footed the bill for about 130 young Americans—including political aides, nonprofit advocates, and business executives—to visit Russia. Along with Portwood, Mother Jones has spoken to two other Rossotrudnichestvo participants who were questioned by the FBI about Zaytsev, who also heads the Russian Cultural Center in Washington.
    Yury Zaytsev, a Russian diplomat. Multiple sources tell us he is the subject of an extensive FBI investigation. Rossotrudnichestvo

    The FBI agents “have been very up front about” their investigation into whether Zaytsev is a Russian intelligence agent, says a 24-year-old nonprofit worker whom the FBI has interviewed twice and who asked not to be identified. The FBI agents, according to this source, said, “We’re investigating Yury for spying activities. We just want to know what interactions you’ve had with him.” The nonprofit worker was shocked. Zaytsev, he says, is “what you imagine when you imagine a Russian diplomat. He’s fairly stoic, tall, pale.” Zaytsev did not travel on the exchange trips he helped arrange, and his contact with the Americans who went on these trips was limited.

    The agents who interviewed the Rossotrudnichestvo participants did not tell them what evidence they possessed to support their suspicions. FBI spokeswoman Amy Thoreson declined to confirm or deny the existence of an investigation into Zaytsev or answer any questions about FBI actions regarding the Russian. (The FBI did not ask Mother Jones to withhold this story.) But based on what the bureau’s agents said during the interviews, the Americans who were questioned concluded the FBI suspects that Zaytsev and Rossotrudnichestvo have used the all-expenses-paid trips to Russia in an effort to cultivate young Americans as intelligence assets. (An asset could be someone who actually works with an intelligence service to gather information, or merely a contact who provides information, opinions, or gossip, not realizing it is being collected by an intelligence officer.) The nonprofit worker says the FBI agents told him that Zaytsev had identified him as a potential asset. Zaytsev or his associates, the agents said, had begun to build a file on the nonprofit worker and at least one other Rossotrudnichestvo participant who had been an adviser to an American governor.

    Advertise on MotherJones.com

    Many countries—including the United States—place spies abroad under diplomatic cover, and it’s common for law enforcement agencies to keep a close eye on foreign diplomats who might be engaged in espionage. The Americans interviewed by the FBI say the agents did not indicate whether they believed Zaytsev had succeeded in developing Americans as assets.

    The FBI appears to be mounting an extensive investigation of Zaytsev. The three Americans interviewed by the FBI say the agents told them the bureau is trying to interview every American who has attended these trips. The nonprofit worker says that FBI agents went so far as to contact a married couple, who are Rossotrudnichestvo alums, while they were vacationing in Japan. He says the agents told him they were also scouring flight manifests associated with Rossotrudnichestvo trips for names that showed up repeatedly and could be Zaytsev collaborators.

    All three former participants describe their Rossotrudnichestvo experience as a typical cultural exchange program, albeit a ritzy one. The organization paid for meals, travel, lodging, and every other expense associated with the trip, down to the visa fee. During the St. Petersburg leg of a June 2012 trip, participants stayed at the Sokos Hotel Palace Bridge, a luxury hotel that has hosted delegations for the G8 and G20 summits. Participants on that trip met with the governors of Moscow and St. Petersburg and with Aleksander Torshin, a high-ranking member of Vladimir Putin’s United Russia party. Since 2011, Rossotrudnichestvo has organized six trips. Most included about 25 people, although roughly 50 visited Russia during the group’s first trip in December 2011.

    The application process for this exchange program is simple. The application form calls for basic personal details—including the applicant’s place of work and job title—copies of the applicant’s passport, and a one-page letter “briefly outlining why you should be selected, why you are interested and what interests you have in collaboration with Russia.” Applicants tend to find the program through referrals. (Portwood has referred about 50 people to Rossotrudnichestvo. To his knowledge, Rossotrudnichestvo never denied any applicants.) The group also offers similar exchanges to young professionals in Asia, Latin America, Africa, and Europe.

    When I called the Russian Cultural Center last week, Zaytsev answered. He declined to answer questions about the FBI’s investigation on the phone, but he eagerly invited me to visit him at the center two days later. “I welcome any questions you have for me,” he said. When I arrived, though, Galina Komissarova, a center employee, asked me to leave, saying I hadn’t sent questions in advance as Zaytsev had requested. (He hadn’t.) Komissarova would not disclose her title or role at the center. “I just clean,” she said sternly, showing me the door. I discovered later that Komissarova is Zaytsev’s wife.

    Since then, Zaytsev has not replied to written questions or returned repeated phone calls.

    A State Department spokeswoman confirms that Zaytsev is on a list of foreign mission staff who have diplomatic immunity. If it chose to, the United States could revoke his immunity, forcing Russia to call him home.

    Portwood, who attended Rossotrudnichestvo trips in 2011 and 2012, and the other Americans questioned by the FBI were asked a similar set of questions. The agents wanted to know how they had heard about the exchange program and where in Russia they traveled. They also asked whether participants had encountered any anti-American sentiment on their trip, were offered jobs, or had suspicious interactions with Rossotrudnichestvo afterward. Portwood and the two other participants said they answered “no” to these questions.

    According to three Rossotrudnichestvo alums, Zaytsev displayed no suspicious behavior and none developed an ongoing relationship with him after their excursion. For most Rossotrudnichestvo participants, they say, Zaytsev was merely the name on the congratulatory letter they received when they were accepted into the exchange program.

    The third participant who spoke to Mother Jones about the exchange program, a 26-year-old resident of Washington, DC, is not surprised by the FBI’s allegations—and doesn’t care whether he was targeted as a possible intelligence asset. “There’s not a single American diplomat anywhere in the American sphere of influence who doesn’t have an open line of communication with the CIA. … [What Zaytsev is doing] is not something that every other single [foreign] cultural center in DC isn’t also doing,” he says. “And that doesn’t bother me. I don’t have a security clearance. I don’t work for an elected official. I run a social enterprise that has absolutely nothing to do with US-Russia relations.”

    Rossotrudnichestvo’s most recent Russia trip was scheduled for mid-October and it’s unclear whether or not it went forward as planned. After he was questioned by the FBI, Portwood emailed people he had earlier referred to the organization to inform them of what he learned. His email read, in part: “The FBI disclosed to me that Yury Zaytsev is a Russian Foreign Intelligence officer and a professional spy, acting as the Director of the Russian Cultural Center in Washington, D.C.…only so that he can maintain a residence here in the United States. In fact, the FBI alleges that part of Mr. Zaytsev’s mission is sending young professionals from the United States to Russia as part of a cultural program wherein participants are evaluated and/or assessed for Russian counterintelligence purposes.”

    Portwood was disappointed to learn the exchange program may have been a cover for Russian intelligence work. “It passed the smell test,” he says. “But I guess Russia’s Russia, you know?”

    UPDATE, 6:00 p.m. EDT, Wednesday October 23: The Russian Embassy provided the following statement in an email to Mother Jones:

    All such “scaring information” very much resembles Cold War era. A blunt tentative is made to distort and to blacken activities of the Russian Cultural Center in DC, which are aimed at developing mutual trust and cooperation between our peoples and countries. As a matter of fact, somebody intends to torpedo the guidelines of the Russian and U.S. Presidents, whose Joint Statement in Lough Erne emphasizes the importance of “expanding direct contracts between Americans and Russians that will serve to strengthen mutual understanding and trust and make it possible to raise U.S.-Russian relations to a qualitatively new level”.

    Russian Cultural Center has been working to expand contacts and better understanding between Russian and American citizens and will continue this work.

    —By Molly Redden
    | Wed Oct. 23, 2013 3:00 AM PDT | UPDATED Wed Oct. 23, 2013 3:00 PM PDT

    Find this story at 23 October 2013

    Copyright ©2013 Mother Jones and the Foundation for National Progress.

    << oudere artikelen  nieuwere artikelen >>