• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Kiwi spies taught ‘honey trap’ tricks – Snowden documents

    Kiwi spooks were briefed on setting honey traps and internet “dirty tricks” to “control, infiltrate, manipulate, and warp” online discourse, documents leaked by Edward Snowden reveal.

    Government Communications Security Bureau (GCSB) agents – part of the Five Eyes intelligence network – were briefed by counterparts from the ultra-secret Joint Threat Research Intelligence Group. A slide-show presentation, called “The Art of Deception: Training for Online Covert Operations”, was given at a top secret spy conference in 2012.

    It outlined sex and dirty tricks cyber operations used by JTRIG, a unit of the British Signals intelligence agency GCHQ which focused on cyber forensics, espionage and covert operations. GCHQ described the purpose of the unit as “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).”

    According to the slides, JTRIG conducted “honey traps,” sent computer viruses, deleted the online presence of targets and engaged in cyber-attacks on the “hacktivist” collective Anonymous.

    One carried the title “Cyber offensive session: pushing the boundaries and action against hacktivism” revealing the agency was going after online political activists.

    Reputation destroying tactics

    The presentation outlined tactics to destroy the reputation of targets online. It detailed how agents could get another country to “believe a secret” by placing information on a compromised computer or making it visible on networks under surveillance.

    A JTRIG tool, called AMBASSADORS RECEPTION, involved sending a virus to someone’s computer to stop it functioning. It would delete emails, encrypt files, make the screen shake, deny service or stop log-ins.

    Other methods were deployed to “stop someone communicating,” bombarding their phone with text messages and calls – in some cases every 10 seconds, deleting their online presence and blocking up their fax machines. According to the presentation these tactics were used in Afghanistan “significantly disrupting Taliban Operations.”

    Changing a profile photo on social networking sites “can take paranoia to a whole new level.” A honey trap was described as ” a great option” and “very successful when it works.” Writing false blogs, pretending to be a “victim” of a target worked in “serious crime ops” and in Iran, the conference was told.

    The documents were presented to the GCSB, NSA and agents from Australia and Canada.

    Author and journalist Glen Greenwald worked with MSNBC to reveal the documents. On “The Intercept” website he wrote that the agencies were “attempting to control, infiltrate, manipulate and warp online discourse, and in doing so are compromising the integrity of the internet itself.”

    Published: 1:41PM Wednesday February 26, 2014 Source: Fairfax

    Find this story at 26 February 2014

    © 2014, Television New Zealand Limited

    Orange Gives All Of Its Data To France’s NSA

    Orange has been cooperating allegedly illegally for years with France’s main intelligence agency (the DGSE). According to a newly found report by Edward Snowden and an investigation by Le Monde, the DGSE was given access to all of Orange’s data (not just metadata).

    Orange is the leading telecom company in France with more than 26 million clients. These clients have communicated with tens of millions of non-Orange clients. Nearly everyone in France is concerned by today’s revelation. No regulating agency has a say in this special relationship between France’s intelligence agencies and Orange. Data is shared with allies, such as the GCHQ in the U.K.

    While the state still owns 27 percent of Orange, Orange has operated as a private company for years. Yet, when it comes to data collecting, it still works as if it was a state-owned company.

    Orange employees help the DGSE create and develop new tools to collect and analyze data. Contrarily to PRISM, it’s not just an agreement between the government and big Internet companies, it’s an implicit “joint venture” that has been going on for around 30 years.

    Both the government and the DGSE had no comment on the allegations. Orange CEO Stéphane Richard said that he wasn’t aware of what the DGSE was doing. He just granted access to Orange for employees of the DGSE in order to comply with the law. The three other main telecom companies denied the existence of similar programs with them.

    Last July, Le Monde discovered that France has a PRISM-like program which collects thousands of trillions of metadata elements, collecting data on call history, recipient and sizes of text message, email subject etc. The program targets phone communications, emails and data from Internet giants, such as Google, Facebook, Apple, Microsoft and Yahoo.

    The public outcry has been very moderated so far. These popular Internet services are still dominant. In other words, in France, convenience comes first, privacy second.

    Update: An Orange spokesperson sent the following statement.

    As is the case for all operators, Orange has relations with the French state’s services that are responsible for national security. This relationship takes place within a strict legal framework, under the responsibility of the state and appropriate legal control by judges.

    Posted Mar 20, 2014 by Romain Dillet (@romaindillet)

    Find this story at 20 March 2014

    © 2013-2014 AOL Inc.

    Orange shares all its call data with France’s intelligence agency, according to new Snowden leak

    Another day, another round of troubling surveillance news. In a twist, though, today’s nugget has less to do with the US or the NSA but rather, France’s central intelligence agency, the DGSE. According to a leak by Edward Snowden to the French paper Le Monde, Orange, the country’s leading telecom, has been willingly sharing all of its call data with the agency. And according to the leaked document — originally belonging to the UK intelligence agency GCHQ — the French government’s records don’t just include metadata, but all the information Orange has on file. As you might expect, the DGSE then shares this information with other countries, including, of course, the UK, which had this incriminating document in the first place.

    In a way, this isn’t surprising: the French government owns a 27 percent stake in the company. But until now, Orange has ostensibly been operating as a private firm. What’s more, the leaked document would suggest that the DGSE’s relationship with Orange has been cooperative, with Orange employees creating new tools to collect and interpret the data. If true, then, this arrangement would go beyond the DGSE merely requesting specific cell phone records and getting them. For now, both the French government and the DGSE have declined to comment, according to TechCrunch, while Orange CEO Stéphane Richard told LeMonde that he isn’t aware of what the DGSE is doing, but that Orange has granted access to the DGSE to comply with the law.

    BY DANA WOLLMAN @DANAWOLLMAN MARCH 20TH 2014, AT 3:29:00 PM ET 16

    Find this story at 20 March 2014

    © 2014 AOL Inc.

    Espionnage : comment Orange et les services secrets coopèrent

    Selon un document auquel “Le Monde” eu accès, l’opérateur historique France Télécom-Orange est un acteur essentiel du renseignement français.
    On apprend souvent davantage de choses sur soi par des gens qui n’appartiennent pas à votre famille. Les Britanniques, un peu malgré eux, viennent de nous éclairer sur les liens hautement confidentiels qui existent entre les services secrets français, la Direction générale de la sécurité extérieure (DGSE) et l’opérateur historique de télécommunication France Télécom, qui a pris le nom d’Orange en février 2012.
    Selon un document interne des services secrets techniques britanniques (GCHQ), l’équivalent de l’Agence nationale de sécurité (NSA) américaine, la DGSE entretient une coopération étroite avec « un opérateur de télécommunication français ». L’ancienneté de leurs liens, la description des savoir-faire spécifiques de l’entreprise ainsi que l’enquête du Monde permettent de conclure qu’il s’agit bien de France Télécom-Orange.

    Lire les autres éléments de l’enquête Les services secrets britanniques ont accès aux données des clients français d’Orange

    Lire les autres éléments de l’enquête Les X-Télécoms, maîtres d’œuvre du renseignement

    Lire les autres éléments de l’enquête Surveillance : « Les opérateurs n’ont pas les moyens de résister aux Etats »

    Selon le GCHQ, la DGSE et l’opérateur historique français travaillent ensemble pour améliorer les capacités nationales d’interception sur les réseaux de communication et collaborent pour casser les cryptages de données qui circulent dans les réseaux. France Télécom est un acteur important du système de surveillance en France.

    COLLECTE DE DONNÉES LIBRE DE TOUT CONTRÔLE

    Cette note, extraite des archives de la NSA par son ex-consultant Edward Snowden, assure que la relation entre la DGSE et l’opérateur français constitue un atout majeur par rapport à ses homologues occidentaux. L’une des forces de la DGSE résiderait dans le fait qu’elle ne se contente pas des autorisations accordées par le législateur pour accéder aux données des clients de France Télécom-Orange. Elle dispose surtout, à l’insu de tout contrôle, d’un accès libre et total à ses réseaux et aux flux de données qui y transitent.

    Cette collecte libre de tout contrôle, par le biais de l’opérateur français, portant sur des données massives, concerne aussi bien des Français que des étrangers. Elle est utilisée par la DGSE, qui la met à la disposition de l’ensemble des agences de renseignement françaises au titre de la mutualisation du renseignement technique et de sa base de données. Ces données sont également partagées avec des alliés étrangers comme le GCHQ. Enfin, l’opérateur français développe, en partenariat avec la DGSE, des recherches en cryptologie.

    Au plus haut niveau de l’Etat, en France, on se refuse à tout commentaire, mais on indique au Monde que, si la puissance publique est devenue minoritaire (27 %) au sein du capital de France Télécom, le plus ancien opérateur français reste considéré comme « un délégataire de service public ». Le savoir-faire de l’entreprise, qui fut en premier lieu une administration, contribue, de manière essentielle, « aujourd’hui comme hier », à la sécurité du territoire et à l’autonomie de décision des dirigeants français.

    « Le rapport entre France Télécom et la DGSE n’est pas de même nature que celui révélé dans le programme Prism de la NSA, qui a des liens contractuels avec les géants d’Internet, explique un ancien chef de service de renseignement français. En France, c’est consubstantiel. » Il n’existe pas de formalisation de cette coopération entre la DGSE et France Télécom-Orange. Elle est portée par des personnes habilitées secret-défense, au sein de l’entreprise, et pérennisée, depuis au moins trente ans, par des ingénieurs, qui font la navette entre les deux institutions.

    « USAGE INTERNE ET NON OFFICIEL »

    Au quotidien, dans l’entreprise, ce lien est géré par un très petit nombre de personnes au sein de trois services. La direction des réseaux, en premier lieu, gère, notamment, les stations dites « d’atterrissement », où accostent les câbles sous-marins France Télécom-Orange touchant la France et par lesquels transitent les flux massifs de données collectées. Un tri préalable peut aisément être réalisé en fonction des pays et des régions d’origine, puis tout est stocké dans des locaux de la DGSE.

    « Le transit massif des données est stocké pour un usage interne et non officiel, détaille un cadre attaché à la direction des réseaux. Mais le point névralgique, c’est l’accès au fournisseur d’accès, comme ça, vous croisez la circulation de la donnée et l’identité de ceux qui l’échangent. C’est pour cette raison que la DGSE est en contact avec l’ensemble des opérateurs français. »

    La DGSE s’appuie aussi sur la direction internationale de l’opérateur, qui gère les filiales de téléphonie mobile à l’étranger. Orange joue dans certains cas un rôle stratégique. Il a ainsi accompagné les opérations militaires françaises au Mali et en Centrafrique. Enfin, la direction sécurité, chasse gardée des anciens de la direction technique de la DGSE, est le principal interlocuteur des services secrets. Elle veille, avec Orange Business Services, sur les questions de protection de données et de déchiffrement.

    Interrogé, le patron d’Orange, Stéphane Richard, a indiqué que « des personnes habilitées secret-défense peuvent avoir à gérer, au sein de l’entreprise, la relation avec les services de l’Etat et notamment leur accès aux réseaux, mais elles n’ont pas à m’en référer. Tout ceci se fait sous la responsabilité des pouvoirs publics dans un cadre légal ». La DGSE s’est refusée à tout commentaire.

    LE MONDE | 20.03.2014 à 11h25 • Mis à jour le 26.03.2014 à 16h14 |
    Par Jacques Follorou

    Find this story at 20 March 2013

    © Le Monde.fr

    ‘French intelligence agents spy on Orange customer data’

    The French intelligence agency in charge of military and electronic spying is massively collecting data and monitoring networks of telecoms giant Orange, Le Monde newspaper reported in its Friday edition.

    A picture taken on February 24, 2014 in the French northern city of Lille, shows people walking in front of an Orange store

    “The DGSE can read, like an open book, the origin and destination of all communications of Orange customers,” the paper said.

    Monitoring operations were being carried out without any external supervision with access “free and total” for spies at the General Directorate for External Security (DGSE).

    Le Monde said its report was based on an internal British intelligence document made available by former US intelligence contractor Edward Snowden.

    Contacted by AFP, an Orange spokesman said the company “like all (other) operators has relations with state agencies in charge of the country’s and the French people’s security.”

    “These relations strictly comply with the laws and are legal under the responsibility of the State and the control of judges,” he added.

    The DGSE and agents with military clearance have been working with Orange, formerly known as France Telecom, “for at least 30 years”, said Le Monde.

    The DGSE would not comment on the report.

    Snowden, who has been charged in the United States with espionage, lives in exile in Russia.

    He said earlier this month he had no regrets over his leaks about mass surveillance programmes by the US National Security Agency (NSA), saying they sparked a needed public debate on spying and data collection.

    Published: 21 Mar 2014 at 03.49Online news: World

    Find this story at 21 March 2014

    © 2014 The Post Publishing PCL

    French intelligence officer who went from national hero to villain; Obituary – General Paul Aussaresses

    General Paul Aussaresses was an intelligence chief whose revelations of torture and murder in Algeria shocked his country.

    Aussaresses, who has died aged 95, scandalised France and disgraced himself when, in 2000, he revealed that he had participated in summary executions and acts of torture during the Algerian War of Independence.

    The revelations, made when Aussaresses was 82, could hardly be called confessions, because they were not accompanied by any sign of remorse. On the contrary, Aussaresses noted that if confronted by the same situation again “it would piss me off, but I would do the same”.

    For France, however, the news was deeply shocking, throwing into sharp relief long-buried concerns about its forces’ behaviour in its former colony, as well its treatment of Algerian allies afterwards. Aussaresses assured his countrymen that the future President François Mitterrand, then justice minister, had been kept scrupulously informed of every detail of what was happening in Algiers. “He knew,” Aussaresses noted. “Everyone knew.”

    Jacques Chirac, president at the time of the publication of Aussaresses’s book, Services Spéciaux: Algérie 1955-57 (2001), declared himself “horrified” by its tales of murder, beatings, electrocution and waterboarding, and called for the “full truth” to come out. But the truth was worse than most people imagined.

    Aussaresses described hanging Larbi Ben M’Hidi, a leader of the Algerian militant FLN, then making it look like suicide.

    At the time, when such men were written off as terrorists, it seemed Aussaresses – France’s intelligence chief in Algeria – was hardly challenged. But 40 years later, his reflection that torture was an “effective” tool proved out of step with the mood of his country. He found little support, and was hauled before the French courts and stripped of his decorations. Even his family renounced him.

    The truth, however, was that far from having collaborated during World War II, Aussaresses had fought behind enemy lines. Had he chosen not to open his mouth in his dotage, it is likely that many French politicians would have queued to pay homage at his funeral.

    Paul Aussaresses was born on November 7, 1918, at Saint-Paul-de-Joux, south-west France. He was educated in Bordeaux, excelling in classics, and attended the St Cyr military academy at Aix-en-Provence, where it had relocated after the German invasion of 1940. By the end of his life he was more or less fluent in six languages.

    After the war he moved into the French secret services, helping to create the shock unit of counter-intelligence, SDECE agency.

    He arrived in Philippeville (now Skikda), Algeria, in autumn 1954, just as full-scale hostilities were about to break out. There he made no bones about his “enhanced” interrogation techniques, and quickly won a reputation for his ability to penetrate FLN cells. Such was his success that, in 1957, he was promoted to chief of intelligence by Gen Jacques Massu, leading what Aussaresses himself described as “the company of death”.

    After France withdrew from Algeria, Aussaresses took his counter-insurgency experience to Fort Bragg, where he trained with the US Green Berets and produced a report entitled The American Army against guerrillas forces.

    He returned to France in 1966, the year after he was appointed a Commander of the Legion of Honour.

    Aussaresses spent much of the early 1970s in Latin America, training up special forces for many of the less salubrious regimes of the era. Little more was heard of him until 2000.

    Paul Aussaresses was twice married and had three daughters.

    PUBLISHED 07 DECEMBER 2013 09:30 PM

    Find this story at 7 December 2013

    © Independent.ie

    GCHQ and European spy agencies worked together on mass surveillance

    Edward Snowden papers unmask close technical cooperation and loose alliance between British, German, French, Spanish and Swedish spy agencies

    The German, French, Spanish and Swedish intelligence services have all developed methods of mass surveillance of internet and phone traffic over the past five years in close partnership with Britain’s GCHQ eavesdropping agency.

    The bulk monitoring is carried out through direct taps into fibre optic cables and the development of covert relationships with telecommunications companies. A loose but growing eavesdropping alliance has allowed intelligence agencies from one country to cultivate ties with corporations from another to facilitate the trawling of the web, according to GCHQ documents leaked by the former US intelligence contractor Edward Snowden.

    The files also make clear that GCHQ played a leading role in advising its European counterparts how to work around national laws intended to restrict the surveillance power of intelligence agencies.

    The German, French and Spanish governments have reacted angrily to reports based on National Security Agency (NSA) files leaked by Snowden since June, revealing the interception of communications by tens of millions of their citizens each month. US intelligence officials have insisted the mass monitoring was carried out by the security agencies in the countries involved and shared with the US.

    The US director of national intelligence, James Clapper, suggested to Congress on Tuesday that European governments’ professed outrage at the reports was at least partly hypocritical. “Some of this reminds me of the classic movie Casablanca: ‘My God, there’s gambling going on here,’ ” he said.

    Sweden, which passed a law in 2008 allowing its intelligence agency to monitor cross-border email and phone communications without a court order, has been relatively muted in its response.

    The German government, however, has expressed disbelief and fury at the revelations from the Snowden documents, including the fact that the NSA monitored Angela Merkel’s mobile phone calls.

    After the Guardian revealed the existence of GCHQ’s Tempora programme, in which the electronic intelligence agency tapped directly into the transatlantic fibre optic cables to carry out bulk surveillance, the German justice minister, Sabine Leutheusser-Schnarrenberger, said it sounded “like a Hollywood nightmare”, and warned the UK government that free and democratic societies could not flourish when states shielded their actions in “a veil of secrecy”.

    ‘Huge potential’

    However, in a country-by-country survey of its European partners, GCHQ officials expressed admiration for the technical capabilities of German intelligence to do the same thing. The survey in 2008, when Tempora was being tested, said the Federal Intelligence Service (BND), had “huge technological potential and good access to the heart of the internet – they are already seeing some bearers running at 40Gbps and 100Gbps”.

    Bearers is the GCHQ term for the fibre optic cables, and gigabits per second (Gbps) measures the speed at which data runs through them. Four years after that report, GCHQ was still only able to monitor 10 Gbps cables, but looked forward to tap new 100 Gbps bearers eventually. Hence the admiration for the BND.

    The document also makes clear that British intelligence agencies were helping their German counterparts change or bypass laws that restricted their ability to use their advanced surveillance technology. “We have been assisting the BND (along with SIS [Secret Intelligence Service] and Security Service) in making the case for reform or reinterpretation of the very restrictive interception legislation in Germany,” it says.

    The country-by-country survey, which in places reads somewhat like a school report, also hands out high marks to the GCHQ’s French partner, the General Directorate for External Security (DGSE). But in this case it is suggested that the DGSE’s comparative advantage is its relationship with an unnamed telecommunications company, a relationship GCHQ hoped to leverage for its own operations.

    “DGSE are a highly motivated, technically competent partner, who have shown great willingness to engage on IP [internet protocol] issues, and to work with GCHQ on a “cooperate and share” basis.”

    Noting that the Cheltenham-based electronic intelligence agency had trained DGSE technicians on “multi-disciplinary internet operations”, the document says: “We have made contact with the DGSE’s main industry partner, who has some innovative approaches to some internet challenges, raising the potential for GCHQ to make use of this company in the protocol development arena.”

    GCHQ went on to host a major conference with its French partner on joint internet-monitoring initiatives in March 2009 and four months later reported on shared efforts on what had become by then GCHQ’s biggest challenge – continuing to carry out bulk surveillance, despite the spread of commercial online encryption, by breaking that encryption.

    “Very friendly crypt meeting with DGSE in July,” British officials reported. The French were “clearly very keen to provide presentations on their work which included cipher detection in high-speed bearers. [GCHQ’s] challenge is to ensure that we have enough UK capability to support a longer term crypt relationship.”

    Fresh opportunities

    In the case of the Spanish intelligence agency, the National Intelligence Centre (CNI), the key to mass internet surveillance, at least back in 2008, was the Spaniards’ ties to a British telecommunications company (again unnamed. Corporate relations are among the most strictly guarded secrets in the intelligence community). That was giving them “fresh opportunities and uncovering some surprising results.

    “GCHQ has not yet engaged with CNI formally on IP exploitation, but the CNI have been making great strides through their relationship with a UK commercial partner. GCHQ and the commercial partner have been able to coordinate their approach. The commercial partner has provided the CNI some equipment whilst keeping us informed, enabling us to invite the CNI across for IP-focused discussions this autumn,” the report said. It concluded that GCHQ “have found a very capable counterpart in CNI, particularly in the field of Covert Internet Ops”.

    GCHQ was clearly delighted in 2008 when the Swedish parliament passed a bitterly contested law allowing the country’s National Defence Radio Establishment (FRA) to conduct Tempora-like operations on fibre optic cables. The British agency also claimed some credit for the success.

    “FRA have obtained a … probe to use as a test-bed and we expect them to make rapid progress in IP exploitation following the law change,” the country assessment said. “GCHQ has already provided a lot of advice and guidance on these issues and we are standing by to assist the FRA further once they have developed a plan for taking the work forwards.”

    The following year, GCHQ held a conference with its Swedish counterpart “for discussions on the implications of the new legislation being rolled out” and hailed as “a success in Sweden” the news that FRA “have finally found a pragmatic solution to enable release of intelligence to SAEPO [the internal Swedish security service.]”

    GCHQ also maintains strong relations with the two main Dutch intelligence agencies, the external MIVD and the internal security service, the AIVD.

    “Both agencies are small, by UK standards, but are technically competent and highly motivated,” British officials reported. Once again, GCHQ was on hand in 2008 for help in dealing with legal constraints. “The AIVD have just completed a review of how they intend to tackle the challenges posed by the internet – GCHQ has provided input and advice to this report,” the country assessment said.

    “The Dutch have some legislative issues that they need to work through before their legal environment would allow them to operate in the way that GCHQ does. We are providing legal advice on how we have tackled some of these issues to Dutch lawyers.”

    European allies

    In the score-card of European allies, it appears to be the Italians who come off the worse. GCHQ expresses frustration with the internal friction between Italian agencies and the legal limits on their activities.

    “GCHQ has had some CT [counter-terrorism] and internet-focused discussions with both the foreign intelligence agency (AISE) and the security service (AISI), but has found the Italian intelligence community to be fractured and unable/unwilling to cooperate with one another,” the report said.

    A follow-up bulletin six months later noted that GCHQ was “awaiting a response from AISI on a recent proposal for cooperation – the Italians had seemed keen, but legal obstacles may have been hindering their ability to commit.”

    It is clear from the Snowden documents that GCHQ has become Europe’s intelligence hub in the internet age, and not just because of its success in creating a legally permissive environment for its operations. Britain’s location as the European gateway for many transatlantic cables, and its privileged relationship with the NSA has made GCHQ an essential partner for European agencies. The documents show British officials frequently lobbying the NSA on sharing of data with the Europeans and haggling over its security classification so it can be more widely disseminated. In the intelligence world, far more than it managed in diplomacy, Britain has made itself an indispensable bridge between America and Europe’s spies.

    Julian Borger
    The Guardian, Friday 1 November 2013 17.02 GMT

    Find this story at 1 November 2013

    © 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    NSA spy row: France and Spain ‘shared phone data’ with US

    Spain and France’s intelligence agencies carried out collection of phone records and shared them with NSA, agency says

    European intelligence agencies and not American spies were responsible for the mass collection of phone records which sparked outrage in France and Spain, the US has claimed.
    General Keith Alexander, the head of the National Security Agency, said reports that the US had collected millions of Spanish and French phone records were “absolutely false”.
    “To be perfectly clear, this is not information that we collected on European citizens,” Gen Alexander said when asked about the reports, which were based on classified documents leaked by Edward Snowden, the former NSA contractor.
    Shortly before the NSA chief appeared before a Congressional committee, US officials briefed the Wall Street Journal that in fact Spain and France’s own intelligence agencies had carried out the surveillance and then shared their findings with the NSA.
    The anonymous officials claimed that the monitored calls were not even made within Spanish and French borders and could be surveillance carried on outside of Europe.

    In an aggressive rebuttal of the reports in the French paper Le Monde and the Spanish El Mundo, Gen Alexander said “they and the person who stole the classified data [Mr Snowden] do not understand what they were looking at” when they published slides from an NSA document.
    The US push back came as President Barack Obama was said to be on the verge of ordering a halt to spying on the heads of allied governments.
    The White House said it was looking at all US spy activities in the wake of leaks by Mr Snowden but was putting a “special emphasis on whether we have the appropriate posture when it comes to heads of state”.
    Mr Obama was reported to have already halted eavesdropping at UN’s headquarters in New York.
    German officials said that while the White House’s public statements had become more conciliatory there remained deep wariness and that little progress had been made behind closed doors in formalising an American commitment to curb spying.
    “An agreement that you feel might be broken at any time is not worth very much,” one diplomat told The Telegraph.
    “We need to re-establish trust and then come to some kind of understanding comparable to the [no spy agreement] the US has with other English speaking countries.”
    Despite the relatively close US-German relations, the White House is reluctant to be drawn into any formal agreement and especially resistant to demands that a no-spy deal be expanded to cover all 28 EU member states.
    Viviane Reding, vice-president of the European Commission and EU justice commissioner, warned that the spying row could spill over and damage talks on a free-trade agreement between the EU and US.
    “Friends and partners do not spy on each other,” she said in a speech in Washington. “For ambitious and complex negotiations to succeed there needs to be trust among the negotiating partners. It is urgent and essential that our US partners take clear action to rebuild trust.”
    A spokesman for the US trade negotiators said it would be “unfortunate to let these issues – however important – distract us” from reaching a deal vital to freeing up transatlantic trade worth $3.3 billion dollars (£2bn) a day.
    James Clapper, America’s top national intelligence, told a Congressional hearing yesterday the US does not “spy indiscriminately on the citizens of any country”.
    “We do not spy on anyone except for valid foreign intelligence purposes, and we only work within the law,” Mr Clapper said. “To be sure on occasions we’ve made mistakes, some quite significant, but these are usually caused by human error or technical problems.”
    Pressure from European leaders was added to as some of the US intelligence community’s key Congressional allies balked at the scale of surveillance on friendly governments.
    Dianne Feinstein, the chair of powerful Senate intelligence committee, said she was “totally opposed” to tapping allied leaders and called for a wide-ranging Senate review of the activities of US spy agencies.
    “I do not believe the United States should be collecting phone calls or emails of friendly presidents and prime ministers,” she said.
    John Boehner, the Republican speaker of the house and a traditional hawk on national security, said US spy policy was “imbalanced” and backed calls for a review.
    Mr Boehner has previously been a staunch advocate of the NSA and faced down a July rebellion by libertarian Republicans who tried to pass a law significantly curbing the agency’s power.

    By Raf Sanchez, Peter Foster in Washington8:35PM GMT 29 Oct 2013 Comments15 Comments

    Find this story at 29 October 2013

    © Copyright of Telegraph Media Group Limited 2014

    Officials alert foreign services that Snowden has documents on their cooperation with U.S.

    U.S. officials are alerting some foreign intelligence services that documents detailing their secret cooperation with the United States have been obtained by former National Security Agency contractor Edward Snowden, according to government officials.

    Snowden, U.S. officials said, took tens of thousands of military intelligence documents, some of which contain sensitive material about collection programs against adversaries such as Iran, Russia and China. Some refer to operations that in some cases involve countries not publicly allied with the United States.

    The process of informing officials in capital after capital about the risk of disclosure is delicate. In some cases, one part of the cooperating government may know about the collaboration while others — such as the foreign ministry — may not, the officials said. The documents, if disclosed, could compromise operations, officials said.

    The notifications come as the Obama administration is scrambling to placate allies after allegations that the NSA has spied on foreign leaders, including German Chancellor Angela Merkel. The reports have forced the administration to play down operations targeting friends while also attempting to preserve other programs that depend on provisional partners. In either case, trust in the United States may be compromised.

    “It is certainly a concern, just as much as the U.S. collection [of information on European allies] being put in the news, if not more, because not only does it mean we have the potential of losing collection, but also of harming relationships,” a congressional aide said.

    The Office of the Director of National Intelligence is handling the job of informing the other intelligence services, the officials said. ODNI declined to comment.

    In one case, for instance, the files contain information about a program run from a NATO country against Russia that provides valuable intelligence for the U.S. Air Force and Navy, said one U.S. official, who requested anonymity to discuss an ongoing criminal investigation. Snowden faces theft and espionage charges.

    “If the Russians knew about it, it wouldn’t be hard for them to take appropriate measures to put a stop to it,” the official said.

    Snowden lifted the documents from a top-secret network run by the Defense Intelligence Agency and used by intelligence arms of the Army, Air Force, Navy and Marines, according to sources, who spoke on the condition of anonymity to discuss sensitive matters.

    Snowden took 30,000 documents that involve the intelligence work of one of the services, the official said. He gained access to the documents through the Joint Worldwide Intelligence Communications System, or JWICS, for top-secret/sensitive compartmented information, the sources said.

    The material in question does not deal with NSA surveillance but primarily with standard intelligence about other countries’ military capabilities, including weapons systems — missiles, ships and jets, the officials say.

    Although Snowden obtained a large volume of documents, he is not believed to have shared all of them with journalists, sources say. Moreover, he has stressed to those he has given documents that he does not want harm to result.

    “He’s made it quite clear that he was not going to compromise legitimate national intelligence and national security operations,” said Thomas Drake, a former NSA executive who visited Snowden in Moscow this month. Snowden separately told Drake and a New York Times reporter that he did not take any documents with him to Russia. “There’s a zero percent chance the Russians or Chinese have received any documents,” Snowden told the Times in an online interview last week.

    Indeed, Drake said, Snowden made clear in their conversation that he had learned the lessons of prior disclosures, including those by an Army private who passed hundreds of thousands of diplomatic cables to the anti-
    secrecy organization WikiLeaks, which posted them in bulk online. “It’s telling,” Drake said, “that he did not give anything to WikiLeaks.”

    Nonetheless, the military intelligence agencies remain fearful, officials said. The NSA in recent months has provided them with an accounting of the documents it believes Snowden obtained.

    Intelligence officials said that they could discern no pattern to the military intelligence documents taken and that Snowden appeared to have harvested them at random. “It didn’t seem like he was targeting something specific,” the U.S. official said.

    The notifications are reminiscent of what the State Department had to do in late 2010 in anticipation of the release of hundreds of thousands of sensitive diplomatic cables by WikiLeaks. The department feared that embarrassing details in some of the cables would lead to tension in relations between the United States and other countries.

    In the case of WikiLeaks, the State Department had a number of months to assess the potential impact of the cables’ release and devise a strategy, former State Department spokesman P.J. Crowley said.

    “I’m not sure there were that many startling surprises in the cables,” he said. But there was damage on a country-by-country basis, he said.

    For instance, some of the cables reflected unfavorably on ­then-Libyan leader Moammar Gaddafi, alleging that he feared flying over water and almost never traveled without his “voluptuous blonde” Ukrainian nurse. “All of a sudden we found there were some unsavory guys following” then-U.S. Ambassador to Libya Gene Cretz, Crowley said. “We brought him home for consultations and did not send him back.”

    “But broadly speaking,” Crowley said, “relationships are guided by interests, rather than personalities, and, over time, interests carry the day.”

    The fundamental issue is one of trust, officials said. “We depend to a very great extent on intelligence-sharing relationships with foreign partners, mostly governments — or, in some cases, organizations within governments,” a second U.S. official said. “If they tell us something, we will keep it secret. We expect the same of them. [If that trust is undermined,] these countries, at a minimum, will be thinking twice if they’re going to share something with us or not.”

    Snowden has instructed the reporters with whom he has shared records to use their judgment to avoid publishing anything that would cause harm. “I carefully evaluated every single document I disclosed to ensure that each was legitimately in the public interest,” he told the Guardian newspaper. “There are all sorts of documents that would have made a big impact that I didn’t turn over, because harming people isn’t my goal. Transparency is.”

    It is those documents that may not be subject to journalistic vetting or may be breached by hackers that worry some intelligence officials. Snowden is known to have given documents in any quantity to only three journalists: The Post’s Barton Gellman, independent filmmaker Laura Poitras and former Guardian columnist Glenn Greenwald.

    So far, Drake said, no such documents have been released. Snowden’s disclosures about the NSA have prompted a global debate about the proper scope and purpose of U.S. espionage — against its own and other countries’ citizens.

    “I consider that a good thing,” Drake said.

    By Ellen Nakashima, Published: October 24

    Find this story at 24 October 2013

    © The Washington Post Company

    ‘Success Story’; NSA Targeted French Foreign Ministry

    Espionage by the US on France has already strained relations between the two countries, threatening a trans-Atlantic trade agreement. Now a document seen by SPIEGEL reveals that the NSA also spied on the French Foreign Ministry.

    America’s National Security Agency (NSA) targeted France’s Foreign Ministry for surveillance, according to an internal document seen by SPIEGEL.

    Dated June 2010, the “top secret” NSA document reveals that the intelligence agency was particularly interested in the diplomats’ computer network. All of the country’s embassies and consulates are connected with the Paris headquarters via a virtual private network (VPN), technology that is generally considered to be secure.

    Accessing the Foreign Ministry’s network was considered a “success story,” and there were a number of incidents of “sensitive access,” the document states.

    An overview lists different web addresses tapped into by the NSA, among them “diplomatie.gouv.fr,” which was run from the Foreign Ministry’s server. A list from September 2010 says that French diplomatic offices in Washington and at the United Nations in New York were also targeted, and given the codenames “Wabash” and “Blackfoot,” respectively. NSA technicians installed bugs in both locations and conducted a “collection of computer screens” at the one at the UN.

    A priority list also names France as an official target for the intelligence agency. In particular, the NSA was interested in the country’s foreign policy objectives, especially the weapons trade, and economic stability.

    US-French relations are being strained by such espionage activities. In early July, French President François Hollande threatened to suspend negotiations for a trans-Atlantic free trade agreement, demanding a guarantee from the US that it would cease spying after it was revealed that the French embassy in Washington had been targeted by the NSA.

    “There can be no negotiations or transactions in all areas until we have obtained these guarantees, for France but also for all of the European Union, for all partners of the United States,” he said at the time.

    The NSA declined to comment to SPIEGEL on the matter. As details about the scope of the agency’s international spying operations continue to emerge, Washington has come under increasing pressure from its trans-Atlantic partners. Officials in Europe have expressed concern that negotiations for the trade agreement would be poisoned by a lack of trust.

    09/01/2013 09:32 AM

    Find this story at 1 September 2013

    © SPIEGEL ONLINE 2013

    French accuse BMW of electric car ‘spying’

    The company that runs Paris’s electric car sharing scheme has filed an industrial espionage complaint against BMW, after employees alleged the German car giant sent “spies” to check out their electric cars.

    Another Franco-German automobile row appears to have kicked off this week.
    As the bust-up between between Mercedes and the French government rumbles on, another Franco-German automobile row appears to have kicked off this week with French company Autolib accusing BMW of “spying”.

    The affair began on August 21st, when Autolib maintenance staff spotted two men they said were German, at a recharging station in Paris, fiddling with computer equipment in one of the electric vehicles, called “Blue cars”.

    Later that day, the same men reportedly passed themselves off as “maintenance staff” and pretended to carry out work on one of the cars in the city’s 9th arrondissement, before slipping away.
    Their suspicions raised, one of the Autolib ambassadors made a note of the license plate of one of the cars rented by the German men, cross-referenced it with rental times, and discovered that a “P3-group.com” email suffix was used to sign up online for the Autolib scheme.

    P3 is an engineering firm contracted by none other than BMW to lay the groundwork for its upcoming I3 electric car model.

    The following day, the alleged spies were once again seen at an Autolib station, this time in the city’s second arrondissement.

    According to reports in French daily Le Figaro, when questioned by staff, the two men said they worked for BMW, before quickly leaving the scene.

    This time, management at Autolib, which is run by French company Bolloré, notified the DCRI, France’s intelligence services, and told its entire staff to be on the look-out for phoney “maintenance staff”.
    They were not seen again until September 5th, when they were spotted on Rue Jouffroy-d’Abbans in the seventh arrondissement.

    Staff immediately called in the police, who came and arrested the two suspects.
    They were questioned by BEFTI, the police’s electronic fraud division, before being released the next day.

    Autolib management promptly filed a police complaint, accusing the two men of “abuse of trust,” “intrusion into a system of automated data,” and property damage, according to Le Figaro.
    BMW reportedly took the step of writing to Bolloré’s CEO, Vincent Bolloré, reportedly recognizing it had dispatched staff to conduct “compatibility tests,” and apologizing for not seeking advanced permission from Bolloré.

    However, in a statement released on Tuesday, BMW France denied all allegations of industrial espionage.
    “In the context of the upcoming launch of the BMW I3, BMW Group is conducting routine tests across Europe, to check the compatibility of charging stations on public streets,” said the statement.
    “The sole purpose of these tests is to identify networks of charging stations that electric BMW vehicles could use.”
    The company confirmed it had conducted tests of this kind on August 21st, 22nd and 26th in Paris, but significantly denied it had done so on September 5th, the day the two alleged spies were arrested.
    A representative from the P3 Group was not immediately available for comment when contacted by The Local on Tuesday.
    Autolib, an all-electric car-sharing scheme based on the French capital’s successful bike-sharing project Velib, launched in October 2011.
    Users can rent and return one of the more than 4,000 Bluecars for as little as €9 for half an hour, or as much as €120 for an annual subscription of unlimited journeys of up to 30 minutes.
    Since launching in Paris, the scheme has come to the eastern city of Lyon, and is slated to arrive in Bordeaux, south-western France in November.
    After that, plans are afoot to bring the all-electric car-sharing scheme to the US city of Indianapolis in 2014.

    Published: 10 Sep 2013 14:25 GMT+02:00

    Find this story at 10 September 2013

    Copyright The Local Europe GmbH

    Chinese Espionage and French Trade Secrets

    Paris prosecutor Jean-Claude Marin on Jan. 14 began an inquiry into allegations of commercial espionage carried out against French carmaker Renault. The allegations first became public when Renault suspended three of its employees on Jan. 3 after an internal investigation that began in August 2010. Within days, citing an anonymous French government source, Reuters reported that French intelligence services were looking into the possibility that China played a role in the Renault espionage case. While the French government refused to officially confirm this accusation, speculation has run wild that Chinese state-sponsored spies were stealing electric-vehicle technology from Renault.

    The Chinese are well-known perpetrators of industrial espionage and have been caught before in France, but the details that have emerged so far about the Renault operation differ from the usual Chinese method of operation. And much has been learned about this MO just in the last two years across the Atlantic, where the United States has been increasingly aggressive in investigating and prosecuting cases of Chinese espionage. If Chinese intelligence services were indeed responsible for espionage at Renault it would be one of only a few known cases involving non-Chinese nationals and would have involved the largest amount of money since the case of the legendary Larry Wu-Tai Chin, China’s most successful spy.

    STRATFOR has previously detailed the Chinese intelligence services and the workings of espionage with Chinese characteristics. A look back at Chinese espionage activities uncovered in the United States in 2010, since our latest report was compiled, can provide more context and detail about current Chinese intelligence operations.

    Chinese Espionage in the U.S.

    We chose to focus on operations in the United States for two reasons. First, the United States is a major target for Chinese industrial espionage. This is because it is a leader in technology development, particularly in military hardware desired by China’s expanding military, and a potential adversary at the forefront of Chinese defense thinking. Second, while it is not the only country developing major new technologies in which China would be interested, the United States has been the most aggressive in prosecuting espionage cases against Chinese agents, thereby producing available data for us to work with. Since 2008, at least seven cases have been prosecuted each year in the United States against individuals spying for China. Five were prosecuted in 2007. Going back to about 2000, from one to three cases were prosecuted annually, and before that, less than one was prosecuted per year.

    Most of the cases involved charges of violating export restrictions or stealing trade secrets rather than the capital crime of stealing state secrets. As the premier agency leading such investigations, the FBI has clearly made a policy decision to refocus on counterintelligence after an overwhelming focus on counterterrorism following 9/11, and its capability to conduct such investigations has grown. In 2010, 11 Chinese espionage cases were prosecuted in the United States, the highest number yet, and they featured a wide range of espionage targets.

    Ten of the 11 cases involved technology acquisition, and five were overt attempts to purchase and illegally export encryption devices, mobile-phone components, high-end analog-to-digital converters, microchips designed for aerospace applications and radiation-hardened semiconductors. These technologies can be used in a wide range of Chinese industries. While the mobile-phone technology would be limited to Chinese state-owned enterprises (SOEs) such as China Mobile, the aerospace-related microchips could be used in anything from rockets to fighter jets. Xian Hongwei and someone known as “Li Li” were arrested in September 2010 for allegedly attempting to purchase those aerospace-related microchips from BAE Systems, which is one of the companies involved in the development of the F-35 Joint Strike Fighter. Similar espionage may have played a role in China’s development of the new J-20 fifth-generation fighter, but that is only speculation.

    (click here to enlarge image)

    Five other cases in 2010 involved stealing trade secrets. These included organic light-emitting diode processes from Dupont, hybrid vehicle technology from GM, insecticide formulas from the Dow Chemical Co., paint formulas from Valspar and various vehicle design specifications from Ford. These types of Chinese cases, while often encouraged by state officials, are more similar to industrial espionage conducted by corporations. Since many of the major car companies in China are state-run, these technologies benefit both industry and the state.

    But that does not mean these efforts are directed from Beijing. History shows that such espionage activities are not well coordinated. Various Chinese company executives (who are also Communist Party officials) have different requirements for their industrial espionage. In cases where two SOEs are competing to sell similar products, they may both try to recruit agents to steal the same technology. There are also a growing number of private Chinese companies getting involved in espionage. One notable example was when Du Shanshan and Qin Yu passed on technology from GM to Chery Automobile, a private, rather than state-run, manufacturer. In the five trade-secret cases in 2010, most of the suspects were caught because of poor tradecraft. They stored data on their hard drives, sent e-mails on company computers and had obvious communications with companies in China. This is not the kind of tradecraft we would expect from trained intelligence officers. Most of these cases probably involved ad hoc agents, some of whom were likely recruited while working in the United States and offered jobs back in China when they were found to have access to important technology.

    These cases show how Chinese state-run companies can have an interest in espionage in order to improve their own products, both for the success of their companies and in the national interest of China. The U.S. Department of Justice has not provided specific details on how the stolen defense-related technologies were intended to be used in China, so it is hard to tell whether they would have enhanced China’s military capability.

    First-generation Chinese carried out 10 of the 11 publicized cases in the United States last year. Some were living or working temporarily in the United States, others had become naturalized American citizens (with the exception of Xian and Li, who were caught in Hungary). The Chinese intelligence services rely on ethnic Chinese agents because the services do not generally trust outsiders. When recruiting, they also use threats against family members or the individuals themselves. Second- and third-generation Chinese who have assimilated in a new culture are rarely willing to spy, and the Chinese government has much less leverage over this segment of the ethnic-Chinese population living overseas.

    In the 11 cases in 2010, it is not clear what payments, if any, the agents might have received. In some cases, such as those involving the trade secrets from Valspar and Ford, the information likely helped the agents land better jobs and/or receive promotions back in China. Cash does not typically rule the effectiveness of newly recruited Chinese spies, as it might with Western recruits. Instead, new Chinese agents are usually motivated by intelligence-service coercion or ideological affinity for China.

    The outlier in 2010 was Glenn Duffie Shriver, an American student with no Chinese heritage who applied to work at both the U.S. State Department and the CIA. His was the first publicized case of the Chinese trying to develop an agent in place in the United States since Larry Chin. Shriver studied in China in 2002 and 2003. The recruitment process began when he returned to China in 2004 to seek employment and improve his language capabilities. After responding to an ad for someone with an English-language background to write a political paper, Shriver was paid $120 for producing an article on U.S.-Chinese relations regarding Taiwan and North Korea.

    The woman who hired him then introduced him to two Chinese intelligence officers named Wu and Tang. They paid Shriver a total of $70,000 in three payments while he tried to land a job with the U.S. government. Shriver failed the exams to become a foreign service officer and began pursuing a career with the CIA. He was accused of lying on his CIA application by not mentioning at least one trip to China and at least 20 meetings with Chinese intelligence officers. It is not clear how he was exposed, but customs records and passport stamps would have easily revealed any trips to China that he did not report in his CIA application. On Oct. 22, 2010, Shriver pleaded guilty to conspiring to provide national defense information to intelligence officers of the People’s Republic of China and was sentenced to 48 months in prison in accordance with his plea agreement.

    A few Americans have been accused of being Chinese agents before, such as former Defense Department official James Fondren, who was caught and convicted in 2009. These cases are rare, though they may increase as Beijing tries to reach higher levels of infiltration. It is also possible that the FBI has been reaching only for low-hanging fruit and that Chinese espionage involving Americans at higher levels is going undetected. If this were the case, it would not be consistent with the general Chinese espionage MO.

    China takes a mosaic approach to intelligence, which is a wholly different paradigm than that of the West. Instead of recruiting a few high-level sources, the Chinese recruit as many low-level operatives as possible who are charged with vacuuming up all available open-source information and compiling and analyzing the innumerable bits of intelligence to assemble a complete picture. This method fits well with Chinese demographics, which are characterized by countless thousands of capable and industrious people working overseas as well as thousands more analyzing various pieces of the mosaic back home.

    Another case in 2010 was an alleged China-based cyberattack against Google, in which servers were hacked and customer account information was accessed. Last year, more than 30 other major companies reported similar infiltration attempts occurring in 2009, though we do not know how widespread the effort really is. China’s cyber-espionage capabilities are well known and no doubt will continue to provide more valuable information for China’s intelligence services.

    The Renault Case

    Few details have been released about the Renault case, which will likely remain confidential until French prosecutors finish their investigation. But enough information has trickled in to give us some idea of the kind of operation that would have targeted Renault’s electric-vehicle program. Three Renault managers were accused: Matthieu Tenenbaum, who was deputy director of Renault’s electric-vehicle program; Michel Balthazard, who was a member of the Renault management board; and Bertrand Rochette, a subordinate of Balthazard who was responsible for pilot projects. Various media reports — mostly from Le Figaro — claim that the State Grid Corporation of China opened bank accounts for two of the three managers (it is unknown which two). Money was allegedly wired through Malta, and Renault’s investigators found deposits of 500,000 euros (about $665,000) and 130,000 euros (about $175,000) respectively in Swiss and Liechtenstein bank accounts.

    Assuming this is true, it is still unclear what the money was for. Given that the three executives had positions close to the electric-vehicle program, it seems that some related technology was the target. Patrick Pelata, Renault’s chief operating officer, said that “not the smallest nugget of technical or strategic information on the innovation plan has filtered out of the enterprise.” In other words, Renault uncovered the operation before any technology was leaked — or it is intentionally trying to downplay the damage done in order to reassure investors and protect stock prices. But Pelata also called the operation “a system organized to collect economic, technological and strategic information to serve interests abroad.”

    Renault is convinced a foreign entity was involved in a sophisticated intelligence operation against the company. The question is, what foreign entity? On Jan. 13, Renault filed an official complaint with French authorities, saying it was the victim of organized industrial espionage, among other things, committed by “persons unknown.” French Industry Minister Eric Besson clarified Jan. 14 that there was no information to suggest Chinese involvement in the case, though he previously said France was facing “economic war,” presuming that the culprits came from outside France. The source for the original rumors of Chinese involvement is unclear, but the French clearly backed away from the accusation, especially after Chinese Foreign Ministry spokesman Hong Lei called the accusation “baseless and irresponsible” on Jan. 11 (of course, even if the Chinese were the culprits they would certainly not admit it).

    The Chinese have definitely targeted energy-efficient motor vehicle technology in the past, in addition to the Ford and GM cases, and Renault itself is no stranger to industrial espionage activities. In 2007, Li Li Whuang was charged with breach of trust and fraudulent access to a computer system while working as a trainee at Valeo, a French automotive components manufacturer, in 2005. The 24-year-old was studying in Paris when she was offered the trainee position at Valeo. Investigators found files on her computer related to a project with BMW and another with Renault.

    The new Renault case, however, is very different from most Chinese espionage cases. First, it involved recruiting three French nationals with no ethnic ties to China, rather than first-generation Chinese. Second, the alleged payments to two of three Renault employees were much larger than Chinese agents usually receive, even those who are not ethnic Chinese. The one notable exception is the case of Larry Chin, who is believed to have received more than $1 million in the 30 years he spied for China as a translator for U.S. intelligence services. Renault executives would also be paid as much or more in salaries than what was found in these bank accounts, though we don’t know if more money was transferred in and out of the accounts. This may not be unprecedented, however; STRATFOR sources have reported being offered many millions of dollars to work for the Chinese government.

    Another problem is the alleged use of a Chinese state-owned company to funnel payments to the Renault executives. Using a company traceable not only to China but to the government itself is a huge error in tradecraft. This is not likely a mistake that the Chinese intelligence services would make. In Chin’s case, all payments were made in cash and were exchanged in careful meetings outside the United States, in places where there was no surveillance.

    Thus, STRATFOR doubts that the Renault theft was perpetrated by the Chinese. The leak suggesting otherwise was likely an assumption based on China’s frequent involvement in industrial espionage. Still, it could be a sign of new methods in Chinese spycraft.

    Higher-level Recruitment?

    The Shriver and Renault cases could suggest that some Chinese intelligence operations are so sophisticated that counterintelligence officers are unaware of their activities. They could mean that the Chinese are recruiting higher-level sources and offering them large sums of money. Chin, who got his start working for the U.S. Army during the Korean War, remained undetected until 1985, when a defector exposed him. There may be others who are just as well hidden. However, according to STRATFOR sources, including current and former counterintelligence officers, the vast majority of Chinese espionage operations are perpetrated at low levels by untrained agents.

    There is little indication that the Chinese have switched from the high-quantity, low-quality mosaic intelligence method, and cyber-espionage activities such as hacking Google demonstrate that the mosaic method is only growing. The Internet allows China to recruit from its large base of capable computer users to find valuable information in the national interest. It provides even more opportunities to vacuum up information for intelligence analysis. Indeed, cyber-espionage is being used as another form of “insurance,” a way to ensure that the information collected by the intelligence services from other sources is accurate.

    If China is responsible for the Renault penetration, the case would represent a change in the Chinese espionage MO, one aiming at a higher level and willing to spend more money, even though most of the cases prosecuted in the United States pointed to a continuation of the mosaic paradigm. Nevertheless, counterintelligence officers are likely watching carefully for higher-level recruits, fearing that others like Chin and Shriver may have remained undetected for years. These cases may be an indication of new resources made available to Western counterintelligence agencies and not new efforts by the Chinese.

    One thing is certain: Chinese espionage activities will continue apace in 2011, and it will be interesting to see what targets are picked.

    Security Weekly
    THURSDAY, JANUARY 20, 2011 – 03:53 Print Text Size
    By Sean Noonan

    Find this story at 20 January 2011

    Copyright © 2014 Stratfor

    Renault cars spy case: French intelligence investigates

    The French president has asked the intelligence service to investigate suspected industrial spying at Renault.

    The French carmaker has suspended three senior managers after an investigation into the possible leaking of electric vehicle secrets to rivals.

    The firm has said industrial espionage poses a serious threat to its “strategic assets”.

    The French industry minister has described the case of Renault, which is 15% state-owned, as “economic warfare”.

    The right-leaning Le Figaro newspaper reported that, according to several sources, the information passed on relates to the technology in the battery and the engine of electrical vehicles that will be rolled out after 2012.

    Advanced technology

    The three executives suspended are alleged to have sold new patents not yet registered to one or several intermediaries specialising in economic intelligence.

    One of the three – who have all been given the opportunity to respond to the charges made against them, before any sanctions are imposed – is a member of the carmaker’s management committee.

    Continue reading the main story
    Analysis

    image of Mark Gregory
    Mark Gregory
    BBC News
    The incident comes at a time of rising concern in Europe and America about protecting intellectual property rights.

    The picture emerging from French media reports is that the three suspended executives may have leaked details of battery and engine technologies developed for Renault’s new generation of electric cars.

    Whether or not the allegations are true, they have touched a raw nerve. Western firms are worried about rivals in emerging economies grabbing their best ideas without paying for them.

    The issue is becoming more serious as China and other new industrial powers become more sophisticated in what they produce.

    Stories about stolen industrial secrets will probably become more frequent as competition between old industrial powers and new ones intensifies.

    The BBC’s Christian Fraser, in Paris, says that it is a mark of how seriously the French government is taking this breach of trust that it has asked the intelligence service to investigate.

    Car manufacturing is an important part of the French economy, and a major employer, our correspondent says.

    One of the biggest advantages that Western carmakers have is their advanced technology, which enables them to compete against cheaper labour costs outside Europe.

    According to sources within Renault it is suspected the final recipient of this information was likely to have been a Chinese rival.

    “We cannot accept that an innovation financed by the French taxpayer ends up in the hands of the Chinese,” one, anonymous industry ministry source told Agence France Presse.

    The carmaker, alongside its partner Nissan, has invested heavily in electric vehicle technology.

    Both plan to launch a number of new electric vehicles over the next two years.

    7 January 2011

    Find this story at 7 January 2011

    BBC © 2014

    After Crimea, West’s spies, armies to raise Russia focus

    (Reuters) – As Western states enter a new era of potential confrontation with Moscow, they face an awkward reality.

    A quarter-century after the fall of the Berlin Wall, the level of expertise on Russia in intelligence agencies, armed forces and governments has diminished drastically.

    Rising concern over Russian government espionage – including increasingly sophisticated cyber attacks and computer spyware – had sparked some modest renewed interest in recent years, primarily in counterintelligence.

    But the way Washington and its allies were so blindsided by President Vladimir Putin’s military seizure and annexation of Crimea from Ukraine, is seen demonstrating a dramatic need for renewed focus.

    The bottom line, current and former officials say, is that with the post-September 11, 2001 focus on Islamist militancy and the Middle East and later the rise of China, the former Soviet Union was simply not seen a career enhancing speciality.

    Compared to the Cold War era, when most of Russian territory was off-limits to Westerners, regional specialists say there is no shortage of expertise among academics and in the business community today. But it has so far gone untapped.

    “There is a good supply of Russia experts out there – people who have lived there with lots of good experience – but the demand has just not been there from government,” says Fiona Hill, U.S. national intelligence officer for Russia in 2006-9 and now director for the Centre for the United States and Europe at the Brookings Institution.

    “The Pentagon in particular has lost a lot of its Russia expertise, as has the White House.”

    More of those outside experts are now likely to find work in defence ministries and intelligence agencies, current and former officials say. But in an era of constrained budgets, focusing on Russia is likely to mean redeploying resources from elsewhere.

    Until the Ukraine crisis that did not seem a natural choice, people with knowledge of internal discussions say.

    “The main problem is one of capacity at a time when counterterrorism, Iraq, Afghanistan and the Arab awakening have taken up so much energy,” said one former Western intelligence officer on condition of anonymity.

    Russia is primarily a threat to its immediate neighbourhood only, officials and analysts say, but still one requiring greater vigilance that over the last two decades.

    “THOSE WHO KNOW MOST WORRY”

    Capacity alone is far from everything. The West’s legions of Soviet specialists, with few exceptions, missed the warning signs of the collapse of the Soviet Union in 1989.

    Still, officials and analysts say there is a growing feeling that the West should have done more to increase its Russia focus particularly as Moscow’s defence spending rose some 30 percent after its 2008 war with Georgia.

    “The people who know the most about Russia’s defence capability have tended to take it the most seriously,” says former Pentagon official Elbridge Colby, now a senior fellow at the Centre for a New American Security.

    Some central and east European and Nordic states have long focused much if not all of their intelligence and defence resources on Russia. Poland and Sweden in particular are seen leading the pack. Others are now catching up.

    One reason Washington and its allies were so surprised by events in Crimea was that during Russia’s military build-up in the region, there was little or no signals chatter indicating an imminent takeover, intelligence sources say.

    Still, Moscow had very publicly mobilised its forces several days earlier ostensibly for an exercise. That such obvious clues were missed, some say, suggests analysts had lost their edge in assessing and predicting the actions of the Russian leadership.

    While U.S. officials are now monitoring closely a Russian troop build-up along Ukraine’s eastern border, Western experts differ over whether Putin plans to invade the region.

    SPY RING, SPYWARE

    For the United States, two espionage incidents in the last decade helped draw counterintelligence attention back to Moscow’s suspected activities.

    The first was the 2008 discovery of sophisticated spy software dubbed Agent BTZ that infected Department of Defence computers after apparently entering from a USB drive later found in the car park of a U.S. military base in the Middle East.

    Pentagon officials spent months cleaning systems and the attack is still seen one of the most serious breaches of U.S. government IT security. Although Washington never officially laid blame for the intrusion, several US officials told Reuters on condition of anonymity that Moscow was the prime suspect.

    Much higher profile was the 2010 arrest and expulsion of 10 “deep cover” spies in the United States including Anna Chapman, who became a Russian television presenter and celebrity. That followed information from a Russian defector and a major FBI investigation. There is little evidence the spies were hugely successful.

    In Britain, security agencies began paying more attention to Russia after the 2007 death of Putin opponent Alexander Litvinenko from radioactive poisoning.

    Until recently, however, military intelligence specialists were simply too busy with operations in the Middle East and Afghanistan.

    Russia’s Crimea annexation may revive military specialisms such as tank and submarine warfare neglected during the decade-long campaign in mountainous, landlocked Afghanistan.

    “Antisubmarine warfare is something that has been far too sidelined for the simple reason that the Taliban do not have submarines,” said one former senior European officer.

    Some of the problems in understanding Russia, however, may be societal rather than military.

    “For a country that is so patriotic, we can be highly intolerant of others’ patriotism,” former Pentagon official Colby said of the United States. “We just don’t see their patriotism as particularly legitimate.”

    BY PETER APPS
    LONDON Mon Apr 7, 2014 1:35pm BST
    (Reporting by Peter Apps; Editing by Paul Taylor)

    Find this story at 7 April 2014

    Copyright Thomson Reuters

    How Special Branch Spied on Animal Rights Movement

    Since 2010 there have been revelations about police infiltration of protest groups. For over 40 years the state sanctioned the use of undercover police to gain intelligence on political activists, including animal rights campaigners.

    Though it was widely assumed that groups were under surveillance, no-one would have imagined the extent to which the secret state burrowed deep into organisations, established close friendships and sexual relationships with activists, and broke the law to further its objectives. This article will explain how it happened and what can be learnt from it.

    The Special Demonstrations Squad

    The story begins in 1968, when tens of thousands of people marched against the Vietnam War. In March there was rioting as protesters fought with police outside the American Embassy in London and the government was so alarmed that it set up of the Special Demonstrations Squad (SDS).

    Although the police had used undercover officers before to catch criminals, this was as Rob Evans and Paul Lewis say in their book ‘Undercover’, ‘a new concept in policing.’ Special Branch officers transformed themselves into activists and lived amongst their targets for several years. They changed their appearance and used fake identities to penetrate political groups to the highest levels to gain intelligence and to enable the police to maintain public order. The nickname for the SDS was ‘the hairies’ because – in the early days at least – their operatives had to grow their hair long in order in order to blend into the milieu of radical politics.

    The job of the SDS was to infiltrate groups considered subversive which meant those that ‘threatened the safety or well-being of the state or undermined parliamentary democracy’. Initially this meant mainly Marxist or Trotskyist groups, as well as the anti-apartheid movement in the seventies.

    The eighties: Robert Lambert

    By the early eighties, however, the animal rights movement had become established. It was attracting thousands of people on protest marches against vivisection and groups like the Animal Liberation Front (ALF) were rescuing animals and damaging property. To the state this was a dangerous and subversive threat.

    Evans and Lewis say Special Branch first became involved when one of its operatives was deployed at the World Day for Lab Animals march in April 1983. Shortly afterwards a second spy was sent in. His name was Robert Lambert and he became an almost legendary figure amongst his colleagues. For the activists who knew him he was equally unforgettable, though nowadays it is for all the wrong reasons.

    Lambert called himself Bob Robinson. Like all SDS agents he stole the identity of a dead child. Mark Robert Robinson died aged seven in 1959, only to be quietly resurrected 24 years later by Lambert who would have found his birth and death certificates. He was then given a forged driving licence, passport and other documents. This procedure was known in SDS circles as the ‘Jackal Run’ because it was based on the book, ‘The Day of the Jackal’.

    Lambert quickly immersed himself in the world of animal rights by going to protests and meetings. At a demo outside Hackney Town Hall he met Jackie, 12 years younger than him, and they soon started a relationship and their son was born in 1985. Lambert was already married with two children but knew an activist girlfriend would give his cover an added dimension, making him appear a fully rounded, genuine person.

    London Greenpeace and the ALF

    In 1984 Lambert became involved in London Greenpeace (LG). This wasn’t an AR group as such but a radical organisation (not to be confused with the much larger Greenpeace International) that embraced anarchism and direct action. Up to then it had been mainly concerned with anti-nuclear and environmental issues but in the mid-eighties it adopted much more of an animal liberation stance.

    The first LG meeting I attended was a public meeting with a speaker from the ALF in 1985. Lambert chaired the discussion and obviously had a prominent role in the group. He soon became a close friend. Like all the spies that followed him, Lambert had a van that was used to take people to demos. He said he was a gardener and needed a vehicle for his job.

    Lambert’s mission was to infiltrate the ALF and he made it clear he was a strong supporter of illegal actions. In 1986 he organised a benefit gig for the ALF Supporters Group but kept back some of the takings to buy glass etching fluid, used to damage windows. Soon afterwards he confided to friends that he had dressed as a jogger and thrown paint stripper over a car belonging to the director of an animal laboratory.

    He also wrote two notable publications. One was a simple A5 leaflet titled ‘You are the ALF!’ which exhorted people to do direct action themselves, not ask others to do so on their behalf. The other was a booklet called ‘London ALF News’ which had articles on the ALF and a diary of actions, including attacks he had carried out.

    Debenhams

    In July 1987 the ALF targeted three Debenhams’ department stores with incendiary devices because they sold fur. In two, water from the sprinklers caused hundreds of thousands of pounds in losses, but at the Luton branch they had been switched off and fire gutted the store, causing over £6m in damage.

    Two months later, Andrew Clarke and Geoff Sheppard were caught at the latter’s bedsit in Tottenham in the act of making incendiary devices as the police burst in. In June 1988 at the Old Bailey Sheppard received 4 years and 4 months and Clarke 3 ½ years. Obviously the police had been tipped off but neither activist knew who it was until nearly 24 years later when Lambert was uncovered as a spy.

    Lambert, according to Sheppard, was the third member of this cell. Neither activist suspected him but then they had good reason not to – as far as they were concerned he had planted the device in the Harrow store that caused £340,000 in damage.
    The last time I saw Lambert was in a pub near the LG office in Kings Cross in November 1988. He was unusually downbeat as he told me his father who had dementia had just died and the values he fought for in World War II were dying too under Thatcherism. He also said Jackie had started a relationship with a fascist and he was no longer allowed to see his son. Both stories were lies and I now know he was preparing for his exit.

    All undercover spies have an exit strategy, usually prepared months if not years in advance. Lamberts would have been devised around the time of the Debenhams action but departing too soon would have appeared suspicious. He waited for over a year, until he left allegedly on the run from Special Branch, which was in fact his employer. They even staged a fake raid at the flat where he was staying.

    John Dines

    By the beginning of 1989 Bob Robinson was just a memory but LG already had another spy in its ranks. John Dines, using the surname Barker, had joined the group in October 1987. During the next year as he rose to prominence, Lambert was on the wane – going to fewer meetings and demos. This was a pattern that would be repeated time and time again.

    Like his mentor, Lambert, Dines had van which he used for demos. He twice drove activists all the way to Yorkshire to sab grouse shoots and he also took them to a protest against Sun Valley Chickens in Herefordshire. While there he was apparently arrested but released without charge. He too produced an anonymous publication called ‘Business as Usual’, which comprised a diary of actions, and he also organised two benefit gigs for London Greenpeace in late 1989.

    John Dines and McLibel

    While LG was well known in activist circles – mainly for the anti-McDonald’s campaign it had started several years earlier – it hardly registered to the outside world. Most people confused it with Greenpeace International. All that began to change, however, when five of its supporters were sued for libel by McDonald’s in September 1990.

    None of the defendants had written the pamphlet that was the subject of the writ; in fact three of them weren’t even part of the group at that time. Ironically Lambert had been one of the architects of the ‘What’s Wrong with McDonald’s’ factsheet but he was long gone.

    McDonald’s placed several infiltrators of its own in the group from the autumn of 1989 onwards with the result that it became infested with spies. At some meetings there were more of them than genuine activists. These new corporate spies aroused suspicion – they didn’t quite fit in – and some of them were followed. One of those doing the following was Dines, together with Helen Steel, who would later be sued and become Dines’ girlfriend..

    In January 1991 I and two others decided to cut our losses and apologise. Helen and Dave Morris carried on fighting the case as the McLibel 2. By their side was Dines who was the group’s treasurer and a key player. He relayed the legal advice they received and the tactical discussions they had with other group members back to his bosses in the SDS who then passed it on to McDonald’s. Several years later the McLibel trial revealed that Special Branch and McDonald’s had exchanged information about London Greenpeace. Morris and Steel sued the Metropolitan Police over this and received £10,000 in an out of court settlement and an apology.

    London Boots Action Group: Andy Davey and Matt Rayner

    By the early nineties the animal rights movement was on a roll again and three activists decided to set up a new London-wide organisation called London Boots Action Group (LBAG), to target Boots plc, which at that time did animal testing. LBAG was unashamedly pro-direct action so it is no surprise that it became a target for the SDS. The group was launched in November 1991 with a public meeting that attracted nearly 100 people, two of whom were spies.

    Andy Davey and Matt Rayner were two of the many new people to join the fledgling group. But they were slightly different – they had vans, which made them both unusual and useful, and they got quickly involved. Both also had jobs (quite rare in those days as many activists were either unemployed or students). Davey was a ‘man with a van’ removal service – his nickname was ‘Andy Van’ – while Rayner said he worked for a company that delivered musical instruments.

    Each lived in a bedsit, Davey in Streatham, south London, Rayner in north London. They even looked similar – tall, dark haired and with glasses, and spoke with Home Counties accents. What set Davey apart from other agents was his dog, named Lucy who came from an animal rescue person that lived locally. His bosses probably decided he would appear a more authentic activist if he had a companion animal.

    Personality-wise they differed though. While Rayner was easy going and friendly, enjoying social situations, Davey had a somewhat hesitant and nervous manner and could at times appear too eager to please. Initially there were suspicions about both but they quickly assimilated into the protest scene. They would have known who each other were, as their unit had only about a dozen operatives at any time, but they weren’t close. This meant that if one spy was uncovered, the other wouldn’t fall under suspicion.

    It was not common practice for two spies to be placed in the same group. In the book Undercover, the whistleblower Peter Francis says the SDS had two animal rights spies when he joined it in January 1993. This was indicative of the threat posed by animal rights in general and LBAG in particular.

    Davey was so well entrenched that he begun to produce the group’s newsletter. Shortly afterwards he also transferred the mailing list onto a computer. We were in the era when some organisations still did not have their own PC or internet access and his IT expertise was considered invaluable. Spies are trained to exploit skills shortages like this, to ensure they become trusted and above suspicion.

    Rayner, too, was a fixture in the London scene. He would usually be the one to drive activists to demos outside London. A notable example was the 1993 Grand National when he took a vanload of people to Aintree. This was the year the race had to be abandoned because the course was invaded, costing the betting industry over £60m.

    In 1995 – following former spy Dines’ example – he drove a carload of saboteurs to the ‘Glorious Twelfth’ to sab a grouse shoot. While there he was arrested and taken into police custody, only to be released a few hours later. He wasn’t charged but this brush with the law only served to improve his standing.

    London Animal Action: Davey’s exit

    Rayner had a long term relationship with a female activist. Davey never managed this though it wasn’t for want of trying and he gained a reputation as a lecher. This no doubt undermined his status – some saw him as a bit sad, others didn’t really take to him – and it probably played a part in the decision to take him out of the group. This happened quickly as he announced he was ‘stressed’ and was going to Eastern Europe. The double life he was leading was probably taking its toll as well. He left in February 1995 with a farewell social to which only a few people came. Shortly afterwards a hunt sab whom he knew received a couple of letters postmarked abroad.

    As Davey’s exit was hasty, the spy who replaced him joined London Animal Action – as LBAG was now called – around the same time he left. Unusually the new agent was female and her name was Christine Green. As she set about inveigling herself into the group, Rayner’s deployment was reaching its climax. In May 1995 Geoff Sheppard’s flat was raided again by the police where they found materials for making an incendiary device and a sawn-off shotgun. In October he was sentenced to seven years in prison.

    After Geoff’s release we speculated on why the police had chosen him. Devices were being placed in various targets and it appeared to have been simply a chance raid due to his arrest in the eighties. However, it is now clear that Rayner set Geoff up just as Lambert had done years earlier. No-one suspected him of the sting because he was, like his boss had been, an established and trusted of the group: by 1995 he was LAA treasurer.

    Lambert the spymaster

    By the mid-nineties Lambert was the operational manager of the SDS thanks to his ‘legendary tour of duty’ a decade earlier. According to Evans and Lewis he was ‘the gaffer…pulling the strings like a puppet-master’ and he used his experience to guide a new generation of infiltrators who were in some cases spying on the same activists as he had. Geoff was one of those and he describes Rayner as being ‘up to his neck’ in direct action. The final proof came in April 2013 when it was discovered the real Matthew Rayner died aged four in 1972. We still don’t know his true identity.

    One of Lambert’s first duties when he re-joined the SDS was to write a report on a spy who had ‘gone rogue’ named Mike Chitty. Chitty – known as Mike Blake – had penetrated the animal rights movement in London at the same time as Lambert but in comparison his deployment had been a failure. It resulted in no high-profile ALF arrests and it seems he enjoyed socialising more than targeting subversives. Even worse, when his deployment finished he returned to his activist comrades, leading a double life unbeknownst to his employers or his wife. He was eventually pensioned off after he began legal action against the Met for the stress he suffered due to his covert role.

    Rayner’s exit strategy

    Clearly not everybody could cope with the demands of undercover work. Davey may have been one of those but Rayner made of different stuff. His exit strategy was masterly in execution, bearing the hallmark of his mentor and manager, Lambert, who had written a report highlighting the importance of ‘carefully crafted withdrawal plans’ to convince ‘increasingly security-conscious target groups of the authenticity of a manufactured departure…inevitably this entails travel to a foreign country.’

    In November1996 Rayner apparently went to work in France for a wine company. He had always liked France and could speak the language fluently. To a few close friends he mentioned his unease with activism after being raided by the police and the breakdown of the relationship with his girlfriend. Very well liked, he was given a big going away party, presented with a camera from the group and a speech wishing him well in his new life.

    The next day he drove to France in his van and with him were two activist friends. At the port they were questioned by a police officer who said he was from Special Branch before letting them go on their way. This plan was concocted for the activists’ benefit in the knowledge they would tell others about it, lending further credibility to Rayner’s exit. A few weeks later he briefly came back to London and met up with friends before supposedly returning to France for good. Then over a period of about a year letters were sent and phone messages were left saying he had moved to Argentina, and after that he was never heard from again.

    Christine Green

    By 1997 Green was occupying a key part of the group, driving activists to demos, going to meetings and mailouts and taking part in protests, as her predecessors had done. She had even taken over Rayner’s role of group treasurer. The same pattern repeating itself but no-one was aware of it. For the next two years Green appears to have been the only spy in LAA. Perhaps there was another who remains unexposed – though this seems unlikely – or the SDS may have deployed another spy elsewhere.

    To enhance her cover, Green began a relationship with a well-known hunt saboteur whose job was a coach driver and they took coach loads of protesters to some of the high profile demos of the time, for example at Hillgrove Farm. There is no suggestion that the sab was a spy. There was speculation surrounding her, however: she was not always easy to get along with – though she did make some friends -and she always carried the same bag around with her, which inevitably drew suspicion.

    Towards the end of 1999 Green let it be known she was tired with activism. Early in 2000 she said she was departing to Australia for a relative’s funeral and would stay there travelling. About a year later, though, she reappeared and made contact with a few activist friends. Several years later in 2010 she cropped up once more, this time in Cornwall where she was spotted with the same boyfriend in a veggie café. Someone who knew them from LAA tried to have a chat and was all but ignored.

    Dave Evans

    Green’s replacement in and the last known SDS spy was Dave Evans. Like Dines he appeared to be from New Zealand and he had the same rugged appearance. He had a van and was a gardener too, so very much in the Lambert mould, except his personality couldn’t have been more different. While his boss was amiable, even charming, Evans could be a bit peevish and erratic: once he turned up at a demo then left after only a few minutes saying his flatmate was locked out. Typically spies spent five or six days in the field, only returning to their families for one night per week, but on one occasion he went missing for so long that people became concerned and went round to his flat.

    A lot of the time he gave the impression of not being very committed and more interested in the social side of the group. LAA had a big drinking culture which he took to like a duck to water and he often took part in fundraising at festivals by working in bars. In SDS parlance he was a ‘shallow paddler’, not a ‘deep swimmer’.

    In the last year or so of his deployment, Evans’ involvement in animal rights tapered off somewhat and it was recently revealed that his flatmate was Jason Bishop, a spy active in anti-capitalist groups. The pair drove minibuses to the G8 protests in Scotland in 2005. Both were arrested with other activists for conspiracy to commit a breach of the peace but the charges were dropped.

    Evans’ exit and the end of the SDS

    Evans was last seen at the AR Gathering in 2005. While sitting around a bonfire he began asking other activists questions about LAA, which had just folded after its bank account containing thousands of pounds was seized by Huntingdon Life Sciences. The mask slipped and it became obvious that he was a cop. He must have realised this because he left the next morning and was never seen again. Evans was the last known SDS spy in London animal rights circles. There were also at least two corporate infiltrators during this period, one of whom worked her way up to be group treasurer before she was uncovered.

    In 2008 the SDS was disbanded, its functions supplanted by the National Public Order Intelligence Unit (NPOIU) set up a few years earlier. This was one of three pillars of a new secret state established by the Labour government to combat ‘domestic extremism’, a term which encompassed anyone who wanted to ‘prevent something happening or to change legislation or domestic policy outside of the normal democratic process.’ The others were the National Extremism Tactical Co-ordination Unit (NETCU) and the National Domestic Extremism Team.

    There is no reason to believe that intelligence gathering has diminished in the last few years. The animal rights movement has been perceived as less of a threat, mainly due to the imprisonment of certain activists, but the emergence of the anti-badger cull campaign will undoubtedly lead to an increase in surveillance and spying. The ‘Undercover’ book also mentions a recent spy in the Welsh animal rights scene but does not go into detail.

    Conclusion: (1) How were we duped?

    With the benefit of hindsight it appears obvious that animal rights groups in London were targeted by undercover police who followed the same pattern over a period of at least two decades. In that case why did no-one find out what was going on?

    The answer lies in Lambert, the spymaster, who established the template the rest followed. For 23 years ‘Bob’ as he was known was held in such high esteem and affection that his authenticity wasn’t doubted. He was one of us, an anarchist and animal liberationist, who had fled overseas to build a new life. Nobody guessed he was working just a few miles away at Scotland Yard.

    The agents that followed – Dines, Davey, Rayner, Green and Evans – did attract suspicion but only individually, not as a sequence. The people they spied upon were activists fighting for animal rights and a better world, welcoming of outsiders into their groups, not spycatchers. Moreover the suspicions were usually no more than of the ‘they are a bit dodgy’ variety, with little or no concrete evidence. Many people have been falsely accused in this way over the years.

    The whole thing finally fell apart thanks to the determination of two women: Helen Steel and Laura, the girlfriend of a spy called Jim Boyling, whom she met in Reclaim the Streets in 1999. She managed to track him down after he left her and he confessed about Lambert and Dines. Helen had spent years searching for the latter after he supposedly ran off abroad in 1992. By 2010 she knew he had been a cop but it was Laura who confirmed that he was also a spy. At the same time Mark Kennedy, who worked for the NPOIU, was unmasked.

    Conclusion: (2) What difference does it make?

    The next important question is what difference does it make? Isn’t this just history? While a lot of this happened a long time ago it does stretch up almost to the present. Those who experienced this also have to show what the state is capable of doing to other, newer activists. Should we should trust politicians and believe the promises made by political parties or is the state fundamentally a force for repression? Can we cooperate with a system that tries to disrupt and undermine groups and individuals in this way?

    What went on still matters because when we sweep away all the intrigue and scandal, we are left with a very simple fact: the spies were there to prevent animals being saved. This article has concentrated on what occurred in London because that’s where the writer has mainly been active but there is no question that infiltration went on elsewhere. We know, for instance, that there was a spy active inside SHAC before the mass arrests of 2007.

    Many people have been arrested, convicted and even imprisoned during the struggle for animal rights and if it can be proved that a spy was involved, then those convictions are possibly unsafe. Even if their role was only driving activists to a demo where they were arrested, then there could be good grounds for an appeal. This is especially true if those nicked discussed their case with the spy, because this information would have been passed on to the police.

    So far a total of 56 convictions or attempted prosecutions of environmental protesters have been overturned, abandoned or called into question over the past two years following disclosures surrounding the activities of undercover police officers. Most of these relate to Mark Kennedy and two climate change actions against power stations in 2008 and 2009.

    Most defendants are being represented by Mike Schwarz from Bindmans and he has said he is keen to act for animal rights campaigners who want to try to overturn their convictions. But in order to do that we first have to find out who the spies were.

    Conclusion: (3) Learning the lessons

    There are no fewer than 15 investigations taking police into the role of undercover police. The main one is Operation Herne which is an internal Metropolitan Police enquiry This will last up to three years and cost millions of pounds but many of the victims of the SDS, including women who had relationships with spies, are boycotting it. They have instead called for an independent public enquiry as when the police investigate themselves the result is inevitably a whitewash.

    What can activists themselves learn? Well firstly we should not succumb to paranoia. This may sound strange after what we know now but it is important to realise that the spies were in a small minority. Yes there were several in LBAG/LAA over the years but the group was large and regularly attracted over 50 people to its meetings.

    There are, however, commonsense precautions that can be taken. The modus operandi of Special Branch agents – such as using dead children’s’ identities and driving vans – will not be replicated by current spies but if there are certain aspects of a person’s behaviour that don’t make sense or appear suspicious , then it is entirely reasonable to find out the truth. If that means questioning the person to ascertain whether they are a bone fide activist, then so be it. A genuine person would not object to this line of enquiry if the reason for it were explained to them.

    Finally the lesson to take from all this is that we are making a difference. The state would not have invested such huge resources in trying to undermine the animal rights movement if it did not fear what we stand for. This is something we should be proud of.

    If you have any further information or would like to join an email distribution list called ARspycatcher please contact: ARspycatcher@riseup.net

    AR Spycatcher

    Find this story at 26 February 2014

    artikel als pdf

    << oudere artikelen  nieuwere artikelen >>