• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Ex-FBI agent who disappeared in Iran was on rogue mission for CIA

    An American man who disappeared in Iran more than six years ago had been working for the CIA in what U.S. intelligence officials describe as a rogue operation that led to a major shake-up in the spy agency.
    Robert Levinson, a retired FBI agent, traveled to the Iranian island of Kish in March 2007 to investigate corruption at a time when he was discussing the renewal of a CIA contract he had held for several years. He also inquired about getting reimbursed for the Iran trip by the agency before he departed, according to former and current U.S. intelligence officials.
    After he vanished, CIA officials told Congress in closed hearings as well as the FBI that Levinson did not have a current relationship with the agency and played down its ties with him. Agency officials said Levinson did not go to Iran for the CIA.
    But months after Levinson’s abduction, e-mails and other documents surfaced that suggested he had gone to Iran at the direction of certain CIA analysts who had no authority to run operations overseas. That revelation prompted a major internal investigation that had wide-ranging repercussions, the officials said, speaking on the condition of anonymity.
    The CIA leadership disciplined 10 employees, including three veteran analysts who were forced out of their jobs, the officials said.
    The agency changed the rules outlining how analysts conduct business with contractors, including academics and other subject-matter experts who don’t work at the CIA, making it harder for agency employees to have such relationships.
    The CIA ultimately concluded that it was responsible for Levinson while he was in Iran and paid $2.5 million to his wife, Christine, former U.S. intelligence officials said. The agency also paid the family an additional $120,000, the cost of renewing Levinson’s contract.
    Levinson’s whereabouts remain unknown. Investigators can’t even say for certain whether he’s still alive. The last proof of life came about three years ago when the Levinson family received a video of him and later pictures of him shackled and dressed in an orange jumpsuit similar to those worn by detainees at the prison at Guantanamo Bay, Cuba.
    “I have been held here for 31 / 2 years,” he says in the video. “I am not in good health.”
    U.S. intelligence officials concede that if he is alive, Levinson, who would be 65, probably would have told his captors about his work for the CIA, as he was likely subjected to harsh interrogation.
    The National Security Council declined to comment on any ties Levinson has to the U.S. government. “The investigation into Mr. Levinson’s disappearance continues, and we all remain committed to finding him and bringing him home safely to his family,” said spokeswoman Caitlin Hayden.
    In a statement released Thursday, Levinson’s family said the U.S. government has failed to make saving his life a priority. “It is time for the U.S. government to step up and take care of one of its own. After nearly 7 years, our family should not be struggling to get through each day without this wonderful, caring, man that we love so much,” the statement said.
    Levinson joined the FBI’s New York Field Office in 1978 after spending six years with the Drug Enforcement Administration. He was an expert on the New York mob’s five families. Eventually, he moved to the Miami office, where he tracked Russian organized-crime figures and developed a reputation for developing sources.
    While in the FBI, Levinson attended a conference where he met a well-respected CIA analyst named Anne Jablonski, one of the agency’s experts on Russia. The two formed a friendship.
    When Levinson retired from the FBI in 1998, he went to work as a private investigator.
    Jablonski continued at the agency and, among her other duties after the Sept. 11, 2001, attacks on the United States, was to brief FBI Director Robert S. Mueller and Attorney General John D. Ashcroft. By 2005, she was in the Office of Transnational Issues (OTI), the CIA unit that tracks money transfers, weapons smuggling and organized crime.
    Jablonski brought Levinson to the CIA for discussions on money laundering with her colleagues. In 2006, Tim Sampson, then the head of the Illicit Finance Group, which was part of OTI, hired Levinson. The unclassified contract was then worth $85,000.
    Academic reports
    Levinson was supposed to provide academic reports but was operating more like a spy, gathering intelligence for the CIA and producing numerous well-
    received reports, officials said. While working for the CIA, he passed on details about the Colombian rebels, then-President Hugo Chávez of Venezuela and Iran’s nuclear program.
    Levinson hopscotched the globe. He went to Turkey and Canada, among other countries, to interview potential sources, sometimes using a fake name. But CIA station chiefs in those countries were never notified of Levinson’s activities overseas even though the agency reimbursed him for his travel, a violation of the rules.
    On March 8, 2007, Levinson flew from Dubai to the Iranian island of Kish and checked into a hotel. He met with Dawud Salahuddin, a fugitive wanted for the murder of an Iranian dissident and diplomat who was shot at his house in Bethesda, Md. Levinson thought Salahuddin could supply details about the Iranian regime, perhaps ones that could interest the CIA, according to officials who have reconstructed some of his movements.
    Levinson spent hours talking to Salahuddin. The next morning, he checked out of his hotel and vanished, officials said. The United States suspected the Iranian security services were behind his abduction, according to a diplomatic cable disclosed by WikiLeaks.
    The U.S. government insisted that Levinson was a private citizen making a private trip. The State Department, in a cable to U.S. embassies in May 2007, said much the same thing. “Levinson was not working for the United States government,” Secretary of State Condoleezza Rice wrote.
    The CIA told the Senate Intelligence Committee that Levinson had done some minor work for the agency but that his contract had run out and the spy agency had nothing to do with him going to Iran. Agency analysts also spoke with the FBI and said they hadn’t sent him to Iran. The CIA’s involvement seemed to end there. The FBI, which investigates crimes against Americans, did not push the CIA to open its files and take a deeper look at Levinson’s relationship with the agency.
    But Levinson’s family and friends refused to accept that he was a lost tourist. A former federal prosecutor in Florida named David McGee, a friend of Levinson’s, and McGee’s paralegal, Sonya Dobbs, thought the government wasn’t being truthful about who employed Levinson.
    Dobbs managed to access Levinson’s e-mail accounts. There she found e-mails between Jablonski and Levinson and other material suggesting that he had worked with the CIA in what appeared to be a continuing relationship.
    One of the e-mails instructed Levinson not to worry about getting paid for going to Iran shortly before he made the trip. Jablonski said she would take care of it. She advised him not to contact the agency’s contract office. “Keep talk about the additional money among us girls,” she said by e-mail.
    The e-mails also suggested that Levinson was operating at Jablonski’s behest, according to officials who have reviewed the communications between the two. Jablonski adamantly denied in an interview that she oversaw what Levinson was doing.
    With the newly discovered information, McGee got the attention of Sen. Bill Nelson (D-Fla.), who serves on the intelligence panel and is from Levinson’s home state. At the CIA, agency investigators began to scrutinize Levinson’s relationship with Jablonski and her boss, Sampson, and discovered more problems in the handling of his work.
    Instead of mailing reports to the CIA, where they would be properly screened and processed, Jablonski had Levinson send them to her house, according to officials. She said she could review them faster that way.
    They used private e-mail accounts to communicate — one reason the CIA was slow to learn of the relationship. The arrangement led CIA investigators to think Jablonski was trying to obscure their ties, according to current and former U.S. officials.
    Jablonski never disclosed those details and others to investigators when Levinson disappeared. While the FBI and CIA knew about Levinson’s previous contract, answers she provided “didn’t square with the e-mails,” said a former senior agency official with knowledge of the events.
    To CIA officials, it appeared that she was running a source and collecting intelligence, a job for trained operatives in the clandestine service and not analysts. In fact, the CIA’s clandestine arm never knew that Levinson was on the payroll or his activities when he traveled abroad, officials said.
    By 2008, the CIA’s deputy director at the time, Stephen Kappes, conceded to Nelson and other senators that there was more to the Levinson story than the agency had acknowledged the previous year. Some on the committee said they had been misled by the CIA.
    Jablonski said in an interview that she wasn’t hiding anything from CIA officials and that they knew about the arrangement with Levinson. Jablonksi said she would never put Levinson, a friend, in harm’s way.
    Nevertheless, Jablonski and Sampson could face criminal charges, law enforcement officials say. Both veteran analysts resigned from the CIA in 2008 along with a third senior manager. Jablonski now works in the private sector. Sampson took a job with the Department of Homeland Security. He declined to comment for this report.
    He told the Associated Press: “I didn’t even know he was working on Iran. As far as I knew he was a Latin America, money-laundering and Russian-organized-crime guy. I would never have directed him to do that.”
    A break in 2010
    For years, Levinson’s family had no word on the fate of the former FBI agent. A break came in November 2010 when an unknown source sent the family a 54-second video of Levinson, who appeared haggard but otherwise unharmed. They are unsure who sent the video, or why. The FBI is also unsure when the video was made.
    “Please help me get home,” he says in the video. “Thirty-three years of service to the United States deserves something. Please help me.”
    Levinson spent only 28 years with the Drug Enforcement Administration and the FBI, suggesting that he was including his time on a CIA contract as part of his government service.
    A few months later, the family received a series of pictures: Levinson, his hands chained and his hair long and unruly, dressed in an orange jumpsuit. The family received them in April 2011. The FBI determined that they were sent from Afghanistan but was unsure when they were taken.
    The photographs and videos turned into a dead end. And a recent FBI media blitz and $1 million reward haven’t revealed his whereabouts. Secret FBI meetings with the Iranians in Europe also have proved fruitless, officials said.
    After the video and pictures of Levinson emerged, American officials concocted a story that he was being held in Pakistan or Afghanistan in an effort to provide the Iranians some cover to release him, according to U.S. intelligence officials. Then-Secretary of State Hillary Rodham Clinton put out a statement in March 2011 that Levinson might be in southwest Asia. Officials hoped Levinson would turn up in one of those two countries and give the Iranians plausible deniability, officials said.
    The ruse failed.
    U.S. intelligence officials say that if there was a moment for his return, it was when they received the video. They can’t explain why Iran has freed other captives, such as a trio of U.S. hikers, but not Levinson. And other U.S. citizens being held by Iran — pastor Saeed Abedini and former Marine Amir Hekmati — are known to be alive, unlike Levinson.
    The Iranians have steadfastly denied holding Levinson. Even as the relationship between the United States and Iran has thawed with the recent election of President Hassan Rouhani and a temporary deal that freezes parts of the country’s nuclear program, there has been no progress on securing Levinson or information about his fate.
    “We don’t know where he is, who he is,” Rouhani told CNN in September during the United Nations General Assembly. “He is an American who has disappeared. We have no news of him.”
    U.S. intelligence officials remain skeptical. They suspect Iran did snatch Levinson, but they can’t prove it. Officials surmise that only a professional intelligence service such as Iran’s Ministry of Intelligence and National Security could have taken Levinson and thwarted American efforts to find him for so many years.
    U.S. intelligence officials acknowledge it’s very possible Levinson, who was in poor health, died under questioning at some point. They say there is no upside for the Iranians to admit he died in their custody.
    Former officials familiar with the case said releasing the information about his CIA ties won’t make his situation any worse.
    Levinson’s family refuses to believe he is dead and remains hopeful he will return home.
    In November, Levinson became the longest-held hostage in U.S. history, surpassing the 2,454 days that Terry Anderson spent in captivity in Lebanon in the 1970s.
    “No one would have predicted this terrible moment more than 61 / 2 years ago when Bob disappeared,” Christine Levinson said in a statement last month. “Our family will soon gather for our seventh Thanksgiving without Bob, and the pain will be almost impossible to bear. Yet, as we endure this terrible nightmare from which we cannot wake, we know that we must bear it for Bob, the most extraordinary man we have ever known.”
    This article was reported beginning in 2010 while Goldman worked at the Associated Press. Goldman, whose byline also appears on an AP story on this subject, is now a Post staff writer.
    By Adam Goldman,
    Find this story at 13 December 2013
    © The Washington Post Company

    CIA’s anti-terrorism effort called ‘colossal flop’ (2013)

    CIA officers given ‘non-official cover,’ often posing as business executives, tried to collect intelligence on terrorists. The NOC program reportedly has had few successes.
    WASHINGTON — Several years ago, a senior officer in the CIA clandestine service attended a closed-door conference for overseas operatives. Speakers included case officers who were working in the manner Hollywood usually portrays spies — out on their own.
    Most CIA officers abroad pose as U.S. diplomats. But those given what’s called non-official cover are known as NOCs, pronounced “knocks,” and they typically pose as business executives. At the forum, the NOCs spoke of their cover jobs, their false identities and measures taken to protect them. Few said much about gathering intelligence.
    A colleague passed a caustic note to the senior officer. “Lots of business,” it read. “Little espionage.”
    Twelve years after the CIA began a major push to get its operatives out of embassy cubicles and into foreign universities, businesses and other local perches to collect intelligence on terrorists and rogue nations, the effort has been a disappointment, current and former U.S. officials say. Along with other parts of the CIA, the budget of the so-called Global Deployment Initiative, which covers the NOC program, is now being cut.
    “It was a colossal flop,” a former senior CIA official said in sentiments echoed by a dozen former colleagues, most of whom spoke on condition of anonymity to discuss a classified program.
    Spurred by Congress after the attacks of Sept. 11, 2001, the CIA rushed to put its eyes and ears in gritty corners of the globe where Al Qaeda and other adversaries operate or recruit. The risk was considerable: Unlike CIA officers in embassies, NOCs have no diplomatic immunity if caught, and could face imprisonment or worse.
    The CIA spent at least $3 billion on the program, and the number of specially trained spies grew from dozens to hundreds. The entire clandestine service is believed to total about 5,000 people.
    But because of inexperience, bureaucratic hurdles, lack of language skills and other problems, only a few of the deep-cover officers recruited useful intelligence sources, several former officers said.
    Some of the most ambitious efforts were aimed at Iran, former officers said. The CIA created front companies and elaborate fake identities for operatives trying to recruit sources inside Iran’s nuclear and missile procurement networks.
    But Iranian authorities were able to expose American operatives, said two former senior CIA officials. They were transferred back to CIA headquarters in Virginia or other U.S. posts.
    Sometimes the CIA didn’t send the right people with the right cover, said Joseph Wippl, former chief of the CIA’s Europe division. Others were posted “a zillion miles from where their targets were located,” he said.
    CIA leaders also were reluctant to put the special spies in harm’s way.
    “There was just a great unwillingness to put NOCs in really, really dangerous places,” said another former case officer. “If you’re a high-grade agency manager, are you going to sign off on a memo that puts Joe Schmuckatelli in Pyongyang? Whether you are a careerist or not, that is a hard decision for anybody to make.”
    The program also was tainted by financial irregularities, according to a former senior CIA official. The CIA’s inspector general found that some NOCs billed the agency for unjustified time and expenses, three former officials said, and it forced a few to repay money.
    A CIA spokesman, Todd Ebitz, declined to comment about the NOC program, its budget or its problems.
    “The agency does not discuss publicly any cover techniques that it may employ,” he wrote in an email. “The CIA does keep the congressional intelligence oversight committees fully informed of its activities, which are constantly evolving to meet the threats to national security. And, while the details of the agency budget remain properly classified, sequestration and budget cutbacks have affected the entire federal government, including CIA.”
    The best-known NOC was Valerie Plame. In the mid-1990s, while in Brussels, she posed as an energy analyst for a Boston-based firm, Brewster Jennings & Associates, which the CIA later acknowledged was a front company. Plame maintained her false identity after she moved back to CIA headquarters in 1997, traveling frequently to the Middle East and elsewhere to recruit agents who could spy in Iran and elsewhere.
    Her CIA career ended in 2003 after Bush administration officials leaked her name to the press in an effort to discredit her husband, who had claimed the White House had manipulated intelligence on Iraq. A White House aide, I. Lewis “Scooter” Libby, was later convicted of perjury and obstruction of justice. Plame’s best-selling book on the case, “Fair Game,” was turned into a Hollywood film.
    Masking spies as engineers, consultants or other professions has long been part of the CIA playbook. But the push took on new urgency after the 2001 terrorist attacks exposed the CIA’s lack of informants inside Al Qaeda and other terrorist networks.
    It wasn’t that CIA officers were expected to personally infiltrate Al Qaeda. But working outside the embassy might make it easier to recruit local sources in Pakistan, Yemen and elsewhere who could collect intelligence on terrorist money, aims and intentions.
    In 2004, then-CIA Director Porter J. Goss announced a new effort to put more officers under deep cover to gain what he called “close-in access to the plans and intentions” of America’s adversaries. Soon after, Congress passed legislation permitting undercover CIA officers serving overseas to keep salaries from their civilian cover jobs even if it exceeded their federal paychecks.
    Members of the Senate Intelligence Committee pressed the CIA to go further. They attached a provision to their 2006 intelligence authorization measure questioning whether the spy service was “committed to doing what is needed to ensure that NOC operations are successful.”
    The agency doubled down. A growing number of recruits at the CIA training facility at Camp Peary, Va., known as the Farm — including the class of 2008, the largest in CIA history — was made up of NOCs, former officials said.
    Unlike their classmates, they were barred from making cellphone calls or using the Internet in order to hide any ties to the CIA. Later, many would operate in their own names, holding real jobs for multinational companies around the globe.
    But when it came to penetrating terrorist networks, NOCs suffered the same shortcomings as other CIA officers — too few spoke Urdu, Pashto, Dari or other necessary languages, or could disappear in local cultures, former CIA officers say.
    In 2008, a former CIA operative’s biting memoir, “The Human Factor,” was published, describing his 15 years overseas targeting nuclear networks and terrorist groups. He wrote that the CIA had spent at least $3 billion since 2001 to get deep-cover operatives overseas, but only a few had been successfully deployed.
    “There were only a handful of effective NOCs overseas, and that never changed,” the author, who uses the pseudonym Ishmael Jones, said in a telephone interview.
    In 2010, then-CIA Director Leon E. Panetta gave a speech promising “new approaches to cover.” But the vast majority of case officers continue to pose as diplomats, U.S. officials say.
    John Maguire, who retired from the CIA in 2005, argues that the CIA could help the NOC program by doing more to establish legitimate commerce for the front companies. But that would cause headaches for CIA administrators, he acknowledged.
    Maguire said he knew only three successful NOCs in his 23 years as a case officer. “They were absolute nightmares for the administrative bureaucracy of the agency,” he said.
    By Ken Dilanian
    December 8, 2013, 6:01 a.m.
    Find this story at 8 December 2013
    Copyright © 2013, Los Angeles Times

    The CIA Crosses Over; Even as a Congressional commission investigates the agency’s cold war incompetence, the CIA has expanded a high-risk plan to spy on U.S. economic competitors. our exclusive report exposes this secret program. (1995)

    What is a NOC?
    For resources on the CIA, see our resource guide.
    Robert Dreyfuss’ revelation that the CIA is engaged in economic espionage (“Company Spies,” June 1994) was covered extensively in Japan, but so far no American newspaper or network has touched the story. Now, Dreyfuss offers more proof.
    William Casey’s ghost haunts the Central Intelligence Agency.
    That ghost, a Central Intelligence Agency program revived by the late director in the 1980s, marries the spy agency to corporate America in order to gather intelligence on economics, trade, and technology. Now that the Cold War is over, agency officials have latched onto the idea of collecting clandestine economic data to justify the CIA’s inflated budget, even as the CIA’s competence–indeed, its very existence–is being questioned.
    Advertise on MotherJones.com
    And dozens of U.S. corporations–from Fortune 500 companies to small, high-tech firms–are secretly assisting the CIA, allowing the agency to place full-time officers from its operations divisions into corporate offices abroad.
    Serving under what is referred to as “nonofficial cover” (NOC), CIA officers pose as American businessmen in friendly countries, from Asia to Central America to Western Europe. There, they recruit agents from the ranks of foreign officials and business leaders, pilfer secrets, and even conduct special operations and paramilitary activities.
    The story of the CIA’s NOC (pronounced “knock”) program, revealed here for the first time, raises serious questions about the CIA at a time when the agency is already beset by scandal. Yet the NOC program has grown to its present bloated size without any public scrutiny–and with no open discussion within the companies whose interests could be harmed by a spy scandal.
    NOC, NOC! Who’s there?
    One hundred and ten CIA officers currently serve as NOCs, according to a recent CIA retiree. Some of the most familiar firms in America’s corporate hierarchy, CIA sources report, have sponsored NOCs overseas: RJR Nabisco, Prentice-Hall, Ford Motor Co., Procter & Gamble, General Electric, IBM, Bank of America, Chase Manhattan Bank, Pan Am, Rockwell International, Campbell Soup, and Sears Roebuck.
    In some cases, flamboyant conservative businessmen like Ross Perot and the late Malcolm Forbes have actively cooperated with the CIA in stationing officers worldwide. In other cases, obscure U.S. companies doing business abroad–such as a tiny Texas firm that deals in spare tractor parts in Latin America, cited by a former CIA officer–have taken part in the NOC program. Shipping lines, mineral and oil exploration firms, and construction companies with international operations, like the Bechtel Corp., often house NOCs.
    By joining the CIA in clandestine activities, a company tacitly accepts that some of its employees could routinely break the law in another country and, if exposed, embarrass the company and endanger its other overseas employees.
    Unlike most CIA officers, who are stationed abroad disguised as State Department employees, military officials, or other U.S. government personnel attached to an American embassy, NOCs operate without any apparent links to the U.S. government. They are able to approach people who would not otherwise come into contact with a U.S. embassy official. The CIA’s operations within terrorist, drug trafficking, and arms dealer networks often involve NOCs, who can move more easily in such circles without raising suspicion.
    In recent years, according to several CIA sources, NOCs have increasingly turned their attention to economics. Using their business covers, they seek to recruit agents in foreign government economic ministries or gain intelligence about high-tech firms in computer, electronics, and aerospace industries. They also help track the development of critical technologies, both military and civilian.
    NOCs frequently stay 5, 10, or more years in one place. During that time, the NOC is truly “out in the cold.” Their contacts with control officers in the CIA station are strictly limited; they do not have access to embassy files; and they must report through secret communications channels and clandestine meetings.
    “As a NOC officer you are truly alone,” says John Quinn, who spent much of the 1980s as a NOC in Tokyo. “The sense of isolation and loneliness is difficult to describe to those who have never experienced it.”
    Because NOCs do not have the diplomatic immunity that protects CIA officers operating under embassy cover, if they are exposed they are subject to arrest and imprisonment–and they can be executed as spies.
    How did we get here?
    The NOC program is one of the CIA’s most sensitive and closely held secrets.
    Former CIA Director William Colby refuses to comment on the NOC program. “I better stay off of that. It’s a very complicated subject. In deference to my old colleagues, the less chatter about that, the better.” But, if American corporate executives do lend their overseas offices to the CIA, Colby adds, “They have my strong applause. They only do it because they’re patriots.”
    The CIA has used private U.S. companies for cover overseas since its inception in 1947. “When the agency was being put together in the late 1940s, they made pretty extensive use of nonofficial cover,” says Admiral Bobby Ray Inman, a former CIA deputy director.
    Since it was cheaper to station spies in the U.S. embassy, cost-cutting led the CIA to scale down the number of NOCs by the 1960s. The program shrank further after ITT’s involvement with the CIA in the 1973 military coup against Salvador Allende’s government in Chile was revealed. “That clearly scared a lot of U.S. corporations,” Inman says.
    But events in the 1970s revived the use of NOCs. Investigative journalists and CIA defectors like Philip Agee publicized the fact that a cursory study of the State Department roster could identify CIA officers in any embassy, and publications like Counterspy even named individual CIA personnel.
    At the same time, the U.S. government cut the number of embassy personnel worldwide. “With them, they also took out the cover billets for the clandestine services,” Inman says.
    When William Casey took over the CIA in 1981, one of his decisions, according to Inman (who served as Casey’s number two), was to beef up the NOC program. Because of the closure of the U.S. embassy in Tehran in 1979, the CIA had virtually no presence in Iran. A NOC program, Casey reasoned, would at least have given the CIA a toehold inside the country.
    Richard Kerr, another former deputy director of the CIA, says that in the 1980s Casey was also concerned about economic intelligence, technology, and trade secrets. That gave him another reason to expand the NOCs.
    “There was an awful lot of technology theft. Tech transfer was the big thing,” says Kerr. “People, in effect, stealing U.S. technology–either the Soviets or the Iraqis or the Iranians, or in some cases the Japanese.”
    According to a former high-ranking CIA operations officer, Casey tripled the number of NOCs in 1986. “Casey believed that economics was going to be more and more a part of the CIA’s mission, including learning about other countries’ economic plans and intentions,” he says. “State Department pinstripers couldn’t do that job. They simply couldn’t associate easily with the commercial people in a country. So Casey ordered the CIA to refocus itself on economic issues. And that meant more NOCs.”
    It’s a hard NOC life
    Putting aside, for a moment, whether we should engage in economic espionage at all, perhaps the most damaging indictment of the NOC program is that, in the estimation of many of the people who are risking their lives for the program, it has wasted millions of dollars–while producing precious little of real value to decisionmakers.
    Interviews with former CIA officers who have served overseas and with midlevel and senior retired CIA officials reveal that the NOC program is beset with bungling, corruption, and poor tradecraft. The program is so badly run that NOCs are resigning from the CIA in droves, many after serious mistakes by the CIA that could have resulted in their exposure, arrest, or worse.
    Tom Darcy is a former CIA officer who served for five years as a NOC in Western Europe. Asked whether the CIA’s clumsy management has caused any NOC to land in a prison overseas, Darcy says, “Yes. More than once. Or die.”
    “The NOC program is horribly mismanaged,” says John Quinn. Though it costs hundreds of thousands of dollars to set up a NOC in an overseas corporation, CIA officers serving under embassy cover are rarely properly trained to work with NOCs. “There is a lot of suspicion and animosity between inside officers and NOCS,” Quinn adds.
    When errors involving the CIA program do come to light, CIA headquarters invariably corrects the problem in a way that favors the inside officers, not the NOCs. A CIA officer says, “Just like the way the Catholic Church protects priests accused of sexual abuse or wrongdoing, headquarters will always cover up for the division chief, the chief of station, or the deputy chief of station–and they will discipline the NOC.”
    In South America, for example, large sums of cash destined for a NOC were siphoned off by the CIA’s station chief, who escaped without reprimand.
    In that case, the innocent NOC’s career was severely damaged. But Quinn and other former NOCs say that embezzlement is also frequent among NOCs, who often handle large amounts of cash without any real oversight.
    Worse, the CIA pressures NOCS to produce intelligence, so their information is often questionable. “One NOC in Tokyo would fabricate intelligence reports based on what he thought the embassy officer wanted to hear,” says Quinn.
    A case history
    Perhaps the most interesting NOC case history uncovered by this reporter unfolded in the late 1980s in Tokyo.
    Japan has been a major theater of CIA operations since the United States’ post-World War II occupation. During the Vietnam War, the CIA expanded its presence in Japan, with additional focus on the country’s trade and political relations with the Soviet Union, China, Cuba, and other communist powers. According to a former CIA officer, the CIA’s Tokyo station was one of the largest in the world.
    Casey saw the Japanese threat as an economic one–and the NOC program as his vehicle to penetrate Japan’s scientific, technological, and commercial institutions. Thirteen NOCs were stationed in Japan in the mid-1980s, including John Quinn.
    According to him, one CIA target was a leading Japanese high-technology firm. “They wanted to know the structure of the company inside, who were the bigwigs, who were their policymakers, where was their R&D section, what was the R&D section working on, what was their budget, what were the critical technologies they were developing.”
    But a series of clumsy CIA mistakes caused the NOC program in Japan to self-destruct in 1988:
    The CIA’s Tokyo station chief installed a branch chief who “made it clear that he was not enamored of working with NOCs,” says Quinn. The branch chief questioned expense accounts and ordered one group of NOCs to report another’s petty infractions. Not surprisingly, the NOCs’ morale plummeted.
    The CIA’s “glorious ineptitude,” as another CIA officer calls it, alerted Japan’s counterintelligence unit, the Public Security Investigative Agency (PSIA), that the CIA was seeking to penetrate its commercial sector. During a series of regular, friendly liaison meetings between U.S. and Japanese intelligence officers in Tokyo, the PSIA politely suggested “certain businessmen” be reined in. “But we, in our dullness, failed to respond,” says the CIA officer.
    The communications and electronics equipment the CIA gave NOCs to allow them to maintain contact with the U.S. embassy was made in Japan. “They didn’t realize that the Japanese had built most of the stuff and knew its operating characteristics, so the systems weren’t secure,” says a senior CIA officer.
    CIA embassy officers routinely took taxis to meet NOCs, taking few precautions not to be seen. All of this was duly noticed by Japanese security people, who kept careful records on meetings held by these “businessmen.”
    Finally, exasperated, Japanese PSIA officers trashed the homes and offices of several NOCs, stealing communications equipment and wreaking havoc. Their actions, a CIA officer says, were meant to send a message to the CIA that such activity would not be tolerated. The CIA quickly withdrew at least 10 NOCs, a fiasco that cost the agency millions of dollars in investments in NOCs, one of whom had been in place for 15 years.
    Let’s get smart about intelligence
    Today, the CIA is trying to bridge the chasm between Cold War action and 21st-century diplomacy. Pressure is mounting for a sweeping, “zero-based” review of the entire $28 billion U.S. intelligence community. In response to the scandal after the arrest of CIA spy Aldrich Ames, Congress has appointed a blue-ribbon commission to review the CIA’s operations by 1996.
    Though the CIA is being downsized and there are calls to abolish it, there are also calls from CIA insiders, some congressional Republicans, and a few outside conservatives to expand the CIA’s use of spies–known in the trade as “human intelligence” (humint)–at the expense of techint, or intelligence gathered by satellites, listening devices, or other technical means.
    Robert Steele, a former CIA officer who has put forward a number of otherwise thoughtful ideas about reforming the CIA, recently called for a doubling of the agency’s clandestine espionage and for placing all of the new spies under “nonofficial cover.”
    Steele’s ideas may find a receptive audience on the Hill, following the conservative shift after November’s election. Soon-to-be Speaker of the House Newt Gingrich, the Republican from Georgia, joining the debate over the CIA’s future, cites the “need for stronger human intelligence”–i.e., more spies. And Larry Combest, a Texas Republican who could become the chair of the House Intelligence Committee, has said that he supports suggestions to increase the CIA’s budget.
    Critics and CIA loyalists alike contend that the vast bulk of economic information necessary for government decisionmaking can easily be obtained from newspapers, magazines, trade and technical journals, trade shows, and conventions. Most of the CIA’s economic spying produces little or nothing of real value for America’s policymakers.
    Yet the spiderlike agency continues to weave tangled webs that ensnare its officers as well as the foreign companies they seek to entrap. It would be an irony indeed if the current wave of CIA reformism results in a decision to maintain–or even expand–the NOC program and its cousins.
    Robert Dreyfuss is a Washington, D.C., freelance writer.
    Robert Dreyfuss is a longtime MoJo contributor and the author of Devil’s Game: How the US unleashed fundamentalist Islam
    —By Robert Dreyfuss
    | January/February 1995 Issue
    Find this story at January/February 1995
    Copyright ©2013 Mother Jones and the Foundation for National Progress.

    Revealed: Guantanamo suspects were ‘turned’ into double agents at secret facility

    CIA paid millions of dollars to small band of inmates who were recruited to spy on al-Qa’ida leaders
    The CIA was doing more than just incarcerating and interrogating the hundreds of terror suspects who were rounded up and delivered to the fortified Guantanamo Bay military prison in a remote corner of Cuba in the wake of the 9/11 attacks. In a few cases it was also trying to turn them into double agents.
    Click image above to enlarge graphic
    The programme, run from a secret facility within Guantanamo Bay which has never been revealed until now, ran from 2002 until 2006 and drew the personal attention of George W Bush who was then in the White House.
    A number of terror suspects were successfully turned and sent back to their countries in the hope that they would reconnect with the al-Qa’ida network and feed information back to the CIA to help it locate and kill high-profile targets, according to an investigation by the Associated Press.
    Only those believed still to have legitimate contacts with the top hierarchies of terror group were considered for the secret programme. Once identified, they were tempted by an assortment of inducements, most notably large sums of cash as well as promises from the CIA that their safety and that of their families would thereafter be assured, including with new false identities.
    The money for the men, which over time came to millions of dollars, was drawn from a secret CIA fund called the “Pledge”. More prosaically, these special recruits were offered equally special privileges while they remained at Guantanamo Bay, including being taken out of the main cell blocks and moved to a group of small, relatively cosy bungalows set several hundred yards away beyond a screen of shrub and cactus.
    The cottages, which went by the codename Penny Lane, had their own patios, kitchens and private showers. Perhaps most tempting of all, they featured proper beds with regular mattresses.
    The Penny Lane moniker was derived from The Beatles song, in a nod to the fact that the main cell block complex had already become known as “Strawberry Fields”, because of the next word in the chorus – “forever”. More than 10 years later some of the detainees are still incarcerated in them with little prospect of release.
    Some also took collectively to calling the hidden cottages the “Marriott”, because of their relative comfort. Allegedly, the Penny Lane residents were even allowed to access pornography if they so requested.
    There was no comment today from the CIA. Details of the programme, which came laden with heavy risks, were pieced together by the Associated Press following interviews with numerous current and former US officials who were familiar with it. They, however, spoke on condition of anonymity. Others familiar with Guantanamo Bay did not express particular surprise.
    “Of course that would be an objective,” noted Emile Nakhleh, a former top CIA analyst who helped assess detainees, without discussing the programme further. “It’s the job of intelligence to recruit sources.”
    “I do see the irony on the surface of letting some really very bad guys go,” David Remes, a lawyer for a group of Yemeni detainees at the facility, told the AP. He too, however, saw what the CIA was hoping to achieve. “The men we were sending back as agents were thought to be able to provide value to us.”
    Mr Bush was sufficiently intrigued to speak at the White House directly to one CIA official who was involved in Afghanistan, where the suspects-turned-agents were sent to upon their release from Penny Lane. By contrast, President Barack Obama is said to have raised concerns about any of those who were supposedly still helping the CIA when he took office in 2009 and ordered a review of all such operations.
    If the programme remained a heavily guarded secret, it was surely because of the rather obvious risks associated with it, notably that the men, once released would immediately take part in new attacks against the US and publicly reveal their journeys through Penny Lane to embarrass Washington. There was also concern that if any of them identified a target for drone attack they might themselves have been killed even while being in the pay of the CIA.
    While sources said that the programme did result in some successful CIA assassinations of high-priority targets, they conceded that in other cases men simply vanished upon release never to be heard from again. They said there is no evidence, however, that any of them turn around again and killed any Americans.
    The treatment of inmates by the US at Guantanamo Bay has repeatedly been condemned by human rights groups. The facility remains a political thorn in the side for President Obama, who has failed to fulfil a pledge made when he was first elected to close it down quickly. He was stymied in particular by resistance on Capitol Hill to any notion of terror suspects being moved to US soil for trial in the regular court system.
    Public attention will be directed back to Guantanamo Bay next year in particular with the expected start of the trial of Khalid Sheik Mohammed, the alleged mastermind of the 9/11 attacks on America.
    David Usborne
    Tuesday, 26 November 2013
    Find this story at 26 November 2013
     
    © independent.co.uk

    Penny Lane: Gitmo’s other secret CIA facility

    This Sept. 2, 2010 satellite image provided by TerraServer.com and DigitalGlobe shows a portion of Naval Station Guantanamo Bay, Cuba, including the secret facility known as Penny Lane, upper middle in white. In the early years after 9/11, the CIA turned a handful of prisoners at the secret facility into double agents and released them. Current and former U.S. officials tell The Associated Press that the program helped kill terrorists. The program was carried out in the secret facility, built a few hundred yards from the administrative offices of the prison in Guantanamo Bay, bottom of image. The eight small cottages were hidden behind a ridge covered in thick scrub and cactus. (AP Photo/TerraServer.com and DigitalGlobe)
    WASHINGTON (AP) — A few hundred yards from the administrative offices of the Guantanamo Bay prison, hidden behind a ridge covered in thick scrub and cactus, sits a closely held secret.
    A dirt road winds its way to a clearing where eight small cottages sit in two rows of four. They have long been abandoned. The special detachment of Marines that once provided security is gone.
    But in the early years after 9/11, these cottages were part of a covert CIA program. Its secrecy has outlasted black prisons, waterboarding and rendition.
    In these buildings, CIA officers turned terrorists into double agents and sent them home.
    It was a risky gamble. If it worked, their agents might help the CIA find terrorist leaders to kill with drones. But officials knew there was a chance that some prisoners might quickly spurn their deal and kill Americans.
    For the CIA, that was an acceptable risk in a dangerous business. For the American public, which was never told, it was one of the many secret trade-offs the government made on its behalf. At the same time the government used the threat of terrorism to justify imprisoning people indefinitely, it was releasing dangerous people from prison to work for the CIA.
    Nearly a dozen current and former U.S officials described aspects of the program to The Associated Press. All spoke on condition of anonymity because they were not authorized to publicly discuss the secret program, even though it ended in about 2006.
    The program and the handful of men who passed through these cottages had various official CIA codenames. But those who were aware of the cluster of cottages knew it best by its sobriquet: Penny Lane.
    It was a nod to the classic Beatles song and a riff on the CIA’s other secret facility at Guantanamo Bay, a prison known as Strawberry Fields.
    Some of the men who passed through Penny Lane helped the CIA find and kill many top al-Qaida operatives, current and former U.S. officials said. Others stopped providing useful information and the CIA lost touch with them.
    When prisoners began streaming into the prison on the U.S. naval base at Guantanamo Bay, Cuba, in January 2002, the CIA recognized it as an unprecedented opportunity to identify sources. That year, 632 detainees arrived at the island. The following year 117 more arrived.
    “Of course that would be an objective,” said Emile Nakhleh, a former top CIA analyst who spent time in 2002 assessing detainees but who did not discuss Penny Lane. “It’s the job of intelligence to recruit sources.”
    By early 2003, Penny Lane was open for business.
    Candidates were ushered from the confines of prison to Penny Lane’s relative hominess, officials said. The cottages had private kitchens, showers and televisions. Each had a small patio.
    Some prisoners asked for and received pornography. One official said the biggest luxury in each cottage was the bed, not a military-issued cot but a real bed with a mattress.
    The cottages were designed to feel more like hotel rooms than prison cells, and some CIA officials jokingly referred to them collectively as the Marriott.
    Current and former officials said dozens of prisoners were evaluated but only a handful, from varying countries, were turned into spies who signed agreements to spy for the CIA.
    CIA spokesman Dean Boyd declined to comment.
    Sen. Kelly Ayotte, R-N.H., who serves on the Armed Services and Homeland Security oversight committees, said Tuesday that she was still learning more about the program but was concerned about the numbers of prisoners who were released by the Bush and Obama administrations and returned to fight with terrorists against U.S. interests.
    “So, when I juxtapose that to the CIA actually thinking that they can convert these people, I think it was very ill-conceived program for them to think that,” Ayotte said on MSNBC’s “Andrea Mitchell Reports. “These are some very hard-core individuals and many whom have been released by both administrations have gotten back in to fight us and our allies, unfortunately.”
    Appearing on the program with Ayotte, Sen. Bob Casey, D-Pa., said it was difficult for him to evaluate the CIA program’s effectiveness. “But it has a degree of recklessness to it that I would be very concerned about,” Casey said.
    The U.S. government says it has confirmed about 16 percent of former Guantanamo Bay detainees rejoin the fight against America. Officials suspect but have not confirmed that another 12 percent rejoined.
    Though the number of double agents recruited through Penny Lane was small, the program was significant enough to draw keen attention from President George W. Bush, one former official said. Bush personally interviewed a junior CIA case officer who had just returned home from Afghanistan, where the agency typically met with the agents.
    President Barack Obama took an interest the program for a different reason. Shortly after taking office, he ordered a review of the former detainees working as double agents because they were providing information used in Predator drone strikes, one of the officials said.
    Infiltrating al-Qaida has been one of the CIA’s most sought-after but difficult goals, something that other foreign intelligence services have only occasionally accomplished. So candidates for Penny Lane needed legitimate terrorist connections. To be valuable to the CIA, the men had to be able to reconnect with al-Qaida.
    From what the Bush administration was saying about Guantanamo Bay prisoners at the time, the CIA would have seemingly had a large pool to draw from.
    Vice President Dick Cheney called the prisoners “the worst of a very bad lot.” Defense Secretary Donald Rumsfeld said they were “among the most dangerous, best trained, vicious killers on the face of the Earth.”
    In reality, many were held on flimsy evidence and were of little use to the CIA.
    While the agency looked for viable candidates, those with no terrorism ties sat in limbo. It would take years before the majority of detainees were set free, having never been charged. Of the 779 people who were taken to Guantanamo Bay, more than three-fourths have been released, mostly during the Bush administration.
    Many others remain at Guantanamo Bay, having been cleared for release by the military but with no hope for freedom in sight.
    “I do see the irony on the surface of letting some really very bad guys go,” said David Remes, an American lawyer who has represented about a dozen Yemeni detainees at Guantanamo.
    But Remes, who was not aware of Penny Lane, said he understands its attraction.
    “The men we were sending back as agents were thought to be able to provide value to us,” he said.
    Prisoners agreed to cooperate for a variety of reasons, officials said. Some received assurances that the U.S. would resettle their families. Another thought al-Qaida had perverted Islam and believed it was his duty as a Muslim to help the CIA destroy it.
    One detainee agreed to cooperate after the CIA insinuated it would harm his children, a former official said, harkening to similar threats interrogators lodged against admitted 9/11 mastermind Khalid Sheikh Mohammed.
    All were promised money. Exactly how much each was paid remains unclear. But altogether, the government paid millions of dollars for their services, officials said. The money came from a secret CIA account, codenamed Pledge, that’s used to pay informants, officials said.
    The arrangement led to strategic discussions inside the CIA: If the agency’s drones had a shot at Osama bin Laden or his deputy, Ayman al-Zawahri, would officials take the shot if it meant killing a double agent on the American payroll?
    It never came to that.
    The biggest fear, former officials involved with the program recalled, was that a former detainee would attack Americans, then publicly announce that he’d been on the CIA payroll.
    Al-Qaida suspected the CIA would attempt a program like this and its operatives have been very suspicious of former Guantanamo Bay detainees, intelligence officials and experts said.
    In one case, a former official recalled, al-Qaida came close to discovering one of the double agents in its midst.
    The U.S. government had such high hopes for Penny Lane that one former intelligence official recalled discussion about whether to secretly release a pair of Pakistani men into the United States on student or business visas. The hope was that they would connect with al-Qaida and lead authorities to members of a U.S. cell.
    Another former senior intelligence official said that never happened.
    Officials said the program ended in 2006, as the flow of detainees to Guantanamo Bay slowed to a trickle. The last prisoner arrived there in 2008.
    Penny Lane still stands and can be seen in satellite photos. The complex is surrounded by two fences and hidden among the trees and shrubs of Guantanamo Bay.
    ___
    Associated Press writer Ben Fox contributed to this story from San Juan, P.R.
    By ADAM GOLDMAN and MATT APUZZO
    — Nov. 26, 2013 3:42 PM EST
    Find this story at 26 November 2013
    © 2013 Associated Press

    Revealed: Australian spy agency offered to share data about ordinary citizens

    • Secret 5-Eyes document shows surveillance partners discussing what information they can pool about their citizens
    • DSD indicated it could provide material without some privacy restraints imposed by other countries such as Canada
    • Medical, legal or religious information ‘not automatically limited’
    • Concern that intelligence agency could be ‘operating outside its legal mandate’
    The secret document shows the partners discussing whether or not to share citizens’ “medical, legal or religious information”. Photograph: Kacper Pempel/Reuters
    Australia’s surveillance agency offered to share information collected about ordinary Australian citizens with its major intelligence partners, according to a secret 2008 document leaked by the US whistleblower Edward Snowden.
    The document shows the partners discussing whether or not to share “medical, legal or religious information”, and increases concern that the agency could be operating outside its legal mandate, according to the human rights lawyer Geoffrey Robertson QC.
    The Australian intelligence agency, then known as the Defence Signals Directorate (DSD), indicated it could share bulk material without some of the privacy restraints imposed by other countries, such as Canada.
    “DSD can share bulk, unselected, unminimised metadata as long as there is no intent to target an Australian national,” notes from an intelligence conference say. “Unintentional collection is not viewed as a significant issue.”
    The agency acknowledged that more substantial interrogation of the material would, however, require a warrant.
    Metadata is the information we all generate whenever we use technology, from the date and time of a phone call to the location from which an email is sent.
    “Bulk, unselected, unminimised metadata” means that this data is in its raw state, and nothing has been deleted or redacted in order to protect the privacy of ordinary citizens who might have been caught in the dragnet. Metadata can present a very complete picture of someone’s life.
    The working document, marked secret, sheds new light on the extent to which intelligence agencies at that time were considering sharing information with foreign surveillance partners, and it provides further confirmation that, to some extent at least, there is warrantless surveillance of Australians’ personal metadata.
    The DSD joined its four intelligence-sharing partners – the US, Britain, Canada and New Zealand, collectively known as 5-Eyes – to discuss what could and what could not be shared under the different jurisdictions at a meeting hosted by Britain’s GCHQ at its headquarters in Cheltenham on 22-23 April, 2008.
    The notes, published today by Guardian Australia, suggest that Australia was open to pooling bulk data that almost certainly includes information about Australian citizens.
    Clearly indicating the different attitudes between the intelligence partners, the Canadians insisted that bulk collection could only be shared if information about its citizens was first “minimised”, meaning deleted or removed. The various techniques used in “minimisation” help protect citizens’ privacy.
    The GCHQ memo taker, reporting on this, said that “bulk, unselected metadata presents too high a risk to share with second parties at this time because of the requirement to ensure that the identities of Canadians or persons in Canada are minimised, but re-evaluation of this stance is ongoing”.
    By contrast, DSD, now renamed the Australian Signals Directorate, offered a broader sweep of material to its partners.
    DSD offered to share bulk, unselected, unminimised metadata – although there were specific caveats. The note taker at the meeting writes: “However, if a ‘pattern of life’ search detects an Australian then there would be a need to contact DSD and ask them to obtain a ministerial warrant to continue.”
    A “pattern of life” search is more detailed one – joining the dots to build up a portrait of an individual’s daily activities.
    It is technically possible to strip out the metadata of Australian nationals from bulk collection methods used by the 5-Eyes countries, such as cable taps – ensuring the information is not stored, and so could not be pulled in to searches and investigations by agents.
    The Snowden documents reveal Australia’s intelligence services instead offered to leave the data in its raw state.
    Australian politicians have insisted that all surveillance undertaken is in accordance with the law.
    But Geoffrey Robertson, writing in the Guardian today, says if what was described in the memo took place, this would be a breach of sections eight and 12 of the Intelligence Services Act 2001. The act sets a strict requirement that ministerial authorisation is required if the data of an Australian citizen is involved, and indicates that the citizen must be a “person of interest”, such as someone involved in terrorism or organised crime.
    The Cheltenham gathering, which appears to have been convened to consider the issues around the burgeoning collection of metadata and to reach common positions, resolved to avoid pre-emptive efforts to categorise various materials and “simply focus on what is shareable in bulk”.
    The memo flags privacy concerns around the collection of various types of data, but the meeting, according to the record, resolved not to set “automatic limitations” – leaving judgment calls to each country’s own agencies.
    “Consideration was given as to whether any types of data were prohibited, for example medical, legal, religious or restricted business information, which may be regarded as an intrusion of privacy,” the memo says.
    “Given the nascent state of many of these data types then no, or limited, precedents have been set with respect to proportionality or propriety, or whether different legal considerations applies to the ‘ownership’ of this data compared with the communications data that we were more accustomed to handle.”
    “It was agreed that the conference should not seek to set any automatic limitations, but any such difficult cases would have to be considered by ‘owning’ agency on a case-by-case basis.”
    The document also shows the agencies considering disclosure to “non-intelligence agencies”. It says: “Asio and the Australian federal police are currently reviewing how Sigint [signals intelligence] information can be used by non-intelligence agencies.”
    The record of the Cheltenham meeting does not indicate whether the activities under discussion in April 2008 progressed to final decisions or specific actions. It appears to be a working draft.
    Since Snowden leaked the NSA documents to the Guardian and the Washington Post in May, controversy has raged around the world over revelations that surveillance agencies are collecting information in bulk about ordinary citizens’ day-to-day activities, without first getting a warrant.
    In Australia, the Greens party and the South Australian independent senator Nick Xenophon have been pursuing questions about the extent to which Australian citizens have been caught up in the dragnet, and the extent of Australian intelligence agencies’ involvement.
    So far, those questions have largely met with stonewalling, both under the previous Labor government and the new Abbott administration.
    Ewen MacAskill, James Ball and Katharine Murphy
    The Guardian, Monday 2 December 2013 00.20 GMT
    Find this story at 2 December 2013
    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Singapore, South Korea revealed as Five Eyes spying partners

    Singapore and South Korea are playing key roles helping the United States and Australia tap undersea telecommunications links across Asia, according to top secret documents leaked by former US intelligence contractor Edward Snowden. New details have also been revealed about the involvement of Australia and New Zealand in the interception of global satellite communications.
    A top secret United States National Security Agency map shows that the US and its “Five Eyes” intelligence partners tap high speed fibre optic cables at 20 locations worldwide. The interception operation involves cooperation with local governments and telecommunications companies or else through “covert, clandestine” operations.
    The undersea cable interception operations are part of a global web that in the words of another leaked NSA planning document enables the “Five Eyes” partners – the US, United Kingdom, Australia, Canada and New Zealand – to trace “anyone, anywhere, anytime” in what is described as “the golden age” signals intelligence.
    The NSA map, published by Dutch newspaper NRC Handelsblad overnight, shows that the United States maintains a stranglehold on trans-Pacific communications channels with interception facilities on the West coast of the United States and at Hawaii and Guam, tapping all cable traffic across the Pacific Ocean as well as links between Australia and Japan.
    The map confirms that Singapore, one of the world’s most significant telecommunications hubs, is a key “third party” working with the “Five Eyes” intelligence partners.
    In August Fairfax Media reported that Australia’s electronic espionage agency, the Defence Signals Directorate, is in a partnership with Singaporean intelligence to tap the SEA-ME-WE-3 cable that runs from Japan, via Singapore, Djibouti, Suez and the Straits of Gibraltar to Northern Germany.
    Australian intelligence sources told Fairfax that the highly secretive Security and Intelligence Division of Singapore’s Ministry of Defence co-operates with DSD in accessing and sharing communications carried by the SEA-ME-WE-3 cable as well as the SEA-ME-WE-4 cable that runs from Singapore to the south of France.
    Access to this major international telecommunications channel, facilitated by Singapore’s government-owned operator SingTel, has been a key element in an expansion of Australian-Singaporean intelligence and defence ties over the past 15 years.
    Majority owned by Temask Holdings, the investment arm of the Singapore Government, SingTel has close relations with Singapore’s intelligence agencies. The Singapore Government is represented on the company’s board by the head of Singapore’s civil service, Peter Ong, who was previously responsible for national security and intelligence co-ordination in the Singapore Prime Minister’s office.
    Australian intelligence expert, Australian National University Professor Des Ball has described Singapore’s signal’s intelligence capability as “probably the most advanced” in South East Asia, having first been developed in cooperation with Australia in the mid-1970s and subsequently leveraging Singapore’s position as a regional telecommunications hub.
    Indonesia and Malaysia have been key targets for Australian and Singaporean intelligence collaboration since the 1970s. Much of Indonesia’s telecommunications and Internet traffic is routed through Singapore.
    The leaked NSA map also shows South Korea is another key interception point with cable landings at Pusan providing access to the external communications of China, Hong Kong and Taiwan.
    South Korea’s National Intelligence Service has long been a close collaborator with the US Central Intelligence Agency and the NSA, as well as the Australian intelligence agencies. The Australian Security Intelligence Organisation recently engaged in legal action in an unsuccessful effort to prevent publication of details of South Korean espionage in Australia. ASIO Director-General David Irvine told the Federal Court that Australian and South Korean intelligence agencies had been cooperating for “over 30 years” and that any public disclose of NIS activities would be “detrimental” to Australia’s national security.
    The NSA map and other documents leaked by Mr Snowden and published by the Brazilian O Globo newspaper also reveal new detail on the integration of Australian and New Zealand signals intelligence facilities in the interception of satellite communications traffic by the “Five Eyes” partners.
    For the first time it is revealed that the DSD satellite interception facility at Kojarena near Geraldton in Western Australia is codenamed “STELLAR”. The New Zealand Government Communications Security Bureau facility at Waihopai on New Zealand’s South Island is codenamed “IRONSAND”. The codename for DSD’s facility at Shoal Bay near Darwin is not identified. However all three facilities are listed by the NSA as “primary FORNSAT (foreign satellite communications) collection operations”.
    Coverage of satellite communications across Asia and the Middle East is also supported by NSA facilities at the United States Air Force base at Misawa in Japan, US diplomatic premises in Thailand and India, and British Government Communications Headquarters facilities in Oman, Nairobi in Kenya and at the British military base in Cyprus.
    The leaked NSA map also shows that undersea cables are accessed by the NSA and the British GCHQ through military facilities in Djibouti and Oman, thereby ensuring maximum coverage of Middle East and South Asian communications.
    November 25, 2013
    Philip Dorling
    Find this story at 25 November 2013
    Copyright © 2013 Fairfax Media

    New Snowden leaks reveal US, Australia’s Asian allies

    Singapore and South Korea are playing key roles helping the United States and Australia tap undersea telecommunications links across Asia, according to top secret documents leaked by former US intelligence contractor Edward Snowden. New details have also been revealed about the involvement of Australia and New Zealand in the interception of global satellite communications.
    A top secret United States National Security Agency map shows that the US and its “Five Eyes” intelligence partners tap high speed fibre optic cables at 20 locations worldwide. The interception operation involves cooperation with local governments and telecommunications companies or else through “covert, clandestine” operations.
    The undersea cable interception operations are part of a global web that in the words of another leaked NSA planning document enables the “Five Eyes” partners – the US, United Kingdom, Australia, Canada and New Zealand – to trace “anyone, anywhere, anytime” in what is described as “the golden age” signals intelligence.
    The NSA map, published by Dutch newspaper NRC Handelsblad overnight, shows that the United States maintains a stranglehold on trans-Pacific communications channels with interception facilities on the West coast of the United States and at Hawaii and Guam, tapping all cable traffic across the Pacific Ocean as well as links between Australia and Japan.
    The map confirms that Singapore, one of the world’s most significant telecommunications hubs, is a key “third party” working with the “Five Eyes” intelligence partners.
    In August Fairfax Media reported that Australia’s electronic espionage agency, the Defence Signals Directorate, is in a partnership with Singaporean intelligence to tap the SEA-ME-WE-3 cable that runs from Japan, via Singapore, Djibouti, Suez and the Straits of Gibraltar to Northern Germany.
    Australian intelligence sources told Fairfax that the highly secretive Security and Intelligence Division of Singapore’s Ministry of Defence co-operates with DSD in accessing and sharing communications carried by the SEA-ME-WE-3 cable as well as the SEA-ME-WE-4 cable that runs from Singapore to the south of France.
    Access to this major international telecommunications channel, facilitated by Singapore’s government-owned operator SingTel, has been a key element in an expansion of Australian-Singaporean intelligence and defence ties over the past 15 years.
    Majority owned by Temask Holdings, the investment arm of the Singapore Government, SingTel has close relations with Singapore’s intelligence agencies. The Singapore Government is represented on the company’s board by the head of Singapore’s civil service, Peter Ong, who was previously responsible for national security and intelligence co-ordination in the Singapore Prime Minister’s office.
    Australian intelligence expert, Australian National University Professor Des Ball has described Singapore’s signal’s intelligence capability as “probably the most advanced” in South East Asia, having first been developed in cooperation with Australia in the mid-1970s and subsequently leveraging Singapore’s position as a regional telecommunications hub.
    Indonesia and Malaysia have been key targets for Australian and Singaporean intelligence collaboration since the 1970s. Much of Indonesia’s telecommunications and Internet traffic is routed through Singapore.
    The leaked NSA map also shows South Korea is another key interception point with cable landings at Pusan providing access to the external communications of China, Hong Kong and Taiwan.
    South Korea’s National Intelligence Service has long been a close collaborator with the US Central Intelligence Agency and the NSA, as well as the Australian intelligence agencies. The Australian Security Intelligence Organisation recently engaged in legal action in an unsuccessful effort to prevent publication of details of South Korean espionage in Australia. ASIO Director-General David Irvine told the Federal Court that Australian and South Korean intelligence agencies had been cooperating for “over 30 years” and that any public disclose of NIS activities would be “detrimental” to Australia’s national security.
    The NSA map and other documents leaked by Mr Snowden and published by the Brazilian O Globo newspaper also reveal new detail on the integration of Australian and New Zealand signals intelligence facilities in the interception of satellite communications traffic by the “Five Eyes” partners.
    For the first time it is revealed that the DSD satellite interception facility at Kojarena near Geraldton in Western Australia is codenamed “STELLAR”. The New Zealand Government Communications Security Bureau facility at Waihopai on New Zealand’s South Island is codenamed “IRONSAND”. The codename for DSD’s facility at Shoal Bay near Darwin is not identified. However all three facilities are listed by the NSA as “primary FORNSAT (foreign satellite communications) collection operations”.
    Coverage of satellite communications across Asia and the Middle East is also supported by NSA facilities at the United States Air Force base at Misawa in Japan, US diplomatic premises in Thailand and India, and British Government Communications Headquarters facilities in Oman, Nairobi in Kenya and at the British military base in Cyprus.
    The leaked NSA map also shows that undersea cables are accessed by the NSA and the British GCHQ through military facilities in Djibouti and Oman, thereby ensuring maximum coverage of Middle East and South Asian communications.
    November 24, 2013
    Philip Dorling
    Find this story at 24 November 2013
    Copyright © 2013 Fairfax Media

    How we spied on the Indonesians and how expats are targeted overseas

    THEIR clandestine activities may be directly in the spotlight, but Australian spies have for decades been listening in on our neighbours.
    Modern spooks have two main methods of tapping the mobile phones of people of interest in cities such as Jakarta. The first option is to install a physical bugging device in the actual handset, to forward calls to a third number – but this requires access to the handset.
    For high-security targets, Australian agents use electronic scanners and very powerful computers to monitor phone numbers of interest via microwave towers (small metal towers that look like venetian blinds) located on top of buildings across Jakarta and all modern cities.
    The latter was employed to tap the phones of Indonesian President Susilo Bambang Yudhoyono, his wife and key ministers.
    Getting hold of a handset is a tricky business so the preferred method for the spooks employed by the Australian Signals Directorate (formerly Defence Signals Directorate) is to monitor microwave phone towers located on top of most buildings in Jakarta and indeed any other major city.
    The material, known at this point as “first echelon”, is captured by computers located in secure rooms at the Australian Embassy where information is filtered before it is forwarded by secure means to super computers located at ASD headquarters. They are located inside the maximum security building ‘M’, protected by high voltage electric fences, at Defence’s Russell Office complex in Canberra. Here it is processed and analysed as “second echelon” product.
    In less busy locations, or where the target phone number is known, an off-the-shelf scanner can be programmed to intercept mobile phone calls.
    In cities such as Jakarta enterprising business people now offer a mobile bugging service where for a fee of between $300 and $1000 they will arrange to “borrow” a mobile phone, insert a bugging device and then return it to a relieved owner. Whenever the phone rings or is used to access a network the call is diverted to another handset or recording device.
    Government staff understand that if their phone goes missing and then turns up they should dispose of it and get a new one.
    But for the average citizen, say a teacher at an English speaking school in Jakarta whose phone was bugged by an angry ex-girlfriend, phone tapping is a serious matter. And it is more common than many expatriates might think.
    There is a thriving business in phone tapping for private or industrial or state espionage reasons in cities such as Jakarta, Singapore and Bangkok. Industrial espionage is widespread in cities around the world including Sydney, Melbourne and Canberra.
    Compared to the operations of ASD and its powerful scanners, super computers and army of analysts these operations are small beer.
    Prime Minister Tony Abbott was quick to point out in the wake of the phone tapping scandal that every country spied and he was right.
    However Indonesia has nowhere near the capacity for espionage that Australia and our close “five eyes” allies – the US, UK, Canada and New Zealand – posses.
    After the 2002 Bali bombings the DSD, Australian Federal Police and Telstra went to Indonesia and showed Indonesian intelligence agencies how to tap into the networks of the terrorist group Jemaah Islamiah (JI).
    Unlike Australia much of Indonesia’s electronic surveillance capacity is directed at internal problems such as the insurgencies in Aceh and West Papua.
    According to one of Australia’s leading experts on electronic spying, Professor Des Ball from the Australian National University, there is really no point in conducting such intercept operations unless a country has the whole picture. That is satellite communications, cable communications and radio communications.
    “Microwave mobile phone calls are very hit and miss,” he said.
    Australia owns the big picture thanks to an expensive and extensive network of listening posts in Jakarta, Bangkok and Port Moresby and powerful satellite ground stations at HMAS Harman in Canberra, Shoal Bay near Darwin, Morundah near Wagga in NSW, Cabarlah near Toowoomba in Qld and Geraldton in WA.
    This interception network is monitoring communications from Singapore to the Pacific Islands including Indonesia’s Palapa satellite.
    Professor Ball said there had been huge growth in Australia’s eavesdropping capacity in recent years. For example the number of dishes at Shoal Bay has gone from six to 15 and Geraldton has more than doubled its capacity including six American dishes for the exclusive use of the National Security Agency (NSA) whose lax security allowed Edward Snowden to abscond with top-secret information that is now being leaked.
    Unfortunately Australian taxpayers have no way of knowing how much is spent on these facilities or even how many staff are employed by the top-secret ASD. The numbers used to appear in the Defence annual report, but not anymore.
    Professor Ball said successive governments had allowed the electronic spooks to have a virtual free rein.
    “When briefings about the phone intercepts from SBY and his wife came in the government should have ordered the tapping to stop,” Professor Ball said.
    “It is important to have the capacity but you only use it when there is a conflict. Put it in, test it and keep it up to date, but don’t use it because unless you have to because it will come out.”
    Professor Ball also slammed Mr Abbott for saying that other countries (Indonesia) were doing exactly what Australia did, because they weren’t and they can’t.
    “They are not doing what we are doing and Abbott should have apologised or done what Bob Hawke did with Papua New Guinea in 1983.”
    Prime Minister Hawke went to Port Moresby after it was revealed that Australia spied on politicians there, but before he left he ordered the spooks switch to all monitoring equipment off for 48 hours. He was then able to say that Australia wasn’t doing it although as journalist Laurie Oakes pointed out he had to be “very careful with his tenses”.
    Tapping a friendly foreign leader’s phone is fraught enough. Recording the fact on clear power point slides and handing them to another country is just plain dumb.
    IAN MCPHEDRAN NATIONAL DEFENCE WRITER
    NEWS LIMITED NETWORK
    NOVEMBER 21, 2013 6:34PM
    Find this story at 21 November 2013
    News Ltd 2013 Copyright

    Spying rocks Indonesia-Australia relations

    Indonesia has officially downgraded the relationship, after Australia refused to apologise for espionage.
    A spy scandal involving an Australian attempt to tap the phone of Indonesia’s president has jeopardised crucial people smuggling and counter-terrorism co-operation between the two countries, officials have said.
    President Susilo Bambang Yudhoyono has temporarily suspended co-coordinated military operations with Australia, including those which target people-smuggling, after significant public outcry in Indonesia over the reports.
    “I find it personally hard to comprehend why the tapping was done. We are not in a cold war era,” President Yudhoyono said.
    Find out more with our exclusive interactive feature
    “I know Indonesians are upset and angry over what Australia has done to Indonesia. Our reactions will determine the future of the relationship and friendship between Indonesia and Australia – which actually have been going well.”
    Angry crowds mobbed Australia’s embassy in Jakarta, burning Australian and American flags on Thursday. Indonesia has officially downgraded its relationship with Australia and recalled its ambassador from Canberra.
    ‘Reasonable’ surveillance
    The country’s prime minister, Tony Abbott, has refused to apologise for what he calls “reasonable” surveillance, but promised to respond to the president’s request for an explanation “swiftly and courteously”.
    “I want to express … my deep and sincere regret about the embarrassment to the president and to Indonesia that’s been caused by recent media reporting,” Abbott told parliament.
    “As always, I am absolutely committed to building the closest possible relationship with Indonesia because that is overwhelmingly in the interests of both our countries.”
    I don’t believe Australia should be expected to apologise for reasonable intelligence-gathering activities
    Tony Abbott, Australian Prime Minister
    The situation erupted after documents leaked by former US National Security Agency contractor Edward Snowden, showed Australia’s Defence Signal’s Directorate recorded personal communications of President Yudhoyono, his wife, Ani Yudhoyono, and senior officials in 2009.
    The surveillance is understood to be part of a longstanding spying arrangement with the UK, USA, Canada and New Zealand, known as the “five eyes” intelligence partners.
    “I don’t believe Australia should be expected to apologise for reasonable intelligence-gathering activities,” Abbott told Australia’s parliament on Tuesday.
    “Importantly, in Australia’s case, we use all our resources including information to help our friends and allies, not to harm them,” Abbott said.
    The document leaked by Snowden was dated November 2009 and was published jointly by Guardian Australia and the Australian Broadcasting Corporation state television network.
    It details the attempted interception of various targets’ mobile phones and lists their specific phone models with slides marked “top secret” and the Australian Signals Directorate’s slogan: “Reveal their secrets, protect our own.”
    This leak came after previous documents released by Snowden revealed Australian embassies had participated in
    widespread US surveillance across Asia, including in Cambodia, China, Indonesia, Malaysia, Myanmar and Thailand.
    Strained relations
    The combined revelations have strained a bilateral relationship already under pressure over the Abbott government’s hardline asylum seeker policy to “turn back” boats coming to Australia, a controversial and highly emotive issue in the country.
    Professor Greg Fealy is an Indonesian politics specialist at the Australian National University. He told Al Jazeera the situation was becoming increasingly serious.
    “Every new day brings new sanctions from the Indonesian side and so far the Abbott government hasn’t responded well to it,” Fealy said.
    He believes relations between the two countries have not been this strained since the East Timor crisis in 1999, when Australia’s military went into East Timor during its transition from an Indonesian territory to independence.
    “It has the potential to get worse, with the Indonesians withdrawing further cooperation [with Australia] in many fields,” Fealy said.
    “If there is a sufficiently wide range of retaliation then this could possibly be worse than the crisis of 15 years ago.”
    Prime Minister Abbott has been encouraged to reassure President Yudhoyono that no further surveillance is taking place – similar to the conversation between US President Barack Obama and German Chancellor Angela Merkel after
    revelations her phone was also tapped.
    John McCarthy, a former Australian ambassador to Indonesia, said Abbott must contact Yudhoyono to make amends.
    “There is nothing, frankly, to prevent the prime minister saying to the president that it’s not happening and it’s not going to happen in the future. That’s what Obama did with Angela Merkel and I don’t see a problem with that,”
    McCarthy said.
    “It can’t be allowed just to fester. If it festers it will get worse and it will be much harder to deal with, particularly as the politics get hotter in Indonesia.”
    US blame
    Australian officials would also be expressing their frustration with the United States over this situation, according to Michael Wesley, professor of national security at the Australian National University.
    “There are a number of reasons Australian officials can legitimately be very irritated with the Americans. We’re in this mess because of an American security lapse,” Wesley told Al Jazeera.
    “I’m actually gobsmacked at both Snowden and Bradley Manning, at their ability to get highly classified documents and download them. It would be absolutely impossible for people of their level of access to do that in Australia.”
    “There should be real questions asked in the American intelligence community how this could have happened,” Professor Wesley said.
    Former NSA senior executive Thomas Drake said the “five eyes” utilise each other’s services for information on other nations.
    “Much of it is legit, but increasingly since 9/11 because of the sheer power of technology and access to the world’s communication systems … [agencies have] extraordinary access to even more data on just about anything and anybody,” Drake told ABC.
    Indonesia’s minister for religious affairs, Suryadharma Ali, also cancelled a planned visit to Australia following the response from Yudhoyono.
    Author and Indonesian political expert Professor Damien Kingsbury was due to host Ali at an event in Melbourne, and
    told Al Jazeera the snub was a concerning sign of the deterioration in relations.
    “It is still quite significant that a senior minister felt he couldn’t come to Australia at this time,” Kingsbury said.
    “It’s pretty disastrous, the issue has effectively ended ongoing diplomatic engagement between Australia and Indonesia.”
    “We’ve seen the cancellation and suspension of a number of points of engagement and that has quite distinct implications for Australian government policy in some areas. There is the possibility this matter could continue to escalate if it’s not adequately resolved,” Kingsbury said.
    ‘Uncomfortable’
    The bilateral relationship between the two nations will be “uncomfortable” but it will pass, according to former US assistant secretary of state for East Asia, Kurt Campbell.
    “The relationship will be strong again, but there is a ritual quality that I’m afraid you [Australia] will have to go through, and very little you can say now or do is going to ease the next couple of months,” Campbell told ABC.
    He said the practice of phone-tapping was an acceptable part of international relations.
    “I can tell you that some of the most sensitive spying is done by allies and friends.”
    “Some of the most difficult foreign policy challenges – terrorist attacks – actually emanated in Indonesia. Australia has good cause to understand the delicate dynamics that play out behind the scenes with regard to how Indonesia’s thinking about some of those movements and some of the actors inside its country,” Campbell said.
    Australian opposition leader Bill Shorten said the “vital” relationship between the two countries must be repaired.
    “No-one should underestimate what is at stake in maintaining this critical relationship on the best possible terms.
    “Co-operation between our countries is fundamental to our national interest – working together on people smuggling, terrorism, trade,” Shorten wrote in an opinion piece for The Guardian.
    Prime Minister Abbott is expected to respond to Indonesia’s request for a full written explanation into the phone tapping in the coming days.
    Geraldine Nordfeldt Last updated: 22 Nov 2013 15:00
    Find this story at 22 November 2013

    Indonesia voices anger at Australia alleged spying

    (CNN) — Indonesia summoned the Australian ambassador Monday to voice its anger at allegations that Australia tried to listen into the phone calls of Indonesian President Susilo Bambang Yudhoyono.
    Greg Moriarty. Australia’s ambassador to Indonesia, “took careful note of the issues raised and will report back to the Australian Government,” the Australian embassy in Jakarta said.
    Indonesia’s objections stem from reports in the Australian Broadcasting Corporation (ABC) and Guardian Australia that said Australian intelligence tracked Yudhoyono’s mobile phone for 15 days in August 2009, monitoring the calls he made and received.
    ‘We live in a post-Snowden age’
    Stone: ‘We’ve bugged the whole world’
    Fareed’s Take: Spying on allies
    The intelligence agency also tried to listen in on what was said on at least one occasion. But the call was less than a minute long and could not be successfully tapped, ABC reported.
    The two media outlets cited documents provided by Edward Snowden, the U.S. national security contractor turned leaker.
    “The Australian Government urgently needs to clarify on this news, to avoid further damage,” Indonesian presidential spokesman Teuku Faizasyah tweeted.
    “The damage has been done and now trust must be rebuilt,” he said in another tweet.
    Asked in parliament to comment on the reports, Australian Prime Minister Tony Abbott said, “all governments gather information and all governments know that every other government gathers information.”
    “The Australian Government never comments on specific intelligence matters,” he added. “This has been the long tradition of governments of both political persuasions and I don’t intend to change that today.”
    By the CNN Staff
    November 18, 2013 — Updated 1033 GMT (1833 HKT)
    Find this story at 18 November 2013
    © 2013 Cable News Network. Turner Broadcasting System, Inc.

    Australia spied on Indonesian president Susilo Bambang Yudhoyono, leaked Edward Snowden documents reveal

    Video: Watch: Michael Brissenden on how leaked documents prove Australia spied on SBY (ABC News)
    Photo: The documents show the DSD tracked activity on Susilo Bambang Yudhoyono’s mobile phone. (Reuters: Supri)
    Related Story: Live: Follow the unfolding reaction to this story
    Map: Australia
    Australian intelligence tried to listen in to Indonesian president Susilo Bambang Yudhoyono’s mobile phone, material leaked by NSA whistleblower Edward Snowden reveals.
    Documents obtained by the ABC and Guardian Australia, from material leaked by the former contractor at the US National Security Agency, show Australian intelligence attempted to listen in to Mr Yudhoyono’s telephone conversations on at least one occasion and tracked activity on his mobile phone for 15 days in August 2009.
    Spy games explained
    Australia’s role in the NSA spy program, including what it means for Indonesian relations.
    The top-secret documents are from Australia’s electronic intelligence agency, the Defence Signals Directorate (now called the Australian Signals Directorate), and show for the first time how far Australian spying on Indonesia has reached.
    The DSD motto stamped on the bottom of each page reads: “Reveal their secrets – protect our own.”
    The documents show that Australian intelligence actively sought a long-term strategy to continue to monitor the president’s mobile phone activity.
    The surveillance targets also included senior figures in his inner circle and even the president’s wife Kristiani Herawati (also known as Ani Yudhoyono).
    Also on the list of targets is the vice president Boediono, the former vice president Yussuf Kalla, the foreign affairs spokesman, the security minister, and the information minister.
    Mr Yudhoyono’s spokesman Teuku Faizasyah has responded to the revelations, saying: “The Australian Government needs to clarify this news, to avoid further damage … [but] the damage has been done.”
    Asked about the spying in Question Time today, Prime Minister Tony Abbott said: “First of all, all governments gather information and all governments know that every other government gathers information… the Australian government never comments on specific intelligence matters. This has been the long tradition of governments of both political persuasions and I don’t intend to change that today.”
    Documents list ‘who’s who’ of Indonesian government
    One page in the documentation lists the names and the 3G handsets the surveillance targets were using at the time.
    A number of the people on the list are lining up as potential candidates for the presidential election to replace Mr Yudhoyono next year.
    The documents are titled “3G impact and update” and appear to chart the attempts by Australian intelligence to keep pace with the rollout of 3G technology in Indonesia and across South-East Asia.
    A number of intercept options are listed and a recommendation is made to choose one of them and to apply it to a target – in this case the Indonesian leadership.
    The document shows how DSD monitored the call activity on Mr Yudhoyono’s Nokia handset for 15 days in August 2009.
    One page is titled “Indonesian President voice events” and provides what is called a CDR view. CDR are call data records; it can monitor who is called and who is calling but not necessarily what was said.
    Another page shows that on at least one occasion Australian intelligence did attempt to listen in to one of Mr Yudhoyono’s conversations.
    But according to the notes on the bottom of the page, the call was less than one minute long and therefore did not last long enough to be successfully tapped.
    Factbox: Indonesia and Australia
    Indonesia is one of Australia’s most important bilateral relationships.
    Indonesia was Australia’s 12th largest trade partner in 2012.
    Prime Minister Tony Abbott has pledged to increase two-way trade and investment flows.
    President Yudhoyono has visited Australia four times during his presidency, more than any predecessor.
    Asylum seekers remain a sticking point in relations; Australia seeks active cooperation.
    In 2012-13, Australia’s aid assistance to Indonesia was worth an estimated $541.6 million.
    Source: http://www.dfat.gov.au/geo/indonesia/indonesia_brief.html
    Given the diplomatic furore that has already surrounded the claims that the Australian embassy in Jakarta was involved in general spying on Indonesia, these revelations of specific and targetted surveillance activity at the highest level are sure to increase the tension with our nearest and most important neighbour significantly.
    On an official visit to Canberra last week, the Indonesian vice president publicly expressed Indonesia’s concern.
    “Yes, the public in Indonesia is concerned about this,” Boediono said.
    “I think we must look to come to some arrangement that guarantees intelligence information from each side is not used against the other.”
    Last week Prime Minister Tony Abbott was keen to play down the significance of the spying allegations, saying that he was very pleased “we have such a close, cooperative and constructive relationship with the Indonesian government”.
    That may be a little harder to say today.
    By national defence correspondent Michael Brissenden
    Updated Mon 18 Nov 2013, 8:11pm AEDT
    Find this story at 18 November 2013
    © 2013 ABC

    Australia’s spy agencies targeted Indonesian president’s mobile phone

    Secret documents revealed by Edward Snowden show Australia tried to monitor the mobile calls of Susilo Bambang Yudhoyono and his wife
    Susilo Bambang Yudhoyono, accompanied by his first lady, Kristiani Herawati, speaks to his Democratic party supporters during a rally in Banda Aceh, Aceh province, in March 2009. Photograph: Supri/Reuters
    Australia’s spy agencies have attempted to listen in on the personal phone calls of the Indonesian president, Susilo Bambang Yudhoyono, and have targeted the mobile phones of his wife, senior ministers and confidants, a top-secret document from whistleblower Edward Snowden reveals.
    The document, dated November 2009, names the president and nine of his inner circle as targets of the surveillance, including the vice-president, Boediono, who last week visited Australia. Other named targets include ministers from the time who are now possible candidates in next year’s Indonesian presidential election, and the first lady, Kristiani Herawati, better known as Ani Yudhoyono.
    When a separate document from Snowden, a former contractor to the US’s National Security Agency (NSA), showed Australia had spied on Indonesia and other countries from its embassies, the Indonesian foreign minister, Marty Natalegawa, reacted angrily and threatened to review co-operation on issues crucial to Australia such as people smuggling and terrorism.
    The revelation strained a bilateral relationship already under pressure over the Abbott government’s policy to “turn back” boats of asylum seekers coming to Australia. The new leak, published jointly by Guardian Australia and the Australian Broadcasting Corporation, reveals the specific top-level targets and is likely to seriously escalate those tensions.
    The leaked material is a slide presentation, marked top secret, from the Australian Department of Defence and the Defence Signals Directorate, or DSD, (now called the Australian Signals Directorate), dealing with the interception of mobile phones as 3G technology was introduced in Asia. It includes a slide titled Indonesian President Voice Intercept, dated August 2009 and another slide, titled IA Leadership Targets + Handsets, listing the president and the first lady as having Nokia E90-1s, Boediono as having a BlackBerry Bold 9000, as well as the type and make of the mobile phones held by the other targets.
    Also named as targets for the surveillance are Dino Patti Djalal, at the time the president’s foreign affairs spokesman, who recently resigned as Indonesia’s ambassador to the US and is seeking the candidacy in next year’s presidential election for the president’s embattled Democratic party, and Hatta Rajasa, now minister for economic affairs and possible presidential candidate for the National Mandate party. Hatta was at the time minister for transport and his daughter is married to the president’s youngest son.
    A slide entitled Indonesian President Voice Intercept (August ’09), shows a call from an unknown number in Thailand to Yudhoyono. But the call did not last long enough for the DSD to fulfil its aims. “Nil further info at this time (didn’t make the dev threshold – only a sub-1minute call),” a note at the bottom says.
    Another slide, titled Indonesian President Voice Events, has a graphic of calls on Yudhoyono’s Nokia handset over 15 days in August 2009. It plots CDRs – call data records – which record the numbers called and calling a phone, the duration of calls, and whether it was a voice call or SMS. The agency, in what is standard procedure for surveillance, appears to have expanded its operations to include the calls of those who had been in touch with the president. Another slide, entitled Way Forward, states an imperative: “Must have content.”
    Also on the list of “IA Leadership Targets” are:
    • Jusuf Kalla, the former vice-president who ran as the Golkar party presidential candidate in 2009.
    • Sri Mulyani Indrawati, then a powerful and reforming finance minister and since 2010 one of the managing directors of the World Bank Group.
    • Andi Mallarangeng, a former commentator and television host who was at the time the president’s spokesman, and who was later minister for youth and sports before resigning amid corruption allegations.
    • Sofyan Djalil, described on the slide as a “confidant”, who until October 2009 was minister for state-owned enterprises.
    • Widodo Adi Sucipto, a former head of the Indonesian military who was until October 2009 security minister.
    Asked about the previous revelations about the embassies, Tony Abbott emphasised that they occurred during the administration of the former Labor government, that Australia’s activities were not so much “spying” as “research” and that its intention would always be to use any information “for good”. The prime minister has repeatedly insisted Australia’s relationship with Indonesia is “good and getting better”.
    Boediono said during his visit to Australia – before being revealed as an intended target of Australia’s surveillance – that the Indonesian public was “concerned” about the spying allegations.
    “I think we must look forward to come to some arrangement which guarantees that intelligence information from each side is not used against the other,” he said. “There must be a system.”
    At the bottom of each slide in the 2009 presentation is the DSD slogan: “Reveal their secrets – protect our own.” The DSD is credited with supplying the information.
    Yudhoyono now joins his German, Brazilian and Mexican counterparts as leaders who have been monitored by a member of Five Eyes, the collective name for the surveillance agencies of the US, Britain, Australia, New Zealand and Canada, who share information.
    Germany, Brazil and Mexico have all protested to the US over the infringement of privacy by a country they regarded as friendly. The German chancellor, Angela Merkel, reacted with outrage to the revelation that her personal mobile phone had been tapped by the US, calling President Barack Obama to demand an explanation. The US eventually assured the chancellor that her phone was “not currently being tapped and will not be in the future”.
    The Australian slide presentation, dated November 2009, deals with the interception of 3G mobile phones, saying the introduction of 3G in south-east Asia was nearly complete and providing dates for 3G rollout in Cambodia, Malaysia, the Philippines, Singapore and Thailand.
    Talking about future plans, the Australian surveillance service says it “must have content” and be able to read encrypted messages, which would require acquiring the keys that would unlock them. Other documents from Snowden show the intelligence agencies have made huge inroads in recent years in finding ways into encrypted messages.
    One of the slides, entitled DSD Way Forward, acknowledges that the spy agency’s resources are limited compared with its US and British counterparts. It says there is a “need to capitalise on UKUSA and industry capability”, apparently a reference to the help provided – willingly or under pressure – from telecom and internet companies. The slides canvass “options” for continued surveillance and the final slide advises: “Choose an option and apply it to a target (like Indonesian leadership).”
    The tension between Australia and Indonesia began in October when documents revealed by the German newspaper Der Spiegel and published by Fairfax newspapers revealed that Australian diplomatic posts across Asia were being used to intercept phone calls and data. The Guardian then revealed that the DSD worked alongside America’s NSA to mount a massive surveillance operation in Indonesia during a UN climate change conference in Bali in 2007.
    But these earlier stories did not directly involve the president or his entourage. Abbott made his first international trip as prime minister to Indonesia and has repeatedly emphasised the crucial importance of the bilateral relationship.
    Speaking after his meeting with Boediono last week, Abbott said: “All countries, all governments gather information. That’s hardly a surprise. It’s hardly a shock.
    “We use the information that we gather for good, including to build a stronger relationship with Indonesia and one of the things that I have offered to do today in my discussions with the Indonesian vice-president is to elevate our level of information-sharing because I want the people of Indonesia to know that everything, everything that we do is to help Indonesia as well as to help Australia. Indonesia is a country for which I have a great deal of respect and personal affection based on my own time in Indonesia.”
    Asked about the spying revelations in a separate interview, Abbott said: “To use the term spying, it’s kind of loaded language … researching maybe. Talking to people. Understanding what’s going on.”
    On Monday a spokesman for Abbott said: “Consistent with the long-standing practice of Australian governments, and in the interest of national security, we do not comment on intelligence matters.”
    It remains unclear exactly who will contest next year’s Indonesian presidential election, in which Yudhoyono, having already served two terms, is not eligible to stand. Based on recent polling, the popular governor of Jakarta, Joko Widodo, known as Jokowi, and former general Prabowo Subianto would be frontrunners.
    Ewen MacAskill in New York and Lenore Taylor in Canberra
    theguardian.com, Monday 18 November 2013 00.58 GMT
    Find this story at 18 November 2013
    Find the documents at
     
    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    In the shadows of international law

    German intelligence services collect data from asylum seekers that could have security relevance and turn it over to the US. In some instances this could be a breach of international law.
    In its ongoing “war on terror,” the United States, for years, has been carrying out so-called targeted killings of suspected terrorists with the help of unmanned drone aircraft. Information about possible targets is also passed on to the US intelligence services by their German counterparts, who have gleaned that information from asylum seekers.
    Germany’s Central Survey Office (HBW) regularly conducts background checks on asylum seekers. The agency, like the Federal Intelligence Service (BND), answers directly to the chancellor, and is particularly interested in information about suspected terrorists in the asylum seeker’s country of origin.
    Theoretically, as German media have pointed out, the transfer of this information could lead to the targeted killing of a person by the United States, making Germany an indirect participant in that action – and that could be a violation of international law, according to Robert Frau, an expert on the subject at Viadrina University in Frankfurt/Oder.
    “If Germany were to hand over data to the Americans, which were then used for illegal actions, then Germany would be abetting a breach of international law,” said Frau.
    Interpretations of international law
    There is no consensus among law experts, however, whether or not drone attacks and targeted killings are a violation of international law, and as such, whether Germany, in passing on information, would be abetting a breach of the law.
    This MQ-9 Reaper is one of the main drones used by the US for clandestine air operations
    In armed conflicts, persons participating directly in combat operations are legitimate targets. “In such cases, a drone attack is no different than using a missile, or having soldiers fire their weapons,” said Frau.
    A targeted killing in that scenario would not be a violation of international law. Both the United States and Germany, for example, are involved in an armed conflict in Afghanistan. Therefore, if Germany passes information to the US on German citizens in Afghanistan and the US uses that information for a targeted killing, that is not a breach of international law, Frau explained.
    The situation would be different in Somalia, however. “Germany is not involved in armed conflict there and outside of an armed conflict there are other rules. That means, as a matter of principle, such killings are not legal,” Frau stressed.
    No German collusion is known
    Hans-Christian Ströbele admits that no German participation is known
    It is next to impossible to prove whether or not Germany in the past ever provided information that led to a targeted killing. When asked, the German government points to the necessity of keeping sensitive information secret.
    Even the highly critical Green politician, Hans-Christian Ströbele, who is a member of the Parliamentary Control Committee that oversees the intelligence services and has access to secret government files, has said that he has no knowledge of any such cases.
    Ströbele did say, however, that there was also no way to totally exclude it either. Germany, he said, had no way of knowing what the US did with the information it received from Berlin.
    Once data is passed on, one can assume the US intelligence services will use it as they see fit, agrees law expert Frau. Germany “cannot pass on data with the explicit request that they not be used for illegal acts,” he said.
    Date 26.11.2013
    Author Sven Pöhle / gb
    Editor John Blau
    Find this story at 26 November 2013
    © 2013 Deutsche Welle |

    German spies keep tabs on asylum-seekers

    German law promises refuge to those persecuted in their home countries. Now it has been revealed that German intelligence uses the asylum process to find out more about those coming here – and those who stay behind.
    When refugees apply for asylum in Germany they have to go through a long process before their stay is approved. Employees of the Federal Office for Migration and Refugees ask them questions about the situation in their home country and whether they face political persecution.
    They agency is also interested in finding out how refugees arrived in Germany, whether criminal smugglers helped them and whether applicants entered other European countries before arriving in Germany. If they did, international law says they must return to the country of entry.
    Victor Pfaff says the HBW are not mysterious
    But unknown to the public, there is another authority that can take charge of the process. The Berlin-based Office for Interrogation (HBW) is officially part of the chancellor’s office. Since 1958 if has gathered information to help Germany’s domestic Federal Intelligence Service (BND). Many observers believe it is in reality part of the BND.
    Journalists from the daily “Süddeutsche Zeitung” and public broadcaster NDR reported that HBW employees ask whether asylum-seekers know specific people in their home countries who might belong to a terrorist organization or have information about weapons caches. In theory, this information could be used by intelligence services to find or kill terrorists.
    A dangerous game?
    Lawyers who advise asylum-seekers about their rights frequently encounter the HBW. Victor Pfaff has been working in Frankfurt as an asylum-rights lawyer for more than 40 years. He has met many HBW employees, finding them always to be very polite and happy to hand out their business cards. “We shouldn’t enshroud them in a fog of mystery,” he said.
    Pfaff said the agency denies being part of the BND, even though both organizations report directly to the chancellor.
    Asylum-seekers had never complained to him that this questioning caused them problems, Pfaff said. On the contrary, he sometimes approached the HBW for help in speeding up difficult asylum cases. He said if his clients are able to provide useful information, their residence permits can be issued in a matter of days.
    But deals like this only happen rarely, Pfaff said, warning that information can also be gathered without consent. “It is problem if German intelligence is secretly present at a an asylum hearing and provides this information to foreign intelligence.” If this happened, asylum-seekers might feel they were being used. Pfaff said he had heard of such cases, and believed they posed a danger, because terrorists could take revenge and kill alleged traitors.
    Refugees can spend years in camps such as this one in Friedland, Lower Saxony
    Warnings for attempted spying
    Claus-Ulrich Prössl heads the Cologne Refugee Council, an organization that assists asylum-seekers throughout the procedure. Prössl said he believes the BND and the HBW are closely connected, and had even heard of cases where people were questioned by BND employees. “A few refugees were hoping that their asylum process would go more quickly, while other refugees did not understand what was going on and were worried.”
    Prössl warns asylum-seekers to be careful: “Unfortunately, after the NSA affair, we have to assume that all information will be passed on.” He said he did not see any data protection or confidentiality and worried that the information thus gathered would not stay within the borders of Germany. There must be a reason, he said, why the state of North Rhine-Westphalia had given up on its own security questioning.
    Cologne-based lawyer Zaza Koschuaschwili also warns applicants about questions that have nothing to do with the actual asylum process. Sometimes the quality of the available simultaneous translators is poor:”It often happens that interpreters is add their own interpretations or opinions to a statement.” His clients would often complain that they had been musunderstood, he added.
    As a lawyer and a native of Georgia, Koschuaschwili can speak both languages and knows his clients’ rights. But whenever the HBW gets involved, attorneys are frequently excluded from interviews.
    Refugees give information to the HBW in the hope of gaining residency
    Participation is not meant to have drawbacks
    DW asked the HBW for an interview to shed light on the relationship between itself and the BND. Its director promised to provide the desired information once a series of questions had been discussed with the chancellor’s office. That process is still ongoing.
    Six months ago, Sharmila H. came to Germany from Afganistan. Although she is still waiting for her interview, she says one thing is already clear to her: “I will not answer just any questions,” if intelligence agencies speak to her – just who she is and why she came here.
    Pfaff and Koschuaschwili wish to reassure those who are unwilling to cooperate with German intelligence that they should have no fear about the regular procedure for granting asylum.
    Sharmila H. hopes they are right.
    Date 22.11.2013
    Author Wolfgang Dick / ns
    Editor Simon Bone
    Find this story at 22 November 2013
    © 2013 Deutsche Welle

    << oudere artikelen  nieuwere artikelen >>