• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Asylum Seekers in Germany Unwittingly Used As Intelligence Sources

    In Somalia, Yusuf A. owned two houses and several cars. He had money and power as a politician with a seat in parliament and occasionally even in the cabinet. Now he lives in a shabby apartment in a small industrial park in Munich. Yusuf hasn’t yet found work and frequently falls ill. He’s lost his wealth, but at least he’s safe. In Somalia, he was under threat from al-Shabaab Islamists. Then it went beyond threats. One day a grenade landed in his house, killing a colleague of his. Yusuf fled to Germany.
    He was granted permanent residency with amazing swiftness and was allowed to send for his wife and seven children to join him. The German authorities—and they probably weren’t alone—showed great interest in Yusuf. In the span on seven weeks authorities called him in for questioning five times. The meetings lasted hours. Hearings conducted by the Federal Office for Migration and Refugees usually aren’t that involved. But in the case of Yusuf A., another authority came into play: the Main Office for Questioning (the Hauptstelle für Befragungswesen, HBW for short), which was established in during Cold War times to interview refugees and immigrants.
    The mysterious agency specializes in drawing on information it teases out of refugees. Just like the Federal Intelligence Service (Bundesnachrichtendienst, the BND, the counterpart to the U.S.’s Central Intelligence Agency), it falls under the purview of the Chancellor’s office. Even the federal government is tight-lipped about the intelligence operations conducted within the HBW. This is about secret intelligence, after all.
    Old records at Berlin’s administrative court show, however, that the HBW (first created by Germany’s Western allies) has been under the control of the BND since the 1950s. One BND report from 1983 calls witnesses in the HBW asylum process an “opening in the shadows.” That would make the HBW an institution built on a shadow world.
    The refugees are expected to give extensive testimony. Testimony about conditions back home, preferably about politicians, terrorists and their networks.
    Yusuf won’t say exactly what he told the officers at the HBW. But he will give us one detail; during a meeting he gave up the telephone number of an al-Shabaab leader. He knew a woman who came from the same town and, at the urging of the German officers, coaxed the al-Shabaab leader’s number out of her. He also found out that the Islamist leader seldom used his cellphone and even then used it only briefly. He mostly let his associates speak for him, switching their phones often.
    Yusuf now wonders if it was right to pass on the number to the Germans. Cellphone numbers help to locate people, and if the German authorities get a hold of important numbers, the BND can hand them over to the U.S.
    The United States is leading a drone war in Somalia that is legally questionable and continually claims the lives of people who have nothing to do with terrorist groups such as al-Shabaab or Al-Qaida. Yusuf knows that.
    He says, “You have to attack al-Shabaab. They are evil people.” But he doesn’t want innocent civilians to die in the name of shutting down al-Shabaab.
    Refugees like Yusuf who are interviewed by the HBW aren’t told later what was done with the information they provided.
    Immigrant as informant
    Asylum seekers in Germany are unwittingly being used as intelligence sources. Not every immigrant is called for questioning, but some receive letters from the HBW. They read; “the security situation worldwide” makes it necessary that the government of the Federal Republic of Germany gain information “about the political and social issues in your home country.” The HBW is charged with “collecting reliable information.”
    An HBW questionnaire for Afghanis reads: “The people in my hometown openly support the Taliban”—”yes” and “no”. The HBW wants to know how the supply of doctors and drinking water is, how foreign soldiers are perceived, and whether people believe that Afghanistan’s government can stabilize the situation. The questions are written in Afghanistan’s official language, Dari.
    Once you’ve filled out the questionnaire, it’s not over. Sometimes two women from the HBW, accompanied by a translator, arrive for a more personal chat. One lawyer from northern Germany says her client was allowed to stay in Germany because of his work helping the U.S. Army in his home country of Afghanistan. Later she learned her client had been questioned by the HBW in a refugee camp. She calls the cooperation between refugees and the HBW a “balancing act”. It’s not yet clear, lawyers say, what’s done with the information from these surveys and interviews or what effect participation—or nonparticipation—has on the refugees’ fate.
    The Germany government says participation in the surveys is voluntary and has no influence on the duration or success of the asylum process. But it’s striking how quickly refugees are taken in when they pique the interest of the HBW. Attorneys argue that their clients are especially vulnerable after such an HBW interview session if they are subsequently sent back to their home countries. In many of these refugees’ homelands, it’s not exactly seen as a good thing to be talking to a western intelligence agency.
    The German government talks about “post-refuge rationale” that occurs after leaving one’s homeland. If such a “post-refuge rationale” is apparent during the HBW questioning, it will be considered as part of the asylum application. That sounds complicated, especially since the government says there’s no reward system at play.
    In off-the-record interviews, several attorneys said clearly: refugees who cooperate with the HBW can expect a speedy process and permanent residency in Germany. Lawyers are mostly shut out of these interview sessions. The authorities explicitly advise the asylum seekers to come without legal representation.
    One Somali interpreter who has translated for asylum seekers for many years is convinced that there’s a rewards system at play: “It’s made clear to these people that if they cooperate they will be accepted quicker.” The interpreter came to Germany more than 20 years ago and has assisted many asylum seekers over the years. He fears giving his name would put his work and himself at risk. He says sometimes strange people come to hearings at the Federal Office for Migration and Refugees calling themselves interns. “The intern doesn’t come to simply any hearing, but rather just when he thinks someone knows something.” Then the refugee is asked about Islamist groups in great detail. Many refugees come from regions where the U.S. has dropped bombs using unmanned predator drones. Drones are a weapon against which you can’t protect yourself, says the interpreter. “People live in fear.”
    Victor Pfaff, a lawyer from Frankfurt, witnessed in the 1970s how asylum seekers had to move through three rooms during an application procedure. One room where the German officials sat, one where representatives from the U.S. intelligence agencies awaited them. The sign read “Liaison Officer “. It was only later that Pfaff learned of the HBW. He considers the agency to be legitimate and thinks it’s in Germany’s interest to make sure no one who poses a security risk should be allowed to remain in the country. That’s one possible outcome of the HBW surveys. But when it comes to cooperation with foreign intelligence agencies, “it could be problematic,” Pfaff says.
    The 1980s it came out that the information Turkish refugees had given the HBW/BND somehow landed at the Turkish intelligence agency. A BND officer at the time testified that it be “grave misconduct” if the authorities had been responsible for such a huge slip-up. But the agencies do work together with Turkish intelligence agencies on projects including those in the area of anti-terrorism.
    The methods, explanation and assertions from that case sound oddly similar. Three years ago, an insider published an essay under the pseudonym Jack Dawson in the Journal for Intelligence, Propaganda and Security Studies. He wrote that the HBW was a part of a larger interrogation program in Germany, the United Kingdom and the U.S. called the Tripartite Debriefing Programme. France is said to have taken part earlier in its existence.
    British and U.S. intelligence officials celebrated the 50th anniversary of the HBW along with their German counterparts in Berlin in 2008.
    After Dawson’s revelations British and American intelligence officers began questioning asylum seekers in Germany sometimes even without their German colleagues. Asked in late October, Dawson said that, to the best of his knowledge, the Tripartite program still runs strong. The goal remains the same: gain intelligence from the refugee questioning sessions.
    You could even say: whoever wants German protection isn’t safe from American intelligence agencies.
    Confronted with Dawson’s information, the German government seems struck by a telling silence. In stilted language, officials refer to rules of confidentiality. “An in-depth answer to the question would reveal details about methods, jeopardizing the future ability and performance of the HBW and BND.” Questions put to U.S. officials about HBW still remains unanswered.
    It’s not very easy to pay a visit the HBW headquarters at 150 Hohenzollerndamm in Berlin’s Wilmersdorf district. Surely, that’s by design. In front of the building lies a well-maintained yard. The HBW offices are housed on the fourth floor, where officers can look down from a bay window. But getting up there isn’t simple. There are no stairs that lead to the HBW offices—only an elevator, which requires a key.
    There are other HBW offices in Nuremberg, Maiz and Hanover and six refugee reception centers. The German government won’t say anything on the topic. It merely confirms that there is a duty station at the border transit camp in Friedland, in central Germany. In total, just 40 people work at the HBW.
    Meanwhile the interviewers have switched their focus towards Afghanistan, Somalia, Iraq and Syria. At the end of 2012, in response to questions posed by the Green Party, the German government said that since 2000, some 500 to 1,000 “briefings” with refugees and emigrants were conducted, each applicant enduring two to five question sessions each.
    But not every asylum seeker is telling the truth. In 1999, the Iraqi Rafed Ahmed Alwan came to the refugee reception center in Zirndorf, near Nuremberg and was questioned there. He provided the BND with information about purported biochemical weapon laboratories in Iraq, which was forwarded to American officials. The C.I.A. gave him the codename Curveball. His statements were later used by the U.S. government to justify the invasion into Iraq.
    But the alleged facts were wrong. There were no labs. Alwan, AKA Curveball, got a Germany passport and a contract at some sham offices at, of all places, the BND.
    Coincidentally, the BND currently seeks “freelancers” who speak Somali. Applicants are asked to discreetly submit their letters of interest.
    November 20, 2013 02:54 pm CET
    By Christian Fuchs, John Goetz, Hans Leyendecker, Klaus Ott, Niklas Schenck, Tanjev Schultz
    Find this story at 20 November 2013
    © Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH

    Misleidende methode (NL 2003)

    Ahmed was in Irak advocaat van iemand uit de `inner cicle’ van Saddam Hoessein. De CIA en de BVD waren zeer geïnteresseerd in zijn ervaringen en spraken hem meerdere malen na zijn aankomst in 1999 in Nederland. Ahmed vertelt: `”Natuurlijk”, zei meneer Bert van de BVD, “krijg je een verblijfsvergunning voor bewezen diensten.”‘ Eerst moest Ahmed echter alles wat hij wist netjes aan de geheime dienst vertellen. Zijn advocaat, mr. Schoorl uit Alkmaar, moest hem duidelijk maken dat de bvdgeen verblijfsvergunningen verstrekt.
    Dit boek is een vervolg op De vluchteling achtervolgd, het in 1990 door Buro Jansen & Janssen uitgevoerde onderzoek naar de bemoeienissen van de BVD met vluchtelingen en asielzoekers. De belangrijkste conclusie van dat onderzoek was toen dat het voor de betrokken asielzoekers en vluchtelingen vaak erg onduidelijk en verwarrend was dat de bvdook via de politie opereert. Het onderscheid tussen de vreemdelingendienst van de politie (destijds verantwoordelijk voor procedures rond verblijfsvergunningen) en de inlichtingendienst (die mensen werft als informant) was niet altijd duidelijk. Omdat die twee functies in de praktijk vaak ook nog werden gecombineerd door een en dezelfde persoon, was het voor nieuwkomers extra moeilijk om erachter te komen waar ze aan toe waren.
    Voor de betrokken asielzoeker betekende dit systeem van `dubbele petten’ dat er weinig overeind bleef van het officiële recht om medewerking aan het werk van inlichtingendiensten te weigeren. Helemaal omdat, zoals uit dat onderzoek bleek, middelen als intimidatie, bedreiging en misleiding (`Als je niet meewerkt, waarom zouden we je dan een asielstatus verstrekken?’) niet werden geschuwd.
    De vluchteling achtervolgd deed bij verschijning in 1991 behoorlijk wat stof opwaaien. Er was veel media-aandacht voor het onderzoek en het leidde tot Kamervragen. Het boekje zorgde voor verspreiding van kennis over de risico’s van samenwerking met inlichtingendiensten.
    Nieuw onderzoek
    Tien jaar later is er veel veranderd, maar de pogingen om asielzoekers en migranten te werven als informant gaan door. De politieke verhoudingen in de wereld hebben zich gewijzigd: het zijn nu andere landen waar vluchtelingen vandaan komen, en ze komen deels om andere redenen. Tegelijkertijd staan terrorisme en mensensmokkel hoog op de politieke agenda. De asielprocedures zijn aangescherpt en het is nu niet langer de Vreemdelingendienst maar de Immigratie- en Naturalisatiedienst IND, van het ministerie van Justitie) die verantwoordelijk is voor de toelatingsprocedure. De IND heeft haar eigen Bureau Bijzondere Zaken voor onderzoek naar asielzoekers die van een misdrijf worden verdacht, en om de inlichtingendiensten van interessante informatie te kunnen voorzien.
    In dezelfde periode is het werk van inlichtingendiensten en het opsporingsonderzoek van politie en justitie naar elkaar toe geschoven, deels overlapt het elkaar zelfs. Dit levert onduidelijke situaties op waar ook asielzoekers en migranten mee te maken kunnen krijgen. Zo let de AIVD niet langer alleen op de politieke achtergrond van asielzoekers en migranten (een inlichtingentaak), de dienst doet ook onderzoek naar mensensmokkel en georganiseerde misdaad (meer opsporingswerk). Dit alles in nauwe samenwerking met gespecialiseerde politiediensten binnen heel Europa.
    De afgelopen jaren zijn de procedures voor een verblijfsvergunning in Nederland strenger geworden, en de mogelijkheden er een te krijgen kleiner. Voor asielzoekers, die toch al in een kwetsbare positie verkeren, werd de afhankelijkheid van Nederlandse instanties daardoor versterkt. Tegen deze achtergrond waren wij benieuwd hoe het nu toegaat bij het benaderen van asielzoekers.
    Openlijke controle
    Dit hernieuwd onderzoek naar de bemoeienissen van inlichtingendiensten met asielzoekers en migranten vond plaats vanuit de doelstelling die Buro Jansen & Janssen al jarenlang nastreeft: meer openheid over en controle op politie, justitie en inlichtingendiensten. Zonder publicatie van praktijken die anders geheim zouden blijven, is geen openbare controle mogelijk.
    Daarnaast streven we naar de versterking van de positie van asielzoekers, die zich tijdens de procedure voor een verblijfsvergunning in een onzekere positie bevinden. Voor hen moet duidelijk zijn wanneer ze met de IND te maken hebben inzake hun eigen asielverzoek, en wanneer het belang van inlichtingendiensten vooropstaat. Met deze publicatie in de hand kunnen advocaten, vluchtelingenorganisaties en andere belangenbehartigers een asielzoeker die benaderd is beter bijstaan of, zo mogelijk, voorkomen dat het zover komt.
    Dit boek Misleidende Methode begint met enige achtergrondinformatie over de positie van asielzoekers in Nederland en de procedures waarmee ze te maken krijgen. Hoofdstuk 2 gaat over de Immigratie- en Naturalisatiedienst. De IND speelt een centrale rol in de asielprocedure en het horen van asielzoekers. Wat gebeurt er met de informatie uit de vertrouwelijke gehoren van asielzoekers? Welk onderzoek doet de IND zelf? En wat is hierbij de rol van het Bureau Bijzondere Zaken van de IND? Voor welke asielzoekers bestaat bijzondere belangstelling?
    Centraal in hoofdstuk 3 staat de BVD(tegenwoordig AIVD)en de manier waarop deze dienst informatie verzamelt onder vluchtelingen. Wie benadert de BVD, en waarom juist deze mensen? Op welke manier gebeurt dat, en zijn degenen die benaderd worden om informatie te leveren gezien hun (kwetsbare) positie in staat om medewerking te weigeren? Is het voor hen mogelijk een inschatting te maken van de gevolgen van het praten met de BVD?
    In hoofdstuk 4 onderzoeken we de samenwerking tussen de verschillende diensten die zich bezighouden met het verzamelen van informatie over asielzoekers en migranten. De IND, haar afdeling Bureau Bijzondere Zaken, de BVD, de Vreemdelingendienst en buitenlandse inlichtingendiensten azen allemaal op bepaalde informatie. Hoe werken zij samen? In hoeverre hebben zij toegang tot elkaars informatie, en is er overleg? Is deze samenwerking inzichtelijk en controleerbaar, of kunnen asielzoekers en migranten alleen maar hopen dat informatie over hen niet bij de inlichtingendienst van hun land van herkomst terechtkomt?
    In de conclusies komen de lijnen uit de voorgaande hoofdstukken samen en kijken we naar de ontwikkelingen op dit gebied die plaatsvonden in de onderzoeksperiode, van de publicatie van De vluchteling achtervolgd (begin jaren negentig) tot in het begin van de nieuwe eeuw. Wat is er in die tijd veranderd? En waar gaat het naartoe?
    Verantwoording
    Tot slot een verantwoording over de gebezigde onderzoeksmethoden en bronnen. We hebben gebruikgemaakt van informatie die openbaar was en informatie die we met een beroep op de Wet Openbaarheid van Bestuur openbaar hebben gemaakt (zie literatuurlijst).
    Daarnaast hebben we voor dit onderzoek honderden telefoontjes gepleegd: met asielzoekers, vluchtelingen en migranten, met advocaten, vluchtelingen- en migrantenorganisaties, met deskundigen van universiteiten en met journalisten. In enkele tientallen gevallen leidde dit tot gesprekken met de asielzoeker en/of migrant zelf of zijn belangenbehartiger. Sommigen van hen zijn met naam en toenaam terug te vinden in de voorbeelden die dit boek illustreren, anderen bleven om begrijpelijke redenen liever anoniem.
    Het was niet makkelijk om met asielzoekers te spreken over hun ervaringen met inlichtingendiensten. Sommigen waren bang dat dit gevolgen voor hun procedure voor verblijfsrecht in Nederland zou hebben. Anderen waren bang voor repercussies uit de eigen gemeenschap als ze te boek kwamen staan als iemand die contacten met inlichtingendiensten had gehad. Vaak wilden mensen maar liever niet herinnerd worden aan die gesprekken.
    We hebben ook veel migrantenorganisaties aangeschreven en gesproken. Politieke organisaties van bijvoorbeeld Turkse, Koerdische of Iraanse migranten hadden wel ervaringen met informanten, maar verkozen om daarmee niet in de openbaarheid te treden. Anders dan tien jaar geleden hadden ze er nu ieder hun eigen reden voor om de zaken in eigen kring af te handelen.
    Degenen die wel met ons spraken, deden dat omdat ze het belangrijk vonden hun teleurstelling en frustratie over de werkwijze van inlichtingendiensten met andere vluchtelingen(organisaties) te delen. Sommige verhalen mochten we slechts als achtergrondinformatie gebruiken, andere konden wemet of zonder de naam van degene die het betrof publiceren. Instemming van de betrokkenen stond voor ons voorop bij het maken van dit boek.
    Een van onze informatiebronnen vraagt om wat nadere toelichting, en dat is Hilbrand Nawijn. Het is van belang te weten dat wij voor dit onderzoek met hem spraken in augustus 2001. Hij was toen vreemdelingenadvocaat; daarvoor was hij jarenlang directeur van de IND. Na het gesprek is hij een paar maanden minister van Vreemdelingenzaken en Integratie geweest voor de Lijst Pim Fortuyn, de [kk]lpf[kx]. Nawijn gaf ons achtergrondinformatie over het functioneren van Bureau Bijzondere Zaken van de IND.
    Opvallend is dat we vooral met mannen gesproken hebben. Onduidelijk is of de inlichtingendiensten vooral mannen benaderen, bijvoorbeeld omdat die vaker `interessante’ functies in het leger hebben, en wij dus bij navraag naar deze gesprekken automatisch bij mannen terechtkwamen. Het kan ook zijn dat vrouwen die benaderd zijn hierover geen contact hebben gezocht met bijvoorbeeld hun advocaat, waardoor hun verhaal onbekend bleef.
    Hoofdstuk 1
    De procedure
    Hoofdstuk 2
    Het hemd van het lijf gevraagd: de IND op het inlichtingenpad
    Hoofdstuk 3
    Asielzoekers bespied
    Hoofdstuk 4
    Samen weten we nog net iets meer
    Conclusie
    Nawoord
    Tips
    Find misleidende methode
    Find vluchteling achtervolgd
    Find a report of the CTIVD

    Geheimer Krieg BND will umstrittene Befragungsstelle auflösen

    Die sogenannte Hauptstelle für Befragungswesen ist wenig bekannt, aber sehr umstritten: Asylbewerber werden dort von deutschen und ausländischen Geheimdienstlern ausgehorcht. Die Bundesregierung bestätigt nun diese Praxis. Lange soll es die Stelle aber nicht mehr geben.
    Die umstrittene “Hauptstelle für Befragungswesen”, die dem Bundesnachrichtendienst zugeordnet ist, soll aufgelöst werden. Das geht aus einer schriftlichen Antwort der Bundesregierung auf eine Frage von Linksfraktionsvize Jan Korte hervor, die der Nachrichtenagentur dpa vorliegt. Die personelle Ausstattung der Dienststelle sei bereits schrittweise reduziert worden, heißt es darin.
    In der Antwort räumt die Regierung ein, dass in der Einrichtung Asylbewerber auch durch Vertreter “der alliierten Partnerdienste ohne deutsche Begleiter” befragt wurden. Es könne außerdem nicht ausgeschlossen werden, dass Informationen aus den Befragungen “auch zum militärischen Lagebild” der Partnerdienste beitragen könnten. Korte kritisierte die Praxis scharf.
    500 bis 800 “Vorgespräche”
    Nach Recherchen von NDR und Süddeutscher Zeitung im Rahmen des Projekts Geheimer Krieg horchten deutsche Geheimdienstler in der Hauptstelle für Befragungswesen Asylbewerber systematisch aus und gaben Hinweise aus diesen Befragungen an die USA weiter. Diese wiederum nutzen solche Informationen auch für den Einsatz von Kampfdrohnen. Es gibt zudem Hinweise, dass auch britische und amerikanische Nachrichtendienstler in Deutschland Asylbewerber befragen.
    Bilder
    Geheime Außenstellen des BND Sie sind mitten unter uns
    Anzeige
    In der Antwort der Regierung heißt es, in den vergangenen zwei bis drei Jahren hätten durchschnittlich 500 bis 800 “Vorgespräche” pro Jahr stattgefunden. Im Anschluss seien etwa 200 bis 300 Personen befragt worden. Seit der Gründung der Dienststelle 1958 seien an den Befragungen alliierte Nachrichtendienste beteiligt.
    Wenn ausländische Geheimdienstler alleine mit Asylbewerbern sprächen, habe der BND “im Vor- und Nachgang” die Aufsicht. Die Ergebnisse der Gespräche würden außerdem im “Meldungssystem” des BND erfasst, bei Bedarf “bereinigt” – etwa im Hinblick auf Datenschutz – und erst dann an die ausländischen Partner weitergegeben. 60 Prozent der erhobenen Informationen der Dienststelle gingen auf diesem Wege an ausländische Geheimdienste.
    Korte bezeichnete dies als “absurd”. “Wir sollen mal wieder für dumm verkauft werden”, sagte er der dpa. “Befragungen finden auch durch US-Geheimdienstler statt, aber die Befragungsergebnisse werden angeblich nur nach Prüfung und Freigabe an die USA weitergereicht – und die Befrager haben natürlich alles sofort wieder vergessen und erzählen ihren Dienststellen nichts.”
    Zur Nutzung der Informationen aus den Gesprächen mit Asylbewerbern schreibt die Regierung: “Zielsetzung der Befragungen war und ist zu keiner Zeit die Gewinnung von Informationen zur Vorbereitung von Drohneneinsätzen.” Es sei aber nicht auszuschließen, dass die Erkenntnisse auch zum militärischen Lagebild der ausländischen Partner beitragen könnten.
    Geheimer Krieg Deutschlands Rolle im “Kampf gegen den Terror”
    Eine Serie der Süddeutschen Zeitung und des NDR +++ Panorama-Film “Geheimer Krieg” +++ interaktive Datenbank: Spionen auf der Spur +++ Sonderseite zum Projekt: geheimerkrieg.de +++ alle Artikel finden Sie hier: sz.de/GeheimerKrieg +++ englische Version hier +++
    Personal soll reduziert werden
    Korte reagierte empört: “Erschreckend ist, dass die Regierung die Berichterstattung der letzten Wochen komplett bestätigen muss, aber scheinbar keinerlei Problem erkennen kann”, sagte er. Niemand könne ausschließen, dass Erkenntnisse aus den Befragungen auch für das gezielte Töten durch Drohnen benutzt würden. “Das ohnehin fragwürdige geheimdienstliche Abschöpfen von Asylsuchenden muss sofort ersatzlos beendet werden”, forderte er.
    Die geplante Auflösung der Hauptstelle zeige, dass die derzeitige Praxis offenbar ohnehin entbehrlich sei. Der BND habe die Dienststelle “seit längerem einer Effizienzkontrolle unterzogen” und das Personal dort reduziert, heißt es weiter in der Antwort der Regierung. Ziel sei, die Befragungen direkt in den Krisenregionen im Ausland zu verstärken.
    29. November 2013 20:24
    Find this story at 29 November 2013
    © Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH

    Geheimer Krieg Deutsche Behörde horcht Asylbewerber aus

    Wer Informationen über mutmaßliche islamistische Terrorgruppen hat, soll schneller als Asylbewerber anerkannt werden: Die geheime “Hauptstelle für Befragungswesen” befragt Flüchtlinge – das Wissen könnten die USA beim Einsatz von Kampf-Drohnen nutzen.
    Beim Einsatz von Kampf-Drohnen greifen US-Geheimdienste auch auf Informationen zurück, die von Asylbewerbern in Deutschland stammen. Nach Angaben eines früheren hochrangigen Pentagon-Mitarbeiters fließen solche Erkenntnisse in das “Zielerfassungssystem” der US-Dienste ein. Selbst scheinbar banale Informationen könnten manchmal reichen, “ein Ziel zu bestätigen – und vielleicht auch dafür, einen Tötungsbefehl auszulösen”. Deutsche Behörden würden angeblich die USA systematisch mit Hinweisen versorgen, die von Flüchtlingen stammen. Dazu können auch die Handydaten von Terrorverdächtigen gehören.
    Nach Recherchen der Süddeutschen Zeitung und des Norddeutschen Rundfunks spielt dabei die geheimnisumwitterte “Hauptstelle für Befragungswesen” (HBW), die dem Kanzleramt untersteht, eine zentrale Rolle. Die Bundesregierung macht über die Struktur des HBW selbst bei Anfragen im Parlament keine genauen Angaben. Die Behörde war ursprünglich von den Westalliierten eingerichtet und dann 1958 von der damaligen Bundesregierung übernommen worden. Sie wurde dem Bundesnachrichtendienst zugeordnet.
    Geheimer Krieg
    Wie Geheimdienste Asylbewerber benutzen
    Yusuf A. war in Somalia ein Mann mit Macht, ein Politiker mit Geld und mehreren Autos. Dann muss er nach Deutschland fliehen. Bei Gesprächen über seinen Asylantrag sind nicht nur Beamte vom Bundesamt für Flüchtlinge anwesend. geheimerkrieg.de
    Es gibt Hinweise, dass auch britische und amerikanische Nachrichtendienstler in Deutschland Asylbewerber befragen. Manchmal angeblich sogar allein, ohne deutsche Kollegen. In einer internationalen Fachzeitschrift berichtete ein Insider, die Hauptstelle sei Teil eines gemeinsamen Befragungsprogramms von Deutschland, Großbritannien und den USA.
    Die HBW führt heute nach amtlichen Angaben jährlich 500 bis 1000 Vorgespräche mit Flüchtlingen und befragt anschließend 50 bis 100 von ihnen intensiv. Ein Schwerpunkt der Befragungen liegt derzeit offenbar bei Flüchtlingen aus Somalia, Afghanistan und Syrien.
    Das Bundesinnenministerium teilte jüngst auf eine Anfrage der Linken zur Aufnahme von Syrern mit, dass derzeit jeden Monat etwa zehn Flüchtlinge von der HBW “kontaktiert” würden.
    Dolmetschern und Anwälten zufolge, die Asylbewerber betreuen, interessiert sich die Hauptstelle vor allem für Flüchtlinge, die Angaben über mutmaßliche islamistische Terrorgruppen machen können. Wer mit der Hauptstelle kooperiere, werde oft mit einer schnellen Anerkennung als Asylbewerber belohnt und dürfe in der Bundesrepublik bleiben.
    Die Bundesregierung bestreitet, dass es solche Belohnungen gibt und betont, zudem seien die Befragungen freiwillig. Über eine Zusammenarbeit von HBW und BND äußert sich die Regierung nicht. Sie ließ eine umfassende Anfrage zu der Behörde weitgehend unbeantwortet. Detaillierte Angaben würden die “weitere Arbeitsfähigkeit und Aufgabenerfüllung von HBW und BND gefährden”, erklärte die Regierung.
    Die HBW, die im Kalten Krieg viele Hundert Mitarbeiter hatte, soll heute nur noch knapp vierzig Mitarbeiter beschäftigen. Die Zentrale der Behörde liegt in Berlin. Weitere Büros soll sie in insgesamt sechs Aufnahmelagern für Flüchtlinge haben.
    19. November 2013 18:59
    Von John Goetz und Hans Leyendecker
    Find this story at 19 November 2013
    © Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH

    Die Operationen der US-Dienste in Deutschland

    Drohnen kommen heute immer häufiger zum Einsatz – auch, um damit Menschen zu töten.
    Alles begann mit einem Anruf aus Somalia: Ein Mann aus Mogadischu berichtete dem Panorama Team von einem amerikanischen Drohnenangriff. Das Ziel war ein Terrorist der Terrorgruppe al-Shabaab. Aber wie so häufig in diesem Krieg starb nicht nur der Terrorist, sondern auch Zivilisten. An einem Tag im Oktober vor zwei Jahren wurde der Vater des Anrufers durch US-Kampfdrohnen getötet. Er war ein unschuldiger Kamelbauer, der zur falschen Zeit am falschen Ort war.
    Der Film “Geheimer Krieg”, für den Panorama Reporter zwei Jahre recherchiert haben, erzählt die Geschichte des Mannes, der sterben musste, weil die USA ihren Krieg gegen den Terror fast weltweit führen. Im Jemen, in Pakistan und in Afrika bringen sie Verdächtige aus der Luft um – ohne Anklage, ohne Anwalt, ohne Gerichtsurteil.
    Panorama: Geheimer Krieg
    Sehen Sie hier das gesamte Video der Panorama Sendung von 28. November 2013.
    Systematische Einbindung Deutschlands
    John Goetz vor der amerikanischen Botschaft in Berlin: Wird von hier das Regierungsviertel abgehört?
    John Goetz und sein Team zeigen, wie vor allem Deutschland in diesen leisen und versteckten Krieg eingebunden ist: Der Bundesnachrichtendienst (BND) befragt systematisch Flüchtlinge aus Krisenregionen, um deren Informationen – auch über mögliche Ziele – an die Amerikaner weiterzugeben.
    Das Afrika-Kommando der US-Streitkräfte sitzt in Stuttgart. Von hier kommen die Befehle für Drohnenangriffe auf Menschen in Afrika. Über die Airbase in Ramstein läuft die Kommunikation der Drohnenpiloten mit den fliegenden Kampfrobotern über Somalia. Und eine Firma, die Terrorverdächtige für die CIA entführt hat, bekommt seit Jahren Millionenaufträge von der Bundesregierung in sensiblen Bereichen.
    Bundesregierung und US-Botschaft wiegeln ab
    Auf Anfrage wiegelt die Bundesregierung ab: Es würden nur Informationen an US-Dienste weitergegeben, mit denen keine Drohnenangriffe geplant werden könnten. Außerdem lägen “der Bundesregierung keine eigenen gesicherten Erkenntnisse zu von US-Streitkräften in der Bundesrepublik Deutschland angeblich geplanten oder geführten Einsätzen vor”. Auch die amerikanische Botschaft in Berlin widerspricht den Rechercheergebnissen. Es seien “Halbwahrheiten, Spekulationen und Unterstellungen”, sowie “ungeheuerliche Behauptungen”.
    Weltweite Recherchen
    Am Beispiel des ermordeten Kamelbauern aus Somalia und anderen konkreten Fällen zeigt die Dokumentation erstmals, wie deutsche Dienste und US-Einrichtungen in Deutschland an der Ermordung von unschuldigen Zivilisten durch Drohnen in Afrika beteiligt sind. Dafür haben die Reporter in Afrika, den USA, in der Türkei, Deutschland und in Moskau bei Edward Snowden recherchiert.
    Die Ausstrahlung des Films ist der Höhepunkt der Serie “Geheimer Krieg”, in der der Norddeutsche Rundfunk und die “Süddeutsche Zeitung” seit gut zwei Wochen darüber berichten, wie das US-Militär und die amerikanischen und britischen Geheimdienste den Kampf gegen den Terrorismus aus Deutschland steuern und kontrollieren.
    28.11.13 | 21:45 Uhr
    von John Goetz & Niklas Schenck
    Find this story at 28 November 2013
    © Norddeutscher Rundfunk

    It’s outrageous to accuse the Guardian of aiding terrorism by publishing Snowden’s revelations

    Alan Rusbridger is being grilled by MPs – but he has published nothing that could be a threat to national security
    The Guardian’s editor, Alan Rusbridger, is due to appear before the House of Commons home affairs select committee on Tuesday to answer questions about his newspaper’s publication of intelligence files leaked by Edward Snowden. Unlike the directors of MI5, MI6 and GCHQ, who gave evidence recently before the intelligence and security committee, Rusbridger will not be provided with a list of questions in advance.
    There are at least five legal and political issues arising out of Snowden’s revelations on which reasonable opinion is divided. These include whether Snowden should enjoy the legal protection accorded a whistleblower who reveals wrongdoing; whether his revelations have weakened the counter-terrorism apparatus of the US or the UK; whether, conversely, they show the need for an overhaul of surveillance powers on both sides of the Atlantic (and even an international agreement to protect partners like Germany); whether parliament has been misled by the services about the extent of intrusive surveillance; and whether the current system for parliamentary oversight of the intelligence and security services is sufficiently robust to meet the international standards laid down by my predecessor at the UN, Martin Scheinin.
    These questions are too important for the UN to ignore, and so on Tuesday I am launching an investigation that will culminate in a series of recommendations to the UN general assembly next autumn. As in the case of Chelsea Manning, there are also serious questions about sensitive information being freely available to so many people. The information Snowden had access to, which included top-secret UK intelligence documents, was available to more than 850,000 people, including Snowden – a contractor not even employed by the US government.
    There is, however, one issue on which I do not think reasonable people can differ, and that is the importance of the role of responsible media in exposing questions of public interest. I have studied all the published stories that explain how new technology is leading to the mass collection and analysis of phone, email, social media and text message data; how the relationship between intelligence services and technology and telecoms companies is open to abuse; and how technological capabilities have moved ahead of the law. These issues are at the apex of public interest concerns. They are even more important – dare I say it – than whether Hugh Grant’s mobile was hacked by a tabloid.
    The astonishing suggestion that this sort of journalism can be equated with aiding and abetting terrorism needs to be scotched decisively. Attacking the Guardian is an attempt to do the bidding of the services themselves, by distracting attention from the real issues. It is the role of a free press to hold governments to account, and yet there have even been outrageous suggestions from some Conservative MPs that the Guardian should face a criminal investigation.
    It is disheartening to see some tabloids give prominence to this nonsense. When the Mail on Sunday took the decision to publish the revelations of the former MI5 officer David Shayler, no one suggested that the paper should face prosecution. Indeed, when the police later tried to seize the Guardian’s notes of its own interviews with Shayler, Lord Judge, the former lord chief justice, refused to allow it to happen – saying, rightly, that it would interfere with the vital role played by the media to expose public wrongdoing.
    When it comes to damaging national security, comparisons between the two cases are telling. The Guardian has revealed that there is an extensive programme of mass surveillance that potentially affects every one of us, while being assiduous in avoiding the revelation of any name or detail that could put sources at risk. Rusbridger himself has made most of these decisions, as befits their importance. The Mail on Sunday, on the other hand, published material that was of less obvious public interest.
    An even closer example is Katharine Gunn, the GCHQ whistleblower who revealed in 2003 that the US and UK were spying on the missions of Mexico and five other countries at the UN, in order to manipulate a vote in the security council in favour of military intervention in Iraq. Like Snowden, her defence was that she was acting to prevent a greater wrong – the attempt to twist the security council to the bellicose will of the US and UK. She was charged under the Official Secrets Act, but the case was dropped because the director of public prosecutions and attorney general rightly concluded that no jury would convict Gunn.
    There can be no doubt that the Guardian’s revelations concern matters of international public interest. There is already an intense debate that has drawn interventions from some of the UK’s most senior political figures. Wholesale reviews have been mooted by President Obama, Chancellor Merkel and Nick Clegg, Britain’s deputy prime minister. Current and former privy councillors and at least one former law officer have weighed in.
    In the US, a number of the revelations have already resulted in legislation. Senior members of Congress have informed the Guardian that they consider the legislation to have been misused, and the chair of the US Senate intelligence committee has said that as a result of the revelations it is now “abundantly clear that a total review of all intelligence programmes is necessary”.
    In Europe, and particularly in Germany (which has a long and unhappy history of abusive state surveillance) the political class is incandescant. In November the Council of Europe parliamentary assembly endorsed the Tshwane International Principles on National Security and the Right to Information, which provide the strongest protection for public interest journalism deriving from whistleblowers. Lord Carlile, the former independent reviewer of terrorism legislation in the UK, took part in the drafting of the principles and has endorsed them as an international template for resolving issues such as the present one. Many states have registered serious objections at the UN about spying, and there are diplomatic moves towards an international agreement to restrict surveillance activity. In direct response to the Guardian’s revelations, Frank La Rue, the special rapporteur on freedom of expression, has brought forward new guidelines on internet privacy, which were adopted last week by the UN general assembly.
    When it comes to assessing the balance that must be struck between maintaining secrecy and exposing information in the public interest there are often borderline cases. This isn’t one. It’s a no-brainer. The Guardian’s revelations are precisely the sort of information that a free press is supposed to reveal.
    The claims made that the Guardian has threatened national security need to be subjected to penetrating scrutiny. I will be seeking a far more detailed explanation than the security chiefs gave the intelligence committee. If they wish to pursue an agenda of unqualified secrecy, then they are swimming against the international tide. They must justify some of the claims they have made in public, because, as matters stand, I have seen nothing in the Guardian articles that could be a risk to national security. In this instance the balance of public interest is clear.
    Ben Emmerson
    The Guardian, Monday 2 December 2013 18.21 GMT
    Find this story at 2 December 2013
    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Meet the Spies Doing the NSA’s Dirty Work; This obscure FBI unit does the domestic surveillance that no other intelligence agency can touch.

    With every fresh leak, the world learns more about the U.S. National Security Agency’s massive and controversial surveillance apparatus. Lost in the commotion has been the story of the NSA’s indispensable partner in its global spying operations: an obscure, clandestine unit of the Federal Bureau of Investigation that, even for a surveillance agency, keeps a low profile.
    When the media and members of Congress say the NSA spies on Americans, what they really mean is that the FBI helps the NSA do it, providing a technical and legal infrastructure that permits the NSA, which by law collects foreign intelligence, to operate on U.S. soil. It’s the FBI, a domestic U.S. law enforcement agency, that collects digital information from at least nine American technology companies as part of the NSA’s Prism system. It was the FBI that petitioned the Foreign Intelligence Surveillance Court to order Verizon Business Network Services, one of the United States’ biggest telecom carriers for corporations, to hand over the call records of millions of its customers to the NSA.
    But the FBI is no mere errand boy for the United States’ biggest intelligence agency. It carries out its own signals intelligence operations and is trying to collect huge amounts of email and Internet data from U.S. companies — an operation that the NSA once conducted, was reprimanded for, and says it abandoned.
    The heart of the FBI’s signals intelligence activities is an obscure organization called the Data Intercept Technology Unit, or DITU (pronounced DEE-too). The handful of news articles that mentioned it prior to revelations of NSA surveillance this summer did so mostly in passing. It has barely been discussed in congressional testimony. An NSA PowerPoint presentation given to journalists by former NSA contractor Edward Snowden hints at DITU’s pivotal role in the NSA’s Prism system — it appears as a nondescript box on a flowchart showing how the NSA “task[s]” information to be collected, which is then gathered and delivered by the DITU.
    But interviews with current and former law enforcement officials, as well as technology industry representatives, reveal that the unit is the FBI’s equivalent of the National Security Agency and the primary liaison between the spy agency and many of America’s most important technology companies, including Google, Facebook, YouTube, and Apple.
    The DITU is located in a sprawling compound at Marine Corps Base Quantico in Virginia, home of the FBI’s training academy and the bureau’s Operational Technology Division, which runs all the FBI’s technical intelligence collection, processing, and reporting. Its motto: “Vigilance Through Technology.” The DITU is responsible for intercepting telephone calls and emails of terrorists and foreign intelligence targets inside the United States. According to a senior Justice Department official, the NSA could not do its job without the DITU’s help. The unit works closely with the “big three” U.S. telecommunications companies — AT&T, Verizon, and Sprint — to ensure its ability to intercept the telephone and Internet communications of its domestic targets, as well as the NSA’s ability to intercept electronic communications transiting through the United States on fiber-optic cables.
    For Prism, the DITU maintains the surveillance equipment that captures what the NSA wants from U.S. technology companies, including archived emails, chat-room sessions, social media posts, and Internet phone calls. The unit then transmits that information to the NSA, where it’s routed into other parts of the agency for analysis and used in reports.
    After Prism was disclosed in the Washington Post and the Guardian, some technology company executives claimed they knew nothing about a collection program run by the NSA. And that may have been true. The companies would likely have interacted only with officials from the DITU and others in the FBI and the Justice Department, said sources who have worked with the unit to implement surveillance orders.
    “The DITU is the main interface with providers on the national security side,” said a technology industry representative who has worked with the unit on many occasions. It ensures that phone companies as well as Internet service and email providers are complying with surveillance law and delivering the information that the government has demanded and in the format that it wants. And if companies aren’t complying or are experiencing technical difficulties, they can expect a visit from the DITU’s technical experts to address the problem.
    * * *
    Recently, the DITU has helped construct data-filtering software that the FBI wants telecom carriers and Internet service providers to install on their networks so that the government can collect large volumes of data about emails and Internet traffic.
    The software, known as a port reader, makes copies of emails as they flow through a network. Then, in practically an instant, the port reader dissects them, removing only the metadata that has been approved by a court.
    The FBI has built metadata collection systems before. In the late 1990s, it deployed the Carnivore system, which the DITU helped manage, to pull header information out of emails. But the FBI today is after much more than just traditional metadata — who sent a message and who received it. The FBI wants as many as 13 individual fields of information, according to the industry representative. The data include the route a message took over a network, Internet protocol addresses, and port numbers, which are used to handle different kinds of incoming and outgoing communications. Those last two pieces of information can reveal where a computer is physically located — perhaps along with its user — as well as what types of applications and operating system it’s running. That information could be useful for government hackers who want to install spyware on a suspect’s computer — a secret task that the DITU also helps carry out.
    The DITU devised the port reader after law enforcement officials complained that they weren’t getting enough information from emails and Internet traffic. The FBI has argued that under the Patriot Act, it has the authority to capture metadata and doesn’t need a warrant to get them. Some federal prosecutors have gone to court to compel port reader adoption, the industry representative said. If a company failed to comply with a court order, it could be held in contempt.
    The FBI’s pursuit of Internet metadata bears striking similarities to the NSA’s efforts to obtain the same information. After the 9/11 terrorist attacks, the agency began collecting the information under a secret order signed by President George W. Bush. Documents that were declassified Nov. 18 by Barack Obama’s administration show that the agency ran afoul of the Foreign Intelligence Surveillance Court after it discovered that the NSA was collecting more metadata than the court had allowed. The NSA abandoned the Internet metadata collection program in 2011, according to administration officials.
    But the FBI has been moving ahead with its own efforts, collecting more metadata than it has in the past. It’s not clear how many companies have installed the port reader, but at least two firms are pushing back, arguing that because it captures an entire email, including content, the government needs a warrant to get the information. The government counters that the emails are only copied for a fraction of a second and that no content is passed along to the government, only metadata. The port reader is designed also to collect information about the size of communications packets and traffic flows, which can help analysts better understand how communications are moving on a network. It’s unclear whether this data is considered metadata or content; it appears to fall within a legal gray zone, experts said.
    * * *
    The DITU also runs a bespoke surveillance service, devising or building technology capable of intercepting information when the companies can’t do it themselves. In the early days of social media, when companies like LinkedIn and Facebook were starting out, the unit worked with companies on a technical solution for capturing information about a specific target without also capturing information related to other people to whom the target was connected, such as comments on posts, shared photographs, and personal data from other people’s profiles, according to a technology expert who was involved in the negotiations.
    The technicians and engineers who work at the DITU have to stay up to date on the latest trends and developments in technology so that the government doesn’t find itself unable to tap into a new system. Many DITU employees used to work for the telecom companies that have to implement government surveillance orders, according to the industry representative. “There are a lot of people with inside knowledge about how telecommunications work. It’s probably more intellectual property than the carriers are comfortable with the FBI knowing.”
    The DITU has also intervened to ensure that the government maintains uninterrupted access to the latest commercial technology. According to the Guardian, the unit worked with Microsoft to “understand” potential obstacles to surveillance in a new feature of Outlook.com that let users create email aliases. At the time, the NSA wanted to make sure that it could circumvent Microsoft’s encryption and maintain access to Outlook messages. In a statement to the Guardian, Microsoft said, “When we upgrade or update products we aren’t absolved from the need to comply with existing or future lawful demands.” It’s the DITU’s job to help keep companies in compliance. In other instances, the unit will go to companies that manufacture surveillance software and ask them to build in particular capabilities, the industry representative said.
    The DITU falls under the FBI’s Operational Technology Division, home to agents, engineers, electronic technicians, computer forensics examiners, and analysts who “support our most significant investigations and national security operations with advanced electronic surveillance, digital forensics, technical surveillance, tactical operations, and communications capabilities,” according to the FBI’s website. Among its publicly disclosed capabilities are surveillance of “wireline, wireless, and data network communication technologies”; collection of digital evidence from computers, including audio files, video, and images; “counter-encryption” support to help break codes; and operation of what the FBI claims is “the largest fixed land mobile radio system in the U.S.”
    The Operational Technology Division also specializes in so-called black-bag jobs to install surveillance equipment, as well as computer hacking, referred to on the website as “covert entry/search capability,” which is carried out under law enforcement and intelligence warrants.
    The tech experts at Quantico are the FBI’s silent cybersleuths. “While [the division’s] work doesn’t typically make the news, the fruits of its labor are evident in the busted child pornography ring, the exposed computer hacker, the prevented bombing, the averted terrorist plot, and the prosecuted corrupt official,” according to the website.
    According to former law enforcement officials and technology industry experts, the DITU is among the most secretive and sophisticated outfits at Quantico. The FBI declined Foreign Policy’s request for an interview about the unit. But in a written statement, an FBI spokesperson said it “plays a key role in providing technical expertise, services, policy guidance, and support to the FBI and the intelligence community in collecting evidence and intelligence through the use of lawfully authorized electronic surveillance.”
    In addition to Carnivore, the DITU helped develop early FBI Internet surveillance tools with names like CoolMiner, Packeteer, and Phiple Troenix. One former law enforcement official said the DITU helped build the FBI’s Magic Lantern keystroke logging system, a device that could be implanted on a computer and clandestinely record what its user typed. The system was devised to spy on criminals who had encrypted their communications. It was part of a broader surveillance program known as Cyber Knight.
    In 2007, Wired reported that the FBI had built another piece of surveillance malware to track the source of a bomb threat against a Washington state high school. Called a “computer and Internet protocol address verifier,” it was able to collect details like IP addresses, a list of programs running on an infected computer, the operating system it was using, the last web address visited, and the logged-in user name. The malware was handled by the FBI’s Cryptologic and Electronic Analysis Unit, located next door to the DITU’s facilities at Quantico. Wired reported that information collected by the malware from its host was sent via the Internet to Quantico.
    The DITU has also deployed what the former law enforcement official described as “beacons,” which can be implanted in emails and, when opened on a target’s computer, can record the target’s IP address. The former official said the beacons were first deployed to track down kidnappers.
    * * *
    Lately, one of the DITU’s most important jobs has been to keep track of surveillance operations, particularly as part of the NSA’s Prism system, to ensure that companies are producing the information that the spy agency wants and that the government has been authorized to obtain.
    The NSA is the most frequent requester of the DITU’s services, sources said. There is a direct fiber-optic connection between Quantico and the agency’s headquarters at Fort Meade, Maryland; data can be moved there instantly. From the companies’ perspective, it doesn’t much matter where the information ends up, so long as the government shows up with a lawful order to get it.
    “The fact that either the targets are coming from the NSA or the output goes to the NSA doesn’t matter to us. We’re being compelled. We’re not going to do any more than we have to,” said one industry representative.
    But having the DITU act as a conduit provides a useful public relations benefit: Technology companies can claim — correctly — that they do not provide any information about their customers directly to the NSA, because they give it to the DITU, which in turn passes it to the NSA.
    But in the government’s response to the controversy that has erupted over government surveillance programs, FBI officials have been conspicuously absent. Robert Mueller, who stepped down as the FBI’s director in September, testified before Congress about disclosed surveillance only twice, and that was in June, before many of the NSA documents that Snowden leaked had been revealed in the media. On Nov. 14, James Comey gave his first congressional testimony as the FBI’s new director, and he was not asked about the FBI’s involvement in surveillance operations that have been attributed to the NSA. Attorney General Eric Holder has made few public comments about surveillance. (His deputy has testified several times.)
    The former law enforcement official said Holder and Mueller should have offered testimony and explained how the FBI works with the NSA. He was concerned by reports that the NSA had not been adhering to its own minimization procedures, which the Justice Department and the FBI review and vouch for when submitting requests to the Foreign Intelligence Surveillance Court.
    “Where they hadn’t done what was represented to the court, that’s unforgivable. That’s where I got sick to my stomach,” the former law enforcement official said. “The government’s position is, we go to the court, apply the law — it’s all approved. That makes for a good story until you find out what was approved wasn’t actually what was done.”
    BY SHANE HARRIS | NOVEMBER 21, 2013
    Find this story at 21 November 2013
    ©2013 The Slate Group, LLC.

    FBI Pursuing Real-Time Gmail Spying Powers as “Top Priority” for 2013

    For now, law enforcement has trouble monitoring Gmail communications in real time
    Despite the pervasiveness of law enforcement surveillance of digital communication, the FBI still has a difficult time monitoring Gmail, Google Voice, and Dropbox in real time. But that may change soon, because the bureau says it has made gaining more powers to wiretap all forms of Internet conversation and cloud storage a “top priority” this year.
    Last week, during a talk for the American Bar Association in Washington, D.C., FBI general counsel Andrew Weissmann discussed some of the pressing surveillance and national security issues facing the bureau. He gave a few updates on the FBI’s efforts to address what it calls the “going dark” problem—how the rise in popularity of email and social networks has stifled its ability to monitor communications as they are being transmitted. It’s no secret that under the Electronic Communications Privacy Act, the feds can easily obtain archive copies of emails. When it comes to spying on emails or Gchat in real time, however, it’s a different story.
    That’s because a 1994 surveillance law called the Communications Assistance for Law Enforcement Act only allows the government to force Internet providers and phone companies to install surveillance equipment within their networks. But it doesn’t cover email, cloud services, or online chat providers like Skype. Weissmann said that the FBI wants the power to mandate real-time surveillance of everything from Dropbox and online games (“the chat feature in Scrabble”) to Gmail and Google Voice. “Those communications are being used for criminal conversations,” he said.
    While it is true that CALEA can only be used to compel Internet and phone providers to build in surveillance capabilities into their networks, the feds do have some existing powers to request surveillance of other services. Authorities can use a “Title III” order under the “Wiretap Act” to ask email and online chat providers furnish the government with “technical assistance necessary to accomplish the interception.” However, the FBI claims this is not sufficient because mandating that providers help with “technical assistance” is not the same thing as forcing them to “effectuate” a wiretap. In 2011, then-FBI general counsel Valerie Caproni—Weissmann’s predecessor—stated that Title III orders did not provide the bureau with an “effective lever” to “encourage providers” to set up live surveillance quickly and efficiently. In other words, the FBI believes it doesn’t have enough power under current legislation to strong-arm companies into providing real-time wiretaps of communications.
    Because Gmail is sent between a user’s computer and Google’s servers using SSL encryption, for instance, the FBI can’t intercept it as it is flowing across networks and relies on the company to provide it with access. Google spokesman Chris Gaither hinted that it is already possible for the company to set up live surveillance under some circumstances. “CALEA doesn’t apply to Gmail but an order under the Wiretap Act may,” Gaither told me in an email. “At some point we may expand our transparency report to cover this topic in more depth, but until then I’m not able to provide additional information.”
    Either way, the FBI is not happy with the current arrangement and is on a crusade for more surveillance authority. According to Weissmann, the bureau is working with “members of intelligence community” to craft a proposal for new Internet spy powers as “a top priority this year.” Citing security concerns, he declined to reveal any specifics. “It’s a very hard thing to talk about publicly,” he said, though acknowledged that “it’s something that there should be a public debate about.”
    Ryan Gallagher is a journalist who reports from the intersection of surveillance, national security, and privacy for Slate’s Future Tense blog. He is also a Future Tense fellow at the New America Foundation.
    By Ryan Gallagher
    Find this story at 26 March 2013
    © 2013 The Slate Group, LLC.

    Is NSA Prism the New FBI Carnivore?

    From the ‘Uncle Sam is Watching’ files:
    Lots of concern and talk in the last couple of days over the Washington Post’s leaked government story on PRISM.
    The TL;dr version is that PRISM was/is an NSA operation that routes American’s private information to the NSA where it can be analyzed in the interest of national security.
    While the revelation about NSA PRISM is new – the fact that the U.S. Government has active programs to surveil the Internet for email and otherwise is not.
    Back in 2005 it was revealed that the FBI had to abandon it’s own Internet surveillance effort known as Carnivore. With Carnivore, the FBI was quite literally injesting email and Internet content en masse from the U.S .
    Officially known as the Digital Collection System 1000 (DCS-1000), Carnivore captures data traffic that flows through an Internet service provider (ISP). The system prompted a flurry of criticism from privacy advocates when it was announced in 2000 during the Clinton administration.
    At the time that Carnivore was shut down, the Electronic Privacy Information Center (EPIC) speculated that, “FBI’s need for Carnivore-like Internet surveillance tools is decreasing, likely because ISPs are providing Internet traffic information directly to the government.”
    Eight years later, it looks like EPIC was right – since it would appear based on the WaPo report that the NSA has been getting info directly from providers.
    I saw the head of the NSA, General Alexander speak at Defcon last year and he’s slotted to speak as a keynote at Black Hat this year. I wonder if he’ll actually show up now given the revelation of PRISM.
    By Sean Michael Kerner | June 06, 2013
    Find this story at 6 June 2013
    Copyright 2013 QuinStreet Inc.

    FBI retires its Carnivore (2005)

    FBI surveillance experts have put their once-controversial Carnivore Internet surveillance tool out to pasture, preferring instead to use commercial products to eavesdrop on network traffic, according to documents released Friday.
    Two reports to Congress obtained by the Washington-based Electronic Privacy Information Center under the Freedom of Information Act reveal that the FBI didn’t use Carnivore, or its rebranded version “DCS-1000,” at all during the 2002 and 2003 fiscal years. Instead, the bureau turned to unnamed commercially-available products to conduct Internet surveillance thirteen times in criminal investigations in that period.
    Carnivore became a hot topic among civil libertarians, some network operators and many lawmakers in 2000, when an ISP’s legal challenge brought the surveillance tool’s existence to light. One controversy revolved around the FBI’s legally-murky use of the device to obtain e-mail headers and other information without a wiretap warrant — an issue Congress resolved by explicitly legalizing the practice in the 2001 USA PATRIOT Act.
    Under section 216 of the act, the FBI can conduct a limited form of Internet surveillance without first visiting a judge and establishing probable cause that the target has committed a crime. In such cases the FBI is authorized to capture routing information like e-mail addresses or IP addresses, but not the contents of the communications.
    According to the released reports, the bureau used that power three times in 2002 and six times in 2003 in cases in which it brought its own Internet surveillance gear to the job. Each of those surveillance operations lasted sixty days or less, except for one investigation into alleged extortion, arson and “teaching of others how to make and use destructive devices” that ran over eight months from January 10th to August 26th, 2002.
    Other cases investigated under section 216 involved alleged mail fraud, controlled substance sales, providing material support to terrorism, and making obscene or harassing telephone calls within the District of Columbia. The surveillance targets’ names are not listed in the reports.
    In four additional cases, twice each in 2002 and 2003, the FBI obtained a full-blown Internet wiretap warrant from a judge, permitting them to capture the contents of a target’s Internet communications in real time. No more information on those cases is provided in the reports because they involved “sensitive investigations,” according to the bureau.
    The new documents only enumerate criminal investigations in which the FBI deployed a government-owned surveillance tool, not those in which an ISP used its own equipment to facilitate the spying. Cases involving foreign espionage or international terrorism are also omitted.
    Developed by a contractor, Carnivore was a customizable packet sniffer that, in conjunction with other FBI tools, could capture e-mail messages, and reconstruct Web pages exactly as a surveillance target saw them while surfing the Web. FBI agents lugged it with them to ISPs that lacked their own spying capability.
    Kevin Poulsen, SecurityFocus 2005-01-14
    Find this story at 14 January 2005
    Copyright 2010, SecurityFocus

    EarthLink Says It Refuses to Install FBI’s Carnivore Surveillance Device (2000)

    One of the nation’s largest Internet-service providers, EarthLink Inc., has refused toinstall a new Federal Bureau of Investigation electronic surveillance device on its network, saying technical adjustments required to use the device caused disruptions for customers.
    The FBI has used Carnivore, as the surveillance device is called, in a number of criminal investigations. But EarthLink is the first ISP to offer a public account of an actual experience with Carnivore. The FBI has claimed that Carnivore won’t interfere with an ISP’s operations.
    “It has the potential to hurt our network, to bring pieces of it down,” Steve Dougherty, EarthLink’s director of technology acquisition, said of Carnivore. “It could impact thousands of people.”
    While EarthLink executives said they would continue to work with authorities in criminal investigations, they vowed not to allow the FBI to install Carnivore on the company’s network. The company also has substantial privacy concerns.
    EarthLink has already voiced its concerns in court. The ISP is the plaintiff in a legal fight launched against Carnivore earlier this year with the help of attorney Robert Corn-Revere, according to people close to the case. Previously, the identity of the plaintiff in the case, which is under seal, wasn’t known. A federal magistrate ruled against EarthLink in the case early this year, forcing it to give the FBI access to its system. Mr. Corn-Revere declined to comment.
    EarthLink’s problems with Carnivore began earlier this year, when the FBI installed a Carnivore device on its network at a hub site in Pasadena, Calif. The FBI had a court order that allowed it to install the equipment as part of a criminal investigation.
    The FBI connected Carnivore, a small computer box loaded with sophisticated software for monitoring e-mail messages and other online communications, to EarthLink’s remote access servers, a set of networking equipment that answers incoming modem calls from customers. But Carnivore wasn’t compatible with the operating system software on the remote access servers. So EarthLink had to install an older version of the system software that would work with Carnivore, according to Mr. Dougherty.
    EarthLink says the older version of the software caused its remote access servers to crash, which in turn knocked out access for a number of its customers. Mr. Dougherty declined to specify how many, saying only that “many” people were affected.
    EarthLink executives said they were also concerned about privacy. The company said it had no way of knowing whether Carnivore was limiting its surveillance to the criminal investigation at hand or trolling more broadly. Other ISPs have said there could be serious liability issues for them if the privacy of individuals not connected to an investigation is compromised.
    “There ought to be some transparency to the methods and tools that law enforcement is using to search-and-seize communications,” said John R. LoGalbo, vice president of public policy at PSINet Inc., an ISP in Ashburn, Va.
    EarthLink executives declined to say whether the company has received court orders for information about other customers since the disruption earlier this year. EarthLink said it would help authorities in criminal investigations using techniques other than Carnivore.
    The FBI insists that Carnivore doesn’t affect the performance or stability of an ISP’s existing networks. The bureau says Carnivore passively monitors traffic, recording only information that is relevant to FBI investigations.
    In some cases, the FBI said, the ISP is equipped to turn over data without the use of Carnivore. This is common in cases where only e-mail messages are sought because that type of data can easily be obtained through less-intrusive means.
    Attorney General Janet Reno said Thursday that she was putting the system under review. She said the Justice Department would investigate Carnivore’s constitutional implications and make sure that the FBI was using it in “a consistent and balanced way.”
    Write to Nick Wingfield at nick.wingfield@wsj.com , Ted Bridis at ted.bridis@wsj.com and Neil King Jr. at neil.king@wsj.com
    By NICK WINGFIELD, TED BRIDIS and
    NEIL KING JR. | Staff Reporters of
    THE WALL STREET JOURNAL
    Find this story at 14 July 2000
    Copyright ©2013 Dow Jones & Company, Inc.

    Carnivore (2000) FOIA documents

    On July 11, 2000, the existence of an FBI Internet monitoring system called “Carnivore” was widely reported. Although the public details were sketchy, reports indicated that the Carnivore system is installed at the facilities of an Internet Service Provider (ISP) and can monitor all traffic moving through that ISP. The FBI claims that Carnivore “filters” data traffic and delivers to investigators only those “packets” that they are lawfully authorized to obtain. Because the details remain secret, the public is left to trust the FBI’s characterization of the system and — more significantly — the FBI’s compliance with legal requirements.
    One day after the initial disclosures, EPIC filed a Freedom of Information Act (FOIA) request seeking the public release of all FBI records concerning Carnivore, including the source code, other technical details, and legal analyses addressing the potential privacy implications of the technology. On July 18, 2000, after Carnivore had become a major issue of public concern, EPIC asked the Justice Department to expedite the processing of its request. When DOJ failed to respond within the statutory deadline, EPIC filed suit in U.S. District Court seeking the immediate release of all information concerning Carnivore.
    At an emergency hearing held on August 2, 2000, U.S. District Judge James Robertson ordered the FBI to report back to the court by August 16 and to identify the amount of material at issue and the Bureau’s schedule for releasing it. The FBI subsequently reported that 3000 pages of responsive material were located, but it refused to commit to a date for the completion of processing.
    In late January 2001, the FBI completed its processing of EPIC’s FOIA request. The Bureau revised its earlier estimate and reported that there were 1756 pages of responsive material; 1502 were released in part and 254 were withheld in their entirety (see link below for sample scanned documents).
    On August 1, 2001, the FBI moved for summary judgment, asserting that it fully met its obligations under FOIA. On August 9, 2001, EPIC filed a motion to stay further proceedings pending discovery, on the grounds that the FBI has failed to conduct an adequate search for responsive documents.
    On March 25, 2002, the court issued an order directing the FBI to initiate a new search for responsive documents. The new search was to be conducted in the offices of General Counsel and Congressional & Public Affairs, and be completed no later than May 24, 2002. The documents listed above were located and released as a result of that court-ordered search.
    Find this story at 11 July 2000
    Find the FOIA documents at
    And here

    Carnivore Details Emerge (2000)

    A web spying capability, multi-million dollar price tag, and a secret Carnivore ancestor are some of the details to poke through heavy FBI editing.
    “ Carnivore is remarkably tolerant of network aberration, such a speed change, data corruption and targeted smurf type attacks. ”
    FBI report
    WASHINGTON–The FBI’s Carnivore surveillance tool monitors more than just email. Newly declassified documents obtained by Electronic Privacy Information Center (EPIC) under the Freedom of Information Act reveal that Carnivore can monitor all of a target user’s Internet traffic, and, in conjunction with other FBI tools, can reconstruct web pages exactly as a surveillance target saw them while surfing the web. The capability is one of the new details to emerge from some six-hundred pages of heavily redacted documents given to the Washington-based nonprofit group this week, and reviewed by SecurityFocus Wednesday. The documents confirm that Carnivore grew from an earlier FBI project called Omnivore, but reveal for the first time that Omnivore itself replaced a still older tool. The name of that project was carefully blacked out of the documents, and remains classified “secret.” The older surveillance system had “deficiencies that rendered the design solution unacceptable.” The project was eventually shut down. Development of Omnivore began in February 1997, and the first prototypes were delivered on October 31st of that year. The FBI’s eagerness to use the system may have slowed its development: one report notes that it became “difficult to maintain the schedule,” because the Bureau deployed the nascent surveillance tool for “several emergency situations” while it was still in beta release. “The field deployments used development team personnel to support the technical challenges surrounding the insertion of the OMNIVORE device,” reads the report. The ‘Phiple Troenix’ Project In September 1998, the FBI network surveillance lab in Quantico launched a project to move Omnivore from Sun’s Solaris operating system to a Windows NT platform. “This will facilitate the miniaturization of the system and support a wide range of personal computer (PC) equipment,” notes the project’s Statement of Need. (Other reasons for the switch were redacted from the documents.) The project was called “Phiple Troenix”–apparently a spoonerism of “Triple Phoenix,” a type of palm tree–and its result was dubbed “Carnivore.” Phiple Troenix’s estimated price tag of $800,000 included training for personnel at the Bureau’s Washington-based National Infrastructure Protection Center (NIPC). Meanwhile, the Omnivore project was formally closed down in June 1999, with a final cost of $900,000. Carnivore came out of beta with version 1.2, released in September 1999. As of May 2000, it was in version 1.3.4. At that time it underwent an exhaustive series of carefully prescribed tests under a variety of conditions. The results, according to a memo from the FBI lab, were positive. “Carnivore is remarkably tolerant of network aberration, such a speed change, data corruption and targeted smurf type attacks.
    RELATED STORIES
    Corporate Carnivore Available
    Forty-five days of the Carnivore
    Carnivore: Just Say No?
    Carnivore in Court
    “We call ours ‘Sniffy.'”
    FBI Defends Carnivore
    The FBI can
    configure the tool to store all traffic to or from a particular Internet IP address, while monitoring DHCP and RADIUS protocols to track a particular user. In “pen mode,” in which it implements a limited type of surveillance not requiring a wiretap warrant, Carnivore can capture all packet header information for a targeted user, or zero in on email addresses or FTP login data. Web Surveillance Version 2.0 will include the ability to display captured Internet traffic directly from Carnivore. For now, the tool only stores data as raw packets, and another application called “Packeteer” is later used to process those packets. A third program called “CoolMiner” uses Packeteer’s output to display and organize the intercepted data. Collectively, the three applications, Carnivore, Packeteer and CoolMiner, are referred to by the FBI lab as the “DragonWare suite.” The documents show that in tests, CoolMiner was able to reconstruct HTTP traffic captured by Carnivore into coherent web pages, a capability that would allow FBI agents to see the pages exactly as the user saw them while surfing the web. Justice Department and FBI officials have testified that Carnivore is used almost exclusively to monitor email, but noted that it was capable of monitoring messages sent over web-based email services like Hotmail. An “Enhanced Carnivore” contract began in November 1999, the papers show, and will run out in January of next year at a total cost of $650,000. Some of the documents show that the FBI plans to add yet more features to version 2.0 and 3.0 of the surveillance tool, but the details are almost entirely redacted. A document subject to particularly heavy editing shows that the FBI was interested in voice over IP technology, and was in particular looking at protocols used by Net2Phone and FreeTel. EPIC attorney David Sobel said the organization intends to challenge the FBI’s editing of the released documents. In the meantime, EPIC is hurriedly scanning in the pages and putting them on the web, “so that the official technical review is not the only one,” explained Sobel. “We want an unofficial review with as wide a range of participants as possible.” The FBI’s next release of documents is scheduled for mid-November.
    Kevin Poulsen, SecurityFocus 2000-10-04
    Find this story at 4 October 2000
    Copyright 2010, SecurityFocus

    FBI agent Marcus C. Thomas (who is mentioned in the EPIC FOIA documents) made a very interesting presentation at NANOG 20 yesterday morning, discussing Carnivore. (2000)

    Agent Thomas gave a demonstration of both Carnivore 1.34 (the currently
    deployed version) and Carnivore 2.0 (the development version) as well as
    some of the other DragonWare tools.
    Most of this information isn’t new, but it demonstrates that the
    DragonWare tools can be used to massively analyze all network traffic
    accessible to a Carnivore box.
    The configuration screen of Carnivore shows that protocol information can
    be captured in 3 different modes: Full, Pen, and None. There are check
    boxes for TCP, UDP, and ICMP.
    Carnivore can be used to capture all data sent to or from a given IP
    address, or range of IP addresses.
    It can be used to search on information in the traffic, doing matching
    against text entered in the “Data Text Strings” box. This, the agent
    assured us, was so that web mail could be identified and captured, but
    other browsing could be excluded.
    It can be used to automatically capture telnet, pop3, and FTP logins with
    the click of a check box.
    It can monitor mail to and/or from specific email addresses.
    It can be configured to monitor based on IP address, RADIUS username, MAC
    address, or network adaptor.
    IPs can be manually added to a running Carnivore session for monitoring.
    Carnivore allows for monitoring of specific TCP or UDP ports and port
    ranges (with drop down boxes for the most common protocols).
    Carnivore 2.0 is much the same, but the configuration menu is cleaner, and
    it allows Boolean statements for exclusion filter creation.

    The Packeteer program takes raw network traffic dumps, reconstructs the
    packets, and writes them to browsable files.
    CoolMiner is the post-processor session browser. The demo was version
    1.2SP4. CoolMiner has the ability to replay a victim’s steps while web
    browsing, chatting on ICQ, Yahoo Messenger, AIM, IRC. It can step through
    telnet sessions, AOL account usage, and Netmeeting. It can display
    information sent to a network printer. It can process netbios data.
    CoolMiner displays summary usage, broken down by origination and
    destination IP addresses, which can be selectively viewed.
    Carnivore usually runs on Windows NT Workstation, but could run on Windows
    2000.
    Some choice quotes from Agent Thomas:
    “Non-relevant data is sealed from disclosure.”
    “Carnivore has no active interaction with any devices on the network.”
    “In most cases Carnivore is only used with a Title III. The FBI will
    deploy Carnivore without a warrant in cases where the victim is willing to
    allow a Carnivore box to monitor his communication.”
    “We rely on the ISP’s security [for the security of the Carnivore box].”
    “We aren’t concerned about the ISP’s security.”
    When asked how Carnivore boxes were protected from attack, he said that
    the only way they were accessible was through dialup or ISDN. “We could
    take measures all the way up to encryption if we thought it was
    necessary.”
    While it doesn’t appear that Carnivore uses a dial-back system to prevent
    unauthorized access, Thomas mentioned that the FBI sometimes “uses a
    firmware device to prevent unauthorized calls.”
    When asked to address the concerns that FBI agents could modify Carnivore
    data to plant evidence, Thomas reported that Carnivore logs FBI agents’
    access attempts. The FBI agent access logs for the Carnivore box become
    part of the court records. When asked the question “It’s often common
    practice to write back doors into [software programs]. How do we know you
    aren’t doing that?”, Thomas replied “I agree 100%. You’re absolutely
    right.”
    When asked why the FBI would not release source, he said: “We don’t sell
    guns, even though we have them.”
    When asked: “What do you do in cases where the subject is using
    encryption?” Thomas replied, “This suite of devices can’t handle that.” I
    guess they hand it off to the NSA.
    He further stated that about 10% of the FBI’s Carnivore cases are thwarted
    by the use of encryption, and that it is “more common to find encryption
    when we seize static data, such as on hard drives.”
    80% of Carnivore cases have involved national security.
    Marcus Thomas can be contacted for questions at mthomas@fbi.gov or at
    (730) 632-6091. He is “usually at his desk.”
    24 October 2000
    Find this story at 24 October 2000

    The war on democracy; How corporations and spy agencies use “security” to defend profiteering and crush activism

    A stunning new report compiles extensive evidence showing how some of the world’s largest corporations have partnered with private intelligence firms and government intelligence agencies to spy on activist and nonprofit groups. Environmental activism is a prominent though not exclusive focus of these activities.
    The report by the Center for Corporate Policy (CCP) in Washington DC titled Spooky Business: Corporate Espionage against Nonprofit Organizations draws on a wide range of public record evidence, including lawsuits and journalistic investigations. It paints a disturbing picture of a global corporate espionage programme that is out of control, with possibly as much as one in four activists being private spies.
    The report argues that a key precondition for corporate espionage is that the nonprofit in question:
    “… impairs or at least threatens a company’s assets or image sufficiently.”
    One of the groups that has been targeted the most, and by a range of different corporations, is Greenpeace. In the 1990s, Greenpeace was tracked by private security firm Beckett Brown International (BBI) on behalf of the world’s largest chlorine producer, Dow Chemical, due to the environmental organisation’s campaigning against the use of chlorine to manufacture paper and plastics. The spying included:
    “… pilfering documents from trash bins, attempting to plant undercover operatives within groups, casing offices, collecting phone records of activists, and penetrating confidential meetings.”
    Other Greenpeace offices in France and Europe were hacked and spied on by French private intelligence firms at the behest of Électricité de France, the world’s largest operator of nuclear power plants, 85% owned by the French government.
    Oil companies Shell and BP had also reportedly hired Hackluyt, a private investigative firm with “close links” to MI6, to infiltrate Greenpeace by planting an agent who “posed as a left -wing sympathiser and film maker.” His mission was to “betray plans of Greenpeace’s activities against oil giants,” including gathering “information about the movements of the motor vessel Greenpeace in the north Atlantic.”
    The CCP report notes that:
    “A diverse array of nonprofits have been targeted by espionage, including environmental, anti-war, public interest, consumer, food safety, pesticide reform, nursing home reform, gun control, social justice, animal rights and arms control groups.
    Many of the world’s largest corporations and their trade associations – including the US Chamber of Commerce, Walmart, Monsanto, Bank of America, Dow Chemical, Kraft, Coca-Cola, Chevron, Burger King, McDonald’s, Shell, BP, BAE, Sasol, Brown & Williamson and E.ON – have been linked to espionage or planned espionage against nonprofit organizations, activists and whistleblowers.”
    Exploring other examples of this activity, the report notes that in Ecuador, after a lawsuit against Texaco triggering a $9.5 billion fine for spilling 350 million gallons of oil around Lago Agrio, the private investigations firm Kroll tried to hire journalist Mary Cuddehe as a “corporate spy” for Chevron, to undermine studies of the environmental health effects of the spill.
    Referring to the work of US investigative reporter Jeremy Scahill, the report points out that the notorious defence contractor Blackwater, later renamed XE Services and now Academi, had sought to become “the intel arm” of Monsanto, the agricultural and biotechnology corporation associated with genetically modified foods. Blackwater was paid to “provide operatives to infiltrate activist groups organizing against the multinational biotech firm.”
    In another case, the UK’s Camp for Climate Action, which supports the decommissioning of coal-fired plants, was infiltrated by private security firm Vericola on behalf of three energy companies, E.ON, Scottish Power, and Scottish Resources Group.
    Reviewing emails released by Wikileaks from the Texas-based private intelligence firm Stratfor, the report shows how the firm reportedly “conducted espionage against human rights, animal rights and environmental groups, on behalf of companies such as Coca-Cola.” In one case, the emails suggest that Stratfor investigated People for the Ethical Treatment of Animals (PETA) at Coca-Cola’s request, and had access to a classified FBI investigation on PETA.
    The report uncovers compelling evidence that much corporate espionage is facilitated by government agencies, particularly the FBI. The CCP report examines a September 2010 document from the Office of the Inspector General in the US Justice Department, which reviewed FBI investigations between 2001 and 2006. It concluded that:
    “… the factual basis of opening some of the investigations of individuals affiliated with the groups was factually weak… In some cases, we also found that the FBI extended the duration of investigations involving advocacy groups or their members without adequate basis…. In some cases, the FBI classified some of its investigations relating to nonviolent civil disobedience under its ‘Acts of Terrorism’ classification.”
    For instance, on an FBI investigation of Greenpeace, the Justice Department found that:
    “… the FBI articulated little or no basis for suspecting a violation of any federal criminal statute… the FBI’s opening EC [electronic communication] did not articulate any basis to suspect that they were planning any federal crimes….We also found that the FBI kept this investigation open for over 3 years, long past the corporate shareholder meetings that the subjects were supposedly planning to disrupt… We concluded that the investigation was kept open ‘beyond the point at which its underlying justification no longer existed,’ which was inconsistent with the FBI’s Manual of Investigative and Operational Guidelines (MIOG).”
    The FBI’s involvement in corporate espionage has been institutionalised through ‘InfraGard’, “a little-known partnership between private industry, the FBI and the Department of Homeland Security.” The partnership involves the participation of “more than 23,000 representatives of private industry,” including 350 of the Fortune 500 companies.
    But it’s not just the FBI. According to the new report, “active-duty CIA operatives are allowed to sell their expertise to the highest bidder”, a policy that gives “financial firms and hedge funds access to the nation’s top-level intelligence talent. Little is known about the CIA’s moonlighting policy, or which corporations have hired current CIA operatives.”
    The report concludes that, due to an extreme lack of oversight, government effectively tends to simply “rubber stamp” such intelligence outsourcing:
    “In effect, corporations are now able to replicate in miniature the services of a private CIA, employing active-duty and retired officers from intelligence and/or law enforcement. Lawlessness committed by this private intelligence and law enforcement capacity, which appears to enjoy near impunity, is a threat to democracy and the rule of law. In essence, corporations are now able to hire a private law enforcement capacity – which is barely constrained by legal and ethical norms – and use it to subvert or destroy civic groups. This greatly erodes the capacity of the civic sector to countervail the tremendous power of corporate and wealthy elites.”
    Gary Ruskin, author of the report, said:
    “Corporate espionage against nonprofit organizations is an egregious abuse of corporate power that is subverting democracy. Who will rein in the forces of corporate lawlessness as they bear down upon nonprofit defenders of justice?”
    That’s a good question. Ironically, many of the same companies spearheading the war on democracy are also at war with planet earth – just last week the Guardian revealed that 90 of some of the biggest corporations generate nearly two-thirds of greenhouse gas emissions and are thus overwhelmingly responsible for climate change.
    Dr Nafeez Ahmed is executive director of the Institute for Policy Research & Development and author of A User’s Guide to the Crisis of Civilisation: And How to Save It among other books. Follow him on Twitter
    Find this story at 28 November 2013
    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    << oudere artikelen  nieuwere artikelen >>