• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Cyber-Activist Jeremy Hammond Sentenced to 10 Years In Prison; The hacker, who pleaded guilty in May, is given the maximum sentence by a federal judge

    Cyber-activist Jeremy Hammond was sentenced to 10 years in federal prison this morning by Judge Loretta A. Preska in a federal courtroom in lower Manhattan for hacking the private intelligence firm Stratfor. When released, Hammond will be placed under supervised control, the terms of which include a prohibition on encryption or attempting to anonymize his identity online.

    Hammond has shown a “total lack of respect for the law,” Judge Preska said in her ruling, citing Hammond’s criminal record – which includes a felony conviction for hacking from when he was 19 – and what she called “unrepentant recidivism.” There is a “desperate need to promote respect for the law,” she said, as well as a “need for adequate public deterrence.”

    Read ‘Enemy of the State,’ Our 2012 Feature on Jeremy Hammond’s Rise and Fall

    As Hammond was led into the courtroom, he looked over the roughly 100 supporters who had shown up, smiled, and said, “What’s up, everybody?” Prior to the verdict, he read from a prepared statement and said it was time for him to step away from hacking as a form of activism, but recognized that tactic’s continuing importance. “Those in power do not want the truth exposed,” Hammond said from the podium, wearing black prison garb. He later stated that the injustices he has fought against “cannot be cured by reform, but by civil disobedience and direct action.” He spoke out against capitalism and a wide range of other social ills, including mass incarceration and crackdowns on protest movements.

    The Stratfor hack exposed previously unknown corporate spying on activists and organizers, including PETA and the Yes Men, and was largely constructed by the FBI using an informant named Hector Monsegur, better known by his online alias Sabu. Co-defendants in the U.K. were previously sentenced to relatively lighter terms. Citing Hammond’s record, Judge Preska said “there will not be any unwarranted sentencing disparity” between her ruling and the U.K. court’s decision.

    Hammond’s supporters and attorneys had previously called on Judge Preska to recuse herself following the discovery that her husband was a victim of the hack she was charged with ruling on. That motion was denied. (Full disclosure: This reporter previously spoke at a rally calling on Judge Preska to recuse herself.)

    Hammond’s defense team repeatedly stressed that their client was motivated by charitable intentions, a fact they said was reflected in his off-line life as well. Hammond has previously volunteered at Chicago soup kitchens, and has tutored fellow inmates in GED training during his incarceration.

    Rosemary Nidiry, speaking for the prosecution, painted a picture of a malicious criminal motivated by a desire to create “maximum mayhem,” a phrase Hammond used in a chat log to describe what he hoped would come from the Stratfor hack. Thousands of private credit card numbers were released as a result of the Stratfor hack, which the government argued served no public good.

    Sarah Kunstler, a defense attorney for Hammond, takes issue with both the prosecution and judge’s emphasis on the phrase “maximum mayhem” to the exclusion of Hammond’s broader philosophy shows an incomplete picture. “Political change can be disruptive and destructive,” Kunstler says. “That those words exclude political action is inaccurate.”

    Many supporters see Hammond’s case as part of a broader trend of the government seeking what they say are disproportionately long sentences for acts that are better understood as civil disobedience than rampant criminality. Aaron Swartz, who faced prosecution under the Computer Fraud and Abuse Act – the same statute used to prosecute Hammond – took his own life last year, after facing possible decades in prison for downloading academic journals from an MIT server. “The tech industry promised open access and democratization,” says Roy Singham, Swartz’s old boss and executive chairman of ThoughtWorks, a software company that advocates for social justice. “What we’ve given the world is surveillance and spying.” Singham says it’s “shameful” that “titans of the tech world” have not supported Hammond.

    Following his first conviction for hacking, Hammond said, he struggled with returning to that life, but felt it was his responsibility. That decision ultimately lead to the Stratfor hack. “I had to ask myself, if Chelsea Manning fell into the abysmal nightmare of prison fighting for the truth, could I in good conscience do any less, if I was able?” he said, addressing the court. “I thought the best way to demonstrate solidarity was to continue the work of exposing and confronting corruption.”

    by John Knefel
    NOVEMBER 15, 2013

    Find this story at 15 November 2013

    ©2013 Rolling Stone

    105 Years in Jail for Posting a Link? That’s what Barrett Brown is facing.

    A few months ago [1] I passed along the story of Barrett Brown, a young journalist/activist who relentlessly followed up on documents leaked by Anonymous, was targeted for this by the FBI, and who was eventually harassed enough that he cracked—which took the unfortunate form of recording a YouTube rant promising to “destroy” one of his tormentors.

    Brown was indicted for posting the YouTube threats, and there’s no question that it was an ill-advised rant regardless of the FBI instigation. But David Carr follows up with more today. It turns out that only three of the charges against Brown are related to the video. Twelve more are related to a link he posted in a chat room: [2]

    In December 2011, approximately five million e-mails from Stratfor Global Intelligence, an intelligence contractor, were hacked by Anonymous and posted on WikiLeaks. The files contained revelations about close and perhaps inappropriate ties between government security agencies and private contractors. In a chat room for Project PM, Mr. Brown posted a link to it.

    Among the millions of Stratfor files were data containing credit cards and security codes, part of the vast trove of internal company documents….According to one of the indictments, by linking to the files, Mr. Brown “provided access to data stolen from company Stratfor Global Intelligence to include in excess of 5,000 credit card account numbers, the card holders’ identification information, and the authentication features for the credit cards.”

    ….But keep in mind that no one has accused Mr. Brown of playing a role in the actual stealing of the data, only of posting a link to the trove of documents….“The YouTube video was a mistake, a big one,” said Gregg Housh, a friend of Mr. Brown’s who first introduced him to the activities of Anonymous. “But it is important to remember that the majority of the 105 years he faces are the result of linking to a file. He did not and has not hacked anything, and the link he posted has been posted by many, many other news organizations.”

    This is almost a textbook case of prosecutorial overreach. As Carr points out, the guy who actually stole the Stratfor information is facing a sentence of only ten years. So why is Brown facing 105 years? Certainly not for a video posted while he was in withdrawal from heroin addiction. More likely, it’s because the government considers him a thorn in their side and wants to send a message to anyone else planning to follow in Brown’s footsteps. That just ain’t right. As Carr says, “Punishment needs to fit the crime and in this instance, much of what has Mr. Brown staring at a century behind bars seems on the right side of the law, beginning with the First Amendment of the Constitution.”

    Links:
    [1] http://www.motherjones.com/kevin-drum/2013/03/barrett-brown-and-fbi
    [2] http://www.nytimes.com/2013/09/09/business/media/a-journalist-agitator-facing-prison-over-a-link.html?ref=business&pagewanted=all

    By Kevin Drum | Mon Sep. 9, 2013 8:47 AM PDT
    Social Title:
    105 years in jail for posting a link?

    Find this story at 9 September 2013

    Copyright ©2013 Mother Jones and the Foundation for National Progress.

    Barrett Brown’s Mother Will Be Sentenced Today

    The mother of Anonymous-affiliated activist Barrett Brown, Karen Lancaster McCutchin, will be sentenced today, November 8, the Associated Press reports.

    Back in May, she admitted to helping her son hide two laptops from federal agents that were investigating the activist. The laptops were hidden in a kitchen cabinet just as FBI agents were executing a search warrant.

    As per the plea agreement, McCutchin faces up to 12 months in prison and a fine of up to $100,000 (€75,000).

    In the meantime, the case of Barrett Brown continues. He is accused, among other things, of threatening a federal agent in a video published on YouTube, and posting links to information stolen by Anonymous hackers from the think tank Stratfor.

    He faces up to 105 years in prison and substantial fines.

    November 8th, 2013, 13:49 GMT · By Eduard Kovacs, November 8, 2013 [AP]

    Find this story at 8 November 2013

    © 2001 – 2013 Softpedia. All rights reserved.

    The Global Intelligence Files – Stratfor Files (2012)

    LONDON—Today, Monday 27 February, WikiLeaks began publishing The Global Intelligence Files – more than five million emails from the Texas-headquartered “global intelligence” company Stratfor. The emails date from between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal’s Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defense Intelligence Agency. The emails show Stratfor’s web of informers, pay-off structure, payment-laundering techniques and psychological methods, for example :

    “[Y]ou have to take control of him. Control means financial, sexual or psychological control… This is intended to start our conversation on your next phase” – CEO George Friedman to Stratfor analyst Reva Bhalla on 6 December 2011, on how to exploit an Israeli intelligence informant providing information on the medical condition of the President of Venezuala, Hugo Chavez.

    The material contains privileged information about the US government’s attacks against Julian Assange and WikiLeaks and Stratfor’s own attempts to subvert WikiLeaks. There are more than 4,000 emails mentioning WikiLeaks or Julian Assange. The emails also expose the revolving door that operates in private intelligence companies in the United States. Government and diplomatic sources from around the world give Stratfor advance knowledge of global politics and events in exchange for money. The Global Intelligence Files exposes how Stratfor has recruited a global network of informants who are paid via Swiss banks accounts and pre-paid credit cards. Stratfor has a mix of covert and overt informants, which includes government employees, embassy staff and journalists around the world.

    The material shows how a private intelligence agency works, and how they target individuals for their corporate and government clients. For example, Stratfor monitored and analysed the online activities of Bhopal activists, including the “Yes Men”, for the US chemical giant Dow Chemical. The activists seek redress for the 1984 Dow Chemical/Union Carbide gas disaster in Bhopal, India. The disaster led to thousands of deaths, injuries in more than half a million people, and lasting environmental damage.

    Stratfor has realised that its routine use of secret cash bribes to get information from insiders is risky. In August 2011, Stratfor CEO George Friedman confidentially told his employees : “We are retaining a law firm to create a policy for Stratfor on the Foreign Corrupt Practices Act. I don’t plan to do the perp walk and I don’t want anyone here doing it either.”

    Stratfor’s use of insiders for intelligence soon turned into a money-making scheme of questionable legality. The emails show that in 2009 then-Goldman Sachs Managing Director Shea Morenz and Stratfor CEO George Friedman hatched an idea to “utilise the intelligence” it was pulling in from its insider network to start up a captive strategic investment fund. CEO George Friedman explained in a confidential August 2011 document, marked DO NOT SHARE OR DISCUSS : “What StratCap will do is use our Stratfor’s intelligence and analysis to trade in a range of geopolitical instruments, particularly government bonds, currencies and the like”. The emails show that in 2011 Goldman Sach’s Morenz invested “substantially” more than $4million and joined Stratfor’s board of directors. Throughout 2011, a complex offshore share structure extending as far as South Africa was erected, designed to make StratCap appear to be legally independent. But, confidentially, Friedman told StratFor staff : “Do not think of StratCap as an outside organisation. It will be integral… It will be useful to you if, for the sake of convenience, you think of it as another aspect of Stratfor and Shea as another executive in Stratfor… we are already working on mock portfolios and trades”. StratCap is due to launch in 2012.

    The Stratfor emails reveal a company that cultivates close ties with US government agencies and employs former US government staff. It is preparing the 3-year Forecast for the Commandant of the US Marine Corps, and it trains US marines and “other government intelligence agencies” in “becoming government Stratfors”. Stratfor’s Vice-President for Intelligence, Fred Burton, was formerly a special agent with the US State Department’s Diplomatic Security Service and was their Deputy Chief of the counterterrorism division. Despite the governmental ties, Stratfor and similar companies operate in complete secrecy with no political oversight or accountability. Stratfor claims that it operates “without ideology, agenda or national bias”, yet the emails reveal private intelligence staff who align themselves closely with US government policies and channel tips to the Mossad – including through an information mule in the Israeli newspaper Haaretz, Yossi Melman, who conspired with Guardian journalist David Leigh to secretly, and in violation of WikiLeaks’ contract with the Guardian, move WikiLeaks US diplomatic cables to Israel.

    Ironically, considering the present circumstances, Stratfor was trying to get into what it called the leak-focused “gravy train” that sprung up after WikiLeaks’ Afghanistan disclosures :

    “[Is it] possible for us to get some of that ’leak-focused’ gravy train ? This is an obvious fear sale, so that’s a good thing. And we have something to offer that the IT security companies don’t, mainly our focus on counter-intelligence and surveillance that Fred and Stick know better than anyone on the planet… Could we develop some ideas and procedures on the idea of ´leak-focused’ network security that focuses on preventing one’s own employees from leaking sensitive information… In fact, I’m not so sure this is an IT problem that requires an IT solution.”

    Like WikiLeaks’ diplomatic cables, much of the significance of the emails will be revealed over the coming weeks, as our coalition and the public search through them and discover connections. Readers will find that whereas large numbers of Stratfor’s subscribers and clients work in the US military and intelligence agencies, Stratfor gave a complimentary membership to the controversial Pakistan general Hamid Gul, former head of Pakistan’s ISI intelligence service, who, according to US diplomatic cables, planned an IED attack on international forces in Afghanistan in 2006. Readers will discover Stratfor’s internal email classification system that codes correspondence according to categories such as ’alpha’, ’tactical’ and ’secure’. The correspondence also contains code names for people of particular interest such as ’Hizzies’ (members of Hezbollah), or ’Adogg’ (Mahmoud Ahmedinejad).

    Stratfor did secret deals with dozens of media organisations and journalists – from Reuters to the Kiev Post. The list of Stratfor’s “Confederation Partners”, whom Stratfor internally referred to as its “Confed Fuck House” are included in the release. While it is acceptable for journalists to swap information or be paid by other media organisations, because Stratfor is a private intelligence organisation that services governments and private clients these relationships are corrupt or corrupting.

    WikiLeaks has also obtained Stratfor’s list of informants and, in many cases, records of its payoffs, including $1,200 a month paid to the informant “Geronimo” , handled by Stratfor’s Former State Department agent Fred Burton.

    WikiLeaks has built an investigative partnership with more than 25 media organisations and activists to inform the public about this huge body of documents. The organisations were provided access to a sophisticated investigative database developed by WikiLeaks and together with WikiLeaks are conducting journalistic evaluations of these emails. Important revelations discovered using this system will appear in the media in the coming weeks, together with the gradual release of the source documents.

    END

    Public partners in the investigation
    Comment
    Current WikiLeaks status
    How to read the data
    Public partners in the investigation:

    More than 25 media partners (others will be disclosed after their first publication) :

    Al Akhbar – Lebanon – http://english.al-akhbar.com
    Al Masry Al Youm – Egypt – http://www.almasry-alyoum.com
    Bivol – Bulgaria – http://bivol.bg
    CIPER – Chile – http://ciperchile.cl
    Dawn Media – Pakistan – http://www.dawn.com
    L’Espresso – Italy – http://espresso.repubblica.it
    La Repubblica – Italy – http://www.repubblica.it
    La Jornada – Mexico – www.jornada.unam.mx/
    La Nacion – Costa Rica – http://www.nacion.com
    Malaysia Today – Malaysia – www.malaysia-today.net
    McClatchy – United States – http://www.mcclatchydc.com
    Nawaat – Tunisia – http://nawaat.org
    NDR/ARD – Germany – http://www.ndr.de
    Owni – France – http://owni.fr
    Pagina 12 – Argentina – www.pagina12.com.ar
    Plaza Publica – Guatemala – http://plazapublica.com.gt
    Publico.es – Spain – www.publico.es
    Rolling Stone – United States – http://www.rollingstone.com
    Russian Reporter – Russia – http://rusrep.ru
    Sunday Star-Times – New Zealand – www.star-times.co.nz
    Ta Nea – Greece –- http://www.tanea.gr
    Taraf – Turkey – http://www.taraf.com.tr
    The Hindu – India – www.thehindu.com
    The Yes Men – Bhopal Activists – Global http://theyesmen.org
    Comment:

    WikiLeaks – Kristinn Hrafnsson, Official WikiLeaks representative, +35 4821 7121

    Other comment :
    Bhopal Medical Appeal (in UK) – Colin Toogood : colintoogood@bhopal.org / +44 (0) 1273 603278/ +44 (0) 7798 845074
    International Campaign for Justice in Bhopal (in India) – Rachna Dhingra : rachnya@gmail.com, +91 98 261 67369
    Yes Men – mike@theyesmen.org / +44 (0) 7578 682321 – andy@theyesmen.org, +1-718-208-0684
    Privacy International – +44 (0) 20 7242 2836

    Twitter tag : #gifiles
    CURRENT WIKILEAKS STATUS:

    An extrajudicial blockade imposed by VISA, MasterCard, PayPal, Bank of America, and Western Union that is designed to destroy WikiLeaks has been in place since December 2010. The EU Commission is considering whether it will open a formal investigation, but two lawsuits have been filed (http://wikileaks.org/Banking-Blocka…). There are also other ways to donate (https://shop.wikileaks.org/donate). It is legal to donate, including in the United States. The US Treasury has publicly stated that that there are no grounds to place WikiLeaks on a US government blacklist.

    WikiLeaks Founder and Publisher Julian Assange has not been charged with any crime in any country. Four prosecutors are currently trying to charge him under the Espionage Act of 1917 before a closed Grand Jury in Virginia, in the United States. Julian Assange has been detained for 447 days (10,728 hours) since Dec 7, 2010, without charge, and he is currently awaiting a decision from the UK Supreme Court on extradition to Sweden (http://www.justiceforassange.com/Su…). The decision is expected in March. The decision on whether he will be onwardly extradited to the US lies in the hands of the Swedish Executive, but Sweden’s Prime Minister Fredrik Reinfeldt has refused to state whether he will protect Assange from a politically motivated extradition to the United States (http://justice4assange.com/US-Extra… ).

    The Swedish Foreign Minister Carl Bildt has repeatedly attacked WikiLeaks this week in a bizarre manner (http://ferrada-noli.blogspot.com/20… ).

    An alleged WikiLeaks US military source, Bradley Manning, has been in pre-trial detention for 639 days (http://bradleymanning.org/ ). His arraignment took place on 24 February 2012. In December 2011, Manning’s attorney revealed in the preliminary hearing that the US government is attempting to enter a plea deal with Manning in order to “go after” Assange. Manning has 22 charges against him, including violating the Espionage Act of 1917 and aiding the enemy. Manning has deferred entering a plea. Julian Assange and WikiLeaks are legally represented in the Manning hearings by the US Centre for Constitutional Rights (http://ccrjustice.org/ ). WikiLeaks was denied full access to Manning’s hearing after appeal (http://ccrjustice.org/newsroom/pres… ). WikiLeaks put out a statement relating to Manning’s trial ahead of the Article 32 Hearing : (http://www.wikileaks.org/Statement-… ).

    The alleged WikiLeaks-supporting hacktivists known as the “PayPal 14” were arrested in 2011 following co-ordinated online demonstrations against the financial services companies that are carrying out the unlawful financial blockade on WikiLeaks (VISA, MasterCard, Paypal, Western Union, Bank of America). They are represented by attorney Stanley Cohen and will go before court in May 2012 (http://www.cyberguerrilla.org/?p=4644 ).

    WikiLeaks is about to launch a distributed, encrypted “Facebook for revolutionaries” (https://wlfriends.org/ ).

    Julian Assange is currently directing interviews, from house arrest, for a programme on the future of the world that is syndicated to various broadcasters. The first show will be broadcast in March (http://www.wikileaks.org/New-Assang… )
    HOW TO READ THE DATA

    This is a glossary and information on how to understand the internal terms and codes used by Stratfor in their emails. It is not a complete list. We call on the public to add to this list by tweeting #gifind

    To see a list of the terms George Friedman considers useful for his staff to know please download this PDF : The Stratfor Glossary of Useful, Baffling and Strange Intelligence Terms.

    OPEN SOURCE VS. “COVERT”

    As you browse through the content, you will notice that a large set of it is what is classified as “open source” (subject lines which include [OS]). These are basically email threads that start with someone posting a published and accessible source, such as news sites, and follow with commentary by the staff. In one of the emails, Joseph Nye is referenced saying :

    “Open source intelligence is the outer pieces of the jigsaw puzzle, without which one can neither begin nor complete the puzzle”

    CODES IN SUBJECT LINES

    Many of the emails have codes in the subject lines as well as in the body, to make it easier for the staff to “quickly identify when we need to go back and have a look-see.” [*] :

    Examples : INSIGHT – COUNTRY – Subject – SOURCE CODE INSIGHT – CHINA – Trains and planes – CN1000

    Please refer to the glossary for the code names of subject and country tags, as well as mailing list names.

    SOURCE CODES

    A lot of interesting stuff comes from “sources”. Sources are either informal contacts or people they have a formal relationship with. The IDs for sources have the format of CN120 or ME001. In terms of the character part, it refers to a region or a country :

    A) Regions ME – Middle East region EU – European Union EE – Eastern Europe LA- South America SA- South Asia

    B) Countries or Orgs CN – China PK – Pakistan IN- India ML – Malaysia VN – Vietnam NP- Nepal

    US – United States VZ – Venezuela CO- Colombia BR-Brazil NC- Nicaragua MX- Mexico CL/CH- Chile AR- Argentina PY- Paraguay BOL- Bolivia

    RU – Russia UA – Ukraine GE – Georgia TJ – Tajikstan MD – Moldova BG -Bulgaria CR/CZ- Czech Republic PT- Portugal

    ZA – South Africa AO – Angola SO – Somalia NG- Nigeria CD- DR Congo CI- Cote D’Ivoire ZW- Zimbabwe ZM- Zambia RW- Rwanda KE- Kenya ET- Ethiopia SD -Sudan MA- Morocco SN- Senegal GN- Guinea SL- Sierra Leone

    IR – Iran IQ- Iraq IL or IS- Israel SA- Saudi Arabia SY- Syria KU- Kuwait Y or YN – Yemen HZ – Hizbollah TK – Turkey LN- Lebanon LY- Libya UAE- UAE EG- Egypt (etc.)

    C) Odd codes OCH – Old China hand, a finance insider. Stick – Scott Stewart, high level employee Z’s – Zetas, Mexican drug gang

    INSIGHTS FORMAT

    When “insights” are sent, they usually have the following header information :

    SOURCE : The ID of the source, say CN123. Sometimes this is left “no source ID” when it’s a new source.

    ATTRIBUTION : How the source is to be attributed, i.e. “Source in the pharma distribution industry in China”, Stratfor source, etc.

    SOURCE DESCRIPTION : Describes the source, for example : “Source works with Mercator Pharmaceutical Solutions, distributing pharma to developing countries.” These include concrete details on the source for internal consumption so that there’s a better understanding on the source’s background and ability to make assessments on the ground.

    PUBLICATION : Yes or No. If the option is yes it doesn’t mean that it would be published, but rather that it _can_ be published.

    SOURCE RELIABILITY : A/B

    SOURCE RELIABILITY : A-F, A being the best and F being the worst. This grades the turnaround time of this source in responding to requests.

    ITEM CREDIBILITY : 1-10, 1 being the best and 10 being the worst (we may change the range here in the future). this changes a lot based on the info provided. 1 is “you can take this to the bank” and 10 would be an example of maybe – “this is a totally ridiculous rumor but something that is spreading on the ground”

    SPECIAL HANDLING : often this is “none” but it may be something like, “if you use this we need to be sure not to mention the part about XXX in the publication” or any other special notes

    SOURCE HANDLER : the person who can take follow-up questions and communicate with the source.

    MAILING LISTS

    alpha@stratfor.com Discussions circulated exclusively among analysts, writers and higher-ups, including ’insights’ and discussions about sources and source meetings. secure@stratfor.com Discussions circulated exclusively among analysts and higher-ups, and only for use within continental US (analysts traveling ’overseas’ are removed from the list for the duration of their journey). analysts@stratfor.com – Discussion among analysts only, who manage sources, gather and analyze intelligence. ct@stratfor.com Ongoing discussions to collect and analyze counterterrorism intelligence, circulated among select group of analysts. tactical@statfor.com Non-time sensitive discussions for internal training on technical and tactical matters within field of counterterrorism. intelligence@stratfor.com gvalerts@stratfor.com – Related to Gas ventures clients military@stratfor.com Military list for pre-approved staff africa@stratfor.com eastasia@stratfor.com mesa@stratfor.com Middle East/South Asia list for pre-approved staff. eurasia@stratfor.com os@stratfor.com List with information from the public domain circulated and discussed among all employees. adp@stratfor.com List for ADPs. See Glossary. translations@stratfor.com alerts@stratfor.com responses@stratfor.com dialog-list@stratfor.com

    GLOSSARY

    a) Industry and other misc. tags :

    HUMINT – Human intelligence OSINT- Open source intelligence DATA FLU BIRDFLU ECON TECH ENERGY MINING GV – Gas Venture CT – Counterterrorism G1-G4 B2-B4 S1-S4 MILITARY or MIL PENTAGON AQ- Al Qaeda AQAP – Al Qaeda in the Arabia Peninsula SF- Special Forces CONUS- Continental US

    b) Special internal codewords :

    Hizzies or HZ – Hizbollah Izzies or IZ – Israel A-dogg – Mahmoud Ahmadinajad, Iranian President Baby bashar – Bashar Al-Assad, Syrian President Uncle Mo – Moammar Gaddhafi ADP- Analyst Development Program. Four-month program at STRATFOR from which candidates— mostly recent college graduates— are selected for hire. Strictly protect and protect – Often mentioned in the ’subject’, means that the source is protected. Played- A term used for procuring sensitive information from sources. E.g. from one of the secure list messages circulating the ’complete scenario for the Israeli team in Centcom’s war game,’ the analyst who procured the data wrote : “I played the head of the Mossad which was great fun.” Excomm- Appears to be ’executive committee’ of STRATFOR.

    c) Regions and Orgs

    AFRICOM – African countries LATAM – Latin American MERCOSUR NATFA ASEAN APEC FSU – Former Soviet Union countries MESA or MIDDLEEAST – Middle East EASTASIA OPEC EURASIA SA – South Asia FSB- Federal Security Service (Russia)

    ATTACHED DOCUMENTS

    Attached documents can be searched by Filename or part of the file name. Preliminary searches for filenames using the terms ’lists’, ’source lists’ or ’insight lists’, coupled with the names of source handlers (e.g. Reva for Turkey, Brazil or Venezuela) produced Excel lists of the source names, contact info and source descriptions which correspond to the source codes (e.g. ME1315).

    Sourcing Criteria

    The following are the proposed criteria for analyzing both sources and insight.

    1. Source Timeliness 2. Source Accessibility/Position 3. Source Availability 4. Insight Credibility 5. Insight Uniqueness

    Source Timeliness : This is the average grade on how long this particular source turns around tasks and replies to inquiries. It may change but is more of a static indicator.

    Source Accessibility : Accessibility weighs the source’s position to have certain knowledge in a particular field. So, for example, if we are looking for energy insight and the source is an official in an energy agency, his or her Accessibility would be ranked higher than if s/he was a banker giving insight on energy. While we would welcome a banker giving his/her insight, a good source may not have a high accessibility ranking if they aren’t in a position to offer reliable insight on a certain topic. The source’s access to decision makers, specific training or education in the desired topic area, specific knowledge of events/situations/incidents can also be considered.

    Source Availability : How often can we go to this source ? Are they someone we can tap daily, weekly, monthly, yearly ?

    Insight Credibility : This is our assessment of the veracity of the insight offered. Here we need to consider whether or not this is disinformation, speculation, correct data or knowledgeable interpretation. Any bias that the source is displaying or any specific viewpoints or personal background the source is using in the assessment provided should also be considered.

    Insight Uniqueness : Is this insight something that could be found in OS ? If it is but the analysis of the information is unique, it would still have a high uniqueness ranking. Or, if it is concrete data, but is something that is only offered to industry insiders, i.e. stats that aren’t published but that aren’t secret, it would still have a high uniqueness score.

    Scoring

    All of the above factors will be scored on an A-F scale, with A being exemplary and F being useless.

    Source Timeliness : A = turnaround within 24 hours B = turnaround within 48 hours C = turnaround within a week D = turnaround within a month F = lucky to receive a reply at all

    Source Accessibility : A = Someone with intimate knowledge of the particular insight B = Someone within the industry but whose knowledge of the topic is not exact (e.g. if we were asking someone in the oil industry about natural gas) C = Someone working close to the industry who doesn’t have intimate knowledge of a particular topic but can speak to it intelligently (e.g. a financial consultant asked to gauge the movement of the stock market) D = Someone who may know a country but doesn’t have any concrete insight into a particular topic but can offer rumors and discussions heard on the topic F = Someone who has no knowledge of a particular industry at all

    Source Availability : A = Available pretty much whenever B = Can tap around once a week C = Can tap about once a month D = Can tap only several times a year F = Very limited availability

    Insight Credibility : A = We can take this information to the bank B = Good insight but maybe not entirely precise C = Insight is only partially true D = There may be some interest in the insight, but it is mostly false or just pure speculation. F = Likely to be disinformation

    Insight Uniqueness : A = Can’t be found anywhere else B = Can only be found in limited circles C = Insight can be found in OS, but the source has an interesting take/analysis D = Insight can be found in OS, but still may not be common knowledge F = Insight is accessible in numerous locations

    Daily Insight Scoring

    SOURCE : code ATTRIBUTION : this is what we should say if we use this info in a publication, e.g. STRATFOR source/source in the medical industry/source on the ground, etc SOURCE DESCRIPTION : this is where we put the more concrete details of the source for our internal consumption so we can better understand the source’s background and ability to make the assessments in the insight. PUBLICATION : Yes or no. If you put yes it doesn’t mean that we will publish it, but only that we can publish it. SOURCE RELIABILITY : A-F. A being the best and F being the worst. This grades the source overall – access to information, timeliness, availability, etc. In short, how good is this source ? ITEM CREDIBILITY : A-F. A = we can take this info to the bank ; B = Good insight but maybe not entirely precise ; C = Insight is only partially true ; D = There may be some interest in the insight, but it is mostly false or just pure speculation ; F = Likely to be disinformation. SPECIAL HANDLING : often this is “none” but it may be something like, “if you use this we need to be sure not to mention the part about XXX in thepublication” or any other special notes SOURCE HANDLER : the person who can take follow-up questions and communicate with the source.

    Lead journalist: Sarah Harrison

    Find this story at 27 February 2012

    Meet the Private Companies Helping Cops Spy on Protesters

    Promotional materials for private spy companies show that mass surveillance technology is being sold to police departments as a way to monitor dissent

    The documents leaked to media outlets by former NSA contractor Edward Snowden this year have brought national intelligence gathering and surveillance operations under a level of scrutiny not seen in decades. Often left out of this conversation, though, is the massive private surveillance industry that provides services to law enforcement, defense agencies and corporations in the U.S. and abroad – a sprawling constellation of companies and municipalities. “It’s a circle where everyone [in these industries] is benefitting,” says Eric King, lead researcher of watchdog group Privacy International. “Everyone gets more powerful, and richer.”

    Promotional materials for numerous private spy companies boast of how law enforcement organizations can use their products to monitor people at protests or other large crowds – including by keeping tabs on individual people’s social media presence. Kenneth Lipp, a journalist who attended the International Association of Chiefs of Police conference in Philadelphia from October 19th to 23rd, tells Rolling Stone that monitoring Twitter and Facebook was a main theme of the week. “Social media was the buzzword,” says Lipp. He says much of the discussion seemed to be aimed at designing policies that wouldn’t trigger potentially limiting court cases: “They want to avoid a warrant standard.”

    While the specifics of which police departments utilize what surveillance technologies is often unclear, there is evidence to suggest that use of mass surveillance against individuals not under direct investigation is common. “The default is mass surveillance, the same as NSA’s ‘collect it all’ mindset,” says King. “There’s not a single company that if you installed their product, [it] would comply with what anyone without a security clearance would think is appropriate, lawful use.”

    The YouTube page for a company called NICE, for instance, features a highly produced video showing how its products can be used in the event of a protest. “The NICE video analytic suite alerts on an unusually high occupancy level in a city center,” a narrator says as the camera zooms in on people chanting and holding signs that read “clean air” and “stop it now.” The video then shows authorities redirecting traffic to avoid a bottleneck, and promises that all audio and video from the event will be captured and processed almost immediately. “The entire event is then reconstructed on a chronological timeline, based on all multimedia sources,” says the narrator. According to an interview with the head of NICE’s security division published in Israel Gateway, NICE systems are used by New Jersey Transit and at the Statue of Liberty, though it isn’t clear if they are the same products shown in the video.

    “Thousands of customers worldwide use NICE Security solutions to keep people safe and protect property,” says Sara Preto, a spokesperson for NICE. She declined to confirm any specific clients, but added: “We work with law enforcement and other government agencies within the framework of all relevant and national laws.”

    Another program, made by Bright Planet and called BlueJay, is billed in a brochure to law enforcement as a “Twitter crime scanner.” BlueJay allows cops to covertly monitor accounts and hashtags; three that Bright Planet touts in promotional material are #gunfire, #meth, and #protest. In another promotional document, the company says BlueJay can “monitor large public events, social unrest, gang communications, and criminally predicated individuals,” as well as “track department mentions.” Bright Planet did not respond to a request for comment.

    A third company, 3i:Mind, lays out a scenario for a potential law enforcement client that begins: “Perhaps you are tracking an upcoming political rally.” It continues:

    Once you set up the OpenMIND™ system to profile and monitor the rally, it will search the web for the event on web pages, social networking sites, blogs, forums and so forth, looking for information about the nature of the rally (e.g. peaceful, violent, participant demographics), try to identify both online and physical world activist leaders and collect information about them, monitor the event in real-time and alert you on user-defined critical developments.

    The scenario concludes: “Your insight is distributed to the local police force warning them that the political rally may turn violent and potentially thwarting the violence before it occurs.” The 3i:Mind website gives no clues at to which governments or corporations use their products, and public information on the company is limited, though they have reportedly shown their product at various trade shows and police conferences. The company didn’t respond to a request for comment.

    Other companies are less upfront about how their products can be used to monitor social unrest. A product that will be familiar to anyone who attended an Occupy Wall Street protest in or around New York’s Zuccotti Park is SkyWatch, by FLIR, pointed out to Rolling Stone by Lipp, the journalist who attended the police conference. SkyWatch is a mobile tower in the form of a two-person cab that can be raised two stories high to provide “an array of surveillance options,” according to a promotional brochure. Those options include cameras and radar, as well as “customizable” options. The brochure says SkyWatch is perfect for “fluid operations whether on the front lines or at a hometown event.” As of this writing, the NYPD still has a SkyWatch deployed in a corner of Zuccotti Park, where Occupy activists were evicted by the police nearly two years ago.

    These promotional materials, taken together, paint a picture not only of local police forces becoming increasingly militarized, but also suggest departments are venturing into intelligence-gathering operations that may go well beyond traditional law enforcement mandates. “Two things make today’s surveillance particularly dangerous: the flood of ‘homeland security’ dollars (in the hundreds of millions) to state and local police for the purchase of spying technologies, and the fact that spook technology is outpacing privacy law,” says Kade Crockford, director of the Massachusetts ACLU’s technology for liberty program and the writer of the PrivacySOS blog, which covers these issues closely. “Flush with fancy new equipment, police turn to communities they have long spied on and infiltrated: low-income and communities of color, and dissident communities.”

    Many of the legal questions surrounding these kinds of police tactics remain unsettled, according to Faiza Patel, co-director of the Liberty and National Security program at New York University Law School’s Brennan Center for Justice. Information that is publicly available, like tweets and Facebook posts, is generally not protected by the Fourth Amendment, though legal questions may arise if that information is aggregated on a large scale – especially if that collection is based on political, religious or ethnic grounds. “This information can be useful, but it can also be used in ways that violate the Constitution,” says Patel. “The question is: what are [police departments] using it for?”

    Rolling Stone contacted police departments for the cities of New York City, Los Angeles, Chicago, Philadelphia and Washington D.C. for comment on this story.

    “The Philadelphia Police Department has their own cameras,” says that force’s spokesperson Jillian Russell. “The department does not have private surveillance companies monitor crime.” She directed follow-up questions about software used to process big data to a deputy mayor’s office, who didn’t return a phone call asking for comment.

    When asked if the LAPD uses programs to monitor protesters, a media relations email account sent an unsigned message that simply read: “We are not aware of this.”

    The other police departments did not respond to requests for comment.

    By JOHN KNEFEL
    October 24, 2013 3:16 PM ET

    Find this story at 24 October 2013

    Copyright ©2013 Rolling Stone

    Eskom apologises for spying on NGOs

    Nongovernmental organisations (NGO) GroundWork, Earthlife Africa and Greenpeace Africa have agreed to rejoin State-owned power utility Eskom’s NGO forum after the parastatal acknowledged that an investigation into its now-terminated contract with intelligence support services company Swartberg revealed that the firm was “spying” on the environmental groups.

    Eskom said in a statement on Monday that security management at the Medupi coal-fired power station, in Limpopo, had entered into the contract with Swartberg to “ensure protection of the Medupi site and to better anticipate threats to personnel and property”, following civil unrest at Medupi in May 2011.

    However, following media reports that Swartberg was gathering intelligence from the three organisations, the NGO forum members suspended their participation in February, calling for an investigation by the energy provider.

    After terminating the contract with Swartberg, Eskom commissioned independent legal firm Bowman Gilfillan to initiate an investigation, which revealed “concerns” about the way in which the contract was managed.

    After disclosing the extent, process and outcome of the investigation to the three affected NGOs, Eskom CEO Brian Dames said the use of private companies to gather intelligence from stakeholders was “unacceptable” and “not how Eskom does business”.

    “To the extent that this may have happened as a consequence, even if unintended, is regrettable and Eskom apologises for this,’’ he commented.

    The NGOs said in a statement that they believed their key demand for a full internal investigation and a public apology had been met.

    “We, therefore, think it is in order to return to the stakeholder forum, where we will continue to engage and, where necessary, challenge Eskom on its energy choices,” they stated.

    Eskom said it had, since the outcome of the investigation, taken steps to strengthen internal controls and brought the matter to the attention of the South African Police Service to determine whether any laws were contravened, and if any further action was required.

    The group said it would also implement the recommendations made following the investigation, including pursuing disciplinary action against individuals who did not comply with Eskom policies.

    Published 11 Nov 2013
    Article by: Natalie Greve

    Find this story at 11 November 2013

    Copyright © Creamer Media (Pty) Ltd

    Australian spy agency helped BHP negotiate trade deals

    An apology is the least Indonesia can expect from Australia following revelations of electronic spying, according to Greens Senator Scott Ludlam.

    BHP was among the companies helped by Australian spy agencies as they negotiated trade deals with Japan, a former Australian Secret Intelligence Service officer says.

    A former diplomat has also confirmed Australian intelligence agencies have long targeted Japanese companies. Writing in The Japan Times, Professor Gregory Clark said Australian companies were beneficiaries of intelligence operations.

    “In Australia, favoured firms getting spy material on Japanese contract policies and other business negotiations used to joke how [it had] ‘fallen off the back of a truck’,” Professor Clark wrote.

    “BHP knew we were giving them secret intelligence. They lapped it up.”

    Business information is a main target for [intelligence] agencies, he said. “The targeting is also highly corrupting since the information can be passed on selectively to co-operative firms – often firms that provide employment and cover for spy operatives.”
    Professor Clark’s observations are supported by a former Australian Secret Intelligence Service officer who said that commercial information became a priority after the global economic turmoil of the 1970s.

    “Suddenly [the Australian government] wanted to know what the demand would be for Australian iron ore and other commodities, and just what price the Japanese were prepared to pay for steel,” the former intelligence officer said.

    “We gave market information [to] major companies like BHP which were helpful to us, and officers at overseas stations would trade snippets with some of their commercial contacts … BHP knew we were giving them secret intelligence. They lapped it up.”

    The former spy says informal exchanges with business executives were continuing when he retired in the 1990s. More recently, US diplomatic cables obtained by WikiLeaks and published by Fairfax Media in 2011 revealed former BHP Billiton chief executive Marius Kloppers privately offered “to trade confidences” with US officials about China.

    ”Kloppers has a keen interest in learning everything he can about the Chinese and is not shy about asking us for our impressions,” US Consul-General Michael Thurston reported to Washington in 2009. BHP declined to comment at the time.

    The US and Britain have repeatedly denied charges of economic espionage following the disclosures of US intelligence contractor Edward Snowden. Australia says it is longstanding policy not to comment on intelligence matters.

    Australian National University international relations expert Dr Michael McKinley said: ”While most countries might have suspicions … the revelation of economic espionage has the potential to be highly embarrassing.”

    Professor Clark also highlights the potential for secret intelligence to harm diplomatic relations.

    After leaving the Australian foreign service in the mid 1960s because of his opposition to Australia’s participation in the Vietnam War, Professor Clark pursued a distinguished academic career in Japan.

    However as an Australian Government consultant he was also involved in policy making on Australian-Japanese relations in 1974-76.

    In his memoirs, Professor Clark recalls how “a piece of phoney information from an incompetent ASIS spy in Tokyo desperate to impress superiors” was used by conservative Canberra bureaucrats to stall trade negotiations with Japan during the Whitlam Labor Government.

    “[E]ven when it is clear that the information is unreliable and the spies are out of control, it is hard for anyone to complain or disagree,” he says.

    November 7, 2013
    Philip Dorling

    Find this story at 7 November 2013

    Copyright © 2013 Fairfax Media

    CSEC and Brazil: “Whose interests are being served”? (2013)

    Amusing to see both NaPo and the G&M hosting remarks from former CSIS deputy director Ray Boisvert dismissing the recent Snowden/Greenwald docs which revealed CSEC spied on Brazil’s Mines and Energy Ministry.

    Snowden was present at the Five Eyes conference where the CSEC presentation on their Olympia spying program on Brazil took place.

    Boisvert in both papers:

    “We were all too busy chasing bad guys who can actually kill people. The idea that we spend a lot of time, or any time at all, on a country like Brazil is pretty low margin stuff, not likely to happen.”

    The docs probably only represent “a war gaming exercise,” says Boisvert:

    “They have to do paper exercises and say, ‘OK, let’s say our target in counter-terrorism lives in Mali and we have to go up against the Malian telecommunications system.’ They’ll go look at another country and say, ‘OK, well they have a similar network so let’s do a paper exercise and say ‘what do we need?’” he said. ‘I think that’s all this was.’”

    Because when you’re “busy chasing bad guys who can actually kill people” and stuff, naturally your anti-terrorism war games will entail a cyber-espionage program searching for corporate secrets in a country where 40 of your own country’s mining corporations are operating.

    Wouldn’t have anything to do with looking for info on Brazil wanting to block a Canadian mining company from opening the largest open pit gold mine in Brazil, would it? Brazilian prosecutors say the company has failed to study the impact on local Indian communities and has advertised on its own website “plans to build a mine twice the size of the project first described in an environmental assessment it gave state officials.”

    Ok, foreign media. The Guardian, today:

    Canadian spies met with energy firms, documents reveal

    “The Canadian government agency that allegedly hacked into the Brazilian mining and energy ministry has participated in secret meetings in Ottawa where Canadian security agencies briefed energy corporations.

    According to freedom of information documents obtained by the Guardian, the meetings – conducted twice a year since 2005 – involved federal ministries, spy and police agencies, and representatives from scores of companies who obtained high-level security clearance.

    Meetings were officially billed to discuss ‘threats’ to energy infrastructure but also covered ‘challenges to energy projects from environmental groups,’ ‘cyber security initiatives’ and ‘economic and corporate espionage.’

    The documents – heavily redacted agendas – do not indicate that any international espionage was shared by CSEC officials, but the meetings were an opportunity for government agencies and companies to develop ‘ongoing trusting relations’ that would help them exchange information ‘off the record,’ wrote an official from the Natural Resources ministry in 2010.”

    Thank you, Enbridge, for providing the snacks for the one in May 2013.

    “Keith Stewart, an energy policy analyst with Greenpeace Canada, said: ‘There seems to be no limit to what the Harper government will do to help their friends in the oil and mining industries. They’ve muzzled scientists, gutted environmental laws, reneged on our international climate commitments, labelled environmental critics as criminals and traitors, and have now been caught engaging in economic espionage in a friendly country. Canadians, and our allies, have a right to ask who exactly is receiving the gathered intelligence and whose interests are being served.’”

    Good question. And did no Canadian media request these same FOIs?

    You know, I think I blogged about government security briefings to energy companies a few years ago — I’ll see if I can find it.

    Meanwhile, would be interesting to hear Boisvert’s explanation as to why the CSEC logo appeared on another NSA doc about intercepting phone calls and emails of ministers and diplomats at the 2009 G20 summit in London.

    More “paper exercises”? Filling in an empty spot on the page while chasing bad guys?

    And re the recent NSA spying on Brazil PM Dilma Rousseff and the state oil company Petrobras: Did CSEC help out its Five Eyes partner there too?

    Back in 1983, CSEC spied on two of Margaret Thatcher’s cabinet ministers on behalf of Thatcher and Britain’s spy agency GCHQ, so this wouldn’t exactly be new territory for CSEC.

    Fun fact : The annual report on CSEC produced by its independent watchdog commissioner must first be vetted by CSEC “for national security reasons” before it can be released.

    P.S. I pillaged the CSEC slide at top from Lux ex Umbra, where you can view the rest of them.

    Posted by admin on October 10, 2013 · Leave a Comment
    By Alison@Creekside

    Find this story at 10 October 2013

    Copyright © 2013

    Trade Secrets : Is the U.S.’s most advanced surveillance system feeding economic intelligence to American businesses? (1999)

    No one is surprised that the United States uses sophisticated electronic spying techniques against its enemies. But Europeans are increasingly worried about allegations that the U.S. uses those same techniques to gather economic intelligence about its allies.

    The most extensive claims yet came this spring in a report written for the European Parliament. The report says that the U.S.

    National Security Agency, through an electronic surveillance system called Echelon, routinely tracks telephone, fax, and e-mail transmissions from around the world and passes on useful corporate intelligence to American companies.

    Among the allegations: that the NSA fed information to Boeing and McDonnell Douglas enabling the companies to beat out European Airbus Industrie for a $ 6 billion contract; and that Raytheon received information that helped it win a $ 1.3 billion contract to provide radar to Brazil, edging out the French company Thomson-CSF. These claims follow previous allegations that the NSA supplied U.S. automakers with information that helped improve their competitiveness with the Japanese (see “Company Spies,” May/June 1994).

    Is there truth to these allegations? The NSA is among the most secretive of U.S. intelligence agencies and won’t say much beyond the fact that its mission is “foreign signals intelligence.” The companies involved all refused to comment.

    “Since the NSA’s collection capabilities are so grotesquely powerful, it’s difficult to know what’s going on over there,” says John Pike, an analyst at the watchdog group Federation of American Scientists, who has tracked the NSA for years.

    This much is known: The NSA owns one of the largest collections of supercomputers in the world, and it’s an open secret–as documented in the European Parliament report–that Echelon vacuums up massive amounts of data from communications satellites and the Internet and then uses its computers to winnow it down. The system scans communications for keywords–“bomb,” for instance–that might tip off analysts to an interesting topic.

    Fueling allegations of corporate espionage is the fact that defense contractors and U.S. intelligence agencies are linked extensively through business relationships. Raytheon, for instance, has large contracts to service NSA equipment, according to the European report.

    Englishman Glyn Ford, the European Parliament member who initiated the study, wants the NSA to come clean about its activities in Europe. And the Europeans have some leverage on this issue, if they decide to use it. In a drive to improve surveillance, the United States is pressuring European governments to make telephone companies build eavesdropping capabilities into their new systems. But if that’s what the U.S. wants, says Ford, it’s going to have to be open about what information it’s collecting: “If we are going to leave the keys under the doormat for the United States, we want a guarantee that they’re not going to steal the family silver,” he says.

    In the meantime, congressional critics have started to wonder if all that high-powered eavesdropping is limited to overseas snooping. In April, Bob Barr (R-Ga.), a member of the House Government Reform Committee, said he was worried by reports that the NSA was engaged in illicit domestic spying.

    “We don’t have any direct evidence from the NSA, since they’ve refused to provide any reports, even when asked by the House Intelligence Committee,” Barr says. “But if in fact the NSA is pulling two million transmissions an hour off of these satellites, I don’t think there’s any way they have of limiting them to non-U.S. citizens.”

    Last May, after the NSA stonewalled requests to discuss the issue, Congress amended the intelligence appropriations bill to require the agency to submit a report to Congress. (The bill is still in a conference committee.) And the NSA will face more questions when the Government Reform Committee holds hearings on Echelon and other surveillance programs.

    “We ought to prevent any agency from the dragnet approach–where they throw out a net and drag anything in,” Barr says.

    Kurt Kleiner
    Mother Jones November 1, 1999

    Find this story at 1 November 2013

    Copyright ©2013 Mother Jones and the Foundation for National Progress.

    Moscow Denies U.S.-Based Diplomat Sought Young Spies

    Moscow has angrily denied that one of its diplomats in Washington tried to recruit young Americans to spy for Russian intelligence agencies, calling the allegations a “horror story” reminiscent of the Cold War.

    The spy flap centering around the 59-year-old head of a Kremlin-funded cultural exchange program raises the specter of a new dispute rocking already stormy relations between Russia and the U.S.

    The FBI is investigating whether Yury Zaitsev, head of the Russian Center for Science and Culture, is a Russian intelligence officer who arranged all-expense-paid trips to Russia aimed at grooming young Americans, including students, political aides, nonprofit sector workers and business executives, according to Mother Jones magazine, which first broke the story.

    The Russian Embassy in Washington and Zaitsev himself rejected the allegations and expressed concern that unknown people were trying to ruin efforts by Presidents Barack Obama and Vladimir Putin to mend and expand ties.

    “It’s a shame that Russian-American relations periodically echo the Cold War,” Zaitsev, who refused to speak to Mother Jones on the issue, said late Wednesday in an interview with state news agency Itar-Tass. “Someone apparently wants to see the Iron Curtain fall between our two countries once again.”

    “This kind of horror story very much resembles the Cold War era,” embassy spokesman Yevgeny Khorishko said in a statement released to Russian media. “A blunt attempt is being made to distort and discredit the activities of the Russian cultural center, which focuses on developing trust and cooperation between our two countries and people.”

    He warned that “somebody intends to torpedo” a goal set by Obama and Putin at a Group of Eight summit in June to expand direct contracts between Americans and Russians so as to raise relations to a new level.

    But Khorishko vowed that Moscow would not be deterred by the spy allegations. ”The Russian cultural center has been working to expand contacts and improve understanding between Russian and American citizens and will continue to do this work,” he said.

    The Russian center is housed in a 1895 mansion purchased by Moscow in 1957. (rccusa.org)

    Mother Jones and other U.S. media reported that FBI officials had met with people who traveled to Moscow and St. Petersburg on trips organized by the Russian cultural center and quizzed them on whether Zaitsev worked for Russian intelligence and whether any attempts had been made to recruit them during their stay. The media reports, citing trip participants, said all had denied that the Russians had sought to recruit them.

    The FBI refused to comment on whether it had opened an investigation into Zaitsev.

    Zaitsev has diplomatic immunity, so U.S. prosecutors could not press charges against him if the FBI were to conclude that he broke the law. But the State Department could withdraw his immunity, forcing the Russian Foreign Ministry to recall him to Moscow.

    The cultural center has brought 128 Americans on “short-term, fact-finding trips” to Russia since the exchange program was created under a presidential decree in 2011, according to program information on the center’s website. The global program, which seeks participants aged 25 to 35, has also invited 1,219 people from other countries, including 283 from Europe, 157 from Asia and the Middle East, 29 from Africa and South America and 750 from other former Soviet republics.

    About 25 people participated in each trip from the U.S., and they stayed at five-star hotels and met with senior politicians like the mayors of Moscow and St. Petersburg and Federation Council Deputy Speaker Alexander Torshin, Mother Jones said.

    Zaitsev, a St. Petersburg native, said in the interview that trip participants were being targeted in a “witch hunt” rooted in a U.S. fear of Russia. “I think it is simply unacceptable that they are ordered to tell what, why, how and why,” he said.

    In a reminder of lingering suspicions in both countries, Zaitsev pointed out that the U.S. government also organizes exchange programs that bring young Russians to the United States, and he insisted that his program was as transparent as any of those. “All of the information about our programs and projects is publicly available on our website,” he said.

    Zaitsev’s path to Washington is not clear from his organization’s website. He received a doctorate in economics from the Leningrad Technological Institute in 1980 and then worked in several government-run student organizations until the Soviet collapse, according to his online biography. He worked in unspecified “leadership positions in private companies” from 1992 until he was appointed head of the cultural center in July 2010. He is married and has one adult son.

    The center’s second floor has a space library focusing on Russian-U.S. cooperation. (rccusa.org)

    But Zaitsev faces a formidable task. Relations between the Russia and the U.S. have soured since Putin returned to the presidency last year, with Washington deploring a Kremlin crackdown on the opposition and a ban on U.S. parents adopting Russian children. Moscow for its part has assailed the U.S. Magnitsky blacklist of Russian officials accused of human rights violations.

    The tensions have cast a shadow over yearlong events mean to celebrate the 80th anniversary of diplomatic relations.

    The Russian cultural center, also known as Rossotrudnichestvo, is “the official home of Russian culture in the United States” and was created in 2001 under a bilateral agreement aimed at fostering relations, according to its website.

    It is housed in a 1895 mansion located 20 minutes by foot from the White House that the Soviet government bought in 1957 and used for the embassy’s consular services for 40 years.

    The first floor contains the Moscow Room, decorated in cream and gold leaf and with paintings of the Bolshoi Theater, the Kremlin, Moscow State University and Christ the Savior Cathedral; as well as the Hall of Mirrors, with two gala portraits of Peter the Great and Catherine the Great; and the Russian-American Room, with a colorful panorama depicting key moments in Russian-American relations.

    The second floor hosts the Pushkin Library, with more than 2,000 books, 300 movies on video and DVD and more than 100 audiobooks; a space library focusing on Russian-U.S. cooperation in space exploration; and classrooms offering Russian-language lessons.

    The third floor contains two guest rooms, while the basement has a kitchen that prepares meals for the center’s receptions and offers classes on Russian cuisine.

    25 October 2013 | Issue 5242
    By Andrew McChesney

    Find this story at 25 October 2013

    © Copyright 1992-2013. The Moscow Times.

    Head of D.C.-based Russian cultural center being investigated as possible spy

    The FBI is investigating whether the U.S.-based director of a Russian government-run cultural exchange program was clandestinely recruiting Americans as possible intelligence assets, according to law enforcement officials.

    FBI agents have been interviewing Americans who participated in the Rossotrudnichestvo exchange program run by Yury Zaytsev, who also heads the Russian Center for Science and Culture in Washington. For the past 12 years, the program has paid for about 130 Americans to visit Russia.

    Latest from National Security
    Senior Navy civilians investigated in alleged fraud

    Craig Whitlock 2:27 AM ET

    Court records show $1.6 million was paid to an auto mechanic who produced rifle silencers for $8,000.
    Two admirals face inquiry in Navy bribery scheme

    Craig Whitlock NOV 9

    The Navy put the pair, including its top intelligence official, on leave and suspended their access to classified material.
    After teenager flees to Syria, family fights to bring him back

    Michael Birnbaum and Souad Mekhennet NOV 12

    A Muslim family living in Germany “kidnaps” the youth, who had jihadi aspirations, close to Syria’s border.
    NSA Secrets

    Full coverage of the revelations and debate surrounding National Security Agency surveillance programs.

    FBI spokeswoman Amy Thoreson declined to comment on whether there was an investigation or to discuss the bureau’s role. A woman who answered the phone at the cultural center said that neither Zaytsev nor the center would comment.

    “We know that the boys and girls are speaking,” said the woman, referring to the young Americans who participated in the program and have been interviewed by the FBI. “There are many. But we shall not put out a comment.”

    “We are clean and transparent, friendly and true,” said the woman, who did not give her name or title.

    The center, at Phelps Place in the Kalorama neighborhood of northwest Washington, offers language lessons and cultural programs, according to its Web site.

    A spokesman for the Russian Embassy in Washington denied that the cultural center was involved in the recruitment of spies.

    “All such ‘scaring information’ very much resembles Cold War era,” the spokesman, Yevgeniy Khorishko, said in an e-mail. He added that such allegations were being leveled only to “distort and to blacken activities of the Russian Cultural Center.”

    The FBI investigation of Zaytsev was first reported by Mother Jones magazine on its Web site.

    Law enforcement officials said the FBI is investigating whether Zaytsev and Rossotrudnichestvo have used trips to Russia to recruit Americans. Rossotrudnichestvo paid for all their expenses, including meals, travel, visa fees and lodging. Most of the trips involved about 25 participants, who sometimes stayed in luxury hotels and met with Russian government officials.

    Zaytsev did not go on the exchange trips, said one law enforcement official, but he created files on some of the participants, allegedly to cultivate them as future intelligence assets. Law enforcement officials would not comment on whether the FBI has any evidence that Zaytsev was successful in recruiting any assets.

    As part of their probe, FBI special agents are trying to interview the Americans who participated in the program, including graduate students, business executives, political aides and nonprofit workers. Rossotrudnichestvo also has cultural exchanges for young people in Europe, Africa, Latin America and Asia.

    Richard Portwood, the executive director of the Center for American-Russian Engagement of Emerging Leaders and a participant in the cultural exchange program, said he was interviewed by the FBI this month and was told that Zaytsev was a foreign intelligence officer.

    “These revelations came as a total surprise,” Portwood said in a statement. “My sincere hope is that Mr. Zaytsev’s alleged activities do not prevent U.S.-Russia cultural exchanges in the future.”

    Portwood, 27, a graduate student at Georgetown University’s School of Foreign Service, said in a telephone interview that he took two trips to Russia through the exchange program, each lasting a little more than a week, in December 2011 and in June 2012. He said the FBI wanted to know what he and others traveling with him did on the trips, whom they met with and whether they saw anything suspicious. Portwood said the trips did not raise any suspicions. But he added: “Cold War spy games have existed for decades between the U.S. and Russia. We’re not naive to that history.”

    Zaytsev, who is on a State Department list of foreign mission staff, has diplomatic immunity, according to an administration official. The United States could revoke his immunity, which would force him to return to Russia, a law enforcement official said.

    By Sari Horwitz, Published: October 23 E-mail the writer
    Nick Anderson contributed to this report.

    Find this story at 23 October 2013

    © 1996-2013 The Washington Post

    FBI Probing Whether Russia Used Cultural Junkets to Recruit American Intelligence Assets

    Did a senior Russian embassy officer set up exchange trips to Moscow to cultivate young, up-and-coming Americans as Russian intelligence assets?

    On September 30, Richard Portwood, a 27-year-old Georgetown University graduate student, received a phone call from an FBI agent who said the bureau wanted to meet with him urgently. Portwood didn’t know why the FBI would have any interest in him, but two days later he sat down with a pair of agents at a coffee shop near his apartment. They told him they suspected that Yury Zaytsev, the US director of a Russian government-run cultural exchange program that Portwood had participated in, was a spy.

    Since 2001, Zaytsev’s organization, Rossotrudnichestvo, has footed the bill for about 130 young Americans—including political aides, nonprofit advocates, and business executives—to visit Russia. Along with Portwood, Mother Jones has spoken to two other Rossotrudnichestvo participants who were questioned by the FBI about Zaytsev, who also heads the Russian Cultural Center in Washington.
    Yury Zaytsev, a Russian diplomat. Multiple sources tell us he is the subject of an extensive FBI investigation. Rossotrudnichestvo

    The FBI agents “have been very up front about” their investigation into whether Zaytsev is a Russian intelligence agent, says a 24-year-old nonprofit worker whom the FBI has interviewed twice and who asked not to be identified. The FBI agents, according to this source, said, “We’re investigating Yury for spying activities. We just want to know what interactions you’ve had with him.” The nonprofit worker was shocked. Zaytsev, he says, is “what you imagine when you imagine a Russian diplomat. He’s fairly stoic, tall, pale.” Zaytsev did not travel on the exchange trips he helped arrange, and his contact with the Americans who went on these trips was limited.

    The agents who interviewed the Rossotrudnichestvo participants did not tell them what evidence they possessed to support their suspicions. FBI spokeswoman Amy Thoreson declined to confirm or deny the existence of an investigation into Zaytsev or answer any questions about FBI actions regarding the Russian. (The FBI did not ask Mother Jones to withhold this story.) But based on what the bureau’s agents said during the interviews, the Americans who were questioned concluded the FBI suspects that Zaytsev and Rossotrudnichestvo have used the all-expenses-paid trips to Russia in an effort to cultivate young Americans as intelligence assets. (An asset could be someone who actually works with an intelligence service to gather information, or merely a contact who provides information, opinions, or gossip, not realizing it is being collected by an intelligence officer.) The nonprofit worker says the FBI agents told him that Zaytsev had identified him as a potential asset. Zaytsev or his associates, the agents said, had begun to build a file on the nonprofit worker and at least one other Rossotrudnichestvo participant who had been an adviser to an American governor.

    Advertise on MotherJones.com

    Many countries—including the United States—place spies abroad under diplomatic cover, and it’s common for law enforcement agencies to keep a close eye on foreign diplomats who might be engaged in espionage. The Americans interviewed by the FBI say the agents did not indicate whether they believed Zaytsev had succeeded in developing Americans as assets.

    The FBI appears to be mounting an extensive investigation of Zaytsev. The three Americans interviewed by the FBI say the agents told them the bureau is trying to interview every American who has attended these trips. The nonprofit worker says that FBI agents went so far as to contact a married couple, who are Rossotrudnichestvo alums, while they were vacationing in Japan. He says the agents told him they were also scouring flight manifests associated with Rossotrudnichestvo trips for names that showed up repeatedly and could be Zaytsev collaborators.

    All three former participants describe their Rossotrudnichestvo experience as a typical cultural exchange program, albeit a ritzy one. The organization paid for meals, travel, lodging, and every other expense associated with the trip, down to the visa fee. During the St. Petersburg leg of a June 2012 trip, participants stayed at the Sokos Hotel Palace Bridge, a luxury hotel that has hosted delegations for the G8 and G20 summits. Participants on that trip met with the governors of Moscow and St. Petersburg and with Aleksander Torshin, a high-ranking member of Vladimir Putin’s United Russia party. Since 2011, Rossotrudnichestvo has organized six trips. Most included about 25 people, although roughly 50 visited Russia during the group’s first trip in December 2011.

    The application process for this exchange program is simple. The application form calls for basic personal details—including the applicant’s place of work and job title—copies of the applicant’s passport, and a one-page letter “briefly outlining why you should be selected, why you are interested and what interests you have in collaboration with Russia.” Applicants tend to find the program through referrals. (Portwood has referred about 50 people to Rossotrudnichestvo. To his knowledge, Rossotrudnichestvo never denied any applicants.) The group also offers similar exchanges to young professionals in Asia, Latin America, Africa, and Europe.

    When I called the Russian Cultural Center last week, Zaytsev answered. He declined to answer questions about the FBI’s investigation on the phone, but he eagerly invited me to visit him at the center two days later. “I welcome any questions you have for me,” he said. When I arrived, though, Galina Komissarova, a center employee, asked me to leave, saying I hadn’t sent questions in advance as Zaytsev had requested. (He hadn’t.) Komissarova would not disclose her title or role at the center. “I just clean,” she said sternly, showing me the door. I discovered later that Komissarova is Zaytsev’s wife.

    Since then, Zaytsev has not replied to written questions or returned repeated phone calls.

    A State Department spokeswoman confirms that Zaytsev is on a list of foreign mission staff who have diplomatic immunity. If it chose to, the United States could revoke his immunity, forcing Russia to call him home.

    Portwood, who attended Rossotrudnichestvo trips in 2011 and 2012, and the other Americans questioned by the FBI were asked a similar set of questions. The agents wanted to know how they had heard about the exchange program and where in Russia they traveled. They also asked whether participants had encountered any anti-American sentiment on their trip, were offered jobs, or had suspicious interactions with Rossotrudnichestvo afterward. Portwood and the two other participants said they answered “no” to these questions.

    According to three Rossotrudnichestvo alums, Zaytsev displayed no suspicious behavior and none developed an ongoing relationship with him after their excursion. For most Rossotrudnichestvo participants, they say, Zaytsev was merely the name on the congratulatory letter they received when they were accepted into the exchange program.

    The third participant who spoke to Mother Jones about the exchange program, a 26-year-old resident of Washington, DC, is not surprised by the FBI’s allegations—and doesn’t care whether he was targeted as a possible intelligence asset. “There’s not a single American diplomat anywhere in the American sphere of influence who doesn’t have an open line of communication with the CIA. … [What Zaytsev is doing] is not something that every other single [foreign] cultural center in DC isn’t also doing,” he says. “And that doesn’t bother me. I don’t have a security clearance. I don’t work for an elected official. I run a social enterprise that has absolutely nothing to do with US-Russia relations.”

    Rossotrudnichestvo’s most recent Russia trip was scheduled for mid-October and it’s unclear whether or not it went forward as planned. After he was questioned by the FBI, Portwood emailed people he had earlier referred to the organization to inform them of what he learned. His email read, in part: “The FBI disclosed to me that Yury Zaytsev is a Russian Foreign Intelligence officer and a professional spy, acting as the Director of the Russian Cultural Center in Washington, D.C.…only so that he can maintain a residence here in the United States. In fact, the FBI alleges that part of Mr. Zaytsev’s mission is sending young professionals from the United States to Russia as part of a cultural program wherein participants are evaluated and/or assessed for Russian counterintelligence purposes.”

    Portwood was disappointed to learn the exchange program may have been a cover for Russian intelligence work. “It passed the smell test,” he says. “But I guess Russia’s Russia, you know?”

    UPDATE, 6:00 p.m. EDT, Wednesday October 23: The Russian Embassy provided the following statement in an email to Mother Jones:

    All such “scaring information” very much resembles Cold War era. A blunt tentative is made to distort and to blacken activities of the Russian Cultural Center in DC, which are aimed at developing mutual trust and cooperation between our peoples and countries. As a matter of fact, somebody intends to torpedo the guidelines of the Russian and U.S. Presidents, whose Joint Statement in Lough Erne emphasizes the importance of “expanding direct contracts between Americans and Russians that will serve to strengthen mutual understanding and trust and make it possible to raise U.S.-Russian relations to a qualitatively new level”.

    Russian Cultural Center has been working to expand contacts and better understanding between Russian and American citizens and will continue this work.

    —By Molly Redden
    | Wed Oct. 23, 2013 3:00 AM PDT | UPDATED Wed Oct. 23, 2013 3:00 PM PDT

    Find this story at 23 October 2013

    Copyright ©2013 Mother Jones and the Foundation for National Progress.

    KGB ‘recruited’ two politicians as agents

    KGB station chief Ivan Stenin (right) and his successor, Geronty Lazovik, in Canberra in 1971.

    A KGB officer ran two Australian federal parliamentarians as Soviet agents in the 1970s, according to a confidential account of ASIO counter-espionage operations during the Cold War.

    ASIO also tried to persuade a Russian military intelligence officer to defect by offering him treatment in the US for his stomach cancer.

    In an unusually candid document obtained by Fairfax Media, a former senior ASIO officer lists known Soviet intelligence officers in Australia and reveals numerous details of ASIO’s counter-espionage efforts. Much of the information remains classified.

    The account by the former counter-espionage specialist confirms that Soviet intelligence was very active in Australia throughout the Cold War and that ASIO’s counter-espionage efforts had only limited success.
    Advertisement

    The document reveals ASIO’s bid in the 1970s to induce a senior military intelligence officer, Yuriy Ivanovich Stepanenko, to defect.

    ASIO offered the Russian, who had stomach cancer, ”the best facilities in the world” at Johns Hopkins Hospital in Baltimore ”if he wanted to jump”.

    According to the former ASIO officer, the Russian was “tempted but didn’t live much longer”.

    The document also details how ASIO’s bugging operations revealed in the late 1960s and early 1970s that KGB officer Vladimir Aleksandrovich Aleksyev was “running two Australian politicians as agents, using tradecraft of a fairly high order”.

    Aleksyev was followed by Vladimir Yevgenyevich Tulayev, “a hard-eyed, well-dressed thug” who, according to declassified ASIO documents, was also “aggressively involved in intelligence operations in Australia”.

    Geronty Lazovik, another “definite agent runner”, was much more urbane and developed a wide range of contacts across Federal Parliament by targeting Labor politicians, staffers and lobbyists. However, ASIO director-general Peter Barbour delayed recommending that Tulayev and Lazovik be expelled before the 1972 federal election for fear of triggering political controversy.

    Declassified documents show that after the election the new Labor prime minister, Gough Whitlam, was concerned about ASIO’s investigations causing diplomatic embarrassment. Neither KGB officer was expelled and the government suspended ASIO’s phone taps on the Soviet embassy.

    Lazovik was reportedly later awarded a medal for his work in Australia. The award was for “allegedly recruiting a top agent in ASIO, Defence or [the Department of Foreign Affairs]”, according to the former ASIO officer.

    The document also sheds light on the 1983 Combe-Ivanov affair in which the Hawke Labor government blackballed former Labor national secretary and political lobbyist David Combe because of his involvement with KGB officer Valery Ivanov, who was expelled from Australia.

    The former ASIO officer says that Ivanov recruited a cipher clerk in the Indonesian embassy and that ASIO approached the Indonesians to agree to “a joint operation running the cipher clerk back against Ivanov”. However, the proposed double-agent operation had to aborted because of Ivanov’s expulsion.

    “The farewell party for Ivanov was bugged and revealing. He had been roundly castigated by [fellow KGB officer] Koshlyakov for going too far, too soon, and wasn’t very happy at that,” the former ASIO officer says.

    October 14, 2013
    Philip Dorling

    Find this story at 14 October 2013

    Copyright © 2013 Fairfax Media

    Revealed: How Australia spies on its neighbours

    Australia’s electronic spy agency is using the nation’s embassies to intercept phone calls and internet data in neighbouring countries, according to new information disclosed by intelligence whistleblower Edward Snowden and a former Australian intelligence officer.

    The secret Defence Signals Directorate operates clandestine surveillance facilities at embassies without the knowledge of most Australian diplomats.

    Fairfax Media has been told that signals intelligence collection occurs from Australian embassies in Jakarta, Bangkok, Hanoi, Beijing and Dili, the high commissions in Kuala Lumpur and Port Moresby and other diplomatic posts.

    A secret US National Security Agency document leaked by Mr Snowden and published by Germany’s Der Speigel magazine reveals a highly sensitive signals intelligence collection program conducted from US embassies and consulates and from the diplomatic missions of other “Five Eyes” intelligence partners, including Australia, Britain and Canada.

    Codenamed STATEROOM, the collection program involves interception of radio, telecommunications and internet traffic.

    The document says the DSD operates STATEROOM facilities at Australian diplomatic posts. It says the surveillance facilities are “small in size and in number of personnel staffing them”.

    “They are covert, and their true mission is not known by the majority of the diplomatic staff at the facility where they are assigned,” it says.

    The document says the DSD facilities are carefully concealed. “For example, antennas are sometimes hidden in false architectural features or roof maintenance sheds.”

    The Department of Foreign Affairs and Trade declined to comment on the potential diplomatic implications of the disclosure. A spokesperson said: “It is the long-standing practice of Australian governments not to comment on intelligence matters.”

    The leaked NSA document does not identify the location of the DSD facilities overseas. However, a former Australian defence intelligence officer told Fairfax Media that the directorate conducted surveillance from Australian embassies across Asia and the Pacific.

    In June, the East Timorese government complained publicly about Australian spying, including communications interception and the bugging of government offices during negotiations on the Timor Gap oil and gas reserves.

    The former intelligence officer said the interception facility at the Australian embassy in Jakarta played an important role in collecting intelligence on terrorist threats and people smuggling, “but the main focus is political, diplomatic and economic intelligence”.

    “The huge growth of mobile phone networks has been a great boon and Jakarta’s political elite are a loquacious bunch. Even when they think their own intelligence services are listening they just keep talking,” he said.

    He said the Australian consulate in Denpasar, Bali, had also been used for intelligence collection.

    Intelligence expert Des Ball said the DSD had long co-operated with the US in monitoring the Asia-Pacific region, including using listening posts in Australian embassies and consulates.

    “Knowing what our neighbours are really thinking is important for all sorts of diplomatic and trade negotiations,” Professor Ball told Fairfax Media.

    “It’s also necessary to map the whole of the telecommunications infrastructure in any area where we might one day have to conduct military operations so that we can make most use of our cyber warfare capabilities, however remote those contingencies might be, because you can’t get that knowledge and build those capabilities once a conflict starts.”

    Meanwhile, Indonesian Foreign Minister Marty Natalegawa has demanded an explanation of news that the US embassy in Jakarta has been used to tap the phones of Indonesian officials.

    “Indonesia cannot accept and strongly protests the news about the existence of tapping facilities at the US embassy in Jakarta,” Mr Natalegawa said.

    ”We have spoken to the US embassy representative in Jakarta demanding an official explanation from the US government about the news. If it’s confirmed, then it’s not only a breach of security, but a serious breach of diplomatic norms and ethics, and of course it’s not in line with the spirit of having a good relationship between the two countries.”

    The Age
    Date: October 31 2013
    Philip Dorling

    Find this story at 31 October 2013

    Copyright © 2013
    Fairfax Media

    Secret military intelligence unit ran 8 covert operations abroad?

    NEW DELHI: Technical Support Division (TSD), the secretive military intelligence unit set up by former Army chief General V K Singh which is accused of trying to overthrow the Omar Abdullah government, has claimed to have carried out at least eight successful covert operations in a foreign country.

    But the claims are so sensitive and sensational that it would be a key reason why the government will not hand over the inquiry report into the functioning of TSD to an external investigation agency.

    Sources said though the Army has recommended an independent investigation by an agency such as the CBI, the defence ministry has not fully endorsed the suggestion. In fact, official MoD notings have said the investigation won’t move forward because of lack of concrete evidence even if it is handed over to an external agency.

    Gen Singh has already dismissed all allegations, saying it was the Congress-led UPA government’s vendetta politics. “This is simple vendetta as some people are not comfortable with me sharing the dais with Narendra Modi to espouse the cause of ex-servicemen in the country,” Gen Singh had said over the weekend.

    Sources said the inquiry report also doesn’t conclusively prove that the money claimed to have been paid to various people reached the intended beneficiaries. “These are all based on statements of TSD officials, former DGMI (director general of military intelligence) and others. There is no concrete evidence that can stand the scrutiny of law,” a senior official.

    According to sources, among the most sensational claims in the report is that the TSD carried out eight specific covert operations in a foreign country. It has claimed to have spent a few crores on those operations. There is no corroborative evidence for the claims, but if it were to emerge in public, it would be a major embarrassment for New Delhi.

    Besides, the report prepared by director general military operations Lt Gen Vinod Bhatia has claimed that Rs 1.19 crore was given to Ghulam Hassan Mir, agriculture minister of Jammu and Kashmir, to topple the Omar Abdullah government.

    The report also claimed that Rs 2.38 crore was given to Hakikat Singh who set up an NGO called ‘Jammu and Kashmir Humanitarian Service Organisation’ that was in turn linked to ‘Yes Kashmir’ which filed a PIL against Army chief Gen Bikram Singh in the alleged fake encounter case in Jangalat Mandi when he was a brigadier.

    Bhatia’s report has also claimed that TSD spent Rs 8 crore to buy interception equipment from a Singapore-based company in November 2010. Though this was officially for Srinagar-based 15 Corps, it was misused for tapping into phone calls in New Delhi. In March 2012, the equipment was destroyed in Jammu and Kashmir. Then director general of military intelligence Lt Gen D S Thakur told the inquiry that he ordered destruction on instruction from the top brass.

    The report also said that at least three retired lieutenant generals, including an Army commander, were aware of some of the payoffs of military intelligence funds for TSD activities.

    Sources said the MoD recommendation was to look at closing structural gaps in the system. Among them was to ensure that the intelligence agencies do not overlap in their function. “Why should MI have such operations in foreign countries,” a source asked.

    Josy Joseph, TNN Sep 24, 2013, 02.45AM IST

    Find this story at 24 September 2013

    © 2013 Bennett, Coleman & Co. Ltd.

    << oudere artikelen  nieuwere artikelen >>