• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Prisoner X: Israel to pay $1m to Ben Zygier’s family

    Family of Australian-born Mossad agent who died in jail in 2010 while facing treason charges, is offered settlement

    Ben Zygier, known as Prisoner X, picture in a still from an ABC TV report. Photograph: AAP/ABC TV

    Israel is to pay more than $1m to the family of Ben Zygier, an Australian-born Mossad agent who hanged himself in an Israeli prison, in order to avoid damaging disclosures in a court case.

    The agreement will see Zygier’s family receive four million shekels, or around $1.19m, in staged payments in return for the state of Israel being absolved of responsibility for the death.

    Zygier, who held Australian and Israeli citizenships, hanged himself in the Ayalon Prison in 2010. He was known as Prisoner X due to his secret incarceration, where he was facing a 10-year sentence for treason.

    A judicial inquiry found that guards did not properly check his cell and that at least one CCTV camera wasn’t working. Central district court president, Daphna Blatman, said: “Failure by various elements in the Israel prison service caused his death.”

    The Israeli government has said that there was not enough evidence to bring charges over Zygier’s death.

    Zygier’s parents – who are leading figures in Melbourne’s Jewish
    community – threatened to bring a legal case against the state of
    Israel, claiming negligence and seeking compensation.

    According to a statement from the Israeli justice ministry,
    negotiations between the state of Israel and the Zygiers led to the
    settlement, “under which the state agreed to pay the family of the
    deceased the sum of four million shekels”. The agreement was made
    “without admitting claims raised against”, it said.

    Israel made the payment in order to avoid court action, which might have
    involved the disclosure of information “which could cause real damage
    to national security”, the statement added.

    Earlier this year, the ABC’s Foreign Correspondent program reported that the Israeli government attempted to cover up the story of Zygier’s death, urging editors of Israeli newspapers not to report the incident.

    The program claimed that Zygier was imprisoned for sabotaging a Mossad mission to recover the bodies of soldiers killed in action in Lebanon. Israel has refused to comment on the reasons for his incarceration.

    Oliver Milman in Sydney and Harriet Sherwood in Jerusalem
    The Guardian, Wednesday 11 September 2013 09.07 BST

    Find this story at 11 September 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    ‘Prisoner X’ family to get Israeli payout

    Justice ministry says $1.1 million to be paid to family of alleged Mossad spy who hanged himself in prison.

    Zygier known as “Prisoner X” was found hanged in his isolation cell in Ayalon prison near in December 2010. [EPA]

    Israel is to pay more than $1 million to the family of an alleged Mossad spy who hanged himself in prison in 2010, the justice ministry has said.

    “After negotiations, the two parties have reached an agreement whereby the state will pay $1.1 million to the deceased’s family,” the ministry said in a statement late on Tuesday.

    The family of Ben Zygier, an Australian-Israeli known as “Prisoner X,” had accused Israel of negligence in dealing with his case, according to the statement.

    Zygier was found hanged in his isolation cell in Ayalon prison near Tel Aviv in December 2010 — a case Israel went to extreme lengths to cover up.

    A court document released on April 25 this year said Israel’s prison service had caused Zygier’s death by failing to prevent him from committing suicide.

    The document revealed details about his background and imprisonment, indicating he was suicidal and had an emotionally-charged exchange with his wife the day he was found hanged.

    It also said that his cell was not properly watched by prison guards.

    The justice ministry statement stressed that the deal with Zygier’s family was not an “admission of alleged wrongdoing.”

    It was instead “to avoid the affair going to court, which would lead to the publication of numerous details of the case which could cause serious harm to national security.”

    The reasons for Zygier’s detention were unclear, but the Australian Broadcasting Corporation said in a report in May that the 34-year-old, who was allegedly working for Israel’s foreign spy service Mossad, had unwittingly sabotaged a top secret spy operation in Lebanon.

    Last Modified: 11 Sep 2013 08:52

    Find this story at 11 September 2013

    www.aljazeera.com

    Israel pays £714,000 to the family of ‘Prisoner X’

    The move is designed to keep their allegation of negligence from becoming a public lawsuit that could expose state secrets

    Israel has agreed to pay four million shekels (£714,000) in compensation to the family of an Australian-Israeli Mossad agent who apparently committed suicide while being held in secret detention in 2010.

    The settlement with relatives of Ben Zygier, who was known as “Prisoner X” during his detention for unspecified crimes, is designed to keep their allegation of negligence from becoming a public lawsuit that could expose state secrets, the justice ministry said in a statement.

    “It is possible that in the course [of a trial] details would be liable to be made public which could cause tangible damage to the security of the state,” the statement said. The justice ministry stressed that the payment was not tantamount to admitting that state was negligent in its care of Mr Zygier.

    The Australian Broadcasting Corporation broke the story of Mr Zygier’s secret incarceration in February. Before then, the Israeli media had been subject to a blackout on the “Prisoner X” case. A judicial inquiry later found that Mr Zygier’s death was a suicide enabled by “neglect of duty’’ on the part of those holding him.

    Uri Misgav, an investigative reporter for the Israeli newspaper Haaretz, said he doubted that security was the real reason for the state keeping the matter out of court. “There is at least suspicion of a cover up of failures in all aspects of this matter including recruitment, handling of him as an agent and his handling as a prisoner by the state,” he added.

    The case has been an embarrassment to Israel, raising the question of whether the judiciary, which approved the secret incarceration, had acted as a rubber stamp of the security branches.

    Ben Lynfield
    Wednesday, 11 September 2013

    Find this story at 11 September 2013

    © independent.co.uk

    US stops jailed activist Barrett Brown from discussing leaks prosecution

    Federal court order prohibits Brown from talking to the media in what critics say is latest in crackdown on investigative journalism

    Brown’s lawyer says the gagging order is a breach of Brown’s first amendment rights. Photograph: Nikki Loehr

    A federal court in Dallas, Texas has imposed a gag order on the jailed activist-journalist Barrett Brown and his legal team that prevents them from talking to the media about his prosecution in which he faces up to 100 years in prison for alleged offences relating to his work exposing online surveillance.

    The court order, imposed by the district court for the northern district of Texas at the request of the US government, prohibits the defendant and his defence team, as well as prosecutors, from making “any statement to members of any television, radio, newspaper, magazine, internet (including, but not limited to, bloggers), or other media organization about this case, other than matters of public interest.”

    It goes on to warn Brown and his lawyers that “no person covered by this order shall circumvent its effect by actions that indirectly, but deliberately, bring about a violation of this order”.

    According to Dell Cameron of Vice magazine, who attended the hearing, the government argued that the gag order was needed in order to protect Brown from prejudicing his right to a fair trial by making comments to reporters.

    But media observers seen the hearing in the opposite light: as the latest in a succession of prosecutorial moves under the Obama administration to crack-down on investigative journalism, official leaking, hacking and online activism.

    Brown’s lead defence attorney, Ahmed Ghappour, has countered in court filings, the most recent of which was lodged with the court Wednesday, that the government’s request for a gag order is unfounded as it is based on false accusations and misrepresentations.

    The lawyer says the gagging order is a breach of Brown’s first amendment rights as an author who continues to write from his prison cell on issues unconnected to his own case for the Guardian and other media outlets.

    In his memo to the court for today’s hearing, Ghappour writes that Brown’s July article for the Guardian “contains no statements whatsoever about this trial, the charges underlying the indictment, the alleged acts underlying the three indictments against Mr Brown, or even facts arguably related to this prosecution.”

    The gag order does give Brown some room to carry on his journalistic work from prison. It says that he will be allowed to continue publishing articles on topics “not related to the counts on which he stands indicted”.

    Following the imposition of the order, Ghappour told the Guardian: “The defense’s overriding concern is that Mr Brown continue to be able to exercise his first amendment right as a journalist. The order preserves that ability.”

    The lawyer adds that since the current defence team took over in May, Brown has made only three statements to the media, two of which where articles that did not concern his trial while the third ran no risk of tainting the jury pool. “Defendant believes that a gag order is unwarranted because there is no substantial, or even reasonable, likelihood of prejudice to a fair trial based on statements made by defendant or his counsel since May 1, 2013.”

    Brown, 32, was arrested in Dallas on 12 September last year and has been in prison ever since, charged with 17 counts that include threatening a federal agent, concealing evidence and disseminating stolen information. He faces a possible maximum sentence of 100 years in custody.

    Before his arrest, Brown became known as a specialist writer on the US government’s use of private military contractors and cybersecurity firms to conduct online snooping on the public. He was regularly quoted by the media as an expert on Anonymous, the loose affiliation of hackers that caused headaches for the US government and several corporate giants, and was frequently referred to as the group’s spokesperson, though he says the connection was overblown.

    In 2011, through the research site he set up called Project PM, he investigated thousands of emails that had been hacked by Anonymous from the computer system of a private security firm, HB Gary Federal. His work helped to reveal that the firm had proposed a dark arts effort to besmirch the reputations of WikiLeaks supporters and prominent liberal journalists and activists including the Guardian’s Glenn Greenwald.

    In 2012, Brown similarly pored over millions of emails hacked by Anonymous from the private intelligence company Stratfor. It was during his work on the Stratfor hack that Brown committed his most serious offence, according to US prosecutors – he posted a link in a chat room that connected users to Stratfor documents that had been released online.

    The released documents included a list of email addresses and credit card numbers belonging to Stratfor subscribers. For posting that link, Brown is accused of disseminating stolen information – a charge with media commentators have warned criminalises the very act of linking.

    As Geoffrey King, Internet Advocacy Coordinator for the Committee to Protect Journalists, has put it, the Barrett Brown case “could criminalize the routine journalistic practice of linking to documents publicly available on the internet, which would seem to be protected by the first amendment to the US constitution under current doctrine”.

    In its motion to the Dallas district court, US prosecutors accuse Brown and his associates of having “solicited the services of the media or media-types to discuss his case” and of continuing to “manipulate the public through press and social media comments”.

    It further accuses Ghappour of “co-ordinating” and “approving” the use of the media, and alleges that between them they have spread “gross fabrications and substantially false recitations of facts and law which may harm both the government and the defence during jury selection”.

    But Ghappour in his legal response has pointed out that several of the specific accusations raised by the government are inaccurate. Prosecutors refer to an article in the Guardian by Greenwald published on 21 March 2013 based partly on an interview between the journalist and Brown, yet as Ghappour points out that piece was posted on the Guardian website before the accused’s current legal team had been appointed.

    Under his legal advice, Ghappour writes, Brown has maintained “radio silence” over his case and has given no further interviews, thus negating the government’s case for a gagging order.

    Ed Pilkington in New York
    theguardian.com, Wednesday 4 September 2013 22.50 BST

    Find this story at 4 September 2013

    © 2013 Guardian News and Media Limited or its affiliated companies.

    Barrett Brown Faces 105 Years in Jail; But no one can figure out what law he broke. Introducing America’s least likely political prisoner

    The mid-June sun is setting on the Mansfield jail near Dallas when Barrett Brown, the former public face of Anonymous, shuffles into the visitors hall wearing a jumpsuit of blazing orange. Once the nattiest anarchist around, Brown now looks like every other inmate in the overcrowded North Texas facility, down to his state-issued faux-Crocs, the color of candy corn.

    Who Are America’s New Political Prisoners?

    Brown sits down across from his co-counsel, a young civil-liberties lawyer named Ahmed Ghappour, and raises a triumphant fist holding several sheets of notebook paper. “Penned it out,” he says. “After 10 months, I’m finally getting the hang of these archaic tools.” He hands the article, titled “The Cyber-Intelligence Complex and Its Useful Idiots,” to his lawyer with instructions to send it to his editor at The Guardian. Brown used to write for the British daily, but since he’s been in prison, it’s written about him and his strange legal ordeal that has had him locked up for nearly a year while he awaits trial next month. Should he be found guilty of all the charges the federal government is bringing against him – 17 counts, ranging from obstruction of justice to threatening a federal officer to identity fraud – he’ll face more than 100 years in prison.

    Given the serious nature of his predicament, Brown, 32, seems shockingly relaxed. “I’m not worried or panicked,” he says. “It’s not even clear to me that I’ve committed a crime.” He describes his time here as a break from the drug-fueled mania of his prior life, a sort of digital and chemical fast in which he’s kicked opiates and indulged his pre-cyber whims – hours spent on the role-playing game GURPS and tearing through the prison’s collection of what he calls “English manor-house literature.”

    Brown has been called many things during his brief public career – satirist, journalist, author, Anonymous spokesman, atheist, “moral fag,” “fame whore,” scourge of the national surveillance state. His commitment to investigating the murky networks that make up America’s post-9/11 intelligence establishment set in motion the chain of events that culminated in a guns-drawn raid of his Dallas apartment last September. “For a long time, the one thing I was happy not to see in here was a computer,” says Brown. “It appears as though the Internet has gotten me into some trouble.”

    Encountering Barrett Brown’s story in passing, it is tempting to group him with other Anonymous associates who have popped up in the news for cutting pleas and changing sides. Brown’s case, however, is a thing apart. Although he knew some of those involved in high-profile “hacktivism,” he is no hacker. His situation is closer to the runaway prosecution that destroyed Aaron Swartz, the programmer-activist who committed suicide in the face of criminal charges similar to those now being leveled at Brown. But unlike Swartz, who illegally downloaded a large cache of academic articles, Brown never broke into a server; he never even leaked a document. His primary laptop, sought in two armed FBI raids, was a miniature Sony netbook that he used for legal communication, research and an obscene amount of video-game playing. The most serious charges against him relate not to hacking or theft, but to copying and pasting a link to data that had been hacked and released by others.

    “What is most concerning about Barrett’s case is the disconnect between his conduct and the charged crime,” says Ghappour. “He copy-pasted a publicly available link containing publicly available data that he was researching in his capacity as a journalist. The charges require twisting the relevant statutes beyond recognition and have serious implications for journalists as well as academics. Who’s allowed to look at document dumps?”

    Brown’s case is a bellwether for press freedoms in the new century, where hacks and leaks provide some of our only glimpses into the technologies and policies of an increasingly privatized national security-and-surveillance state. What Brown did through his organization Project PM was attempt to expand these peepholes. He did this by leading group investigations into the world of private intelligence and cybersecurity contracting, a $56 billion industry that consumes 70 percent of the U.S. intelligence budget.

    Meet Jacob Applelaum, the American Wikileaks Hacker

    “Barrett was an investigative journalist who was merely doing his professional duty,” says Christophe Deloire of Reporters Without Borders. “The sentence that he is facing is absurd and dangerous.”

    B
    rown grew up in the affluent North Dallas neighborhood of Preston Hollow, where, following his parents’ divorce, he lived with his New Age mother. Karen Lancaster always believed her only son was special – he once wrote that she called him “an indigo child with an alien soul.” Among her house rules was that mother and son meditate together daily. She instructed him in the predictions of Nostradamus and made sure he kept a dream journal for the purpose, as Brown described it, “of helping him divine the future by way of my external connection to the collective unconscious.” (For her part, Brown’s mother says she was progressive, but not “New Age”, and that her son’s comments were made in jest.)

    The Rise and Fall of Jeremy Hammond, Enemy of the State

    A precocious pre-adolescent reader and writer, Brown produced a newspaper on his family’s desktop computer while in elementary school. When he started writing for the student paper at his private high school in the mid-Nineties, he quickly clashed with the paper’s censors over his right to criticize the administration. “Barrett always challenged authority, even as a kid, and anytime you go up against authority, you’re going to get in trouble,” says Brown’s father, Robert. “You could sort of always see this coming.”

    By the time he reached high school, Brown had discovered Ayn Rand and declared himself an atheist. He founded an Objectivist Society at school and distinguished himself from other Randians by placing second out of 5,000 entrants in a national Ayn Rand essay contest. (Brown now expresses regret over this.) By all accounts, Brown hated everything about organized education, preferring to follow his own curricula and chat up girls on the bulletin-board systems of a still-embryonic Internet.

    After his sophomore year, Brown told his parents he wasn’t going back. He signed up for online courses and spent his junior year in Tanzania with his father, a Maserati-driving conservative, safari hunter and serial entrepreneur who was trying to launch a hardwood-harvesting business. “Barrett loved living in Africa,” says his father. “He preferred adventure to being in school with his peers. We weren’t far from the embassy that was bombed that year.”

    Brown returned to the U.S. and in 2000 joined some of his childhood friends in Austin, where he spent two semesters taking writing classes at the University of Texas. After dropping out, he spent a summer doing what one friend calls a “heroic” amount of Ecstasy and acid before settling into the charmed life of a pre-crisis Austin slacker – working part-time, smoking pot and paying cheap rent in a series of group houses with enormous porches. Brown’s roommates remember his rooms as being strewn with leaning towers of books and magazines – he especially liked Gore Vidal, P.J. O’Rourke and Hunter S. Thompson – but say he was not especially political. “After 9/11 and Iraq, there were a lot of protests in Austin,” says Ian Holmes, a childhood friend of Brown’s. “I don’t remember him participating in it or being extra vocal, but he was against it all like everyone else.”

    As Brown built up his clip book and matured as a writer, his ambitions began to outgrow Austin. In 2007, Brown moved to Brooklyn with a group of old friends that called itself “the Texadus.” Their Bushwick apartment emerged as a hub for Lone Star State refugees who liked to get high, crush beers and play video games. “People were always hanging out and coming and going,” says Caleb Pritchard, a childhood friend of Brown’s who lived with him in Austin and Brooklyn. Among the apartment’s large cast of characters were a crew of weed-delivery guys from Puerto Rico and Honduras who used the apartment as a daytime base of business operations. “They brought over an Xbox, bought us beer and food and played strategy games with us,” Pritchard says. “It was a good cultural exchange for a bunch of skinny white kids from Dallas.”

    As virtual-world games grew increasingly sophisticated, Brown spent more time in front of his computer. But he didn’t play the games like most people. In Second Life, he linked up with a group of people known as “griefers,” the term for hackers who in the mid-00s became known for generating chaos inside video-game worlds. Socializing on the bulletin board 4chan.org, they formed the first cells of what would later become Anonymous. In the documentary We Are Legion, about the hacktivist group, Brown waxes nostalgic over his griefer period, when he’d spend entire nights “on Second Life riding around in a virtual spaceship with the words ‘faggery daggery doo’ written on it, wearing Afros, dropping virtual bombs on little villages while waving giant penises around. That was the most fun time I ever had in my life.”

    When everyone else went out to the bars, Brown stayed in. Aside from video games and the odd afternoon of pick-up basketball, he also pounded out columns, diaries and blog posts for Vanity Fair, Daily Kos and McSweeney’s, as well as restaurant reviews and essays for weeklies like New York Press and The Onion’s A.V. Club. Though he had some paying gigs, he published most heavily in unpaid, self-edited community forums like Daily Kos and The Huffington Post. “Barrett wasn’t really working in New York so much as getting by with the help of friends and family,” says Pritchard. Among his unpaid gigs was his work as the spokesman for the Godless Americans PAC, which led to Brown’s first TV appearance, on the Fox News morning show Fox & Friends.

    In Brooklyn, Brown resumed shooting heroin, which he’d dabbled in off and on since he was 19. Over the years, doctors have diagnosed him with ADHD and depression. Accurate or not, the diagnoses suggest Brown was drawn to opiates for more than just the high. “When I joined him in Brooklyn in ’08, Barrett was already basically a functional junkie,” says Pritchard.

    Heroin did not mellow Brown when it came to America’s pundit class. Brown’s critique made clear he didn’t want to join the journalistic establishment so much as lash it without mercy. Then, in March 2010, he announced in a blog post the goal of replacing it, of making its institutions irrelevant and rebuilding them in the image of an overly self-confident 28-year-old junkie named Barrett Brown. It was perhaps his first public manifestation of extreme self-assurance that could come off as imperious self-importance. Brown himself did not deny it, once saying, “I don’t think arrogance is something I’m in a position to attack anyone on.”

    The project envisioned by Brown was a new kind of crowdsourced think tank to be “established with a handful of contributors who have been selected by virtue of intellectual honesty, proven expertise in certain topics and journalistic competence in general.” He named it Project PM, after a gang in William Gibson’s Neuromancer called the Panther Moderns.

    Brown conceived his new network partly as a response to what he saw as the sad state of affairs at the two main homes for his work, Daily Kos and HuffPo. After years of vibrancy, both now suffered from “the watering-down of contributor quality,” he said. At Project PM, he assured that “below-average participants will have only very limited means by which to clutter the network.”

    How Anonymous Took Down the Music Industry’s Websites

    With typical cigarette-waving flourish, Brown declared, “Never has there existed such opportunity for revolution in human affairs.”

    Had Project PM developed along the lines of Brown’s original vision – as a kind of exclusive, experts-only, friends-of-Barrett blogger network – it is extremely unlikely that Brown would now be in jail. Or that the FBI would have subpoenaed the company hired to secure its server, as it did in March. But Project PM ended up taking a different route.

    Julian Assange: The Rolling Stone Interview

    T
    he event that locked Brown’s path into a collision course with the federal government came on February 11th, 2010, when he posted an essay on Huffington Post that he grandiloquently titled “Anonymous, Australia and the Inevitable Fall of the NationState.”

    At the time, Anonymous was in the news after some of its hackers, in an action they called Operation Titstorm, brought down Australian government servers in retaliation for the government’s attempt to block certain kinds of niche pornography. For Brown, Titstorm was a world-historic game-changer, a portent of an age in which citizens could successfully challenge state power on their laptops and neutralize government propaganda and censorship.

    In the comically aggrandizing tone that had become his trademark, Brown concluded, “I am now certain that this phenomenon is among the most important and underreported social developments to have occurred in decades.”

    Among those taken by Brown’s interpretation of Titstorm was Gregg Housh, a Boston Web designer and early Anonymous associate, who had emerged as a sort of quasi-spokesman for the group. Through Housh, Brown gained entrance to the online inner sanctums of the hackers he thought were turning history on its head. Housh, who was starting to feel burned out from fielding the barrage of international media requests, saw Brown as someone who could step in and talk to reporters for Anonymous.

    “Barrett ‘got it’ in a way few journalists did,” says Housh. “Soon, he was one of us, and that pretty much set the course for everything that happened next.”

    Brown always denied holding any official capacity as the spokesman of Anonymous, maintaining such a thing was not even possible given the amorphous nature of the group. Yet he embraced the media role with relish, sometimes using the royal “we” during interviews. In March 2011, Brown described himself to a visiting NBC News crew as a “senior strategist” for Anonymous. He also, along with Housh, began writing a book about the group, detailing the transformation of Anonymous from a community of amoral videogame-playing punks into an ethical crusade, assisting street protests across the globe during the Arab Spring.

    From the beginning, Brown’s public role was a subject of internal controversy. A minority dismissed and attacked him as a preening “name fag” – Anonymous slang for people who use their real names and speak to the press. Others were more bothered that Brown was a “moral fag,” the term used by unrepentant griefers to describe the new generation of hacktivists who began flocking to the Anonymous banner in 2008. In We Are Legion, Brown makes his allegiance clear, hailing the hacktivists for turning a “nihilist, ridiculous group” into a “force for good.”

    Yet something of the old griefer remained in Brown even after his and the group’s politicization process had converged to take on the world of intelligence outsourcing. “He was just trolling the hell out of these corporate-surveillance guys,” says Joe Fionda, a New York activist who assisted Brown in his investigations. “Not just doing the serious research work no one else was doing – getting tax files and all that – but calling them at their homes to introduce himself, sometimes straight up pranking them. He’s legit funny and sees the humor and the absurd in everything.”

    Another former colleague, a Boston Web developer and activist named Lauren Pespisa, shared Brown’s love of prank calls: “Sometimes we’d drink and prank-call lobbyists for fun. We went after this one group, Qorvis, because they were helping the kingdom of Bahrain handle its image when they were shooting people. So we’d call them up and ‘dragon shout’ at them,” she says, referring to a sound effect in one of Brown’s favorite video games, The Elder Scrolls V: Skyrim.

    By combining the two ethos of Anonymous, Brown won over more people than he alienated. Part of his appeal was the act of his drily affected pseudo-aristocratic-asshole persona, which he exaggerated during media appearances. He preferred a corduroy sports jacket to the Guy Fawkes mask that Anonymous members favor. A typical portrait showed Brown’s arm slung over a chair, a Marlboro dangling off his bottom lip and a stuffed bobcat on the wall behind him. He was oth loved and hated for being one of the more colorful characters found in the Internet Relay Chat rooms where hackers gathered. He famously once conducted a strategy session while drinking red wine in a bubble bath.

    “Barrett became a bit like the court jester of Anonymous,” says Gabriella Coleman, a professor at McGill University who has written about the network. “His behavior was legendary because he was the ethical foil. Anonymous isn’t just for hackers. People like Barrett Brown can thrive: the organizer, the media-maker, the spectacle-maker.”

    W
    hen Brown met Housh, he was nearing the end of his three-year stint in Brooklyn. In the spring of 2010, Brown called his parents and told them he had a heroin problem. At their urging, he returned to Dallas and began an outpatient treatment that included the heroin replacement Suboxone. It was from a tiny Dallas apartment that Brown deepened his involvement with Anonymous. Since most of his friends lived in Austin, his new social life consisted of the IRC rooms populated by hacktivists. It was a world of nonstop, petty cyberintrigue, which to outsiders can appear like a hellish fusion of The Hollywood Squares, WarGames and Degrassi Junior High.

    Bradley Manning Explains His Motives

    Pritchard remembers the first time Brown crashed on his couch in Austin after his return to Dallas. “I’d wake up, and he’d be online having conversations with these kids on Skype or something,” he says. “Barrett would say, ‘I know what you’re doing!’ The other guy would be stroking his chin like he’s Dr. Claw, saying, ‘No, I know what you’re doing.’ It was nonstop cyberwar, with these dorks just dorking it out with each other. It seemed like a bunch of kids trolling each other.”

    Still, Pritchard appreciated that beneath the dorkery, Brown was involved in serious business. This was Brown’s first year as an unofficial spokesman for Anonymous, and it was eventful. The hackers were aiding the uprisings of the Arab Spring, and assaulted PayPal and credit-card companies in retaliation for their refusal to process donations to WikiLeaks. This latter action, called Operation PayBack, earned the attention of the Justice Department. In the summer of 2011, the FBI issued 35 search warrants and arrested 14 suspected hackers.

    The Trials of Bradley Manning

    By the time of the arrests, Brown’s focus had settled squarely on the nexus between government agencies, private intelligence firms and the information-security industry – known as InfoSec – contracted to build programs and technologies of surveillance, disruption and control that Brown suspected were in many cases unconstitutional. What’s more, he was as bratty as ever about it. He phoned CEOs and flacks at their homes and called them liars. He boasted about bringing the whole system down. As the first raids and arrests took place following Operation PayBack, some observers of Brown’s antics began to suspect that the court jester of Anonymous was not a very safe thing to be.

    “You could just tell it was going to end badly,” says an Anonymous member and veteran hacker. “When he really started making noise about going after these intel-contracting companies, I was like, ‘You’re going to get locked up, kid.'”

    A
    fter Operation Payback, Anonymous was on the radar of every private security firm looking to build a quick reputation. In the office of Aaron Barr, CEO of a struggling digital-security contractor called HBGary Federal, it was the biggest thing on the radar. Barr was convinced that taking down Anonymous before it struck again was a fast track to industry juice and massive contracts. In February 2011, he bragged to The Financial Times about the supersecret sleuthing techniques he had developed to get the goods on Anonymous. He claimed to know the identities of the group’s leaders. Implicit in Barr’s comments was the possibility of federal raids on those identified.

    Partly to avoid that outcome, and partly out of curiosity, an Anonymous cell hacked HBGary’s servers. They discovered that Barr’s techniques involved hanging out on major social-media sites and compiling lists of mostly innocent people. It wasn’t the only example of his staggering miscalculation: Within minutes, the hackers easily got around the firm’s security defenses, ransacking company servers, wiping Barr’s personal tablet and absconding with 70,000 internal e-mails. Stephen Colbert devoted a segment to the fiasco, based around the image of Barr sticking his penis in a hornets’ nest.

    Once the hackers who broke into HBGary’s servers discovered that Barr was basically a clown, they abandoned pursuit. “There were tens of thousands of e-mails and no one wanted to go through them,” says an Anonymous associate who observed the HBGary hack. “Everyone was like, ‘We’re not even going to dump these, because there’s no point.'”

    Brown disagreed. When the hackers posted the e-mails on a BitTorrent site, he used Project PM to organize the painstaking work of collating and connecting the dots to see what picture emerged.

    “Nobody was reading more than a couple of the e-mails before getting bored,” says the Anonymous associate. “But Barrett has this strangely addictive and journalistic kind of mind, so he could stare at those e-mails for 10 hours. He’d be sitting alone in the HBGary channel, yelling at everyone, ‘You’ve got to pay attention! Look at the crap I found!'” Brown quickly drew in some 100 volunteers to help him trawl through and make sense of the e-mails.

    The HBGary cache offered one of the fullest looks ever at how corporate-state partnerships were targeting groups they considered subversive or inimical to the interests of corporate America. The projects under consideration at HBGary ranged from cyberattacks and disinformation campaigns targeting civic groups and journalists to Weird Science-supermodel avatars built to infiltrate and disrupt left-wing and anarchist networks.

    Project PM volunteer investigator Joe Fionda remembers the disturbing thrill of uncovering HBGary’s use of a Maxim pinup to create online personas designed to spy for corporate and government clients. “I couldn’t believe how much crazy shit they were up to,” Fionda says. “My brain still feels like it’s going to explode.”

    The biggest fish flopping in Brown’s net was the story of a cluster of contractors known as Team Themis. The origins of Team Themis dated to Bank of America’s alarm over Julian Assange’s 2010 claim to possess documents that “could take down a bank or two.” The Department of Justice recommended Bank of America retain the services of the white-shoe D.C. law firm Hunton & Williams and the high-­powered intelligence contractor Booz Allen Hamilton. On behalf of Bank of America, Hunton & Williams turned to the large and growing world of InfoSec subcontractors to come up with a plan, settling on HBGary and two dataintelligence shops, Berico Technologies and Palantir Technologies.

    The Themis three were also preparing a proposal for Hunton & Williams on behalf of another client, the U.S. Chamber of Commerce. The leaked HBGary documents revealed that Themis was exploring ways of discrediting and disrupting the activities of organized labor and its allies for the Chamber. The potential money at stake in these contracts was considerable. According to Wired, the trio proposed that the Chamber create a $2-milliona-month sort of cyber special-forces team “of the kind developed and utilized by the Joint Special Operations Command.” They also suggested targeting a range of left-of-center organizations, including the SEIU, watchdog groups like U.S. Chamber Watch, and the Center for American Progress. (The Chamber of Commerce and Bank of America have denied ever hiring Team Themis or having any knowledge of the proposals.)

    In pursuit of the Chamber and Bank of America contracts, the Themis three devised multipronged campaigns amounting to a private-sector information-age COINTELPRO, the FBI’s program to infiltrate and undermine “subversive” groups between 1956 and 1971. Among the The mis ideas presented to Hunton & Williams: “Feed the fuel between the feuding groups. Disinformation. Create messages around actions to sabotage or discredit the opposing organization. Submit fake documents and then call out the error.”

    The revelations represented a triumph for Brown and his wiki. A group of Democratic congressmen asked four Republican committee chairs to hold hearings on the “deeply troubling” question of whether “tactics developed for use against terrorists may have been unleashed illegally against American citizens.” But the calls for investigation went nowhere. The lack of outrage in Washington or on influential editorial pages didn’t shock Brown, who had long ago lost hope in the politicians and pundits who are “clearly intent on killing off even this belated scrutiny into the invisible empire that so thoroughly scrutinizes us – at our own expense and to unknown ends.”

    It was Brown’s finest moment, but his relationship with Anonymous was rapidly deteriorating. By May 2011, Brown had begun turning on the network. “There’s little quality control in a movement like [Anonymous],” Brown told an interviewer. “You attract a lot of people whose interest is in fucking with video-game companies.”

    Brown’s haughty dismissal of the new crop of hacktivists was not a feeling shared by the FBI. The government continued to see Anonymous as a major and growing threat. And in the summer of 2011, it acquired a key piece in its operation to destroy the network. On the night of June 7th, four months after the HBGary hack, two federal agents visited the Jacob Riis publichousing project on Manhattan’s Lower East Side and introduced themselves to a 27-year-old unemployed hacker named Hector Monsegur, known inside Anonymous as “Sabu.” As a leader of an Anonymous offshoot called Lulzsec, he had hacked a number of state and corporate servers. In early 2011, he made some rookie errors that led the FBI to his door: Facing the prospect of being indicted on 12 counts of criminal conspiracy, Sabu rolled over on his old hacker associates. He signed a cooperation agreement and began feeding the FBI information on Anonymous plots. The biggest of these involved a private global intelligence contractor located in Barrett Brown’s backyard, the Austin-based Stratfor.

    I
    n early December 2011, a young Chicago Anon named Jeremy Hammond cracked Stratfor’s server and downloaded some 5 million internal documents. With the apparent blessing and supervision of the FBI, Sabu provided the server for Hammond to store the docs. Hammond then proceeded to release them to the public. Sifting through the data dump would require a massive coordinated effort of exactly the kind Project PM had been training for. Brown and his dedicated volunteers attacked the mountains of e-mails. “We had between 30 and 50 people involved, usually 15 at a time,” says Lauren Pespisa, the Boston Project PM volunteer who now helps organize Brown’s legaldefense fund.

    Did the Mainstream Media Fail Bradley Manning?

    After six months of work, Brown would discover what he considered the fattest spider amid the miles of Stratfor web: a San Diego-based cybersecurity firm called Cubic. As Brown followed the strings, he discovered links between Cubic and a data-mining contractor known as TrapWire, which had ties to CIA vets. Brown thought that he had stumbled on a major find illuminating new technologies for spying and surveillance, but the media pickup was not what Brown had hoped. Major dailies shrugged off the story, and Gawker and Slate poured cold water on his alarm, calling it “outlandish.” Brown responded to the criticism with a rambling, connect-the-conspiracy-dots YouTube video.

    It wasn’t just gossip sites that viewed Brown’s reading of the Stratfor docs with a skeptical eye. Even sympathetic students of intelligence contracting urged caution about interpreting the TrapWire materials. “I applaud anyone digging into this stuff, but you can’t really draw conclusions from what these contractors say in these e-mails because they’re bragging and they’re trying to land business,” says Tim Shorrock, whose 2008 book Spies for Hire first exposed the scope of the intelligence-contracting industry. “Some of the quote-unquote intelligence that Stratfor was reporting on was ludicrous. Why would an intelligence agency buy this stuff?”

    WikiLeaks Stratfor Emails: A Secret Indictment Against Julian Assange?

    Meanwhile, deeply buried in the TrapWire debate was the fact that included in the Stratfor docs were the credit-card numbers of 5,000 Stratfor clients. Brown likely did not give the numbers a second thought. But it’s these numbers that form the most serious charges against Brown. The government alleges that when Brown pasted a link in a chat room to the alreadyleaked documents, he was intentionally “transferring” data for the purpose of credit-card and identity fraud.

    “If the Pentagon Papers included creditcard info, then would The New York Times have been barred from researching them?” says Brown’s co-counsel Ghappour. “There is nothing to indicate Barrett wanted to profit from this information, or that he ever had the information in his possession. He was openly critical of such motives and disapproved of hacking for the sake of it. This was a big part of his rift with Anonymous – why he was considered a ‘moral fag’ by some.”

    The FBI raided Brown’s Dallas apartment on the morning of March 6th, 2012, three months after the Stratfor hack, and one day after Jeremy Hammond was arrested in Chicago. More than a dozen feds led by agent Robert Smith knocked down the door with warrants for Brown’s computers and seized his Xbox. Brown was staying at his mother’s house nearby. Later that morning, the agents appeared at the home of Brown’s mother with a second warrant. They found his laptop in a kitchen cabinet, and she was later charged with obstruction. Brown, who was in the shower preparing for a TV interview when the agents arrived, was not arrested. The agents left with his laptop.

    Among hacktivists, theories differ on the motive behind the FBI action. As one of the few public figures associated with Anonymous, Brown made a soft target with a potentially very valuable hard drive or two. Some say it was meant as a warning; others say Brown had simply pissed off too many powerful people, or was getting too close to something big.

    Then there is the theory, advanced by Gregg Housh, that Brown and Hammond were targeted out of frustration with a blown sting against WikiLeaks founder Julian Assange. After looking into the Stratfor hack, Housh believes that the FBI allowed the hack to proceed not in order to arrest Hammond but Assange. “The idea was to have Sabu sell the stolen Stratfor material to Assange,” says Housh. “This would give them a concrete charge that he had knowingly bought stolen material to distribute on WikiLeaks.”

    Housh believes Hammond got wind of Sabu’s plan to sell the documents to Assange and dumped them before the transaction could take place. While there is no proof of contact between Sabu and Assange, Sabu reportedly communicated with Sigurdur Thordarson, a teenage Icelandic WikiLeaks volunteer and an FBI informant.

    “Hammond had no idea what he’d done,” says Housh. “The FBI were a day away from having evidence against Assange, and Hammond screwed it up for them. That’s why they went after him so hard.”

    Yet Hammond, who led the Stratfor hack, faced only 30 years before cutting a plea deal for 10. Why is Brown facing 105?

    F
    ollowing the March raid, Brown continued his investigations and planned for the future of Project PM. 2012 was going to be a big year. He had a new nucleus of friends and colleagues in Boston, where he was going to move and live in an activist group house. His investigations increasingly took place outside the Anonymous network. Brown had new allies in groups like Telecomix, a collective that operated its own crowdsourcing investigations into the cybersurveillance industry. That summer, he visited New York for the Hackers on Planet Earth conference, an annual gathering of hackers and activists, where he met a few of his Project PM colleagues offline for the first time. “I remember he was wearing a full suit in this crazy heat, sweating profusely in the lobby of the Hotel Pennsylvania,” says Fionda. “He was still struggling with kicking heroin, he had tremors and looked like he was in a lot of pain. But he was full of energy. He was telling everyone, ‘We’re going to the center of the Earth with this story!'”

    But Brown’s mental state seemed to deteriorate during the summer of 2012. Having battled depression throughout his life, he had gone off his meds and was simultaneously struggling with cold-turkey breaks from Suboxone for heroin withdrawal. His YouTube channel documents the effects. In August, Brown posted a clip that showed him skeet-shooting over the words of Caligula’s lament: “If only all of Rome had just one neck.” In early September, as Brown planned his move to Boston, he struggled to contain his rage at the local FBI agent Robert Smith, who had raided his mother’s home and taken his beloved Xbox.

    In September, Brown uploaded a discombobulated three-part video series, the last one titled “Why I’m Going to Destroy FBI Agent Robert Smith.” In the videos, Brown struggles to maintain focus. He demands the return of his Xbox and warns that he comes from a military family that has trained him with weapons – weapons he says he’ll use to defend his home. He calls Smith a “fucking chickenshit little faggot cocksucker” before uttering the words he has since admitted were ill-considered, as well as the result of a chemically combustive mental state.

    Why Shouldn’t Freedom of the Press Apply to WikiLeaks?

    “Robert Smith’s life is over,” says Brown. “And when I say his life is over, I don’t say I’m going to go kill him, but I’m going to ruin his life and look into his fucking kids. How do you like them apples?”

    It takes a suspension of disbelief to hear a credible physical threat as defined by law. The rail-thin Brown appears a desperate, pathetic character in need of psychiatric help. A more humane FBI office might have sent a doctor rather than a car of armed agents. But the FBI didn’t send a shrink. That evening a team of armed agents stormed Brown’s apartment, threw him violently to the ground and arrested him for threatening a federal officer.

    WikiLeaks Releases ‘Beat the Blockade’ Benefit CD

    Over the next four months, federal grand juries issued three multicount indictments for obstruction and “access devicefraud” related to the Stratfor link. It is the last of these that concern civil-liberties activists and that could have a possible chilling effect. “One can’t apply the transfer provision of the statute to someone conducting research,” says Ghappour. “If cutting and pasting a link is the same as the transfer of the underlying data, then anyone on the Internet is prone to violating the Computer Fraud and Abuse Act.”

    The FBI has shown interest in expanding that theoretical “anyone” to include Brown’s circle of volunteers. In March, the bureau went hunting for the digital fingerprints of Project PM administrators with a subpoena. The action has shaken the group’s inner circle, as it was surely intended. “It was a pretext to sow discord and fear in Barrett’s project,” says Alan Ross, a U.K. investigator for Project PM. “They were desperate to bolster their case. After the subpoena, people began to worry about being monitored. I worry about my personal safety even though I acted within the confines of the law. I worry about travel.”

    Travel is one thing Brown does not have to worry about at the moment. Nor, if the government gets its way, will he have to worry about handling the media, his former specialty. In August, the prosecution requested a gag be placed on Brown and his lawyers, a move that suggests they understand the dangers of public scrutiny of the legal peculiarities of United States vs. Barrett Lancaster Brown.

    Meanwhile, Brown has not joined the prison tradition of mastering the law behind bars. Rather than study up on cyberfraud statutes, he has resumed his writing on intel contractors and the pundits who defend them. “Nobody talks to me here,” Brown says of his year in jail, “but I was pretty unsociable on the outside too.” One of the hardest things about incarceration for the atheist has been contending with his cellmates’ singing of hymns. “Prison is great for reading and for thought, until they start in with their Pentecostal nonsense,” says Brown. “It ruins everything.”

    His friends keep him supplied with articles and printouts, which lately have included material related to the Edward Snowden leak. Snowden gained access to information about secret NSA spying on private citizens while working for the intelligence subcontractor Booz Allen Hamilton, a company that had been on Brown’s radar long before most Americans learned of it in the wake of Snowden’s bombshells.

    “This is all much bigger than me,” Brown says in the visiting room. “What matters is this.” He leans over to tap his handwritten manuscript. The pages of the essay are messy on the table, and sticking out from under the pile is the last sentence on the last page. “This is the world that we accept if we continue to avert our eyes,” it says. “And it promises to get much worse.”

    This story is from the August 29th, 2013 issue of Rolling Stone.
    http://www.rollingstone.com/culture/news/barrett-brown-faces-105-years-in-jail-20130905

    by Alexander Zaitchik
    SEPTEMBER 05, 2013

    Find this story at 5 September 2013

    Copyright ©2013 Rolling Stone

    In Secret AT&T Deal, U.S. Drug Agents Given Access to 26 Years of Americans’ Phone Records

    The New York Times has revealed the Drug Enforcement Administration has an even more extensive collection of U.S. phone records than the National Security Agency. Under a secretive DEA program called the Hemisphere Project, the agency has access to records of every phone call transmitted via AT&T’s infrastructure dating back to 1987. That period covers an even longer stretch of time than the NSA’s collection of phone records, which started under President George W. Bush. Each day, some four billion call records are swept into the database, which is stored by AT&T. The U.S. government then pays for AT&T employees to station themselves inside DEA units, where they can quickly hand over records after agents obtain an administrative subpoena. The DEA says the collection allows it to catch drug dealers who frequently switch phones, but civil liberties advocates say it raises major privacy concerns. We speak with Scott Shane, national security reporter for The New York Times and co-author of the report, “Drug Agents Use Vast Phone Trove, Eclipsing NSA’s.”
    Transcript

    This is a rush transcript. Copy may not be in its final form.

    AMY GOODMAN: In a moment we’ll be talking about the death of David Frost with the director Ron Howard, but first we turn to news that one government agency has an even more extensive collection of U.S. phone records than the National Security Administration, the NSA. That agency is the Drug Enforcement Administration. In a front-page article, The New York Times has revealed a secretive operation inside the DEA called the Hemisphere Project. Under this program, the DEA has access to records of every phone call over AT&T’s network dating back to 1987. That period covers a longer stretch of time than the NSA’s collection of phone records, which began under President George W. Bush. Some four billion call records are gathered to the DEA’s database every day. It’s unclear if other major phone companies are involved.

    Unlike with the NSA, the DEA’s phone records are actually stored by AT&T. The U.S. government then pays for AT&T employees to station themselves inside DEA units, where they can quickly hand over data after agents obtain an administrative subpoena. The U.S. government says the program allows DEA agents to keep up with those in the drug trade who often switch phones. In a statement, Justice Department spokesperson Brian Fallon said that “subpoenaing drug dealers’ phone records is a bread-and-butter tactic in the course of criminal investigations” and that Hemisphere “simply streamlines the process.”

    The disclosure of the DEA’s Hemisphere program follows another major revelation involving the DEA and government surveillance. It was revealed last month a secretive DEA unit has used information taken from NSA wiretaps for cases unrelated to terrorism. The DEA has also provided classified intelligence obtained by the NSA and other sources to the Internal Revenue Service to help in their investigations of Americans.

    Well, for more, we’re joined by Scott Shane, national security reporter for The New York Times. His front-page article, co-written with Colin Moynihan, appeared in Monday’s New York Times, “Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s.”

    Welcome to Democracy Now!, Scott Shane. Explain exactly how it’s done and how you found out about this.

    SCOTT SHANE: Well, as you mentioned, I wrote this article with Colin Moynihan, a colleague at The New York Times, and he received from an activist in Washington state, named Drew Hendricks, a 27-slide PowerPoint, which was prepared by AT&T and government agents, apparently DEA or possibly other government agencies, and essentially they’re training slides to introduce folks who are going to be working on the Hemisphere Project, how it works and what it can do. And Drew Hendricks, the activist in Washington, got these slides as part of a series of public information requests. He’s sort of a peace activist out there, and he had been helping some folks with a lawsuit and just, you know, fired off a bunch of public information requests to police agencies in Washington state and other places on the West Coast. This set of slides came back with one of those requests.

    Drew Hendricks believes it may have been sent actually by accident, included by accident. And so—but, in fact, it’s unclassified. It’s marked “Law enforcement sensitive,” but it’s unclassified, and it actually states that the Hemisphere Project is unclassified. What’s kind of remarkable to us is that this has been going on for at least six years under the name Hemisphere Project, and it’s unclassified, but no one has ever learned about it. I couldn’t find a single reference to it in the Nexis database or on the web. And so, they’ve kept it very well hidden, and indeed some of the slides say, if you get information from Hemisphere, never reveal the source of the information. So, the government has kept this very, very well hidden, along with AT&T.

    AMY GOODMAN: And explain what exactly it is, what AT&T is keeping records of and how the government uses this information.

    SCOTT SHANE: AT&T operates what are called switches, through which telephone calls travel all around the country. And what AT&T does in this program is it collects all the—what are called the CDRs, the call data records, the so-called metadata from the calls that we’ve heard about in the NSA context. This is the phone number—phone numbers involved in a call, its time, its duration, and in this case it’s also the location. Some are cellphone calls; some are land line calls. Anything that travels through an AT&T switch, even if it’s not made by an AT&T customer—for example, if you’re using your T-Mobile cellphone but your call travels through an AT&T switch somewhere in the country, it will be picked up by this project and dumped into this database. So AT&T collects the information on all these calls, basically who called who when all over the country. And as you mentioned, there is a slide that says four billion—with a B—call data records are added to the database every day. I’m told by some technical experts that it’s possible one call can create more than one call data record. Apparently, if a cellphone, for example, in a moving car switches from one tower to another, that could be another record, so—because those numbers sound pretty high, 12—you know, maybe 12 or so calls per American per day.

    But anyway, all that call data goes into this giant database, and then when a drug agent at one of three centers around the country—in Los Angeles, Houston and Atlanta—finds a number of interest, they can ask the AT&T person sitting next to them, “Check this out.” The AT&T person accesses the database, the Hemisphere database, and they can come back with a record of, you know, “Here’s the other numbers called by this number, the number you’re interested in,” and when and where, in many cases, and then they can follow up.

    I should say that in order to access the database, the government says that the agent asking AT&T to make the search has to produce at least what’s called an administrative subpoena, which is essentially a form, a DEA form, not approved by a court or by a judge, but simply a DEA form saying, you know, here’s why we’re interested in this number. So there’s no judicial oversight, but it is—these administrative subpoenas are used routinely in a criminal investigation. So the government’s side of the story is that this is no different from kind of routine criminal investigation that happens every day.

    AMY GOODMAN: Scott Shane, very quickly, my final question is about the issue of privacy. What does this raise for Americans?

    SCOTT SHANE: Well, I think what it shows is that, apart from the program we’ve learned about with the NSA in recent months, there are many other programs that the government has, many of them related to law enforcement as well as to intelligence gathering, and also that the government works extremely closely with some telecommunications and Internet companies, sometimes using court orders but often using voluntary arrangements like this one, and often paying the companies to participate, so that the universe of data that’s gathered and has implications for American privacy goes way beyond any one agency or even beyond the government itself into the corporate sector.

    AMY GOODMAN: Scott Shane, I want to thank you for being with us, national security reporter for The New York Times. We’ll link to your front-page article yesterday, “Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s.”

    Tuesday, September 3, 2013

    Find this story at 3 September 2013

    The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.

    DEA has more extensive domestic phone surveillance op than NSA

    For at least six years, US anti-drug agents have used subpoenas to routinely gain access to an enormous AT&T database. It’s an intrusion greater in scale and longevity than the NSA’s collection of phone calls, revealed by Edward Snowden’s leaks.

    As part of the secret Hemisphere Project the government has been paying AT&T to place its employees in drug-fighting units around the country, the New York Times reports.

    The US’s largest telecoms operator has been supplying phone data to the Drug Enforcement Administration since 1987.

    The project covers every call that passes through an AT&T switch, including those made by clients of other operators, with some four billion call records added to the database on a daily basis.

    And, unlike the much debated NSA data, the Hemisphere data includes information on the location of those, making the calls.

    The New York Times found out about the surveillance program after it received slides, describing the Hemisphere Project, from peace activist, Drew Hendricks.

    The activist said he was sent the PowerPoint presentation – which is unclassified, but marked “Law enforcement sensitive” – in response to a series of public information requests to West Coast police agencies.

    The slides revealed that the program was launched back in 2007 and has been carried out in great secrecy since then.

    “All requestors are instructed to never refer to Hemisphere in any official document,” one of the slides said.

    The paper performed a search of the Nexis database, but found no reference to the program in news reports or Congressional hearings.

    The US administration has acknowledged that Hemisphere is operational in three states, adding that the project employed routine investigative procedures used in criminal cases for decades and posed no novel privacy issues.

    Justice Department spokesman, Brian Fallon, stressed that it’s crucial that the phone data is stored by AT&T, and not by the government like in the NSA case. It has requested phone numbers of interest mainly using what are called “administrative subpoenas,” those issued not by a grand jury or a judge, but by a federal agency, the DEA.

    According to the spokesman, Hemisphere proved especially effective in finding criminals, who frequently discard their cellphones in order to avoid being tracked by polices.

    “Subpoenaing drug dealers’ phone records is a bread-and-butter tactic in the course of criminal investigations,” he said in a statement.

    The 27-slide PowerPoint presentation highlights several cases, in which Hemisphere solved big crimes, with not all of them being drug-related.

    For example, this March it found the new phone number and location of a man, who impersonated a general at a San Diego Navy base and then ran over a Navy intelligence agent.

    In 2011, Hemisphere tracked Seattle drug dealers, who were rotating prepaid phones, leading to the seizure of 136 kilos of cocaine and $2.2 million.

    AT&T spokesman, Mark A. Siegel, declined to answer detailed questions on Hemisphere, only saying that AT&T “like all other companies, must respond to valid subpoenas issued by law enforcement.”

    Representatives from Verizon, Sprint and T-Mobile all declined to comment when asked by the New York Times whether their companies participated in Hemisphere or any other similar programs.

    An undisclosed federal law enforcement official told the paper the Hemisphere Project was “singular” and that he knew of no comparable program involving other phone companies.

    It’s not the first time AT&T has been involved in federal surveillance programs, the company operated a telecommunication interception facility for the NSA between 2003 and 2006.

    Published time: September 02, 2013 23:41
    Edited time: September 04, 2013 09:04

    Find this story at 4 September 2013

    © Autonomous Nonprofit Organization “TV-Novosti”, 2005–2013.

    Drug Agents Use Vast Phone Trove, Eclipsing N.S.A.’s

    For at least six years, law enforcement officials working on a counternarcotics program have had routine access, using subpoenas, to an enormous AT&T database that contains the records of decades of Americans’ phone calls — parallel to but covering a far longer time than the National Security Agency’s hotly disputed collection of phone call logs.

    The Hemisphere Project, a partnership between federal and local drug officials and AT&T that has not previously been reported, involves an extremely close association between the government and the telecommunications giant.

    The government pays AT&T to place its employees in drug-fighting units around the country. Those employees sit alongside Drug Enforcement Administration agents and local detectives and supply them with the phone data from as far back as 1987.

    The project comes to light at a time of vigorous public debate over the proper limits on government surveillance and on the relationship between government agencies and communications companies. It offers the most significant look to date at the use of such large-scale data for law enforcement, rather than for national security.

    The scale and longevity of the data storage appears to be unmatched by other government programs, including the N.S.A.’s gathering of phone call logs under the Patriot Act. The N.S.A. stores the data for nearly all calls in the United States, including phone numbers and time and duration of calls, for five years.

    Hemisphere covers every call that passes through an AT&T switch — not just those made by AT&T customers — and includes calls dating back 26 years, according to Hemisphere training slides bearing the logo of the White House Office of National Drug Control Policy. Some four billion call records are added to the database every day, the slides say; technical specialists say a single call may generate more than one record. Unlike the N.S.A. data, the Hemisphere data includes information on the locations of callers.

    The slides were given to The New York Times by Drew Hendricks, a peace activist in Port Hadlock, Wash. He said he had received the PowerPoint presentation, which is unclassified but marked “Law enforcement sensitive,” in response to a series of public information requests to West Coast police agencies.

    The program was started in 2007, according to the slides, and has been carried out in great secrecy.

    “All requestors are instructed to never refer to Hemisphere in any official document,” one slide says. A search of the Nexis database found no reference to the program in news reports or Congressional hearings.

    The Obama administration acknowledged the extraordinary scale of the Hemisphere database and the unusual embedding of AT&T employees in government drug units in three states.

    But they said the project, which has proved especially useful in finding criminals who discard cellphones frequently to thwart government tracking, employed routine investigative procedures used in criminal cases for decades and posed no novel privacy issues.

    Crucially, they said, the phone data is stored by AT&T, and not by the government as in the N.S.A. program. It is queried for phone numbers of interest mainly using what are called “administrative subpoenas,” those issued not by a grand jury or a judge but by a federal agency, in this case the D.E.A.

    Brian Fallon, a Justice Department spokesman, said in a statement that “subpoenaing drug dealers’ phone records is a bread-and-butter tactic in the course of criminal investigations.”

    Mr. Fallon said that “the records are maintained at all times by the phone company, not the government,” and that Hemisphere “simply streamlines the process of serving the subpoena to the phone company so law enforcement can quickly keep up with drug dealers when they switch phone numbers to try to avoid detection.”

    He said that the program was paid for by the D.E.A. and the White House drug policy office but that the cost was not immediately available.

    Officials said four AT&T employees are now working in what is called the High Intensity Drug Trafficking Area program, which brings together D.E.A. and local investigators — two in the program’s Atlanta office and one each in Houston and Los Angeles.

    Daniel C. Richman, a law professor at Columbia, said he sympathized with the government’s argument that it needs such voluminous data to catch criminals in the era of disposable cellphones.

    “Is this a massive change in the way the government operates? No,” said Mr. Richman, who worked as a federal drug prosecutor in Manhattan in the early 1990s. “Actually you could say that it’s a desperate effort by the government to catch up.”

    But Mr. Richman said the program at least touched on an unresolved Fourth Amendment question: whether mere government possession of huge amounts of private data, rather than its actual use, may trespass on the amendment’s requirement that searches be “reasonable.” Even though the data resides with AT&T, the deep interest and involvement of the government in its storage may raise constitutional issues, he said.

    Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said the 27-slide PowerPoint presentation, evidently updated this year to train AT&T employees for the program, “certainly raises profound privacy concerns.”

    “I’d speculate that one reason for the secrecy of the program is that it would be very hard to justify it to the public or the courts,” he said.

    Mr. Jaffer said that while the database remained in AT&T’s possession, “the integration of government agents into the process means there are serious Fourth Amendment concerns.”

    Mr. Hendricks filed the public records requests while assisting other activists who have filed a federal lawsuit saying that a civilian intelligence analyst at an Army base near Tacoma infiltrated and spied on antiwar groups. (Federal officials confirmed that the slides are authentic.)

    Mark A. Siegel, a spokesman for AT&T, declined to answer more than a dozen detailed questions, including ones about what percentage of phone calls made in the United States were covered by Hemisphere, the size of the Hemisphere database, whether the AT&T employees working on Hemisphere had security clearances and whether the company has conducted any legal review of the program

    “While we cannot comment on any particular matter, we, like all other companies, must respond to valid subpoenas issued by law enforcement,” Mr. Siegel wrote in an e-mail.

    Representatives from Verizon, Sprint and T-Mobile all declined to comment on Sunday in response to questions about whether their companies were aware of Hemisphere or participated in that program or similar ones. A federal law enforcement official said that the Hemisphere Project was “singular” and that he knew of no comparable program involving other phone companies.

    The PowerPoint slides outline several “success stories” highlighting the program’s achievements and showing that it is used in investigating a range of crimes, not just drug violations. The slides emphasize the program’s value in tracing suspects who use replacement phones, sometimes called “burner” phones, who switch phone numbers or who are otherwise difficult to locate or identify.

    In March 2013, for instance, Hemisphere found the new phone number and location of a man who impersonated a general at a San Diego Navy base and then ran over a Navy intelligence agent. A month earlier the program helped catch a South Carolina woman who had made a series of bomb threats.

    And in Seattle in 2011, the document says, Hemisphere tracked drug dealers who were rotating prepaid phones, leading to the seizure of 136 kilos of cocaine and $2.2 million.

    September 1, 2013
    By SCOTT SHANE and COLIN MOYNIHAN

    Find this story at 1 September 2013

    © 2013 The New York Times Company

    Release of DEA Agent Kiki Camarena’s “Murderer” Is Game Changer for CIA

    Narco-Trafficker Rafael Caro Quintero Knows Where All the Skeletons Are Buried in the US’ Dirty Drug War

    The recent release from a Mexican prison of Rafael Caro Quintero — a godfather in Mexico’s narco-trafficking world — rips a scab off a long metastasizing tumor in the US drug war.

    A Mexican federal court on Friday, Aug. 9, overturned Caro Quintero’s 40-year sentence after 28 years served because, the court contends, he was tried wrongly in a federal court for a state offense. Caro Quintero was convicted of orchestrating the brutal torture and murder of US DEA agent Enrique “Kiki” Camarena — who was abducted on Feb. 7, 1985, after leaving the US Consulate in Guadalajara, Mexico, to meet his wife for lunch. His body was found several weeks later buried in a shallow grave some 70 miles north of Guadalajara.

    Caro Quintero’s release from prison brings to the surface once again some longstanding, unsettled questions about the US government’s role in the war on drugs. The recent mainstream media coverage of Caro Quintero’s release has focused, in the main, on the shock and anger of US officials — who are now waving the Camarena case in the public arena like a bloody flag, arguing his honor, and that of the nation’s, must be avenged in the wake of Mexico’s affront in allowing Caro Quintero to walk free.

    What is not being discussed is the US government’s complicity in Caro Quintero’s narco-trafficking business, and, yes, even in the Camarena’s gruesome murder.

    Breaking It Down

    In his definitive book about the US drug war, titled “Down by the River,” journalist Charles Bowden reveals that DEA special agent Camarena spent some time in Mexico with another DEA agent, Phil Jordan, in May 1984, prior to Camarena’s abduction. Jordan, at the time, pointed out to Camarena that they were being followed.

    Camarena replied calmly that the individuals who were tailing them worked for Mexico’s intelligence service, the Federal Security Directorate, or DFS in its Spanish initials.

    From Bowden’s book:

    Camarena brushes off Jordan’s alarm by noting that DFS is trained by the CIA and is functionally a unit in their mysterious work. And he says they are also functionally “the eyes and ears of the cartels.”

    That is a stunning revelation, that the CIA and DFS were “functionally” working in unison and simultaneously the DFS also was in league with Mexico’s narco-traffickers — which at the time included Caro Quintero along with his partners Miguel Angel Felix Gallardo and Ernesto Fonseca Carrillo, considered the top dogs in Mexico’s then-dominate drug organization, The Guadalajara Cartel.

    In fact, the DFS also was accused of being complicit in the kidnapping and murder of Camarena and the subsequent attempt to provide protection to Caro Quintero — who was eventually apprehended in Costa Rica after allegedly getting to that country with the help of the DFS.

    Caro Quintero and Fonseca Carrillo were eventually convicted and jailed for their roles in Camarena’s murder and the killing of his pilot, Alfrado Zavala Avelar. Each was sentenced to serve 40 years in a Mexican prison. Caro Quintero was 37 at the time.

    But Camarena was not the only victim of DFS corruption during that era. A famous Mexican journalist, Manuel Buendia, who in the mid-1980s was investigating the connections between corrupt Mexican officials and narco-traffickers, including Caro Quintero, was murdered in 1984 allegedly with the assistance of DFS’ leadership.

    A story by noted Mexican newspaper columnist Carlos Ramirez, translated and published by Narco News in 2000, describes the circumstances surrounding Buendia’s murder as follows:

    Buendía was assassinated on May 30, 1984, on a street near the Zona Rosa of México City. The investigation was covered-up by the Federal Security Agency [DFS]. The last investigations undertaken by Buendía into drug trafficking led him into the rural indigenous areas of the country. Buendía had responded to a newspaper ad by the Catholic bishops in the south of the country where they denounced the penetration of the narco in rural Mexico but also the complicity of the Army and police corps.

    Buendía did not finish his investigation. His assassination came almost a year before… the assassination of US anti-drug agent Enrique Camarena Salazar in Guadalajara had exposed the penetration of drug traffickers in the Mexican police.

    … Agents of the the Political and Social Investigations Agency and of the Federal Security Agency were discovered as protectors of drug trafficking in México. The Attorney General of the Republic, in the investigation of the assassination of Camarena, found credentials of the Federal Security police in the name of drug traffickers. Caro Quintero escaped to Costa Rica using a credential of the Federal Security Agency [DFS] with his photo but with another name. ….

    That which Buendía was investigating months before was confirmed by the assassination of Camerena, a DEA agent assigned to the US Consulate in Guadalajara. …

    Documents

    The DFS was disbanded in 1985, after Camarena’s murder, and integrated into Mexico’s version of the CIA, called CISEN in its Spanish initials. CISEN still works closely with US agencies and officials, including the CIA, but it is the legacy of DFS and its partnership with the CIA that is being brought to the surface once again with the recent release of Caro Quintero.

    In particular, a DEA Report of Investigation, prepared in February 1990 and obtained by Narco News, provides some detailed insight into the DFS/CIA connection. The DEA report was referenced in media coverage of the US trial of four individuals accused of playing a role in Camarena’s murder.

    From a July 5, 1990, report in the Los Angeles Times:

    The [DEA] report is based on an interview two Los-Angeles based DEA agents conducted with Laurence Victor Harrison, a shadowy figure who, according to court testimony, ran a sophisticated communications network for major Mexican drug traffickers and their allies in Mexican law enforcement in the early and mid 1980s.

    On Feb. 9, according to the report, Harrison told DEA agents Hector Berrellez and Wayne Schmidt that the CIA used Mexico’s Federal Security Directorate (DFS) “as a cover, in the event any questions were raised as to who was running the training operation.”

    That training operation, according to the DEA Report of Investigation, involved “Guatemalan Guerrillas” who “were training at a ranch owned by Rafael Caro-Quintero” in Veracruz on Mexico’s East Coast.

    More from the DEA report:

    The operations/training at the camp were conducted by the American CIA, using the DFS as cover, in the event any questions were raised as to who was running the [camp].

    …. Representatives of the DFS, which was the front for the training camp were in fact acting in consort with major drug overlords to insure a flow of narcotics through Mexico and into the United States.

    … Using the DFS as cover, the CIA established and maintained clandestine airfields to refuel aircraft loaded with weapons, which were destined for Honduras and Nicaragua.

    Pilots of these aircrafts would allegedly load up with cocaine in Barranquilla, Colombia, and in route to Miami, Florida, refuel in Mexico at narcotic trafficker operated and CIA maintained airstrips.

    Tosh Plumlee was one of the CIA contract pilots flying drug loads into the US at the time. Plumlee told Narco News that among the places where his aircraft landed while working these missions was the Caro Quintero-owned ranch in Veracruz, Mexico.

    “I was flying sanctioned operations transporting cocaine out of Colombia and into the United States,” Plumlee says. “[DEA agent Kiki] Camarena knew all about those operations.”

    Plumlee attempted to blow the whistle on the arms-and-drugs transshipment operations in the early 1980s, prior to Camarena’s death.

    The following excerpts are from a February 1991 letter written by former US Sen. Gary Hart and sent to US Sen. John Kerry, then chairman of the Subcommittee on Terrorism, Narcotics and International Communications.

    In March of 1983, Plumlee contacted my Denver Senate Office and met with Mr. Bill Holen of my Senate Staff. During the initial meeting, Mr. Plumlee raised certain allegations concerning U.S. foreign and military policy toward Nicaragua and the use of covert activities by U.S. Intelligence agencies.

    … Mr. Plumlee also stated that Mexico, Costa Rica, Guatemala and El Salvador were providing U.S. military personnel access to secret landing field and various staging areas scattered throughout Central America.

    He specifically cited the Mexican government’s direct knowledge of illegal arms shipments and narcotic smuggling activities that were taking place out of a civilian ranch in the Veracruz area which were under the control and sponsorship of Rafael Caro-Quintero and the Luis Jorge Ochoa branch of the Medellin Escobar Cartel.

    … Mr. Plumlee raised several issues including that covert U.S. intelligence agencies were directly involved in the smuggling and distribution of drugs to raise funds for covert military operations against the government of Nicaragua. …

    Heads in the Sand

    Even prior to Caro Quintero’s surprise prison release on Aug. 9, it appears he was being allowed to carry out his narco-business from a comfortable jailhouse condo with little interference from authorities in Mexico. As evidence of that fact, in June of this year DEA announced that the US Department of the Treasury had “designated 18 individuals and 15 [business] entities” as being linked to Rafael Caro Quintero.

    “Today’s action,” the DEA press release states, “pursuant to the Kingpin Act, generally prohibits US persons from conducting financial or commercial transactions with these designees, and also freezes any assets they may have under US jurisdiction.”

    In other words, the US government is alleging that even while he was incarcerated, Caro Quintero continued to run his drug empire through third parties who were laundering millions of dollars in ill-gotten gains on his behalf.

    How is that possible, unless Caro Quintero continues to have extremely good connections within the Mexican government that have an interest in assuring his drug money is laundered?

    If that’s the case, why would those same government officials have any interest in extraditing him to the US to stand trial?

    Similarly, why would those with any real juice in the US government want to put Caro Quintero on trial, at least in an open court, if he has the knowledge to expose corrupt covert US operations that played a role in the murder of a US DEA agent?

    The only way to hide that complicity would be to shield Caro Quintero’s trial from public view under a national-security cloak — even though the charges against him are criminal in nature (drug-trafficking and murder) and should not implicate national security. As further evidence of that fact, the CIA has already told the media that the allegations about the Agency’s involvement in Caro Quintero’s Veracruz ranch are bogus.

    ”The whole story is nonsense,” CIA spokesman Mark Mansfield told the Associated Press in 1990. ”We have not trained Guatemalan guerrillas on that ranch or anywhere else.”

    But its worth noting that since the CIA issued that statement, a UN-sponsored truth commission found that the US, through agencies like the CIA, did play a role in training the death squads responsible for murdering or disappearing some 200,000 Guatemalans – most of them civilians – during the course of that nation’s bloody 34-year civil war. Some 626 massacres played out in the 1980s alone, when the CIA-sponsored Veracruz, Mexico, “Guatemalan Guerrilas” training operation was allegedly underway.

    From a 1999 Washington Post story on the truth commission’s findings:

    … The commission found that the “government of the United States, through various agencies including the CIA, provided direct and indirect support for some state operations.”

    … Documenting the atrocities, the report found the army “completely exterminated Mayan communities, destroyed their dwellings, livestock and crops” and said that in the northern part of the country, where the Mayan population is largest, the army carried out a systematic campaign of “genocide.”

    Given that backdrop, it appears Caro Quintero, now 61, is clearly a man who may well know too much about US national security operations.

    The DEA issued a statement after Caro Quintero was ordered released from prison, making it clear, at least from a public-relations perspective, that the agency still very much wants to track him down and put him behind bars in the US.

    The Drug Enforcement Administration is deeply troubled to learn of the decision by a Mexican court to release infamous drug trafficker Rafael Caro-Quintero from a Mexican prison. Caro-Quintero had been serving a 40 year prison sentence in connection with the kidnapping, torture and murder of DEA Special Agent Enrique “Kiki” Camarena in February 1985.

    Caro-Quintero was the mastermind and organizer of this atrocious act. We are reminded every day of the ultimate sacrifice paid by Special Agent Camarena and DEA will vigorously continue its efforts to ensure Caro-Quintero faces charges in the United States for the crimes he committed.

    But why stop with Caro Quintero? Why not go after everyone who had a hand in the drug-war corruption that led to Camarena’s death? Why isn’t DEA clamoring for that outcome?

    I think we all know the answer to that question. And you can bet Caro Quintero does as well, and will do everything in is power to assure he isn’t held up as the lone scapegoat in some drug-war fairy tale.

    So what are our drug-war warriors to do when faced with such a house of mirrors? Well, that’s what rival narco-traffickers and shadowy intelligence-agency assets are used for in the Big Game, no?

    Posted by Bill Conroy – August 10, 2013 at 10:17 pm

    Find this story at 10 August 2013

    Our Policy on Comment Submissions: Co-publishers of Narco News (which includes The Narcosphere and The Field) may post comments without moderation. A ll co-publishers comment under their real name, have contributed resources or volunteer labor to this project, have filled out this application and agreed to some simple guidelines about commenting.

    Narco News has recently opened its comments section for submissions to moderated comments (that’s this box, here) by everybody else. More than 95 percent of all submitted comments are typically approved, because they are on-topic, coherent, don’t spread false claims or rumors, don’t gratuitously insult other commenters, and don’t engage in commerce, spam or otherwise hijack the thread. Narco News reserves the right to reject any comment for any reason, so, especially if you choose to comment anonymously, the burden is on you to make your comment interesting and relev ant. That said, as you can see, hundreds of comments are approved each week here. Good luck in your comment submission!

    The NSA-DEA police state tango; This week’s DEA bombshell shows us how the drug war and the terror war have poisoned our justice system

    So the paranoid hippie pot dealer you knew in college was right all along: The feds really were after him. In the latest post-Snowden bombshell about the extent and consequences of government spying, we learned from Reuters reporters this week that a secret branch of the DEA called the Special Operations Division – so secret that nearly everything about it is classified, including the size of its budget and the location of its office — has been using the immense pools of data collected by the NSA, CIA, FBI and other intelligence agencies to go after American citizens for ordinary drug crimes. Law enforcement agencies, meanwhile, have been coached to conceal the existence of the program and the source of the information by creating what’s called a “parallel construction,” a fake or misleading trail of evidence. So no one in the court system – not the defendant or the defense attorney, not even the prosecutor or the judge – can ever trace the case back to its true origins.

    On one hand, we all knew more revelations were coming, and the idea that the government would go after drug suspects with the same dubious extrajudicial methods used to pursue terrorism suspects is a classic and not terribly surprising example of mission creep. Both groups have been held up as bogeymen for years, in order to scare the public into accepting ever nastier and more repressive laws. This gives government officials another chance to talk to us in their stern grown-up voices about how this isn’t civics class, and sometimes they have to bend the rules to catch Really Bad People.

    On the other hand, this is a genuinely sinister turn of events with a whiff of science-fiction nightmare, one that has sounded loud alarm bells for many people in the mainstream legal world. Nancy Gertner, a Harvard Law professor who spent 18 years as a federal judge and cannot be accused of being a radical, told Reuters she finds the DEA story more troubling than anything in Edward Snowden’s NSA leaks. It’s the first clear evidence that the “special rules” and disregard for constitutional law that have characterized the hunt for so-called terrorists have crept into the domestic criminal justice system on a significant scale. “It sounds like they are phonying up investigations,” she said. Maybe this is how a police state comes to America: Not with a bang, but with a parallel construction.

    By Andrew O’Hehir
    Saturday, Aug 10, 2013 06:30 PM +0200

    Find this story at 10 August 2013

    Copyright © 2013 Salon Media Group, Inc.

    Exclusive: IRS manual detailed DEA’s use of hidden intel evidence

    WASHINGTON (Reuters) – Details of a U.S. Drug Enforcement Administration program that feeds tips to federal agents and then instructs them to alter the investigative trail were published in a manual used by agents of the Internal Revenue Service for two years.

    The practice of recreating the investigative trail, highly criticized by former prosecutors and defense lawyers after Reuters reported it this week, is now under review by the Justice Department. Two high-profile Republicans have also raised questions about the procedure.

    A 350-word entry in the Internal Revenue Manual instructed agents of the U.S. tax agency to omit any reference to tips supplied by the DEA’s Special Operations Division, especially from affidavits, court proceedings or investigative files. The entry was published and posted online in 2005 and 2006, and was removed in early 2007. The IRS is among two dozen arms of the government working with the Special Operations Division, including the Federal Bureau of Investigation, the National Security Agency and the Central Intelligence Agency.

    An IRS spokesman had no comment on the entry or on why it was removed from the manual. Reuters recovered the previous editions from the archives of the Westlaw legal database, which is owned by Thomson Reuters Corp, the parent of this news agency.

    As Reuters reported Monday, the Special Operations Division of the DEA funnels information from overseas NSA intercepts, domestic wiretaps, informants and a large DEA database of telephone records to authorities nationwide to help them launch criminal investigations of Americans. The DEA phone database is distinct from a NSA database disclosed by former NSA contractor Edward Snowden.

    Monday’s Reuters report cited internal government documents that show that law enforcement agents have been trained to conceal how such investigations truly begin – to “recreate” the investigative trail to effectively cover up the original source of the information.

    DEA officials said the practice is legal and has been in near-daily use since the 1990s. They have said that its purpose is to protect sources and methods, not to withhold evidence.

    NEW DETAIL

    Defense attorneys and some former judges and prosecutors say that systematically hiding potential evidence from defendants violates the U.S. Constitution. According to documents and interviews, agents use a procedure they call “parallel construction” to recreate the investigative trail, stating in affidavits or in court, for example, that an investigation began with a traffic infraction rather than an SOD tip.

    The IRS document offers further detail on the parallel construction program.

    “Special Operations Division has the ability to collect, collate, analyze, evaluate, and disseminate information and intelligence derived from worldwide multi-agency sources, including classified projects,” the IRS document says. “SOD converts extremely sensitive information into usable leads and tips which are then passed to the field offices for real-time enforcement activity against major international drug trafficking organizations.”

    The 2005 IRS document focuses on SOD tips that are classified and notes that the Justice Department “closely guards the information provided by SOD with strict oversight.” While the IRS document says that SOD information may only be used for drug investigations, DEA officials said the SOD role has recently expanded to organized crime and money laundering.

    According to the document, IRS agents are directed to use the tips to find new, “independent” evidence: “Usable information regarding these leads must be developed from such independent sources as investigative files, subscriber and toll requests, physical surveillance, wire intercepts, and confidential source information. Information obtained from SOD in response to a search or query request cannot be used directly in any investigation (i.e. cannot be used in affidavits, court proceedings or maintained in investigative files).”

    The IRS document makes no reference to SOD’s sources of information, which include a large DEA telephone and Internet database.

    CONCERN IN CONGRESS

    House Intelligence Committee Chairman Mike Rogers, R-Michigan, expressed concern with the concept of parallel construction as a method to hide the origin of an investigation. His comments came on the Mike Huckabee Show radio program.

    “If they’re recreating a trail, that’s wrong and we’re going to have to do something about it,” said Rogers, a former FBI agent. “We’re working with the DEA and intelligence organizations to try to find out exactly what that story is.”

    Spokespeople for the DEA and the Department of Justice declined to comment.

    Sen. Rand Paul, R-Kentucky, a member of the Homeland Security and Government Affairs Committee, said he was troubled that DEA agents have been “trying to cover up a program that investigates Americans.”

    “National security is one of government’s most important functions. So is protecting individual liberty,” Paul said. “If the Constitution still has any sway, a government that is constantly overreaching on security while completely neglecting liberty is in grave violation of our founding doctrine.”

    Officials have stressed that the NSA and DEA telephone databases are distinct. The NSA database, disclosed by Snowden, includes data about every telephone call placed inside the United States. An NSA official said that database is not used for domestic criminal law enforcement.

    The DEA database, called DICE, consists largely of phone log and Internet data gathered legally by the DEA through subpoenas, arrests and search warrants nationwide. DICE includes about 1 billion records, and they are kept for about a year and then purged, DEA officials said.

    (Research by Hilary Shroyer of West, a Thomson Reuters business. Additional reporting by David Lawder. Edited by Michael Williams)

    © Thomson Reuters 2011. All rights reserved. Users may download and print extracts of content from this website for their own personal and non-commercial use only. Republication or redistribution of Thomson Reuters content, including by framing or similar means, is expressly prohibited without the prior written consent of Thomson Reuters. Thomson Reuters and its logo are registered trademarks or trademarks of the Thomson Reuters group of companies around the world.

    Thomson Reuters journalists are subject to an Editorial Handbook which requires fair presentation and disclosure of relevant interests.

    Wed, Aug 7 2013
    By John Shiffman and David Ingram

    Find this story at 7 August 2013

    © Thomson Reuters

    DEA and NSA Team Up to Share Intelligence, Leading to Secret Use of Surveillance in Ordinary Investigations

    UPDATE: Add the IRS to the list of federal agencies obtaining information from NSA surveillance. Reuters reports that the IRS got intelligence tips from DEA’s secret unit (SOD) and were also told to cover up the source of that information by coming up with their own independent leads to recreate the information obtained from SOD. So that makes two levels of deception: SOD hiding the fact it got intelligence from the NSA and the IRS hiding the fact it got information from SOD. Even worse, there’s a suggestion that the Justice Department (DOJ) “closely guards the information provided by SOD with strict oversight,” shedding doubt into the effectiveness of DOJ earlier announced efforts to investigate the program.

    A startling new Reuters story shows one of the biggest dangers of the surveillance state: the unquenchable thirst for access to the NSA’s trove of information by other law enforcement agencies.

    As the NSA scoops up phone records and other forms of electronic evidence while investigating national security and terrorism leads, they turn over “tips” to a division of the Drug Enforcement Agency (“DEA”) known as the Special Operations Division (“SOD”). FISA surveillance was originally supposed to be used only in certain specific, authorized national security investigations, but information sharing rules implemented after 9/11 allows the NSA to hand over information to traditional domestic law-enforcement agencies, without any connection to terrorism or national security investigations.

    But instead of being truthful with criminal defendants, judges, and even prosecutors about where the information came from, DEA agents are reportedly obscuring the source of these tips. For example, a law enforcement agent could receive a tip from SOD—which SOD, in turn, got from the NSA—to look for a specific car at a certain place. But instead of relying solely on that tip, the agent would be instructed to find his or her own reason to stop and search the car. Agents are directed to keep SOD under wraps and not mention it in “investigative reports, affidavits, discussions with prosecutors and courtroom testimony,” according to Reuters.

    “Parallel construction” is really intelligence laundering

    The government calls the practice “parallel construction,” but deciphering their double speak, the practice should really be known as “intelligence laundering.” This deception and dishonesty raises a host of serious legal problems.

    First, the SOD’s insulation from even judges and prosecutors stops federal courts from assessing the constitutionality of the government’s surveillance practices. Last year, Solicitor General Donald Verilli told the Supreme Court that a group of lawyers, journalists and human rights advocates who regularly communicate with targets of NSA wiretapping under the FISA Amendments Act (FAA) had no standing to challenge the constitutionality of that surveillance. But Verrilli said that if the government wanted to use FAA evidence in a criminal prosecution, the source of the information would have to be disclosed. When the Supreme Court eventually ruled in the government’s favor, finding the plaintiffs had no standing, it justified its holding by noting the government’s concession that it would inform litigants when FAA evidence was being used against them.

    Although the government has been initially slow to follow up on Verrilli’s promises, it has begrudgingly acknowledged its obligation to disclose when it uses the FAA to obtain evidence against criminal defendants. Just last week DOJ informed a federal court in Miami that it was required to disclose when FAA evidence was used to build a terrorism case against a criminal defendant.

    Terrorism cases make up a very small portion of the total number of criminal cases brought by the federal government, counting for just 0.4 percent of all criminal cases brought by all U.S. Attorney offices across the country in 2012. Drug cases, on the other hand, made up 20 percent of all federal criminal cases filed in 2012, the second most prosecuted type of crime after immigration cases. If the government acknowledges it has to disclose when FAA evidence has been used to make a drug case—even if it’s a tip leading to a pretextual traffic stop—the number of challenges to FAA evidence will increase dramatically.

    SOD bypasses the Constitution

    Even beyond the larger systemic problem of insulating NSA surveillance from judicial review, criminal defendants whose arrest or case is built upon FISA evidence are now deprived of their right to examine and challenge the evidence used against them.

    Taken together, the Fifth and Sixth Amendments guarantee a criminal defendant a meaningful opportunity to present a defense and challenge the government’s case. But this intelligence laundering deprives defendants of these important constitutional protections. It makes it harder for prosecutors to comply with their ethical obligation under Brady v. Maryland to disclose any exculpatory or favorable evidence to the defense—an obligation that extends to disclosing evidence bearing on the reliability of a government witness. Hiding the source of information used by the government to initiate an investigation or make an arrest means defendants are deprived of the opportunity to challenge the accuracy or veracity of the government’s investigation, let alone seek out favorable evidence in the government’s possession.

    Courts must have all the facts

    The third major legal problem is that the practice suggests DEA agents are misleading the courts. Wiretaps, search warrants, and other forms of surveillance authorizations require law enforcement to go to a judge and lay out the facts that support the request. The court’s function is to scrutinize the facts to determine the appropriate legal standard has been met based on truthful, reliable evidence. So, for example, if the government is using evidence gathered from an informant to support its request for a search warrant, it has to establish to the court that the informant is reliable and trustworthy so that the court can be convinced there is probable cause to support the search. But when law enforcement omits integral facts—like the source of a tip used to make an arrest—the court is deprived of the opportunity to fulfill its traditional role and searches are signed off without the full knowledge of the court.

    Ultimately, if you build it, they will come. There’s no doubt that once word got out about the breadth of data the NSA was collecting and storing, other law enforcement agencies would want to get their hands in the digital cookie jar. In fact, the New York Times reported on Sunday that other agencies have tried to get information from the NSA to “curb drug trafficking, cyberattacks, money laundering, counterfeiting and even copyright infringement.”

    Teaming up to play fast and loose with criminal defendants and the court, the DEA and NSA have made a mockery of the rule of law and the legal frameworks intended to curb abuses.

    August 6, 2013 | By Hanni Fakhoury

    Find this story at 6 August 2013

    © www.eff.org

    A Domestic Surveillance Scandal at the DEA? Agents Urged to Cover Up Use of NSA Intel in Drug Probes

    The U.S. Department of Justice has begun reviewing a controversial unit inside the Drug Enforcement Administration that uses secret domestic surveillance tactics — including intelligence gathered by the National Security Agency — to target Americans for drug offenses. According to a series of articles published by Reuters, agents are instructed to recreate the investigative trail in order to conceal the origins of the evidence, not only from defense lawyers, but also sometimes from prosecutors and judges. “We are talking about ordinary crime: drug dealing, organized crime, money laundering. We are not talking about national security crimes,” says Reuters reporter John Shiffman. Ethan Nadelmann, executive director of the Drug Policy Alliance, says this is just the latest scandal at the DEA. “I hope it is a sort of wake-up call for people in Congress to say now is the time, finally, after 40 years, to say this agency really needs a close examination.”
    Transcript

    This is a rush transcript. Copy may not be in its final form.

    AMY GOODMAN: The Justice Department has begun reviewing a controversial unit inside the U.S. Drug Enforcement Administration that uses secret domestic surveillance tactics, including intelligence gathered by the National Security Agency, to target Americans for drug offenses. According to a series of articles published by the Reuters news agency, agents are instructed to recreate the investigative trail in order to conceal the origins of the evidence—not only from defense lawyers but also sometimes from prosecutors and judges. DEA training documents instruct agents to even make up alternative versions of how such investigations truly begin, a process known as “parallel construction.”

    On Monday, White House Press Secretary Jay Carney was asked about the Reuters investigation.

    PRESS SECRETARY JAY CARNEY: It’s my understanding, our understanding, that the Department of Justice is looking at some of the issues raised in the story. But for more, I would refer you to the Department of Justice.

    AMY GOODMAN: The unit of the DEA that distributes the secret intelligence to agents is called the Special Operations Division, or SOD. Two dozen partner agencies comprise the unit, including the FBI, CIA, NSA, Internal Revenue Service and the Department of Homeland Security. The unit was first created two decades ago, but it’s coming under increased scrutiny following the recent revelations about the NSA maintaining a database of all phone calls made in the United States. One former federal judge, Nancy Gertner, said the DEA program sounds more troubling than recent disclosures that the NSA has been collecting domestic phone records. She said, quote, “It is one thing to create special rules for national security. Ordinary crime is entirely different. It sounds like they are phonying up investigations.”

    For more, we’re joined by the reporter who broke this story, John Shiffman, correspondent for Reuters, which published his exclusive story Monday, “U.S. Tells Agents to Cover Up Use of Wiretap Program.”

    Welcome to Democracy Now!, John. Why don’t you start off by just laying it out and what exactly this cover-up is.

    JOHN SHIFFMAN: Thanks very much for having me.

    Well, my colleague Kristina Cooke and I spoke with about a dozen or two dozen agents and obtained some internal documents that showed that what federal agents, not just DEA agents but other agents who work with the DEA and do drug investigations—what they’re doing is, is they are starting—they are claiming that their investigations start, say, at step two. They are withholding step one from the investigations. And, I should say, it’s not just NSA intercepts. It’s informant information, information obtained from court-ordered wiretaps in one case, and using those for information in a second case. They also have a large database of phone records. Whenever the DEA subpoenas or does a search warrant and gets phone records for someone suspected of involvement in drugs or gang involvement, they put all those numbers into one giant database they call DICE, and they use that information to compare different cases. All of the collection is—seems perfectly legitimate, in terms of being court-ordered. What troubles some critics is the fact that they are hiding that information from drug defendants who face trial. The problem with that is that—is that these defendants won’t know about some potentially exculpatory information that may affect their case and their right to a fair trial.

    AMY GOODMAN: So explain exactly how this information is being hidden from judges, prosecutors and sometimes defense attorneys, as well.

    JOHN SHIFFMAN: Sure. Well, just to give an example, through any of these four different ways, including the NSA intercepts, the DEA’s Special Operations Division will send the information to a DEA agent in the field or a FBI agent or an ICE agent or state policeman, and they’ll give him the information. Then they’ll say, “Look, you know, we understand that there will be a truck going to a certain park in Texas at a certain time. It’s a red truck. It’ll be two people involved.” And the state trooper or the DEA will find you reason to pull the truck over, say for a broken tail light or for speeding, that sort of thing. And, lo and behold, inside the trunk they’ll find, you know, a kilo of cocaine. The people who have been arrested will never know that—why the police or the DEA pulled them over. They’ll think it’s just luck. And that’s important because if those people try to go to trial, there are pieces of information about how that evidence was obtained and what it shows and what other pieces of it show—might affect their trial.

    AMY GOODMAN: On Monday, I spoke with Guardian columnist Glenn Greenwald just after your story broke about how the DEA is using material gathered in part by the NSA in its surveillance of Americans. Glenn Greenwald has, of course, broken several major stories about the NSA’s domestic activity. This was his response.

    GLENN GREENWALD: So this should be a huge scandal for the following reason. The essence of the Constitution is that the government cannot obtain evidence or information about you unless it has probable cause to believe that you’ve engaged in a crime and then goes to a court and gets a warrant. And only then is that evidence usable in a prosecution against you. What this secret agency is doing, according to Reuters, it is circumventing that process by gathering all kinds of information without any court supervision, without any oversight at all, using surveillance technologies and other forms of domestic spying. And then, when it gets this information that it believes it can be used in a criminal prosecution, it knows that that information can’t be used in a criminal prosecution because it’s been acquired outside of the legal and constitutional process, so they cover up how they really got it, and they pretend—they make it seem as though they really got it through legal and normal means, by then going back and retracing the investigation, once they already have it, and re-acquiring it so that it looks to defense counsel and even to judges and prosecutors like it really was done in the constitutionally permissible way. So they’re prosecuting people and putting people in prison for using evidence that they’ve acquired illegally, which they’re then covering up and lying about and deceiving courts into believing was actually acquired constitutionally. It’s a full-frontal assault on the Fourth, Fifth and Sixth Amendments and on the integrity of the judicial process, because they’re deceiving everyone involved in criminal prosecutions about how this information has been obtained.

    AMY GOODMAN: John Shiffman, if you could elaborate on that and also talk about the differences between what the DEA is doing and what Glenn Greenwald exposed around the NSA?

    JOHN SHIFFMAN: Sure. These are two very—I think they’re different topics, for one main reason, which is that the NSA revelations by Mr. Greenwald and Mr. Snowden are related to terrorism—or at least that’s what we’re told by the government. And the DEA, what the DEA is doing is only—very rarely do they get involved in terrorism. I mean, they do some narcoterrorism, but inside the United States we’re talking about ordinary crime. We’re talking about drug dealing, organized crime, money laundering. We’re not talking about national security crimes.

    The one thing I would say is that the defense analysts I’ve spoken with, meaning defense attorney analysts, they emphasize less the probable cause aspect of it than they find—they don’t find that as troubling. What they find really troubling is the pretrial discovery aspects of this and a prosecutor’s, you know, obligation to turn over any exculpatory evidence. What they really have a problem with is that this program systematically excludes or appears to systematically exclude all evidence obtained, you know, that’s hidden from view, so the defense doesn’t know to request it. They find that a lot more troubling than the probable cause aspects of it. The Supreme Court has given a pretty wide pro-police interpretation of when probable cause can be obtained, and there are a variety of exceptions. But it’s really the pretrial discovery part of it that seems to trouble a lot of the former judges and defense attorneys and prosecutors.

    AMY GOODMAN: One of the two slides Reuters obtained that were used to train agents with the Drug Enforcement Agency instructs them in the use of parallel construction. According to the slide, this is, quote, “the use of normal investigative techniques to recreate the information provided by the [Special Operations Division],” such as subpoenaed domestic telephone calls. A second slide instructs agents that such evidence, quote, “cannot be revealed or discussed.” The slide is titled “Special Operations Division Rules.” Describe what you uncovered about those rules and this concept of parallel construction, which until now had not been publicly discussed in writing.

    JOHN SHIFFMAN: Well, what really surprised me was talking to agents, current and former agents, who said, “Sure, we do that.” They—half of them said, “Yeah, you know, I could see how people might have a problem with that.” The other half said, “You know, look, this is a hard job that we do, and we’re going after criminals and drug dealers.” The people that got the most offended, I think, were the lawyers, the prosecutors and the—you know, and the judges and the former judges. One current prosecutor told me that he had a case where—in Florida, where a DEA agent came to him with a case and said that it began with an informant. So they were proceeding with the case, and the prosecutor asked the DEA agent more information. He said, you know, “I need to know more about your informant.” Turns out, ultimately, that he found out that there was no informant. It was an NSA wiretap. And what—overseas. And that really upset the prosecutor, because he said that it really offended his sense of fair play and honesty. And he said, “It’s just a bad way of starting an investigation, if you’re going to start with a lie.”

    AMY GOODMAN: I wanted to bring Ethan Nadelmann into this discussion, executive director of the Drug Policy Alliance. Ethan, why is—are the revelations by Reuters, John Shiffman’s investigation, so significant for your work?

    ETHAN NADELMANN: Well, I think what it plays into, Amy, is that there’s been this remarkable lack of oversight of DEA by Congress, by other federal oversight agencies, for decades now. I mean, this year marks the 40th anniversary of the DEA, which Nixon created as a merger of police agencies, of drug enforcement agencies, back during the—one of the earlier drug wars. And what you see is an organization with a budget of over $2 billion. You see an organization getting involved in all sorts of shenanigans, hiring informants who land up to be tied up with murderers, you know, locking up some poor drug—you know, I don’t think even drug dealer, drug—low-level offender, and forgetting about him in a prison cell in this case of Daniel Chong, who was left in a prison cell for five days and forgotten. But beyond that, you have the agency serving as a propaganda agency, with no—with none of its statements being compared or held to any sort of scientific standards. You have an administrator who testifies before Congress and is almost a laughing stock when it comes to talking about drugs. So I think that this report by Reuters and by John Shiffman—I hope it’s a sort of wake-up call for people in Congress to say, “Now is the time, finally, after really 40 years, to say this agency really needs a close examination.”

    AMY GOODMAN: Ethan, the Drug Enforcement Administration has agreed to pay $4.1 million in a settlement to a San Diego college student who nearly lost his life after being left handcuffed in his cell for more than four days without food or water. He ultimately drank his urine as he lay there, yelling out to agents right outside. His name was Daniel Chong. He was arrested for a 420 celebration of marijuana culture. He was never charged with any crime, and ultimately he was released.

    ETHAN NADELMANN: You know, I think—I mean, that’s the case I was mentioning before. I mean, part of—you know, one can say, “Oh, this is just an accident, and accidents happen.” But, of course, accidents like that should never happen when you’re talking about a police agency, much less a federal police agency, being allowed to just sort of forget about somebody. And in the end, what happens? The taxpayers bail out the DEA for almost killing somebody for no cause whatsoever. So, you know, each year the DEA goes through its own little, you know, appropriations hearings in Congress. Each year it gets approved. And each year they just sort of get a ride. I think these things are piling up in a way that can no longer be sustained—should no longer be sustained.

    AMY GOODMAN: So what has been, John Shiffman, the response to your investigation by the DEA, by the NSA, by the FBI and others?

    JOHN SHIFFMAN: Well, they say it’s perfectly legal, what they do. And they say that—one DEA official told us that, you know, “This is a bedrock principle, parallel construction. We use it every day.” They’re pretty unabashed about it and said that—you know, that they’ve been doing this since the late ’90s, and there’s really nothing wrong with it. Yesterday the Justice Department said they are going to review it. But DEA has said, you know, there’s no problem with this.

    AMY GOODMAN: How many people does this impact?

    JOHN SHIFFMAN: Well, it would impact—I would think it would impact everyone, because, you know, it’s—we’re talking about a principle of law here. Not to get too legal, but, I mean, if you’re arrested, one of the fundamental rights that you have is to see the evidence against you. You know, when I was at the DEA and doing the interview, they cited the Ted Stevens case, which involved prosecutorial misconduct, which had—in which the senator’s charges were thrown out, because evidence was concealed. They said that after that there had been a review of all of the discovery procedures throughout the Justice Department, including at Special Operations Division. But they said that—and so I asked, I said, “Great, can I see a copy of the review?” And they said, “No.”

    AMY GOODMAN: So, Ethan Nadelmann, it’s all legal.

    ETHAN NADELMANN: Well, you know, that’s what happens when any agency gets to just do what it wants to do for years and years and years without anybody looking over its shoulder. You know, I mean, Amy, this agency has also done things in the areas of medical marijuana, scientific research, the scheduling process of drugs, whereby they will go through an entirely legal process, through their own administrative law process hearings. It will have an internal judge, an administrative law judge, come down with recommendations that are scientifically based, that are credible, and then they will have the politically appointed head of this agency overrule those recommendations for no purpose whatsoever.

    Once again, Congress is not asking any questions. It’s their job to look at the—I mean, obviously, it’s the Obama administration’s job, as well, and Eric Holder’s job, as well, but it’s ultimately Congress, as well, that has to care about these things. And I’m hoping that it’s not just Democrats in the Senate, but also Republicans in the House, who will say, “This agency has gone too far.” Republicans have never been great friends of overextensions of federal police power, and I hope they can find some common cause with Democrats, saying, “Wait a second. Let’s call the DEA in here. Let’s look at what—you know, what John Shiffman has found with his investigative report. Let’s look at all these other patterns of abuse and misbehavior.”

    AMY GOODMAN: We want to thank you both for being with us, John Shiffman, for your reporting at Reuters, and Ethan Nadelmann. Thanks so much for joining us. We’ll link to the story at democracynow.org.

    JOHN SHIFFMAN: Thanks.

    AMY GOODMAN: Ethan Nadelmann, executive director of the Drug Policy Alliance. When we come back, we’re going to Richmond, California, to speak with the mayor. Stay with us.

    Tuesday, August 6, 2013

    Find this story at 6 August 2013

    The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.

    ‘Everyday Racism’; Turkish Community Responds to NSU Report

    The Turkish Community in Germany has published a report responding to a series of racist murders authorities failed to detect for years. The paper is intended to complement recommendations put forward by a parliamentary committee.

    In response to recommendations published last week by a committee in the Bundestag, Germany’s federal parliament, the Turkish Community in Germany (TGD) has put out its own report on the crimes of the National Socialist Underground (NSU) — the murderous neo-Nazi terrorist cell uncovered nearly two years ago.

    The 80-page report, presented by TGD chairman Kenan Kolat at a Berlin press conference on Tuesday, calls for Germans to develop “a new sensitivity for hidden forms of everyday prejudice”. It also advocates a complete overhaul of the country’s domestic security operations.

    The NSU is believed to have committed 10 murders between 2000 and 2007, and eight of the victims were of Turkish origin. Rather than looking into racial motivations for the murders, police in a number of the slayings immediately suspected the victims were involved in organized crime and drug trafficking.

    Time For Change

    The TGD report, which was researched and co-authored by Hajo Funke — a well-known political scientist with a focus on right-wing extremism in Germany — suggests a fundamental overhaul of the country’s domestic security operations is necessary.

    It recommends that the Federal Office for the Protection of the Constitution — the body tasked with gathering intelligence on racially motivated crimes in Germany — be disbanded. A new, independent and fully financed investigative body, as well as a series of new recruits with fresh ideas would be the only way to institute change, said Kolat.

    Also notable among the Turkish Community’s recommendations is a proposed ban on racial profiling by police and other security officials, the elimination of the government’s large network of undercover informants within the far-right scene and the introduction of a permanent parliamentary committee tasked with overseeing racially motivated crime investigations. The report also suggests erecting a memorial site in the German capital to commemorate the victims.

    An Institutional Problem

    The news comes in response to a report issued last week by a committee of German lawmakers, detailing how members of the NSU were able to commit dozens of crimes without arousing the suspicion of law enforcement.

    The report, which lays out 47 recommendations on how to improve the German state security system, has been heavily criticized. In addition to the fact that its suggestions are non-binding, critics also argue they would be difficult to implement on a nationwide basis. In Germany’s decentralized system of federal states, any kind of affirmative action program would face immense challenges.

    The report also came under fire from lawyers representing the families of those murdered by the NSU for not addressing what they view as the “decisive problem” in the investigation into the slayings — namely “institutional racism” within the German police and government authorities. Sebastian Edathy, chairman of the parliamentary committee with the center-left Social Democratic Party (SPD), was quick to dismiss the criticism. “I wouldn’t refer to it as institutional racism,” he said in an interview with the Frankfurter Allgemeine Zeitung newspaper last week. “There were isolated cases of racists in our police force who do not belong there.”

    ‘Structural Racial Prejudices’

    Although the Bundestag report does include one recommendation stating that “German society is diverse — and that this diversity should be reflected by the police authorities, who must also be able to competently deal with this diversity,” it does not make any explicit mention of the possibility of institutionalized racism within the police or government agencies. The only such comments come at the end of the report, where individual political parties provided responses.

    Neither Merkel’s conservative Christian Democrats, her government’s junior coalition partner, the Free Democratic Party, nor the Green Party said anything in the report on the possibility of institutionalized racism. However, the opposition SPD and Left Party both commented extensively on the phenomenon — at least as it pertains to the NSU investigation.

    The SPD wrote that “structural racial prejudices had been a major cause of the lack of openness in the investigation into the murders and bombing attacks committed by the NSU.” The party also lamented “prejudiced routines in the police’s work” that led to “routine prejudicial structures against people with immigrant backgrounds,” although the party said it was a “structural” rather than intentional problem. Such routines, it said, were often racist. The Left Party lamented that “structural and institutional racism had been a trait of the” police work relating to the NSU series of murders. The Green Party does, however, call in the report for regular “anti-racism training” for police, prosecutors and judges.

    Kenan Kolat, meanwhile, has been more explicit in his assertions. The aim of the Turkish Community’s efforts, Kolat said at Tuesday’s press conference, was to eliminate “everyday racism, which also exists within institutions.”

    08/28/2013 04:38 PM

    Find this story at 28 August 2013

    © SPIEGEL ONLINE 2013

    Neonazi Kai-Uwe Trinkaus; Der V-Mann und die Brandstifter

    Der Thüringer Verfassungsschutz setzte den Neonazi Kai-Uwe Trinkaus als Informanten ein – und verstieß damit einem Gutachten zufolge massiv gegen Dienstvorschriften. Und dann kündigte der ehemalige NPD-Spitzenfunktionär einen Gewaltakt an. Doch niemand reagierte.

    Kai-Uwe Trinkaus bot seine Dienste selbst an. Der berüchtigte Neonazi und NPD-Funktionär rief am 31. Mai 2006 beim Thüringer Landesamt für Verfassungsschutz an und sagte, er wäre bereit, Informationen aus der Szene und der Partei auszuplaudern. Der Geheimdienst zögerte nicht lange: Es gab Gespräche und Stichproben und ab dem 8. März 2007 bekam Trinkaus den Namen “Ares” verpasst und wurde offiziell als Quelle des Verfassungsschutzes geführt – für 1000 Euro im Monat, wie Trinkaus behauptet. Für 41 Berichte soll er 16.200 Euro erhalten haben. Mit dem Geld habe er Aktivitäten der NPD bezahlt, später wechselte er zur DVU.

    Trinkaus als Spitzel einzukaufen war ein Fehler – zu dem Ergebnis kommt das sogenannte Engel-Gutachten. Norbert Engel, ehemaliger Abteilungsleiter im Thüringer Landtag, hat seit Beginn des Jahres die Affäre Trinkaus im Auftrag der Parlamentarischen Kontrollkommission (PKK) untersucht. Sein 80-seitiges Gutachten wurde nun nach Informationen von MDR Thüringen am Dienstag hinter verschlossenen Türen in einer geheimen PKK-Sitzung vorgelegt. Es belegt schwere Versäumnisse von Geheimdienst und der Fachaufsicht im Thüringer Innenministerium.

    Demnach hatten die Verfassungsschützer von Trinkaus’ vormaligen politischen Aktivitäten keinen blassen Schimmer: “Dies gilt insbesondere, weil klar sein musste, dass aufgrund seines politischen Werdegangs Herr Trinkaus persönliche Kontakte zu führenden Mitgliedern der Linkspartei.PDS hatte. Obwohl solche Kontakte für die Zuverlässigkeit zur Verwendung als V-Mann von hoher Bedeutung sind, wurde […] nach ihnen nicht einmal gefragt.” Engels Fazit an dieser Stelle: Ein ehemaliger Funktionär der Linkspartei, der in die NPD wechselte und sich selbst beim Verfassungsschutz anbietet, hätte nicht als V-Mann eingesetzt werden dürfen.

    Die Behörde hat laut Gutachter damals unter großem Druck gestanden: Eine weitere Quelle im Bereich der NPD – besonders im regionalen Bereich von Erfurt und Mittelthüringen – sei “unbedingt” nötig gewesen, “lieber ein problematischer Zugang als gar keine Quelle”.

    Und offensichtlich galt auch: lieber viele Informationen als gute. Denn laut Engel hat Trinkaus dem Verfassungsschutz zwar eine “beachtliche” Menge an Informationen gegeben, diese seien jedoch nicht so profund gewesen, dass sie die Nachteile der “Verwendung von Herrn Trinkaus gerechtfertigt hätten”. Das sei vor allem darauf zurückzuführen, dass Trinkaus nie in den wirklich vertraulichen Runden des Landesvorstandes der Thüringer NPD mitgemischt habe.

    Wer legte Feuer im Haus “Topf & Söhne” in Erfurt?

    Einmal habe Trinkaus eine Aktion von gewaltbereiten Neonazis verraten: Einen Angriff auf das besetzte Haus “Topf & Söhne” in Erfurt. Laut den Bewohnern legten Brandstifter im April 2007 in dem Gebäude Feuer, etwa 40 Menschen hielten sich zu dem Zeitpunkt darin auf. Bis heute wurden keine Täter ermittelt.

    Damals spekulierten die Besetzer über einen rechtsextremen Hintergrund der Tat – Tattag war der Geburtstag Adolf Hitlers. Trinkaus soll laut Mitgliedern des Ausschusses seinem V-Mann-Führer berichtet haben, dass Neonazis einen Angriff auf das Hausprojekt gemeinsam mit sächsischen Kameraden trainierten. Ob vor oder nach der Tat, ist unklar. Aus weiteren Unterlagen, die dem Ausschuss vorliegen, finden sich keine Hinweise über die Weitergabe dieser Informationen an das Landeskriminalamt (LKA) oder die örtliche Polizei.

    Dabei soll Trinkaus auch davon gesprochen haben, dass es nicht ausgeschlossen sei, dass das Gebäude abgebrannt werde, wie SPIEGEL ONLINE von Ausschussmitgliedern erfuhr. Damals erlosch das Feuer von selbst, es gab keine Verletzten.

    Trinkaus ging auf in seinem Doppelleben als Neonazi und V-Mann: Er gründete oder unterwanderte Vereine, die nach außen hin unscheinbar wirkten, in denen sich aber tatsächlich Rechtsextremisten organisierten. Laut Gutachten hatte der Thüringer Verfassungsschutz auch davon keine oder nur ansatzweise Ahnung.

    Auch habe Trinkaus die Anweisung seiner V-Mann-Führer, Provokationen gegenüber der Linkspartei und anderen politischen Parteien zu unterlassen, ignoriert. Erst im September 2010 wurde Trinkaus abgeschaltet, als durch einen MDR-Bericht bekannt geworden war, dass Trinkaus einen getarnten Neonazi als Praktikanten in die Linksfraktion eingeschleust hatte.

    Gab der Verfassungsschutz Interna an Trinkaus weiter?

    Trinkaus’ doppeltes Spiel sei “einmalig” im Verfassungsschutz, resümiert Engel. Ermöglicht habe dies auch die mangelnde Kontrolle des zuständigen Referats im Verfassungsschutz. Der Grund: Der verantwortliche Mitarbeiter war ein Jahr lang krank, Ersatz für ihn gab es keinen.

    Engels Vorwürfe richten sich auch gegen das Thüringer Innenministerium, dem die Fachaufsicht für den Verfassungsschutz untergeordnet ist. Das Verhalten des Innenministeriums sei “nicht akzeptabel”. Der damalige Abteilungsleiter ist der heutige Innenstaatssekretär Bernhard Rieder, der von Beginn an in den kompletten Fall Trinkaus eingebunden war. Aber auch der damalige Innenminister Karl-Heinz Gasser soll informiert gewesen sein: Die Informationen erhielt er vom ehemaligen Verfassungsschutzchef Thomas Sippel.

    Das Gutachten rückt den Thüringer Verfassungsschutz zudem in den Verdacht, Trinkaus mit polizeilichen Ermittlungsunterlagen versorgt zu haben: Im Juni 2007 hatten Linksautonome einen Neonazi-Treff in Erfurt überfallen. Die interne Polizeiliste mit den Namen und Adressen der Verdächtigen tauchte im Oktober 2007 auf der Internetseite der Thüringer NPD auf.

    Laut Engel deuten “gewisse Indizien” darauf hin, dass Trinkaus die Liste aus dem Thüringer Verfassungsschutz bekommen hat. Engel hatte die Originalliste der Polizei mit der damaligen Internetveröffentlichung verglichen. Dabei stellte er fest, dass auf der NPD-Homepage drei Namen fehlten. Laut Gutachten waren diese drei Personen in einer geheimen Datenbank des Verfassungsschutzes als Rechtsextremisten eingestuft. Die Einstufung sei nur dem Geheimdienst bekannt gewesen. Weil exakt diese drei Namen auf der NPD-Internetseite fehlten, kommt Engel zu dem Schluss, das Trinkaus “diese Information nur aus dem TLfV haben” konnte.

    Trinkaus hatte bei seiner Enttarnung im Dezember 2012 MDR Thüringen gesagt, dass er die Liste von seinem V-Mann-Führer abgeschrieben habe. Der Verfassungsschutz bestreitet entschieden, die Namen an Trinkaus gegeben zu haben. Die Staatsanwaltschaft Erfurt hatte erfolglos versucht zu klären, wie die Liste auf die NPD-Internetseite gekommen war.

    27. August 2013, 19:08 Uhr
    Von Maik Baumgärtner und Julia Jüttner

    Find this story at 27 August 2013

    © SPIEGEL ONLINE 2013

    << oudere artikelen  nieuwere artikelen >>