• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • The ex-FBI informant with a change of heart: ‘There is no real hunt. It’s fixed’

    Craig Monteilh describes how he pretended to be a radical Muslim in order to root out potential threats, shining a light on some of the bureau’s more ethically murky practices

    Craig Monteilh: ‘It is all about entrapment.’ Photograph: The Washington Post

    Craig Monteilh says he did not balk when his FBI handlers gave him the OK to have sex with the Muslim women his undercover operation was targeting. Nor, at the time, did he shy away from recording their pillow talk.

    “They said, if it would enhance the intelligence, go ahead and have sex. So I did,” Monteilh told the Guardian as he described his year as a confidential FBI informant sent on a secret mission to infiltrate southern Californian mosques.

    It is an astonishing admission that goes to the heart of the intelligence surveillance of Muslim communities in America in the years after 9/11. While police and FBI leaders have insisted they are acting to defend America from a terrorist attack, civil liberties groups have insisted they have repeatedly gone too far and treated an entire religious group as suspicious.

    Monteilh was involved in one of the most controversial tactics: the use of “confidential informants” in so-called entrapment cases. This is when suspects carry out or plot fake terrorist “attacks” at the request or under the close supervision of an FBI undercover operation using secret informants. Often those informants have serious criminal records or are supplied with a financial motivation to net suspects.

    In the case of the Newburgh Four – where four men were convicted for a fake terror attack on Jewish targets in the Bronx – a confidential informant offered $250,000, a free holiday and a car to one suspect for help with the attack.

    In the case of the Fort Dix Five, which involved a fake plan to attack a New Jersey military base, one informant’s criminal past included attempted murder, while another admitted in court at least two of the suspects later jailed for life had not known of any plot.

    Such actions have led Muslim civil rights groups to wonder if their communities are being unfairly targeted in a spying game that is rigged against them. Monteilh says that is exactly what happens. “The way the FBI conducts their operations, It is all about entrapment … I know the game, I know the dynamics of it. It’s such a joke, a real joke. There is no real hunt. It’s fixed,” he said.

    But Monteilh has regrets now about his involvement in a scheme called Operation Flex. Sitting in the kitchen of his modest home in Irvine, near Los Angeles, Monteilh said the FBI should publicly apologise for his fruitless quest to root out Islamic radicals in Orange County, though he does not hold out much hope that will happen. “They don’t have the humility to admit a mistake,” he said.

    Monteilh’s story sounds like something out of a pulp thriller. Under the supervision of two FBI agents the muscle-bound fitness instructor created a fictitious French-Syrian alter ego, called Farouk Aziz. In this disguise in 2006 Monteilh started hanging around mosques in Orange County – the long stretch of suburbia south of LA – and pretended to convert to Islam.

    He was tasked with befriending Muslims and blanket recording their conversations. All this information was then fed back to the FBI who told Monteilh to act like a radical himself to lure out Islamist sympathizers.

    Yet, far from succeeding, Monteilh eventually so unnerved Orange County’s Muslim community that that they got a restraining order against him. In an ironic twist, they also reported Monteilh to the FBI: unaware he was in fact working undercover for the agency.

    Monteilh does not look like a spy. He is massively well built, but soft-spoken and friendly. He is 49 but looks younger. He lives in a small rented home in Irvine that blends into the suburban sprawl of southern California. Yet Monteilh knows the spying game intimately well.

    By his own account Monteilh got into undercover work after meeting a group of off-duty cops working out in a gym. Monteilh told them he had spent time in prison in Chino, serving time for passing fraudulent checks.

    It is a criminal past he explains by saying he was traumatised by a nasty divorce. “It was a bad time in my life,” he said. He and the cops got to talking about the criminals Monteilh had met while in Chino. The information was so useful that Monteilh says he began to work on undercover drug and organised crime cases.

    Eventually he asked to work on counter-terrorism and was passed on to two FBI handlers, called Kevin Armstrong and Paul Allen. These two agents had a mission and an alias ready-made for him.

    Posing as Farouk Aziz he would infiltrate local mosques and Islamic groups around Orange County. “Paul Allen said: ‘Craig, you are going to be our computer worm. Our guy that gives us the real pulse of the Muslim community in America’,” Monteilh said.

    The operation began simply enough. Monteilh started hanging out at mosques, posing as Aziz, and explaining he wanted to learn more about religion. In July, 2006, at the Islamic Center of Irvine, he converted to Islam.

    Monteilh also began attending other mosques, including the Orange County Islamic Foundation. Monteilh began circulating endlessly from mosque to mosque, spending long days in prayer or reading books or just hanging out in order to get as many people as possible to talk to him.

    “Slowly I began to wear the robes, the hat, the scarf and they saw me slowly transform and growing a beard. At that point, about three or four months later, [my FBI handlers] said: ‘OK, now start to ask questions’.”

    Those questions were aimed at rooting out radicals. Monteilh would talk of his curiosity over the concepts of jihad and what Muslims should do about injustices in the world, especially where it pertained to American foreign policy.

    He talked of access to weapons, a possible desire to be a martyr and inquired after like-minded souls. It was all aimed at trapping people in condemning statements. “The skill is that I am going to get you to say something. I am cornering you to say “jihad”,” he said.

    Of course, the chats were recorded.

    In scenes out of a James Bond movie, Monteilh said he sometimes wore a secret video recorder sewn into his shirt. At other times he activated an audio recorder on his key rings.

    Monteilh left his keys in offices and rooms in the mosques that he attended in the hope of recording conversations that took place when he was not there. He did it so often that he earned a reputation with other worshippers for being careless with his keys. The recordings were passed back to his FBI handlers at least once a week.

    He also met with them every two months at a hotel room in nearby Anaheim for a more intense debriefing. Monteilh says he was grilled on specific individuals and asked to view charts showing networks of relationships among Orange County’s Muslim population.

    He said the FBI had two basic aims. Firstly, they aimed to uncover potential militants. Secondly, they could also use any information Monteilh discovered – like an affair or someone being gay – to turn targeted people into becoming FBI informants themselves.

    None of it seemed to unnerve his FBI bosses, not even when he carried out a suggestion to begin seducing Muslim women and recording them.

    At one hotel meeting, agent Kevin Armstrong explained the FBI attitude towards the immense breadth of Operation Flex – and any concerns over civil rights – by saying simply: “Kevin is God.”

    Monteilh’s own attitude evolved into something very similar. “I was untouchable. I am a felon, I am on probation and the police cannot arrest me. How empowering is that? It is very empowering. You began to have a certain arrogance about it. It is almost taunting. They told me: ‘You are an untouchable’,” he said.

    But it was not always easy. “I started at 4am. I ended at 9.30pm. Really, it was a lot of work … Farouk took over. Craig did not exist,” he said. But it was also well paid: at the peak of Operation Flex, Monteilh was earning more than $11,000 a month.

    But he was wrong about being untouchable.

    Far from uncovering radical terror networks, Monteilh ended up traumatising the community he was sent into. Instead of embracing calls for jihad or his questions about suicide bombers or his claims to have access to weapons, Monteilh was instead reported to the FBI as a potentially dangerous extremist.

    A restraining order was also taken out against him in June 2007, asking him to stay away from the Islamic Center of Irvine. Operation Flex was a bust and Monteilh had to kill off his life as Farouk Aziz.

    But the story did not end there. In circumstances that remain murky Monteilh then sued the FBI over his treatment, claiming that they abandoned him once the operation was over.

    He also ended up in jail after Irvine police prosecuted him for defrauding two women, including a former girlfriend, as part of an illegal trade in human growth hormone at fitness clubs. (Monteilh claims those actions were carried out as part of another secret string operation for which he was forced to carry the can.)

    What is not in doubt is that Monteilh’s identity later became public. In 2009 the FBI brought a case against Ahmad Niazi, an Afghan immigrant in Orange County.

    The evidence included secret recordings and even calling Osama bin Laden “an angel”. That was Monteilh’s work and he outed himself to the press to the shock of the very Muslims he had been spying on who now realised that Farouk Aziz – the radical they had reported to the FBI two years earlier – had in fact been an undercover FBI operative.

    Now Monteilh says he set Niazi up and the FBI was trying to blackmail the Afghani into being an informant. “I built the whole relationship with Niazi. Through my coercion we talked about jihad a lot,” he said. The FBI’s charges against Niazi were indeed later dropped.

    Now Monteilh has joined an American Civil Liberties Union lawsuit against the FBI. Amazingly, after first befriending Muslim leaders in Orange County as Farouk Aziz, then betraying them as Craig Monteilh, he has now joined forces with them again to campaign for their civil liberties.

    That has now put Monteilh’s testimony about his year undercover is at the heart of a fresh legal effort to prove that the FBI operation in Orange County unfairly targeted a vulnerable Muslim community, trampling on civil rights in the name of national security.

    The FBI did not respond to a request from the Guardian for comment.

    It is not the first time Monteilh has shifted his stance. In the ACLU case Monteilh is now posing as the sorrowful informant who saw the error of his ways.

    But in previous court papers filed against the Irvine Police and the FBI, Monteilh’s lawyers portrayed him as the loyal intelligence asset who did sterling work tackling the forces of Islamic radicalism and was let down by his superiors.

    In those papers Monteilh complained that FBI agents did not act speedily enough on a tip he gave them about a possible sighting of bomb-making materials. Now Monteilh says that tip was not credible.

    Either way it does add up to a story that shifts with the telling. But that fact alone goes to the heart of the FBI’s use of such confidential informants in investigating Muslim communities.

    FBI operatives with profiles similar to Monteilh’s – of a lengthy criminal record, desire for cash and a flexibility with the truth – have led to high profile cases of alleged entrapment that have shocked civil rights groups across America.

    In most cases the informants have won their prosecutions and simply disappeared. Monteilh is the only one speaking out. But whatever the reality of his year undercover, Monteilh is almost certainly right about one impact of Operation Flex and the exposure of his undercover activities: “Because of this the Muslim community will never trust the FBI again.”

    Paul Harris in Irvine, California
    guardian.co.uk, Tuesday 20 March 2012 16.50 GMT

    Find this story at 20 March 2012

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Editor of The Progressive Calls for Eric Holder to Resign over Spying on Press, Occupy Protesters

    As the Obama administration faces criticism for the Justice Department’s spying on journalists and the IRS targeting of right-wing organizations, newly released documents show how the FBI, the Department of Homeland Security and local police forces partnered with corporations to spy on Occupy protesters in 2011 and 2012. Detailed in thousands of pages of records from counter terrorism and law enforcement agencies, the spying monitored the activists’ online usage and led to infiltration of their meetings. One document shows an undercover officer was dispatched in Arizona to infiltrate activists organizing protests around the American Legislative Exchange Council (ALEC), the secretive group that helps corporate America propose and draft legislation for states across the country. We’re joined by Matt Rothschild of The Progressive, who tackles the surveillance in his latest article, “Spying on Occupy Activists: How Cops and Homeland Security Help Wall Street.”

    Watch Part Two of interview here
    Transcript

    This is a rush transcript. Copy may not be in its final form.

    NERMEEN SHAIKH: We end our show with a look at newly revealed documents showing how police partnered with corporations to monitor the Occupy Wall Street movement. DBA Press and the Center for Media and Democracy have obtained thousands of pages of records from counterterrorism and law enforcement agencies that detail how so-called “fusion centers” monitored the Occupy Wall Street movement over the course of 2011 and 2012. These fusion centers are comprised of employees from municipal, county and federal counterterrorism and homeland security entities, as well as local police departments, the FBI and the Department of Homeland Security.

    The documents show how fusion center personnel spied on Occupy protesters, monitored their Facebook accounts, and infiltrated their meetings. One document showed how the Arizona fusion center dispatched an undercover officer to infiltrate activist groups organizing protests around the American Legislative Exchange Council, or ALEC, the secretive group that helps corporate America propose and draft legislation for states across the country. The undercover officer apparently worked for the benefit of the private entity ALEC despite being on the public payroll.

    AMY GOODMAN: Democracy Now! reached out to the Phoenix Police Department to join us on the show, but they declined our request. Sergeant Trent Crump in the media relations department said in an email, quote, “Occupy Phoenix presented itself with a great deal of civil unrest over a long period of time. We monitored available Intel all the time, as it is used for Intel-driven policing. Intel dictated resources and response tactics to address, mitigate, and manage this ongoing activity which was very fluid and changing day-to-day. This approach ensured that citizens can exercise their civil rights, while we protect the community at the same time,” they said.

    Well, for more, we go to Matt Rothschild, editor and publisher of The Progressive magazine, wrote the cover story for the June issue of the magazine, “Spying on Occupy Activists: How Cops and Homeland Security Help Wall Street,” the piece drawing heavily on the documents obtained by the Center for Media and Democracy and DBA Press. Matt Rothschild is also the author of You Have No Rights: Stories of America in an Age of Repression.

    Matt, welcome to Democracy Now! Just lay out what you have found.

    MATTHEW ROTHSCHILD: Hey, Amy. Thanks for having me on.

    Yeah, I mean, these documents from the Center for Media and Democracy and DBA Press show that law enforcement and Homeland Security have equated protesters, left-wing protesters, as terrorists. They have diverted enormous amounts of resources from counterterrorism efforts to spy on these local protesters, and then they’ve collaborated with the private sector, some of the very institutions—banks—that these protesters were aiming at. And as you read in that statement from the Phoenix Police Department, the effort was to mitigate these protests. I mean, why is law enforcement, why is Homeland Security, in the business of mitigating protests?

    NERMEEN SHAIKH: Well, I want to go to a response that we received from the Phoenix Police Department when we reached them for comment. And they said that they were not treating Occupy protesters as potential terrorists. They said, “[W]e are an all hazards incident management team, we have gathered information at all types of events [such as] Superbowl, World Series, SB 1070 protest etc.” So can you say how it is that their monitoring of Occupy protesters differed qualitatively from the other events that the Phoenix Police Department named?

    MATTHEW ROTHSCHILD: Sure. Well, they’re using resources from the Arizona Counter Terrorism Information Center, the Arizona fusion center, and they’re using Homeland Defense personnel in the Phoenix Police Department to track Occupy activists. So, it’s a little disingenuous of them to say they’re not treating these protesters as terrorists when they’re using their own anti-terrorist personnel to spend a lot of time simply tracking these activists. One of the police officers who was on the Homeland Defense Bureau of the Phoenix Police Department said she was primarily spending her time tracking Occupy activists on social media.

    AMY GOODMAN: We also asked the Phoenix police if law enforcement is infiltrating Occupy meetings. And he replied, quote, “Infiltrate? No. Attend open meetings? Yes.” Democracy Now! also asked Trent Crump if law enforcement tracked Occupy activists online. He replied, “Yes, we gather intel on a number of social media sites regularly.” So, what about this? And also, this issue of law enforcement monitoring the protests against ALEC, the American Legislative Exchange Council, when we asked him this, he said, “Yes, public safety.” Your response?

    MATTHEW ROTHSCHILD: Well, they not only monitored the ALEC protests in late November 2011, but they also sent a face sheet to the security personnel for ALEC, a face sheet of the faces and names and identities of Occupy protesters who have been doing some activism in the Phoenix area, to make the ALEC security personnel aware of who may be coming to their protests. They were also tracking—

    AMY GOODMAN: So the police are working with the companies and the organizations.

    MATTHEW ROTHSCHILD: Absolutely. Yeah, they were working with security for the American Legislative Exchange Council. They were also letting security know when Jesse Jackson was going to be in town to join an Occupy protest and an ALEC protest. Is that really their job to be passing information on to these private entities?

    And then, with some of the bank protests that Occupy Phoenix was planning, they were giving downtown banks all sorts of information. “Give downtown banks everything they need.” That was one internal memo from the Phoenix Police Department, when it was a day of protest against these banks and Occupy was urging the bank customers to cut up their credit cards from these banks. And which banks are we talking about? We’re talking about Bank of America, Wells Fargo, Chase—some of the very targets that Occupy had been protesting against. So, the question is: Who are the police department working for? Are they working for citizens? Are they working for the private sector? Are they working for the banks?

    NERMEEN SHAIKH: Can you put—Matt Rothschild, can you put this in a wider historical context? Is this kind of surveillance unprecedented in the U.S.? And what accounts for its occurrence during Occupy in the way that you describe?

    MATTHEW ROTHSCHILD: Well, unfortunately, it’s not unprecedented. There’s a terrible history of law enforcement and the FBI spying on left-wing activists, going back to the COINTELPRO program of the FBI in the ’60s and ’70s, where they infiltrated the Black Panther movement and the American Indian Movement. But interestingly, after those revelations came out, there were guidelines imposed by the Justice Department itself, the so-called Levi guidelines. Edward Levi was the attorney general under the Ford administration who said you can’t go spying on and infiltrating activist groups in this country unless there’s a predicate of criminal activity. Well, after 9/11, the Bush administration and Ashcroft, his attorney general, completely destroyed the Levi guidelines and let law enforcement do any kind of infiltration they want, without any necessity for any hint of criminal activity on the part of the activists.

    AMY GOODMAN: Matt Rothschild, you’ve called for the resignation of Attorney General Eric Holder. Why?

    MATTHEW ROTHSCHILD: Well, for a number of reasons, Amy, first of all, for this scandal about investigating reporters. I think that’s outrageous. We had more than a hundred AP reporters and editors that the Justice Department was gathering information on, and now we have the revelation about the Fox News reporter James Rosen, who was being accused of being a co-conspirator under the Espionage Act of 1917 simply for doing his reporting job. Also, the attorney general has been essentially waging war on whistleblowers under the Espionage Act.

    And on top of that, let’s remember, this attorney general, Eric Holder, has been rationalizing the assassination program that the Obama administration has been engaging in, saying that a drone can drop a bomb on a U.S. citizen anywhere in the world, and that U.S. citizen will already have had due process simply because the Obama administration itself or the president or the secretary of defense calls that person a terrorist. Now, that’s not due process, and that’s not what the Justice Department should be doing. Certainly the attorney general, the chief law enforcement officer of this country, should know better than that.

    AMY GOODMAN: Matthew Rothschild, isn’t he just carrying out President Obama’s policies?

    MATTHEW ROTHSCHILD: Well, he very well might be, and then we have a more serious problem. We have a serious problem at the very top with a president of the United States, again, like George W. Bush, engaging in illegal activity.

    AMY GOODMAN: We want to thank you for being with us. We’re going to do part two of the interview and post it at democracynow.org. Matt Rothschild, editor and publisher of The Progressive magazine, wrote the cover story for the June issue, “Spying on Occupy Activists: How Cops and Homeland Security Help Wall Street.”

    Wednesday, May 22, 2013

    Find this story at 22 May 2013

    Bank of America intelligence analyst shared Occupy DC info with police ‘They seemed pretty excited’

    Emails released by Washington D.C.’s Metropolitan Police Department about the Occupy Our Homes movement reveal frustration from one Bank of America intelligence analyst.

    Occupy our Homes, a part of the Occupy movement that began in fall 2011, gained headlines as protesters fought back against home foreclosures across the country. Bank of America Senior U.S. Crime and Intelligence Analyst Amanda Velazquez offered weary commentary in an Occupy email she shared with MPD in September 2012.

    “With all the Occupy DC leaders back home, it appears some concrete plans have materialized for the one-year anniversary. Our day for action is Tuesday, 2 October. I think there should be more participation that [sic] the last attempt against us; they seemed pretty excited …”

    The anniversary plans included two days of “plays, music, art, political discussions and general assemblies” in Freedom Plaza, according to the email Velazquez forwarded. The occupiers had been forcibly evicted by police in February 2012.

    The emails were requested as a part of the File for Aaron project.

    by Tom Nash on May 1, 2013, 1 p.m.

    Find this story at 1 May 2013

    © 2013 MuckRock

    The U.S. counter terrorism apparatus was used to monitor the Occupy Movement nationwide.

    On May 20, 2013, DBA Press and the Center for Media and Democracy released the results of a year-long investigation: “Dissent or Terror: How the Nation’s Counter Terrorism Apparatus, In Partnership With Corporate America, Turned on Occupy Wall Street.” The report, a distillation of thousands of pages of records obtained from counter terrorism/law enforcement agencies, details how state/regional “fusion center” personnel monitored the Occupy Wall Street movement over the course of 2011 and 2012.

    The report also examines how fusion centers and other counter terrorism entities that have emerged since the terrorist attacks of September 11, 2001 have worked to benefit numerous corporations engaged in public-private intelligence sharing partnerships. While the report examines many instances of fusion center monitoring of Occupy activists nationwide, the bulk of the report details how counter terrorism personnel engaged in the Arizona Counter Terrorism Information Center (ACTIC, commonly known as the “Arizona fusion center”) monitored and otherwise surveilled citizens active in Occupy Phoenix, and how this surveillance benefited a number of corporations and banks that were subjects of Occupy Phoenix protest activity.

    While small glimpses into the governmental monitoring of the Occupy Wall Street movement have emerged in the past, there has not been any reporting — until now — that details the breadth and depth with which the nation’s post-September 11, 2001 counter terrorism apparatus has been applied to politically engaged citizens exercising their Constitutionally-protected First Amendment rights.

    REPORT Dissent or Terror: How the Nation’s ‘Counter Terrorism’ Apparatus, in Partnership with Corporate America, Turned on Occupy Wall Street

    REPORT APPENDIX open records materials cited in report.

    PRESS RELEASE “New Report Details How Counter Terrorism Apparatus Was Used to Monitor Occupy Movement Nationwide”(PDF)

    SOURCE MATERIALS almost 10,000 pages of open records materials are archived on DBA Press.

    PRWATCH ARTICLE “Dissent or Terror: How Arizona’s Counter Terrorism Apparatus, in Partnership with Corporate Interests, Turned on Occupy Phoenix”
    Key Findings

    Key findings of this report include:
    How law enforcement agencies active in the Arizona fusion center dispatched an undercover officer to infiltrate activist groups organizing both protests of the American Legislative Exchange Council (ALEC) and the launch of Occupy Phoenix and how the work of this undercover officer benefited ALEC and the private corporations that were the subjects of these demonstrations.
    How fusion centers, funded in large part by the U.S. Department of Homeland Security, expended countless hours and tax dollars in the monitoring of Occupy Wall Street and other activist groups.
    How the U.S. Department of Homeland Security has financed social media “data mining” programs at local law enforcement agencies engaged in fusion centers.
    How counter terrorism government employees applied facial recognition technology, drawing from a state database of driver’s license photos, to photographs found on Facebook in the effort to profile citizens believed to be associated with activist groups.
    How corporations have become part of the homeland security “information sharing environment” with law enforcement/intelligence agencies through various public-private intelligence sharing partnerships. The report examines multiple instances in which the counter terrorism/homeland security apparatus was used to gather intelligence relating to activists for the benefit of corporate interests that were the subject of protests.
    How private groups and individuals, such as Charles Koch, Chase Koch (Charles’ son and a Koch Industries executive), Koch Industries, and the Koch-funded American Legislative Exchange Council have hired off-duty police officers — sometimes still armed and in police uniforms — to perform the private security functions of keeping undesirables (reporters and activists) at bay.
    How counter terrorism personnel monitored the protest activities of citizens opposed to the indefinite detention language contained in National Defense Authorization Act of 2012.
    How the FBI applied “Operation Tripwire,” an initiative originally intended to apprehend domestic terrorists through the use of private sector informants, in their monitoring of Occupy Wall Street groups. [Note: this issue was reported on exclusively by DBA/CMD in December, 2012.]

    Government Surveillance of Occupy Movement
    – by Beau Hodai, CMD/DBA

    Find this story at 22 May 2013

    Dissent or Terror: How the Nation’s ‘Counter Terrorism’ Apparatus, in Partnership with Corporate America, Turned on Occupy Wall Street

    How America’s National Security Apparatus — in Partnership With Big Corporations — Cracked Down on Dissent A new report is an eye-opening look into how the U.S. counter-terror apparatus was used to track the Occupy movement.

    Counter-terror police officers collaborated with corporate entities to combat protests. Undercover police officers monitored and tracked the Occupy movement. A right-wing corporate-backed group hired a police officer to help protect a conference. These are some of the details revealed in a new report published by the Center for Media and Democracy’s Beau Hodai, along with DBA Press. The revelations are based on government documents the group obtained.

    The report, titled “Dissent or Terror: How the Nation’s Counter Terrorism Apparatus, In Partnership With Corporate America, Turned on Occupy Wall Street,” is an eye-opening look into how the U.S. counter-terror apparatus was used to track the Occupy movement in 2011 and 2012 and also help protect the business entities targeted by the movement. The report specifically looks at the activities of “fusion centers,” or law enforcement entities created after 9/11 that transform local police forces into counter-terror units in partnership with federal agencies like the Department of Homeland Security. The fusion centers devoted a lot of time–to the point of “obsession,” the report notes–to monitoring the Occupy movement, particularly for any “threats” to public safety or health and to whether there were “extremists” involved in the movement.

    The documents obtained for the report from government agencies reveal “a grim mosaic of ‘counter-terrorism’ agency operations and attitudes toward activists and other socially/politically-engaged citizens over the course of 2011 and 2012,” writes Hodai. He adds that these heavily-funded agencies indisputably view Occupy activists as “terrorist” threats. Additionally, Hodai writes that “this view of activists, and attendant activist monitoring/suppression, has been carried out on behalf of, and in cooperation with, some of the nation’s largest financial and corporate interests.”

    Much of the report hones in on the Occupy Phoenix branch of the movement and Arizona counter-terrorism agents monitoring, tracking and cracking down on the protests.

    For instance, when JP Morgan Chase CEO Jamie Dimon was planning on coming to Phoenix in October 2011, a “counter-terrorism” detective employed by the Phoenix Police Department’s Homeland Security Bureau exchanged information on potential protests with a JP Morgan Chase security manager. The detective, Jennifer O’Neill, received information on Dimon’s travel plans, and then shared information about Occupy Phoenix. O’Neill said that she and another officer had tracked the online activities of Occupy protesters to find out if they were planning to protest Dimon. No plans for protest were discovered by O’Neill, who also works with the Arizona Counter Terrorism Information Center, otherwise known as the Arizona fusion center.

    Another similar example of how corporate entities were helped by counter-terrorism units of police forces also occurred in October 2011. Then, businesses–including banks–received alerts authored by the Arizona fusion center about planned protest activities. Similar alerts to banks were given in the run-up to the November 5 day of action labeled “Bank Transfer Day,” which encouraged people to move their money from corporate banks to more local financial institutions. The Federal Bureau of Investigation also engaged in similar activity, according to the report. “The bureau had been in the business of alerting banks (and related entities) tothe planned protest activity of OWS groups as early as August of 2011.”

    The extent of law enforcement-corporate cooperation has also been taken a step further by the practice of corporations or right-wing corporate backed groups hiring officers for pay to police protests.

    In late November-early December 2011, the largest Occupy Phoenix action took place outside of a conference held by the American Legislative Exchange Council (ALEC), a corporate-funded group that brings together right-wing lobbyist groups and conservative politicians to push model legislation in state legislatures. The protest was marred by police violence, with officers deploying pepper spray and pepper ball projectiles on activists and arresting 5. While the police portrayed the action as the work of violent anarchists, Hodai writes that this narrative of events had little grounding in reality.

    Hodai reveals that the “tactical response unit” of officers working at the action was under the direction of Phoenix Police Department Sgt. Eric Harkins. What makes this noteworthy is that Harkins was “actually off-duty, earning $35 per hour as a private security guard employed by ALEC.” ALEC also “hired 49 active duty and 9 retired PPD officers to act as private security during the conference.” ALEC also employed off-duty police officers from Charlotte Mecklenburg Police Department during another ALEC summit in May 2012.

    The Center for Media and Democracy report also provides details on how police officers tracked and went undercover to monitor the Occupy movement. The report focuses on an undercover police officer who went by the name of “Saul DeLara,” who presented himself as a homeless Mexican activist. “DeLara” went to Occupy meetings and then reported back on their contents to the police.

    The revelations are confirmation that, as the Center for Media and Democracy noted in a press release,”the nation’s post-September 11, 2001 counter terrorism apparatus has been applied to politically engaged citizens exercising their Constitutionally-protected First Amendment rights.”

    May 21, 2013
    AlterNet / By Alex Kane

    Find this story at 21 May 2013

     

    SPYING ON AMERICANS: Obama’s Backdoor “Cybersecurity” Wiretap Bill Threatens Political and Private Rights; Spying on Social Media

    Under the guise of “cybersecurity,” the new all-purpose bogeyman to increase the secret state’s already-formidable reach, the Obama administration and their congressional allies are crafting legislation that will open new backdoors for even more intrusive government surveillance: portals into our lives that will never be shut.

    As Antifascist Calling has frequently warned, with the endless “War on Terror” as a backdrop the federal government, most notably the 16 agencies that comprise the so-called “Intelligence Community” (IC), have been constructing vast centralized databases that scoop-up and store all things digital–from financial and medical records to the totality of our electronic communications online–and do so without benefit of a warrant or probable cause.

    The shredding of constitutional protections afforded by the Fourth Amendment, granted to the Executive Branch by congressional passage of the Authorization for Use of Military Force (AUMF) after the 9/11 attacks, followed shortly thereafter by the oxymoronic USA Patriot Act set the stage for today’s depredations.

    Under provisions of multiple bills under consideration by the House and Senate, federal officials will be given broad authority over private networks that will almost certainly hand security officials wide latitude over what is euphemistically called “information-sharing” amongst corporate and government securocrats.

    As The Washington Post reported in February, the National Security Agency “has pushed repeatedly over the past year to expand its role in protecting private-sector computer networks from cyberattacks” but has allegedly “been rebuffed by the White House, largely because of privacy concerns.”

    “The most contentious issue,” Post reporter Ellen Nakashima wrote, “was a legislative proposal last year that would have required hundreds of companies that provide such critical services as electricity generation to allow their Internet traffic to be continuously scanned using computer threat data provided by the spy agency. The companies would have been expected to turn over evidence of potential cyberattacks to the government.”

    Both the White House and Justice Department have argued, according to the Post, that the “proposal would permit unprecedented government monitoring of routine civilian Internet activity.”

    National Security Agency chief General Keith Alexander, the dual-hatted commander of NSA and U.S. Cyber Command (USCYBERCOM), the Pentagon satrapy that wages offensive cyberwar, was warned to “restrain his public comments after speeches in which he argued that more expansive legal authority was necessary to defend the nation against cyberattacks.”

    While we can take White House “objections” with a proverbial grain of salt, they do reveal however that NSA, the largest and most well-funded of the secret state’s intel shops will use their formidable surveillance assets to increase their power while undermining civilian control over the military in cahoots with shadowy security corporations who do their bidding. (Readers are well-advised to peruse The Surveillance Catalog posted by The Wall Street Journal as part of their excellent What They Know series for insight into the burgeoning Surveillance-Industrial Complex).

    As investigative journalist James Bamford pointed out recently in Wired Magazine, “the exponential growth in the amount of intelligence data being produced every day by the eavesdropping sensors of the NSA and other intelligence agencies” is “truly staggering.”

    In a follow-up piece for Wired, Bamford informed us that when questioned by Congress, Alexander stonewalled a congressional subcommittee when asked whether NSA “has the capability of monitoring the communications of Americans, he never denies it–he simply says, time and again, that NSA can’t do it ‘in the United States.’ In other words it can monitor those communications from satellites in space, undersea cables, or from one of its partner countries, such as Canada or Britain, all of which it has done in the past.”

    Call it Echelon on steroids, the massive, secret surveillance program first exposed by journalists Duncan Campbell and Nicky Hager.

    And with the eavesdropping agency angling for increased authority to monitor the electronic communications of Americans, the latest front in the secret state’s ongoing war against privacy is “cybersecurity” and “infrastructure protection.”

    ‘Information Sharing’ or Blanket Surveillance?

    Among the four bills currently competing for attention, the most egregious threat to civil liberties is the Cyber Intelligence Sharing and Protection Act of 2011 (CISPA, H.R. 3523).

    Introduced by Mike Rogers (R-MI) and Dutch Ruppersberger (D-MD), the bill amends the National Security Act of 1947, adding language concerning so-called “cyber threat intelligence and information sharing.”

    “Cyber threat intelligence” is described as “information in the possession of an element of the intelligence community directly pertaining to a vulnerability of, or threat to, a system or network of a government or private entity, including information pertaining to the protection of a system or network from: (1) efforts to degrade, disrupt, or destroy such system or network; or (2) theft or misappropriation of private or government information, intellectual property, or personally identifiable information.”

    In keeping with other “openness” mandates of our Transparency Administration™ the Rogers bill will require the Director of National Intelligence (DNI) to establish procedures that permit IC elements to “share cyber threat intelligence with private-sector entities, and (2) encourage the sharing of such intelligence.”

    These measures however, will not protect the public at large from attacks by groups of organized cyber criminals since such intelligence is only “shared with certified entities or a person with an appropriate security clearance,” gatekeepers empowered by the state who ensure that access to information is “consistent with the need to protect U.S. national security, and used in a manner that protects such intelligence from unauthorized disclosure.”

    In other words, should “cleared” cyber spooks be directed by their corporate or government masters to install state-approved malware on private networks as we discovered last year as a result of the HBGary hack by Anonymous, it would be a crime punishable by years in a federal gulag if official lawbreaking were disclosed.

    The bill authorizes “a cybersecurity provider (a non-governmental entity that provides goods or services intended to be used for cybersecurity purposes),” i.e., an outsourced contractor from any one of thousands of spooky “cybersecurity” firms, to use “cybersecurity systems to identify and obtain cyber threat information in order to protect the rights and property of the protected entity; and share cyber threat information with any other entity designated by the protected entity, including the federal government.”

    Furthermore, the legislation aims to regulate “the use and protection of shared information, including prohibiting the use of such information to gain a competitive advantage and, if shared with the federal government, exempts such information from public disclosure.”

    And should the public object to the government or private entities trolling through their personal data in the interest of “keeping us safe” well, there’s an app for that too! The bill “prohibits a civil or criminal cause of action against a protected entity, a self-protected entity (an entity that provides goods or services for cybersecurity purposes to itself), or a cybersecurity provider acting in good faith under the above circumstances.”

    One no longer need wait until constitutional violations are uncovered, the Rogers bill comes with a get-out-of-jail-free card already in place for state-approved scofflaws.

    Additionally, the bill also “preempts any state statute that restricts or otherwise regulates an activity authorized by the Act.” In other words, in states like California where residents have “an inalienable right to privacy” under Article 1, Section 1 of the State Constitution, the Rogers bill would be abolish that right and effectively “legalize” unaccountable snooping by the federal government or other “self-protected,” i.e., private entities deputized to do so by the secret state.

    Social Media Spying

    How would this play out in the real world? As Government Computer News reported, hyped-up threats of an impending “cyber-armageddon” have spawned a host of new actors constellating America’s Surveillance-Industrial Complex: the social media analyst.

    “Companies and government agencies alike are using tools to sweep the Internet–blogs, websites, and social media such as Facebook and Twitter feeds–to find out what people are saying about, well, just about anything.”

    Indeed, as researchers Jerry Brito and Tate Watkins pointed out last year in Loving the Cyber Bomb?, “An industrial complex reminiscent of the Cold War’s may be emerging in cybersecurity today.”

    Brito and Watkins averred that “the military-industrial complex was born out of exaggerated Soviet threats, a defense industry closely allied with the military and Department of Defense, and politicians striving to bring pork and jobs home to constituents. A similar cyber-industrial complex may be emerging today, and its players call for government involvement that may be superfluous and definitely allows for rent seeking and pork barreling.”

    Enter social media analysis and the private firms out to make a buck–at our expense.

    “Not surprisingly,” GCN’s Patrick Marshall wrote, “intelligence agencies have already been looking at social media as a source of information. The Homeland Security Department has been analyzing traffic on social networks for at least the past three years.”

    While DHS claims it does not routinely monitor Facebook or Twitter, and only responds when it receives a “tip,” such assertions are demonstrably false.

    Ginger McCall, the director of the Electronic Electronic Privacy Information Center’s Open Government Program told GCN that the department is “explicitly monitoring for criticism of the government, for reports that reflect adversely on the agency, for public reaction to policy proposals.”

    But DHS isn’t the only agency monitoring social media sites such as Facebook and Google+.

    As Antifascist Calling reported back in 2009, according to New Scientist the National Security Agency “is funding research into the mass harvesting of the information that people post about themselves on social networks.”

    Not to be outdone, the CIA’s venture capital investment arm, In-Q-Tel, has poured millions of dollars into Visible Technologies, a Bellevue, Washington-based firm specializing in “integrated marketing, social servicing, digital experience management, and consumer intelligence.”

    According to In-Q-Tel “Visible Technologies has developed TruCast®, which takes an innovative and holistic approach to social media management. TruCast has been architected as an enterprise-level solution that provides the ability to track, analyze, and respond to social media from a single, Web-based platform.”

    Along similar lines, the CIA has heavily invested in Recorded Future, a firm which “extracts time and event information from the web. The company offers users new ways to analyze the past, present, and the predicted future.”

    The firm’s defense and intelligence analytics division promises to “help analysts understand trends in big data, and foresee what may happen in the future. Groundbreaking algorithms extract temporal and predictive signals from unstructured text. Recorded Future organizes this information, delineates results over interactive timelines, visualizes past trends, and maps future events–all while providing traceability back to sources. From OSINT to classified data, Recorded Future offers innovative, massively scalable solutions.”

    As Government Computer News pointed out, in January the FBI “put out a request for vendors to provide information about available technologies for monitoring and analyzing social media.” Accordingly, the Bureau is seeking the ability to:

    • Detect specific, credible threats or monitor adversarial situations.

    • Geospatially locate bad actors or groups and analyze their movements, vulnerabilities, limitations, and possible adverse actions.

    • Predict likely developments in the situation or future actions taken by bad actors (by conducting trend, pattern, association, and timeline analysis).

    • Detect instances of deception in intent or action by bad actors for the explicit purpose of misleading law enforcement.

    • Develop domain assessments for the area of interest (more so for routine scenarios and special events).

    So much for privacy in our Orwellian New World Order!

    Backdoor Official Secrets Act

    Social media “harvesting” by private firms hot-wired into the state’s Surveillance-Industrial Complex will be protected from challenges under provisions of CISPA.

    As the Electronic Frontier Foundation (EFF) pointed out, “a company that protects itself or other companies against ‘cybersecurity threats’ can ‘use cybersecurity systems to identify and obtain cyber threat information to protect the rights and property’ of the company under threat. But because ‘us[ing] cybersecurity systems’ is incredibly vague, it could be interpreted to mean monitoring email, filtering content, or even blocking access to sites. A company acting on a ‘cybersecurity threat’ would be able to bypass all existing laws, including laws prohibiting telcos from routinely monitoring communications, so long as it acted in ‘good faith’.”

    And as EFF’s Rainey Reitman and Lee Tien aver, the “broad language” concerning what constitutes a cybersecurity “threat,” is an invitation for the secret state and their private “partners” to include “theft or misappropriation of private or government information, intellectual property, or personally identifiable information.”

    “Yes,” Reitman and Tien wrote, “intellectual property. It’s a little piece of SOPA wrapped up in a bill that’s supposedly designed to facilitate detection of and defense against cybersecurity threats. The language is so vague that an ISP could use it to monitor communications of subscribers for potential infringement of intellectual property. An ISP could even interpret this bill as allowing them to block accounts believed to be infringing, block access to websites like The Pirate Bay believed to carry infringing content, or take other measures provided they claimed it was motivated by cybersecurity concerns.”

    More troubling, “the government and Internet companies could use this language to block sites like WikiLeaks and NewYorkTimes.com, both of which have published classified information.”

    Should CISPA pass muster it could serve as the basis for establishing an American “Official Secrets Act.” In the United Kingdom, the Act has been used against whistleblowers to prohibit disclosure of government crimes. But it does more than that. The state can also issue restrictive “D-Notices” that “advise” editors not to publish material on subjects deemed sensitive to the “national security.”

    EFF warns that “online publishers like WikiLeaks are currently afforded protection under the First Amendment; receiving and publishing classified documents from a whistleblower is a common journalistic practice. While there’s uncertainty about whether the Espionage Act could be brought to bear against WikiLeaks, it is difficult to imagine a situation where the Espionage Act would apply to WikiLeaks without equally applying to the New York Times, the Washington Post, and in fact everyone who reads about the cablegate releases.”

    And with the Obama regime’s crusade to prosecute and punish whistleblowers, as the recent indictment of former CIA officer John Kiriakou for alleged violations of the Espionage Act and the Intelligence Identities Protection Act for disclosing information on the CIA’s torture programs, we have yet another sterling example of administration “transparency”! While Kiriakou faces 30 years in prison, the former head of the CIA’s Directorate of Operations, Jose A. Rodriguez Jr., who was responsible for the destruction of 92 torture videotapes held by the Agency, was not charged by the government and was given a free pass by the Justice Department.

    As the World Socialist Web Site points out: “More fundamentally, the prosecution of Kiriakou is part of a policy of state secrecy and repression that pervades the US government under Obama, who came into office promising ‘the most transparent administration in history.’”

    Critic Bill Van Auken observed that Kiriakou’s prosecution “marks the sixth government whistleblower to be charged by the Obama administration under the Espionage Act, twice as many such prosecutions as have been brought by all preceding administrations combined. Prominent among them is Private Bradley Manning, who is alleged to have leaked documents exposing US war crimes to WikiLeaks. He has been held under conditions tantamount to torture and faces a possible death penalty.”

    “In all of these cases,” the World Socialist Web Site noted, “the World War I-era Espionage Act is being used to punish not spying on behalf of a foreign government, but exposing the US government’s own crimes to the American people. The utter lawlessness of US foreign policy goes hand in hand with the collapse of democracy at home.”

    The current crop of “cybersecurity” bills are sure to hasten that collapse.

    Under Rogers’ legislation, “the government would have new, powerful tools to go after WikiLeaks,” or anyone else who challenges the lies of the U.S. government by publishing classified information that contradicts the dominant narrative.

    By Tom Burghardt
    Global Research, April 10, 2012

    Find this story at 10 April 2013

    Copyright © 2005-2013 GlobalResearch.ca

    US: Silencing news sources?

    After the seizure of AP’s phone records, we ask if the US is still the land of the free for journalists and sources.

    On May 10th, the Associated Press news agency received an email from the US Department of Justice saying that records of more than 20 phone lines assigned to its reporters had been secretly seized as part of an investigation into a government leak.
    The government claimed it was a matter of national security, while the AP called it an unprecedented intrusion into its newsgathering operations. But should the journalistic community be so surprised? With the Obama White House’s track record on whistleblowers and WikiLeaks, the move to spy on AP seems consistent with an administration more committed to secrecy than ever before.
    Is the United States still the land of the free for journalists and their sources? In this week’s News Divide we speak to Laura Malone, legal counsel for the Associated Press; Jeremy Scahill, author of Dirty Wars; The World is a Battlefield; the investigative reporter Dana Priest of the Washington Post; and Ben Wizner from the American Civil Liberties Union.
    This week’s Newsbytes: After two years in hiding, a prominent Bahraini blogger reappears in the UK; Globovision, a leading opposition outlet in Venezuela, is sold to businessmen allegedly friendly with the government; and Islamabad is missing one of the most prominent Western journalists based there – the New York Times’ Declan Walsh was ordered to leave the country before the election.
    One of the lesser-known consequences of the US-led ‘war on terror’ has been a wave of anti-terrorism legislation in other countries. One of them is Ethiopia. It is not a country known for its freedom of the press and, with ongoing internal conflicts with separatist groups, and the powers that be keeping a wary eye on the nearby Arab Spring, the government in Addis Ababa has been cracking down on the media.
    It is doing so with an anti-terror law passed in 2009, which has led to the sentencing of 11 journalists, sent dozens of reporters into exile and has forced countless others to practice self-censorship. The Listening Post’s Nic Muirhead reports on the law that blurs the line between journalism and terrorism.
    Unless you have been in orbit or beyond, you have probably already seen our Video of the Week – it’s astronaut Chris Hadfield and his version of David Bowie’s Space Oddity, recorded while on board the International Space Station. It has been watched online and on TV millions of times over, but it is so good that we wanted to run it anyway.

    Listening Post Last Modified: 18 May 2013 08:09

    Find this story at 18 May 2013

    Is the Government Spying on Reporters; More Often Than We Think?

    There’s evidence that the Justice Department’s seizure of Associated Press phone records is far from unprecedented.

    The Justice Department’s seizure of call logs [1] related to phone lines used by dozens of Associated Press reporters has provoked a flurry of bipartisan criticism, most of which has cast the decision as a disturbing departure from the norm. AP head Gary Pruitt condemned the decision, part of an investigation into leaks of classified information, as a “massive and unprecedented intrusion.” Yet there’s plenty of circumstantial evidence suggesting the seizure may not be unprecedented—just rarely disclosed.

    The Justice Department is supposed to follow special rules [2] when it seeks the phone records of reporters, in recognition that such snooping conflicts with First Amendment values. As Pruitt complained in an angry letter to Attorney General Eric Holder, those logs provided the government a “road map” of the stories his reporters were investigating, and there is evidence that such seizures deter [3] anonymous sources from speaking to the press—whether they’re discussing classified programs or merely facts that embarrass the government.

    Federal regulations require that the attorney general personally approve such a move, ensure the request is narrow and necessary, and notify the news organization about the request—in advance whenever possible. In this case, however, the Justice Department seems to have used an indiscriminate vacuum-cleaner [4] approach—seeking information (from phone companies) about a wide range of phone numbers used by AP reporters—and it only notified AP after the fact.

    It wouldn’t be surprising if there were more cases like this we’ve never heard about. Here’s why: The Justice Department’s rules only say the media must be informed about “subpoenas” for “telephone toll records.” The FBI’s operations guidelines [5] interprets those rules quite literally, making clear the requirement “concerns only grand jury subpoenas.” That is, these rules don’t apply to National Security Letters [6], which are secret demands for information used by the FBI that don’t require judicial approval. The narrow FBI interpretation also doesn’t cover administrative subpoenas, which are issued by federal agencies without prior judicial review. Last year, the FBI issued NSLs for the communications and financial records of more than 6,000 Americans—and the number has been far higher in previous years. The procedures that do apply to those tools have been redacted from publicly available versions of the FBI guidelines. Thus, it’s no shocker the AP seizure would seem like an “unprecedented intrusion” if the government doesn’t think it has to tell us about the precedents. And there’s no telling if the Justice Department rules (and the FBI’s interpretation) allow the feds to seize without warning other types of electronic communications records that could reveal a journalist’s e-mail, chat, or Web browsing activity.

    Is it paranoid to fear the Justice Department and the FBI are sidestepping the rules? Consider a case first reported in 2008 [7], and discussed at length in a damning (but heavily redacted) 2010 report [8] from the Justice Department’s Office of the Inspector General. In this instance, the FBI obtained nearly two years of phone records for lines belonging to Washington Post and New York Times bureaus and reporters—even though the FBI had initially requested records covering only seven months. In what the OIG called a “serious abuse of the FBI’s authority to obtain information,” agents seized these records under false pretenses, “without any legal process or Attorney General approval.” And these records remained in the FBI’s database for over three years before the OIG or the press found out [7].

    It gets worse. The OIG report noted that the FBI had made “community of interest” requests to phone carriers; these requests sweep in not only the target’s call records, but those of people the target has spoken with—which can include reporters. Such requests can provide investigators an incredibly revealing portrait of entire social networks. Yet the OIG found that agents used boilerplate requests for information from the carriers; some claimed they submitted the requests without actually knowing exactly what “community of interest” meant, and even when they did it didn’t necessarily occur to them that they were likely to obtain reporter records through such requests. In other words, FBI agents often made these requests without fully understanding what they were requesting.

    By Julian Sanchez | Fri May. 17, 2013 1:01 PM PDT

    Find this story at 17 May 2013

    Copyright ©2013 Mother Jones and the Foundation for National Progress.

    AP records seizure just latest step in sweeping U.S. leak probe

    WASHINGTON (Reuters) – The Justice Department’s controversial decision to seize phone records of Associated Press journalists was just one element in a sweeping U.S. government investigation into media leaks about a Yemen-based plot to bomb a U.S. airliner, government officials said on Wednesday.

    The search for who leaked the information is being led by the U.S. Attorney’s Office in Washington and has involved extensive FBI interviews of personnel at the Justice Department, U.S. intelligence agencies, the White House’s National Security staff and the FBI itself.

    The interviews have been lengthy and thorough, said people who have been questioned in the investigation, but requested anonymity. Two of those interviewed said leak inquiries were always aggressive and that being questioned is a wearing and unpleasant experience.

    The investigation, which a law enforcement official has said was prompted by a May 7, 2012, AP story about the operation to foil the Yemen plot, appears to be ongoing. Some potential witnesses have been advised they are likely to be interviewed in the next two or three weeks.

    Officials in the office of Ronald Machen, the U.S. attorney for the District of Columbia, could not immediately be reached for comment.

    Attorney General Eric Holder, who recused himself from involvement in the case, largely sidestepped questions from angry lawmakers on Wednesday about his department’s secret seizure of AP records, which the news agency revealed on Monday.

    The seizure, denounced by critics as a gross intrusion into freedom of the press, has created an uproar in Washington and led to questions about how the Obama administration is balancing the need for national security with privacy rights.

    There are signs the administration’s efforts to find the alleged leaker were unproductive – at least before the Justice Department seized two months of records of phone calls by the AP and its journalists.

    “Seeking toll records associated with media organizations is undertaken only after all other reasonable alternative investigative steps have been taken,” Holder’s deputy, James Cole, said in a letter on Tuesday to AP President Gary Pruitt, who has protested the government’s action.

    In that letter, Cole revealed the Justice Department had conducted more than 550 interviews and reviewed tens of thousands of documents before subpoenaing phone company records of AP calls.

    Reuters was one of nearly 50 news organizations that signed a letter to Holder on Tuesday complaining about the AP phone record seizures.

    ‘BREATHTAKING SCOPE’

    Floyd Abrams, a prominent First Amendment and media attorney, said, “The breathtaking scope of these subpoenas served on the telephone companies might suggest that after all this time, they have no idea who they’re looking for.”

    Another possibility is “they are touching all bases” because they suspect someone but are not sure, said Abrams, a partner at Cahill Gordon and Reindel LLP in New York. He said it was difficult for an outsider to know.

    “I don’t think that there is any doubt that this is a serious investigation that they have spent a lot of time on and that they feel deeply about,” Abrams said. Justice’s targeting of a large number of phone lines and the AP journalists who use them “taken together, certainly makes it look like the largest, most intrusive action by the government vis-a-vis the press that I can remember.”

    Holder has called the leak “very, very serious” and said it “put the American people at risk.” He did not provide details.

    The AP has reported that it delayed reporting the story of how the United States had foiled a plot by a suicide bomber affiliated with Yemen-based Al Qaeda in the Arabian Peninsula, or AQAP, at the request of government officials, who said it would jeopardize national security. Once U.S. officials said those concerns were allayed, the AP said, it disclosed the plot.

    A law enforcement official said on Wednesday that because officials were so concerned and shocked by the leak, they opened an investigation into how the AP found out about the spy operation even before the news agency ran its initial story. The AP had contacted the government and asked for comment several days before the story was published.

    The AP’s first story reported the CIA had “thwarted an ambitious plot” by AQAP to attack an airline with a newly designed underwear bomb and said the FBI had acquired the bomb. The AP reported it did not know what had happened to the alleged bomber.

    A few hours after the story was published, John Brennan, then chief White House counterterrorism adviser and now director of the CIA, held a conference call with former counterterrorism officials who frequently appear as TV commentators. Brennan said the plot was never a threat to the U.S. public or air safety because Washington had “inside control” over it.

    (Editing by Warren Strobel and Peter Cooney)
    Wed, May 15 2013

    By Mark Hosenball and Tabassum Zakaria

    Find this story at 15 May 2013

    © Thomson Reuters 2011. All rights reserved.

    Exclusive: Did White House “spin” tip a covert op?

    WASHINGTON (Reuters) – White House efforts to soft-pedal the danger from a new “underwear bomb” plot emanating from Yemen may have inadvertently broken the news they needed most to contain.

    At about 5:45 p.m. EDT on Monday, May 7, just before the evening newscasts, John Brennan, President Barack Obama’s top White House adviser on counter-terrorism, held a small, private teleconference to brief former counter-terrorism advisers who have become frequent commentators on TV news shows.

    According to five people familiar with the call, Brennan stressed that the plot was never a threat to the U.S. public or air safety because Washington had “inside control” over it.

    Brennan’s comment appears unintentionally to have helped lead to disclosure of the secret at the heart of a joint U.S.-British-Saudi undercover counter-terrorism operation.

    A few minutes after Brennan’s teleconference, on ABC’s World News Tonight, Richard Clarke, former chief of counter-terrorism in the Clinton White House and a participant on the Brennan call, said the underwear bomb plot “never came close because they had insider information, insider control.”

    A few hours later, Clarke, who is a regular consultant to the network, concluded on ABC’s Nightline that there was a Western spy or double-agent in on the plot: “The U.S. government is saying it never came close because they had insider information, insider control, which implies that they had somebody on the inside who wasn’t going to let it happen.”

    DOUBLE AGENT

    The next day’s headlines were filled with news of a U.S. spy planted inside Yemen-based Al Qaeda in the Arabian Peninsula (AQAP), who had acquired the latest, non-metallic model of the underwear bomb and handed it over to U.S. authorities.

    At stake was an operation that could not have been more sensitive — the successful penetration by Western spies of AQAP, al Qaeda’s most creative and lethal affiliate. As a result of leaks, the undercover operation had to be shut down.

    The initial story of the foiling of an underwear-bomb plot was broken by the Associated Press.

    According to National Security Council spokesman Tommy Vietor, due to its sensitivity, the AP initially agreed to a White House request to delay publication of the story for several days.

    But according to three government officials, a final deal on timing of publication fell apart over the AP’s insistence that no U.S. official would respond to the story for one clear hour after its release.

    When the administration rejected that demand as “untenable,” two officials said, the AP said it was going public with the story. At that point, Brennan was immediately called out of a meeting to take charge of damage control.

    Relevant agencies were instructed to prepare public statements and urged to notify Congressional oversight panels. Brennan then started the teleconference with potential TV commentators.

    White House officials and others on the call insist that Brennan disclosed no classified information during that conference call and chose his words carefully to avoid doing so.

    The AP denies any quid pro quo was requested by them or rejected by the White House. “At no point did AP offer or propose a deal with regard to this story,” said AP spokesman Paul Colford.

    As for his appearance on ABC, Richard Clarke acknowledges he made a logical “leap” when he said that “inside control” meant “there was human inside control rather than anything else I could imagine.” But he adds that over the course of a week, ABC “took extraordinary measures … to make sure” that nothing it was planning to broadcast would damage ongoing counter-terrorism operations.

    PREMATURE SHUTDOWN

    As a result of the news leaks, however, U.S. and allied officials told Reuters that they were forced to end an operation which they hoped could have continued for weeks or longer.

    Several days after the first leaks, counter-terrorism sources confirmed to Reuters that a central role in the operation had been played by MI-5 and MI-6, Britain’s ultra-secretive domestic and foreign intelligence services, whose relationship with their American counterparts has been periodically strained by concern about leaks.

    These sources acknowledged that British authorities were deeply distressed that anything at all had leaked out about the operation.

    The White House places the blame squarely on AP, calling the claim that Brennan contributed to a leak “ridiculous.”

    “It is well known that we use a range of intelligence capabilities to penetrate and monitor terrorist groups,” according to an official statement from the White House national security staff.

    (Reporting By Mark Hosenball; Editing by Warren Strobel and Jim Loney)

    Fri, May 18 2012

    By Mark Hosenball

    Find this story at 18 May 2013

    © Thomson Reuters 2011

    Here’s the story the AP suspects led to sweeping Justice Dept. subpoena

    The Department of Justice secretly obtained Associated Press phone records from 20 different phone lines over two months, according to the news agency. The subpoenaed phones records included personal and office lines for several national security reporters and editors as well as “the main number for AP reporters in the House of Representatives press gallery.”

    Presumably, now that the story has broken, public pressure will compel some sort of explanation from the Department of Justice or the Obama administration. In the meantime, the AP’s own story on the incident strongly suggests a theory for what happened: that the DoJ was looking for the source on the AP’s May 2012 story about a successful CIA operation to thwart a Yemen-based terror plot, a sort of underwear bomber part two.

    Here’s what the AP says in its story about the subpoena:

    The government would not say why it sought the records. U.S. officials have previously said in public testimony that the U.S. attorney in Washington is conducting a criminal investigation into who may have leaked information contained in a May 7, 2012, AP story about a foiled terror plot. The story disclosed details of a CIA operation in Yemen that stopped an al-Qaida plot in the spring of 2012 to detonate a bomb on an airplane bound for the United States.

    In testimony in February, CIA Director John Brennan noted that the FBI had questioned him about whether he was AP’s source, which he denied. He called the release of the information to the media about the terror plot an “unauthorized and dangerous disclosure of classified information.”

    And here’s a snip from the original May 2012 AP story that the agency believes may have started it all. Note that the story seems to cite both the FBI and CIA, as well as revealing that the bomb may not have been detectable by then-current airport security scanners:

    US officials say the plot involved an “upgrade” of the underwear bomb that failed to detonate aboard a jetliner over Detroit on Christmas Day in 2009.

    This new bomb was also built to be used in a passenger’s underwear but contained a more refined detonation system.

    The FBI is examining the latest bomb to see whether it could have passed through airport security and brought down an airplane, officials said. They said the device did not contain metal, meaning it probably could have passed through an airport metal detector. But it was not clear whether new body scanners used in many airports would have detected it.

    The would-be suicide bomber, based in Yemen, had not yet picked a target or bought his plane tickets when the CIA stepped in and seized the bomb, officials said. It is not immediately clear what happened to the alleged bomber.

    By Max Fisher, Updated: May 13, 2013

    Find this story at 13 May 2013

    © The Washington Post Company

    Use These Secret NSA Google Search Tips to Become Your Own Spy Agency

    There’s so much data available on the internet that even government cyberspies need a little help now and then to sift through it all. So to assist them, the National Security Agency produced a book to help its spies uncover intelligence hiding on the web.

    The 643-page tome, called Untangling the Web: A Guide to Internet Research (.pdf), was just released by the NSA following a FOIA request filed in April by MuckRock, a site that charges fees to process public records for activists and others.

    The book was published by the Center for Digital Content of the National Security Agency, and is filled with advice for using search engines, the Internet Archive and other online tools. But the most interesting is the chapter titled “Google Hacking.”

    Say you’re a cyberspy for the NSA and you want sensitive inside information on companies in South Africa. What do you do?

    Search for confidential Excel spreadsheets the company inadvertently posted online by typing “filetype:xls site:za confidential” into Google, the book notes.

    Want to find spreadsheets full of passwords in Russia? Type “filetype:xls site:ru login.” Even on websites written in non-English languages the terms “login,” “userid,” and “password” are generally written in English, the authors helpfully point out.

    Misconfigured web servers “that list the contents of directories not intended to be on the web often offer a rich load of information to Google hackers,” the authors write, then offer a command to exploit these vulnerabilities — intitle: “index of” site:kr password.

    “Nothing I am going to describe to you is illegal, nor does it in any way involve accessing unauthorized data,” the authors assert in their book. Instead it “involves using publicly available search engines to access publicly available information that almost certainly was not intended for public distribution.” You know, sort of like the “hacking” for which Andrew “weev” Aurenheimer was recently sentenced to 3.5 years in prison for obtaining publicly accessible information from AT&T’s website.

    Stealing intelligence on the internet that others don’t want you to have might not be illegal, but it does come with other risks, the authors note: “It is critical that you handle all Microsoft file types on the internet with extreme care. Never open a Microsoft file type on the internet. Instead, use one of the techniques described here,” they write in a footnote. The word “here” is hyperlinked, but since the document is a PDF the link is inaccessible. No word about the dangers that Adobe PDFs pose. But the version of the manual the NSA released was last updated in 2007, so let’s hope later versions cover it.

    By Kim Zetter05.08.132:37 PM

    Find this story at 8 May 2013

    Untangling the Web: A Guide to Internet Research

    Wired.com © 2013 Condé Nast.

    CIA requested Zero Dark Thirty rewrites, memo reveals

    Document shows agency requested removal of interrogation scene with dog, and shots of operatives partying with AK47

    A newly declassified CIA document suggests members of the US agency did help to shape the narrative of Zero Dark Thirty, Kathryn Bigelow’s recent film about the hunt for Osama bin Laden.

    In January the US Senate intelligence committee launched an investigation into whether Bigelow and screenwriter Mark Boal were granted “inappropriate access” to classified CIA material following concern from high-profile members over the film’s depiction of torture in the search for the al-Qaida chief. The probe was dropped in February after Zero Dark Thirty, which had initially been tipped as an Oscars frontrunner, left the world’s most famous film ceremony with just a single award for sound editing.

    However according to Gawker it has now emerged that the CIA did successfully pressure Boal to remove certain scenes from the Zero Dark Thirty script, some of which might have cast the agency in a negative light. Details emerged in a memo released under a US Freedom of Information Act request. It summarises five conference calls held in late 2011 for staff in the agency’s Office of Public Affairs “to help promote an appropriate portrayal of the agency and the Bin Laden operation”.

    Several elements of the draft screenplay for Zero Dark Thirty were changed for the final film upon agency request, according to the memo. Jessica Chastain’s Maya, the film’s main protagonist, was originally seen participating in an early water-boarding torture scene, but in the final film she is only an observer. A scene in which a dog is used to interrogate a suspect was also excised from the shooting script. Finally a segue in which agents party on a rooftop in Islamabad, drinking and shooting off an AK47 in celebration, was also removed upon CIA insistence. This was agreed to despite the documented use of aggressive dogs in US interrogations of terror suspects at Guantánamo Bay in the early days of George W Bush’s war on terror, and despite some of the photographs from the later Abu Ghraib scandal featuring dogs menacing naked prisoners.

    Ben Child
    guardian.co.uk, Tuesday 7 May 2013 16.47 BST

    Find this story at 7 May 2013
    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Völlig unkontrolliert: Brüssel leistet sich einen eigenen Geheimdienst

    Neben der CIA und dem KGB gibt es auch einen eigenen Geheimdienst. Die EU Intelligence Community beschäftigt 1.300 Mitarbeiter und kostet den Steuerzahler 230 Millionen Euro jährlich. Nun regt sich im Europäischen Parlament Widerstand gegen die Truppe. Denn niemand kontrolliert die Spione Brüssels effektiv.

    Parallel zu den nationalen Geheimdiensten in Europa leistet sich auch die EU einen eigenen Geheimdienst. Millionen Euro werden dafür jedes Jahr ausgegeben. 1.300 Mitarbeiter versorgen die EU dafür mit wichtigen Informationen. Eine wirklich effektive Kontrolle gibt es nicht. Transparenz gilt unter Geheimdiensten als Todsünde.

    Insoweit passt diese Einrichtung gut in das bürokratische Schema in Brüssel.

    Brüssel, die Stadt der Lobbyisten, Parlamentarier und – Spione. „Ich denke man kann mit Sicherheit sagen, dass Brüssel eine der größten Spionagehauptstädte der Welt ist“, zitiert der österreichische EU-Abgeordnete Martin Ehrenhauser den Leiter des belgischen Sicherheitsdienstes VSSE in seinem blog. Alain Winants geht davon aus, dass mehrere hundert Spione sich in der EU-Hauptstadt tummeln. Diesem munteren Treiben wollte die EU nicht tatenlos zusehen – und hat mit dem Aufbau eines eigenen Geheimdiensts begonnen.

    Insgesamt sechs Einheiten gibt es in Brüssel, die als EU-Geheimdienst zusammengefasst werden können, die EU-Intelligence Community. Neben Europol und Frontex gehören dazu auch vier nachrichtendienstliche Einheiten, sagte Martin Ehrenhauser den Deutschen Wirtschafts Nachrichten. Diese sind das Intelligence Analysis Center, das Satellite Center, das Intelligence Directorate und der Situation Room. Diese gehören dem Auswärtigen Dienst (EAD) an. 230 Millionen Euro jährlich erhalten die sechs Einheiten des EU-Geheimdienstes aus dem EU-Budget. Dieser Etat „ist über die letzten Jahre kontinuierlich gestiegen, selbstverständlich“, so Ehrenhauser. 1.300 Mitarbeiter arbeiten dort. So hat der EU-Geheimdienst in etwa die Größe „eines Geheimdienstes eines kleinen, mittelgroßen Staates wie Österreich“.

    Jedoch gibt es eigentlich nur für Europol eine rechtliche Grundlage. Das Problem sei vor allem, so Ehrenauser, dass das EU-Parlament kein wirkliches Mitspracherecht bei den Einheiten des Geheimdienstes habe. Jedoch sei eine „parlamentarische, demokratische Kontrolle durch das Parlament dringend notwendig“. Bei Europol und Frontex sei die parlamentarische Kontrolle „relativ stabil“. Bei den vier nachrichtendienstlichen Einheiten sei dies aber so gut wie gar nicht gegeben. Es gebe eine Art budgetrechtliche Kontrolle, aber beim Personal oder dem genauen Einsatz der EU-Mittel könne das Parlament nicht mitreden, sagte Ehrenhauser. Eine entsprechende Initiative des Parlaments für eine bessere parlamentarische Kontrolle sei jedoch kürzlich abgelehnt worden.

    Deutsche Wirtschafts Nachrichten | 08.05.13, 08:57

    Find this story at 8 May 2013

    © 2013 Blogform Social Media

    EU-Geheimdienst: Schwammige Kooperation

    Durch den Sitz der NATO und der EU wurde Brüssel zu einem bedeutenden Schauplatz der Weltpolitik. Die Informationen die in dieser Stadt kursieren sind nicht nur für Frankreich oder Polen von entscheidender Bedeutung, sondern auch für China und den Iran. Die belgische Hauptstadt ist ein europäischer Hotspot für diplomatische Vertretungen, Lobbyorganisationen und Geheimdienste.

    „Ich denke man kann mit Sicherheit sagen, dass Brüssel eine der größten Spionagehauptstädte der Welt ist“, so Alain Winants, Leiter des belgischen Sicherheitsdienstes VSSE. Er schätzt die Anzahl der Spione auf „mehrere Hundert“. Oftmals getarnt als Journalisten, Diplomaten, Studenten oder Lobbyisten umfasst ihr Interesse das gesamte politische Themenspektrum, von der Energie- über Handelspolitik bis hin zur Sicherheitspolitik.

    Mit den wachsenden sicherheitspolitischen Kompetenzen und Bestrebungen der Europäischen Union, sowohl innerhalb als auch außerhalb Europas, hat auch die EU mit dem Aufbau von eigenen nachrichtendienstlichen Einheiten begonnen.

    Die Gründung der „EU-Intelligence Community“ erfolgte ad-hoc und anlassbezogen. Sie folgte keiner Strategie oder einem kohärenten Konzept in Bezug auf Struktur, Methoden und handelnde Personen. Die Gründungsphase begann 1993 mit Europol. Zwischen 2000 und 2004 wurden dann die vier weiteren nachrichtendienstlichen Einheiten aus der Taufe gehoben. Durch Beschluss, Verordnung oder einer gemeinsamen Aktion des Rates. Niemals hatte dabei das EU-Parlament ein Mitspracherecht.

    Einen Sonderfall bildet das Lagezentrum (SitCen), der Vorläufer des Intelligence Directorate (IntDir). Denn die Gründung war lediglich eine Initiative von Javier Solana, dem damaligen Hohen Vertreter der GASP und Generalsekretär des Rates. Es gab keinen Ratsbeschluss. Die Gründung stand damit im Widerspruch mit dem damaligen EU-Vertragsrecht. Denn gemäß Artikel 207 (2) EGV entscheidet der Rat über die Organisation des Generalsekretariats.

    Ungenaue Grenzziehung

    Eine explizite primärrechtliche Grundlage gibt es nur für Europol. Die Gründung wurde im Vertrag über die Europäische Union von 1992 vereinbart und später durch Beschluss des Rates durchgeführt. Die restlichen nachrichtendienstlichen Einheiten finden keine Erwähnung in den Verträgen. Das gilt auch für die Europäisierung der nachrichtendienstlichen Zusammenarbeit. Lediglich in Art. 73 AEUV heißt es: „Es steht den Mitgliedstaaten frei, untereinander und in eigener Verantwortung Formen der Zusammenarbeit und Koordinierung zwischen den zuständigen Dienststellen ihren für den Schutz der nationalen Sicherheit verantwortlichen Verwaltungen einzurichten, die sie für geeignet halten.“ Es existiert somit eine Kooperation ohne klar festgelegte primärrechtliche Grenzen.

    Instabile demokratischer Kontrolle

    Schwammig ist auch die demokratische Kontrolle. Von offizieller Seite heißt es, dass keine Geheimdienste im klassischen Sinne auf EU-Ebene existieren, da keine verdeckten Einsätze durchgeführt werden. Außerdem werde nur „Finished Intelligence“ von nationalen Diensten an die EU-Institutionen übermittelt. Zuständig für die parlamentarische Kontrolle seien somit die nationalen Instanzen – nicht das EU-Parlament.

    Fakt ist, dass die EU-Einheiten immer eigenständiger Informationen sammeln ¬– etwa über die EU-Delegationen oder das Satellite Center (SatCen). Dass die EU zu 100 Prozent von den Informationen der nationalen Behörden abhängig sei, ist damit ein Trugschluss.

    Die EU-Einheiten erfüllen zudem eine ähnliche Funktion wie nationale Nachrichtendienste: Sie sammeln und analysieren Informationen und leiten diese an politsche Entschiedungsträger weiter. Die Tatsache, dass eine Methode (Covert Actions) der Informationsgewinnung nicht unmittelbar angewandt wird, reicht nicht aus um gdie Existenz eines Nachrichtendienstes und damit die Notwendigkeit einer europäischen parlamentarischen Kontrolle zu leugnen. In dubio pro democratia!

    Hinzu kommt das demokratische Grundproblem von „International Governance“: Immer komplexere Entscheidungsstrukturen mit diffusen Verantwortlichkeiten treffen weitreichende Entscheidungen sehr weit weg vom Wähler. Eine Kontrolle durch das EU-Parlament ist daher zwingend erforderlich, auf allen Ebenen. Strukturell, bei der parlamentarischen Mitsprache über Mandat und Leitung, also darüber, was ein Nachrichtendienst machen soll und machen darf und wer dafür verantwortlich ist. Finanziell, bei der parlamentarischen Mitsprache über Budget und Budgetkontrolle sowie Personalausstattung. Juristisch, im Bezug auf die Zuständigkeit von Gerichten, Strafverfolgungsbehörden sowie notwendige Beschwerdemechanismen. Und nicht zuletzt in Bezug auf Qualitätskontrolle und Art der Leistung.

    Mehr Kontrolle? Knapp gescheitert!

    Die parlamentarische Kontrolle der EU-Agenturen Europol und Frontex weist zwar einige Lücken auf, ist jedoch in Summe stabil. Problematischer wird es bei den nachrichtendienstlichen Einheiten im Auswärtigen Dienst (EAD). Unsere Initiative für eine bessere parlamentarische Kontrolle wurde erst kürzlich im Haushaltskontrollausschuss bei Stimmengleichstand knapp abgelehnt. Gefordert hatten wir unter anderem, dass für die vier Einheiten des EAD eine eigene Budgetlinie im Haushalt des EAD eingeführt werden soll. Damit wäre eine konkrete Mitbestimmung und mehr Transparenz möglich geworden. Schließlich ist bisher nicht klar, wie hoch die einzelnen Budgets sind.

    Die einzelnen Abteilungen im Überblick

    Das Kooperationsnetz, das bisher etabliert wurde, umfasst derzeit vier Abteilungen des Europäischen Auswärtigen Dienstes (EAD) und zwei EU-Agenturen, Europol und Frontex. Insgesamt 1300 Mitarbeiter sind beschäftig und ein Jahresbudget von 230 Millionen Euro steht zur Verfügung:

    Intelligence Analysis Center (IntCen)
    Der Vorgänger des IntCen war das Gemeinsame Lagezentrum (SitCen) der Westeuropäischen Union (WEU). Dieses wurde im Jahr 2000 gemeinsam mit dem Militärstab in die EU eingegliedert und ist seit Jänner 2011 Teil des EAD. Sein Budget ist Teil des EAD-Budgets und somit nicht transparent ausgewiesen. Rund 100 Mitarbeiter arbeiten in Brüssel unter der Leitung des Finnen Ilkka Salmi. Überwiegend EU-Beamte und Zweitbedienstete, jedoch auch nationale Nachrichtendienstexperten.
    Die priviligierten Mitgliedstaaten Frankreich, Deutschland, Italien, Niederlande, Schweden, Spanien und Großbritanien entscheiden, welches Land Experten entsenden darf und welches nicht. Die Hauptaufgaben sind die Frühwarnung über externe Bedrohungen und die Risikobewertung für GSVP-Missionen. IntCen ist der Dreh- und Angelpunkt für militärische und zivile nachrichtendienstliche Informationen. Informationen liefern Europol, Frontex, EU-Mission, EU-Delegationen, EU-Sonderbeauftragte, IntDir und viele mehr. Auch nationale Nachrichtendienste liefern auf freiwilliger Basis „Finished Intelligence“. Darüber hinaus reist das Personal selbst in Krisengebiete, zum Beispiel 2011 nach Lybien. Jährlich werden etwa 200 strategische Lagebeurteilungen, Sonderberichte und Briefings ausgearbeitet. Diese Produkte sind klassifiziert bis zur Geheimhaltungsstufe EU TOP SECRET. Darüber hinaus werden Präsentationen und Briefings für Entscheidungsträger angefertigt. Die Produkte werden auch an Europol und Frontex übermittelt.

    Satellite Center (SatCen)
    Es wurde im Juli 2001 gegründet und hat seinen Sitz in Torrejón de Ardoz in Spanien. Später wurde es in den Europäischen Auswärtigen Dienst (EAD) eingegliedert. Rund 108 Mitarbeiter werten bei einem Jahresbudget von rund 17 Millionen Euro nahe Madrid Satellitenbilder und Geodaten aus. Direktor ist seit 2010 der Slovene Tomaž Lovrenčič. Die Rohdaten werden von kommerziellen Partnern wie Indien, Russland oder den USA ankauft oder von den EU-Mitgliedstaaten an das SatCen übermittelt. Damit werden jährlich rund 700 Dienstleistungsprodukte für Entscheidungsträger der Europäischen Union, der EU-Mitgliedstaaten oder auch der UNO und NATO erstellt. Während des „Arabischen Frühlings“ erhielt das SatCen zahlreiche Aufträge von EUFOR Libya und der NATO.

    Intelligence Directorate (IntDir)
    Die Gründung der IntDir erfolgte 1999, volle Funktionsfähigkeit wurde 2001 erreicht. Die Einheit ist im EU-Militärstab angesiedelt, dem „Working Muscle“ der Gemeinsamen Europäischen Sicherheits- und Verteidigungspolitik (GSVP). Dieser ist ebenfalls nun Teil des EAD. Die Hauptinformationsquellen sind klassifizierte nachrichtendienstliche Produkte, die von den militärischen Nachrichtendiensten der Mitgliedstaaten freiwillig über entsandte nationale Experten in der IntDir zur Verfügung gestellt werden. Die Abteilung unterstützt damit die GSVP bei der Entwicklung von strategischen Leitlinien, der Frühwarnung sowie der Planung und Leitung von GSVP-Mission. Derzeit arbeiten 41 Personen in der Abteilung. Der Chef war bis vor Kurzem Günther Eisl, ein Mitarbeiter des österreichischen Heeresnachrichtenamts. Das Budget ist Teil des EAD-Budgets und somit nicht transparent ausgewiesen.

    Situation Room
    Der Situation Room wurde mit der Gründung des EAD im Jänner 2011 etabliert. Head of Division ist der Grieche Petros Mavromichalis. Rund 21 Mitarbeiter arbeiten unter seiner Leitung. Das Budget ist Teil des EAD-Budgets und somit nicht transparent ausgewiesen. Der Situation Room ist der erste „Point of Contact“ für alle Informationen zu EU-relevanten Krisen. Die Hauptaufgabe ist das Krisen-Monitoring, 24 Stunden täglich, sieben Tage in der Woche. Die Informationen erhält der Situation Room von den EU-Delegationen, EU-Missionen, EU-Sonderberichterstattern, den Mitgliedstaaten, aber auch von Internationalen Organisationen.

    Europol
    Die Gründung eines Europäischen Polizeiamts (Europol) wurde 1992 vereinbart. Seit Jänner 2010 ist Europol eine EU-Agentur. Direktor ist seit April 2009 der Waliser Rob Wainwright. Beinahe 800 Personen arbeiten in Den Haag unter seiner Leitung. Rund 85 Millionen Euro beträgt das Jahresbudget. Zu den Aufgaben zählt das Einholen, Speichern, Verarbeiten, Analysieren und Austauschen von Informationen sowie die Koordinierung, Organisation und Durchführung von Ermittlungen und operativen Maßnahmen. Europol analysiert dabei auch personenbezogene Daten, die von nationalen Nachrichtendiensten und Strafverfolgunsbehörden übermittelt werden. Europol verfügt über zwei Datenbanken. Das Europol Information System (EIS) ist für alle nationalen Polizeibehörden zugänglich und enthält Basisangaben über Personen und Gruppierungen. Die Analytical Work Files (AWFs) sind nur für die Europol-Analysten zugänglich und enthalten sensible personenbezogene Daten von verdächtigen Terroristen. Die Produkte werden als „Operative Intelligence“ und „Strategische Intelligence“ an EU-Entscheidungsträger und an jede Organisation übermittelt, die auch Informationen liefert.

    Frontex
    Die europäische Grenzschutzagentur wurde 2004 gegründet und hat ihren Sitz in Warschau. Unter der Leitung des Finnen Ilkka Laitinen arbeiten 314 Mitarbeiter. 2011 betrug das Budget 118 Millionen Euro. Frontex stellt der EU-Kommission und den Mitgliedstaaten technische Unterstützung und Fachwissen zum Schutz der Außengrenzen zur Verfügung. Die Kernaufgabe ist die Risikoanalyse, inklusive die Bewertung der Kapazitäten, die den Mitgliedstaaten zur Bewältigung von Gefahren zur Verfügung stehen. Die Informationen stammen direkt von den Grenzübergangsstellen oder auch von den Mitgliedstaaten.
    Um die Bereitschaft zur Übermittlung von klassifizierten Informationen mit personenbezogenen Daten zu erhöhen, wurde das sogeannte „Frontex Risk Analysis Network“ (FRAN) eingerichtet. Ein Datennetzwerk, dass Frontex mit den nationlen Nachrichtendiensten und EU-Institutionen verbindet. Auch ähnliche regionale Netzwerke außerhalb der EU werden bereits etabliert. Etwa das „Western Balkans Risk Analysis Network“ (WB RAN). Das Frontex-Lagezentrum ist für das Krisenmonitoring zuständig. Rund 500 Lageberichte werden dort jährlich erstellt und täglich werden Newsletter an rund 350 Empfängerkonten übermittelt. Darüber hinaus erstellt Frontex strategische Bewertungen, Vierteljahresberichte und rund 160 Analyseprodukte zur Unterstützung von gemeinsamen Aktionen.

    Find this story at 6 May 2013

    << oudere artikelen  nieuwere artikelen >>