• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • So schöpfen die Spione Ihrer Majestät deutsche Daten ab

    An einem einzigen Tag soll der britische Geheimdienst GCHQ Zugriff auf 21.600 Terabyte gehabt haben – wozu, weiß nicht einmal der BND. Sicher ist nur: Die Überwacher bekommen Hilfe von großen Telekommunikationskonzernen.

    Das amerikanische Außenministerium hat vor Jahren einen kleinen Flecken in Ostfriesland auf eine Liste der weltweit schützenswürdigen Einrichtungen gesetzt. Ein Angriff auf das Städtchen Norden könnte angeblich die nationale Sicherheit der USA bedrohen. Sogar der Chef des US-Geheimdienstes NSA, General Keith B. Alexander, hat vor terroristischen Attacken gewarnt.

    Norden ist ein heimliches Zentrum der neuen virtuellen Welt. Das TAT-14 (Trans Atlantic Telephone Cable No 14) ist am Hilgenrieder Siel bei Norden verbuddelt. Die meisten Internetverbindungen zwischen Deutschland und Amerika laufen dort durch mehrere Glasfaserleitungen; auch Frankreich, die Niederlande, Dänemark und Großbritannien sind durch TAT-14 miteinander verbunden. Etwa 50 internationale Telekommunikationsfirmen, darunter die Deutsche Telekom, betreiben ein eigenes Konsortium für dieses Kabel.

    Manchmal fließen pro Sekunde Hunderte Gigabyte an Daten durch die Leitungen. Es ist ein gigantischer Datenrausch: Millionen Telefonate und E-Mails schießen durch das Netz. Auch deshalb hat der deutsche Verfassungsschutz stets nachgeschaut, ob in Norden alles in Ordnung ist. Keine Sabotage. Keine Terroristen. Kein Problem?

    Für die über die “Seekabelendstelle” Norden, wie die offizielle Bezeichnung der Einrichtung lautet, vermittelten Daten hat sich offenbar der britische Geheimdienst Government Communications Headquarters (GCHQ) brennend interessiert. Aus Unterlagen des Whistleblowers Edward Snowden jedenfalls soll hervorgehen, dass die Briten im Rahmen der Operation “Tempora” die Daten abgegriffen haben. Es soll sich um unzählige Daten handeln, die aus Deutschland kamen oder nach Deutschland geschickt wurden.

    Das ist nicht der Cyberkrieg, vor dem die amerikanische NSA immer gewarnt hat, sondern ein heimlicher umfassender Big-Data-Angriff auf die Bevölkerung eines befreundeten Landes. Die alte Formel: “Freund hört mit” umfasst das Problem nicht mal ungefähr. Großbritanniens Geheimdienst hat einen Lauschangriff auf Deutschland gestartet.

    Die Menge der abgefangenen Daten ist noch Spekulation, und unklar ist auch, wo der Angriff genau erfolgt sein soll. Sicher nicht in Norden, das früher durch sein Seeheilbad bekannt wurde. Das würde sich kein Nachrichtendienstler trauen. Schon gar nicht in freundlicher Absicht.

    Wahrscheinlich erfolgte der Angriff in dem kleinen Küstenstädtchen Bude im Südwesten Englands, das 858 Kilometer Luftlinie von Norden entfernt liegt. Dort macht das Kabel Zwischenstation – das Ende der Strecke ist New Jersey.

    Dass ein britischer Geheimdienst auf diese Weise und so umfassend E-Mails deutscher Bürger abfängt oder Telefonate abhört, war vor Snowdens Enthüllungen für undenkbar gehalten worden. Der Bundesnachrichtendienst erklärt seit Tagen, dass er von den Aktivitäten der Amerikaner oder der Briten nichts wusste und selbst nur Zeitungswissen habe. Das klingt glaubhaft. Die beiden befreundeten Nationen, heißt es in Berlin, hätten offenbar ihr eigenes nationales Sicherheitsprogramm gefahren.

    So viel Sicherheit war sicherlich nur mithilfe von Kommunikationsgesellschaften möglich. Angeblich sollen die beiden britischen Unternehmen Vodafone und British Telecommunications (BT) den Geheimen behilflich gewesen sein.

    Jeder Eingriff, das erklärt eine Telekom-Sprecherin, müsste von dem internationalen Konsortium genehmigt werden, aber eine solche Genehmigung liegt nicht vor. Ein Sprecher der britischen Vodafone erklärte auf Anfrage, dass sich das Unternehmen an die Gesetze in den jeweiligen Ländern halte und Angelegenheiten, die mit der nationalen Sicherheit zusammenhingen, nicht kommentiere. Diese Formel klingt in diesen Tagen sehr vertraut.

    Rechtsgrundlage für die Aktion “Tempora” ist ein sehr weit gefasstes Gesetz aus dem Jahr 2000. Danach kann die Kommunikation mit dem Ausland abgefangen und gespeichert werden. Die privaten Betreiber der Datenkabel, die beim Abhören mitmachen, sind zum Stillschweigen verpflichtet.

    Nordengate macht klar, wie unterschiedlich Gesetze und Regeln in dieser Welt angewandt werden, es symbolisiert aber auch den Wandel der Geheimdienstarbeit. Ganz früher haben Nachrichtendienste Telefonate über relativ simple Horchposten abgehört. Glasfaserleitungen stellten die Dienste vor neue Herausforderungen. Telefonate werden seitdem in optische Signale umgewandelt. Da die Leitungen vor allem am Meeresboden verlaufen, gerieten Nachrichtendienste für kurze Zeit an ihre Grenzen.

    Bereits um die Jahrtausendwende berichteten amerikanische Blätter, dass die NSA mithilfe von U-Booten an die Daten gelangen wollte. So wurde das Atom-U-Boot Jimmy Carter umgerüstet, um Glasfaserkabel aufzuschlitzen und dann abzuhören. Vorher hatten die Dienste auf anderem Weg regelmäßig Seekabel angezapft. Bei früheren Kupferkabeln reichte ein Induktions-Mikrofon, um die Gespräche abzugreifen. Glasfaserkabel hingegen müssen gebogen werden, um die optisch vermittelten Signale auslesen zu können. Am verwundbarsten sind die Kabel freilich an Land.

    Was die Briten mit den vielen deutschen Daten machen und gemacht haben, erschließt sich selbst dem BND nicht so ganz. An einem einzigen Tag soll der britische Geheimdienst insgesamt Zugriff auf 21.600 Terabyte gehabt haben. Dank Snowden ist bekannt, dass die abgefangenen Inhalte drei Tage vorgehalten wurden und Benutzerdaten 30 Tage. In der Zwischenzeit wurden die Daten mit speziellen Programmen gefiltert. Selbst dem Briten George Orwell wäre ein solches Überwachungsprogramm im Leben nicht eingefallen.

    25. Juni 2013 05:10 Großbritanniens Abhördienst GCHQ
    Von John Goetz, Hans Leyendecker und Frederik Obermaier

    Find this story at 25 June 2013

    Copyright: Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH

    The legal loopholes that allow GCHQ to spy on the world

    William Hague has hailed GCHQ’s ‘democratic accountability’, but legislation drafted before a huge expansion of internet traffic appears to offer flexibility

    GCHQ – the government’s communications headquarters. Does it have the strongest checks and balances in the world? Photograph: Reuters

    William Hague was adamant when he addressed MPs on Monday last week. In an emergency statement (video) forced by the Guardian’s disclosures about GCHQ involvement with the Prism programme, the foreign secretary insisted the agency operated within a “strong framework of democratic accountability and oversight”.

    The laws governing the intelligence agencies provide “the strongest systems of checks and balances for secret intelligence anywhere in the world”, he said.

    Leaked documents seen by the Guardian give the impression some high-ranking officials at GCHQ have a different view.

    In confidential briefings, one of Cheltenham’s senior legal advisers, whom the Guardian will not name, made a note to tell his guests: “We have a light oversight regime compared with the US”.

    The parliamentary intelligence and security committee, which scrutinises the work of the agencies, was sympathetic to the agencies’ difficulties, he suggested.

    “They have always been exceptionally good at understanding the need to keep our work secret,” the legal adviser said.

    Complaints against the agencies, undertaken by the interception commissioner, are conducted under “the veil of secrecy”. And the investigatory powers tribunal, which assesses complaints against the agencies, has “so far always found in our favour”.

    The briefings offer important glimpses into the GCHQ’s view of itself, the legal framework in which it works, and, it would seem, the necessity for reassuring the UK’s most important intelligence partner, the United States, that sensitive information can be shared without raising anxiety in Washington.

    None of the documents advocates law-breaking – quite the opposite. But critics will say they highlight the limitations of the three pieces of legislation that underpin the activities of GCHQ, MI5 and MI6 – which were repeatedly mentioned by Hague as pillars of the regulatory and oversight regime during his statement to the Commons.

    The foreign secretary said GCHQ “complied fully” with the Regulation of Investigatory Powers Act (Ripa), the Human Rights Act (HRA) and the Intelligence Services Act (Isa).

    Privacy campaigners argue the laws have one important thing in common: they were drafted in the last century, and nobody involved in writing them, or passing them, could possibly have envisaged the exponential growth of traffic from telecoms and internet service providers over the past decade.

    Nor could they have imagined that GCHQ could have found a way of storing and analysing so much of that information as part of its overarching Mastering the Internet project.

    The Tempora programme appears to have given Britain’s spymasters that resource, with documents seen by the Guardian showing Britain can retain for up to 30 days an astronomical amount of unfiltered data garnered from cables carrying internet traffic.

    This raises a number of questions about the way GCHQ officials and ministers have legitimised the programme.

    The briefings, which are entitled UK Operational Legalities, stress that GCHQ “is an organisation with a highly responsible approach to compliance with the law”.

    GCHQ also has a well staffed legal team, known as OPP-LEG, to help staff navigate their way through the complexities of the law.

    But there appears to be some nervousness about Tempora. In a paper written for National Security Agency (NSA) analysts entitled A Guide to Using Internet Buffers at GCHQ, the author notes: “[Tempora] represents an exciting opportunity to get direct access to enormous amounts of GCHQ’s special source data.

    “As large-scale buffering of metadata and content represent a new concept for GCHQ’s exploitation of the internet, GCHQ’s legal and policy officers are understandably taking a careful approach to their access and use.”

    So how did GCHQ secure the legal authority for setting up Tempora, and what safeguards are in place for sharing the intelligence with the Americans? According to the documents, the British government used Ripa to get taps on to the fibre-optic cables.

    These cables carry internet traffic in and out of the country and contain details of millions of emails and web searches. The information from these cables went straight into the Tempora storage programme.

    In one presentation, which appeared to be for US analysts from the NSA, GCHQ explained: “Direct access to large volumes of unselected SSE data [is] collected under a Ripa warrant.”

    The precise arrangement between the firms is unclear, as are the legal justifications put before ministers. Isa gives GCHQ some powers for the “passive collection” of data, including from computer networks.

    But it appears GCHQ has relied on paragraph four of section 8 of Ripa to gain “external warrants” for its programmes.

    They allow the agency to intercept external communications where, for instance, one of the people being targeted is outside Britain.

    In most Ripa cases, a minister has to be told the name of an individual or company being targeted before a warrant is granted.

    But section 8 permits GCHQ to perform more sweeping and indiscriminate trawls of external data if a minister issues a “certificate” along with the warrant.

    According to the documents, the certificate authorises GCHQ to search for material under a number of themes, including: intelligence on the political intentions of foreign governments; military postures of foreign countries; terrorism, international drug trafficking and fraud.

    The briefing document says such sweeping certificates, which have to be signed off by a minister, “cover the entire range of GCHQ’s intelligence production”.

    “The certificate is issued with the warrant and signed by the secretary of state and sets out [the] class of work we can do under it … cannot list numbers or individuals as this would be an infinite list which we couldn’t manage.”

    Lawyers at GCHQ speak of having 10 basic certificates, including a “global” one that covers the agency’s support station at Bude in Cornwall, Menwith Hill in North Yorkshire, and Cyprus.

    Other certificates have been used for “special source accesses” – a reference, perhaps, to the cables carrying web traffic. All certificates have to be renewed by the foreign secretary every six months.

    A source with knowledge of intelligence confirmed: “Overall exercise of collection and analysis [is] done under a broad, overall legal authority which has to be renewed at intervals, and is signed off at a senior political level.”

    The source said the interception commissioner was able to “conclude that [the process] was not appropriate”, and that the companies involved were not giving up the information voluntarily.

    “We have overriding authority to compel [them] to do this,” the source said. “There’s an overarching condition of the licensing of the companies that they have to co-operate in this.

    “Should they decline, we can compel them to do so. They have no choice. They can’t talk about the warrant, they can’t reveal the existence of it.”

    GCHQ says it can also seek a sensitive targeting authority (STA), which allows it snoop on any Briton “anywhere in the world” or any foreign national located in the UK.

    It is unclear how the STA system works, and who has authority over it.

    The intelligence agencies also have to take note of the HRA, which demands any interception is “necessary and proportionate”.

    But the documents show GCHQ believes these terms are open to interpretation – which “creates flexibility”. When Tempora became fully functional in around 2011, GCHQ gave the NSA access to the programme on a three-month trial – and the NSA was keen to impress.

    The US agency sent a briefing to some of its analysts urging them to show they could behave responsibly with the data. Under a heading – “The need to be successful!” – the author wrote: “As the first NSA users to receive operational access [to Tempora], we’re depending on you to provide the business case required to justify expanded access. Most importantly we need to prove that NSA users can utilise the internet buffers in ways that are consistent with GCHQ’s legal and policy rules.

    “In addition, we need to prove that NSA’s access … is necessary to prosecute our mission and will greatly enhance the production of the intelligence … success of this three-month trial will determine expanded NSA access to internet buffers in the future.”

    The NSA appears to have made a successful case. In May last year, an internal GCHQ memo said it had 300 analysts working on intelligence from Tempora, and the NSA had 250. The teams were supporting “the target discovery mission”.

    But the safeguards for the sharing of this information are unclear.

    Though GCHQ says it only keeps the content of messages for three working days, and the metadata for up to 30 days, privacy campaigners here and in the US will want to know if the NSA is adhering to the same self-imposed rules. One concern for privacy campaigners is that GCHQ and the NSA could conduct intercepts for each other, and then offer to share the information – a manoeuvre that could bypass the domestic rules they have to abide by.

    This was raised by MPs during last week’s statement, with the former Labour home secretary David Blunkett calling for clarification on this potential loophole.

    Last week, the Guardian sent a series of questions to the Foreign Office about this issue, but the department said it would not be drawn on it.

    “It is a longstanding policy not to comment on intelligence matters; this includes our intelligence co-operation with the United States.

    “The intelligence and security committee is looking into this, which is the proper channel for such matters.”

    Ewen MacAskill, Julian Borger, Nick Hopkins, Nick Davies and James Ball
    The Guardian, Friday 21 June 2013 17.23 BST

    Find this story at 21 June 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    GCHQ taps fibre-optic cables for secret access to world’s communications

    Exclusive: British spy agency collects and stores vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them with NSA, latest documents from Edward Snowden reveal

    Secret document detailing GCHQ’s ambition to ‘master the internet’

    Britain’s spy agency GCHQ has secretly gained access to the network of cables which carry the world’s phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA).

    The sheer scale of the agency’s ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate.

    One key innovation has been GCHQ’s ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. That operation, codenamed Tempora, has been running for some 18 months.

    GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people, as well as targeted suspects.

    This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user’s access to websites – all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets.

    The existence of the programme has been disclosed in documents shown to the Guardian by the NSA whistleblower Edward Snowden as part of his attempt to expose what he has called “the largest programme of suspicionless surveillance in human history”.

    “It’s not just a US problem. The UK has a huge dog in this fight,” Snowden told the Guardian. “They [GCHQ] are worse than the US.”

    However, on Friday a source with knowledge of intelligence argued that the data was collected legally under a system of safeguards, and had provided material that had led to significant breakthroughs in detecting and preventing serious crime.

    Britain’s technical capacity to tap into the cables that carry the world’s communications – referred to in the documents as special source exploitation – has made GCHQ an intelligence superpower.

    By 2010, two years after the project was first trialled, it was able to boast it had the “biggest internet access” of any member of the Five Eyes electronic eavesdropping alliance, comprising the US, UK, Canada, Australia and New Zealand.

    UK officials could also claim GCHQ “produces larger amounts of metadata than NSA”. (Metadata describes basic information on who has been contacting whom, without detailing the content.)

    By May last year 300 analysts from GCHQ, and 250 from the NSA, had been assigned to sift through the flood of data.

    The Americans were given guidelines for its use, but were told in legal briefings by GCHQ lawyers: “We have a light oversight regime compared with the US”.

    When it came to judging the necessity and proportionality of what they were allowed to look for, would-be American users were told it was “your call”.

    The Guardian understands that a total of 850,000 NSA employees and US private contractors with top secret clearance had access to GCHQ databases.

    The documents reveal that by last year GCHQ was handling 600m “telephone events” each day, had tapped more than 200 fibre-optic cables and was able to process data from at least 46 of them at a time.
    Document quoting Lt Gen Keith Alexander, head of the NSA, during a visit to Britain

    Each of the cables carries data at a rate of 10 gigabits per second, so the tapped cables had the capacity, in theory, to deliver more than 21 petabytes a day – equivalent to sending all the information in all the books in the British Library 192 times every 24 hours.

    And the scale of the programme is constantly increasing as more cables are tapped and GCHQ data storage facilities in the UK and abroad are expanded with the aim of processing terabits (thousands of gigabits) of data at a time.

    For the 2 billion users of the world wide web, Tempora represents a window on to their everyday lives, sucking up every form of communication from the fibre-optic cables that ring the world.

    The NSA has meanwhile opened a second window, in the form of the Prism operation, revealed earlier this month by the Guardian, from which it secured access to the internal systems of global companies that service the internet.

    The GCHQ mass tapping operation has been built up over five years by attaching intercept probes to transatlantic fibre-optic cables where they land on British shores carrying data to western Europe from telephone exchanges and internet servers in north America.

    This was done under secret agreements with commercial companies, described in one document as “intercept partners”.

    The papers seen by the Guardian suggest some companies have been paid for the cost of their co-operation and GCHQ went to great lengths to keep their names secret. They were assigned “sensitive relationship teams” and staff were urged in one internal guidance paper to disguise the origin of “special source” material in their reports for fear that the role of the companies as intercept partners would cause “high-level political fallout”.

    The source with knowledge of intelligence said on Friday the companies were obliged to co-operate in this operation. They are forbidden from revealing the existence of warrants compelling them to allow GCHQ access to the cables.

    “There’s an overarching condition of the licensing of the companies that they have to co-operate in this. Should they decline, we can compel them to do so. They have no choice.”

    The source said that although GCHQ was collecting a “vast haystack of data” what they were looking for was “needles”.

    “Essentially, we have a process that allows us to select a small number of needles in a haystack. We are not looking at every piece of straw. There are certain triggers that allow you to discard or not examine a lot of data so you are just looking at needles. If you had the impression we are reading millions of emails, we are not. There is no intention in this whole programme to use it for looking at UK domestic traffic – British people talking to each other,” the source said.

    He explained that when such “needles” were found a log was made and the interception commissioner could see that log.

    “The criteria are security, terror, organised crime. And economic well-being. There’s an auditing process to go back through the logs and see if it was justified or not. The vast majority of the data is discarded without being looked at … we simply don’t have the resources.”

    However, the legitimacy of the operation is in doubt. According to GCHQ’s legal advice, it was given the go-ahead by applying old law to new technology. The 2000 Regulation of Investigatory Powers Act (Ripa) requires the tapping of defined targets to be authorised by a warrant signed by the home secretary or foreign secretary.

    However, an obscure clause allows the foreign secretary to sign a certificate for the interception of broad categories of material, as long as one end of the monitored communications is abroad. But the nature of modern fibre-optic communications means that a proportion of internal UK traffic is relayed abroad and then returns through the cables.

    Parliament passed the Ripa law to allow GCHQ to trawl for information, but it did so 13 years ago with no inkling of the scale on which GCHQ would attempt to exploit the certificates, enabling it to gather and process data regardless of whether it belongs to identified targets.

    The categories of material have included fraud, drug trafficking and terrorism, but the criteria at any one time are secret and are not subject to any public debate. GCHQ’s compliance with the certificates is audited by the agency itself, but the results of those audits are also secret.

    An indication of how broad the dragnet can be was laid bare in advice from GCHQ’s lawyers, who said it would be impossible to list the total number of people targeted because “this would be an infinite list which we couldn’t manage”.

    There is an investigatory powers tribunal to look into complaints that the data gathered by GCHQ has been improperly used, but the agency reassured NSA analysts in the early days of the programme, in 2009: “So far they have always found in our favour”.

    Historically, the spy agencies have intercepted international communications by focusing on microwave towers and satellites. The NSA’s intercept station at Menwith Hill in North Yorkshire played a leading role in this. One internal document quotes the head of the NSA, Lieutenant General Keith Alexander, on a visit to Menwith Hill in June 2008, asking: “Why can’t we collect all the signals all the time? Sounds like a good summer project for Menwith.”

    By then, however, satellite interception accounted for only a small part of the network traffic. Most of it now travels on fibre-optic cables, and the UK’s position on the western edge of Europe gave it natural access to cables emerging from the Atlantic.

    The data collected provides a powerful tool in the hands of the security agencies, enabling them to sift for evidence of serious crime. According to the source, it has allowed them to discover new techniques used by terrorists to avoid security checks and to identify terrorists planning atrocities. It has also been used against child exploitation networks and in the field of cyberdefence.

    It was claimed on Friday that it directly led to the arrest and imprisonment of a cell in the Midlands who were planning co-ordinated attacks; to the arrest of five Luton-based individuals preparing acts of terror, and to the arrest of three London-based people planning attacks prior to the Olympics.

    As the probes began to generate data, GCHQ set up a three-year trial at the GCHQ station in Bude, Cornwall. By the summer of 2011, GCHQ had probes attached to more than 200 internet links, each carrying data at 10 gigabits a second. “This is a massive amount of data!” as one internal slideshow put it. That summer, it brought NSA analysts into the Bude trials. In the autumn of 2011, it launched Tempora as a mainstream programme, shared with the Americans.

    The intercept probes on the transatlantic cables gave GCHQ access to its special source exploitation. Tempora allowed the agency to set up internet buffers so it could not simply watch the data live but also store it – for three days in the case of content and 30 days for metadata.

    “Internet buffers represent an exciting opportunity to get direct access to enormous amounts of GCHQ’s special source data,” one document explained.

    The processing centres apply a series of sophisticated computer programmes in order to filter the material through what is known as MVR – massive volume reduction. The first filter immediately rejects high-volume, low-value traffic, such as peer-to-peer downloads, which reduces the volume by about 30%. Others pull out packets of information relating to “selectors” – search terms including subjects, phone numbers and email addresses of interest. Some 40,000 of these were chosen by GCHQ and 31,000 by the NSA. Most of the information extracted is “content”, such as recordings of phone calls or the substance of email messages. The rest is metadata.

    The GCHQ documents that the Guardian has seen illustrate a constant effort to build up storage capacity at the stations at Cheltenham, Bude and at one overseas location, as well a search for ways to maintain the agency’s comparative advantage as the world’s leading communications companies increasingly route their cables through Asia to cut costs. Meanwhile, technical work is ongoing to expand GCHQ’s capacity to ingest data from new super cables carrying data at 100 gigabits a second. As one training slide told new users: “You are in an enviable position – have fun and make the most of it.”

    Ewen MacAskill, Julian Borger, Nick Hopkins, Nick Davies and James Ball
    The Guardian, Friday 21 June 2013 17.23 BST

    Find this story at 21 June 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Spy agencies win millions more to fight terror threat

    Britain’s intelligence agencies will emerge as the biggest winners from the Government’s review of public spending, The Telegraph can disclose.
    MI6, MI5 and Government Communications Headquarters will see an increase in their combined £1.9 billion budget

    MI6, MI5 and Government Communications Headquarters (GCHQ) will see an inflation-busting increase in their combined £1.9 billion budget, underlining the Government’s concern over the growing terrorist threat following the Woolwich attack.

    Police spending on counter-terrorism will also be protected and will rise in line with inflation.

    The percentage increase in the budgets of the intelligence agencies – at more than three per cent in addition to inflation – will be the largest of any item of government spending including the NHS, schools and international development.

    It will lead to the agencies receiving about another £100 million in funding annually from 2015.

    Local councils are also expected to emerge as winners with increased funding for elderly social care. Money from the ring-fenced NHS budget is expected to be diverted to help fund care homes and home visits for frail pensioners.
    Related Articles
    George Osborne: I’d rather not have tax rises but can’t rule it out 27 Jun 2013
    Sketch: Dr Osborne needles Labour 26 Jun 2013
    Tax rises likely after spending review cuts, says IFS 26 Jun 2013
    Are the two Eds Attlee and Cripps – or Tory clones? 25 Jun 2013
    Nick Clegg: even more cuts are coming 25 Jun 2013
    Married couples to be offered tax breaks 24 Jun 2013

    George Osborne will on Wednesday unveil the Government’s spending plans for the 2015-16 financial year following months of Whitehall wrangling.

    The Spending Review, which will cut a further £11.5 billion in public expenditure, is regarded as especially sensitive as the cuts will be implemented just weeks before the next general election.

    The biggest losers will include the Business department, the Culture department, the Home Office and the Justice department, which are expected to each lose about eight per cent from their budgets.

    The Ministry of Defence will see its budget cut by about £1 billion, although this will not involve further reductions in front-line troops.

    Mr Osborne is also expected to set out plans for long-term caps on welfare spending and other areas of government expenditure which are not tightly controlled.

    The Chancellor will detail proposals to divert the money saved from Whitehall spending to fund long-term infrastructure projects such as widening major roads.

    He is expected to say: “Britain is moving from rescue to recovery. But while the British economy is leaving intensive care, now we need to secure that recovery.

    “We’re saving money on welfare and waste to invest in the roads and railways, schooling and science our economy needs to succeed in the future.”

    The intelligence agencies have recently faced criticism that they are struggling to deal with emerging threats, amid suggestions that MI5 and MI6 could have done more to prevent the murder of Drummer Lee Rigby in Woolwich. One of the suspects had attempted to travel to Somalia and both were known to the intelligence services.

    GCHQ’s activities have also come under scrutiny following accusations that it may be abusing its power in secretive projects with the United States to monitor internet traffic.

    The Chancellor is understood to have contacted the heads of the three agencies last Friday to inform them of their spending increases. MI5, MI6 and GCHQ have seen their budgets fall in real terms by more than 10 per cent since 2010 and there were fears that they would face a further round of cuts.

    A Whitehall source said: “This has been one of George’s personal priorities. It is vitally important we look after these budgets and they were settled last week with agreement at the very highest level.”

    Mr Osborne and the Prime Minister are understood to believe the agencies need more resources to tackle the growing terrorist threat from sub-Saharan Africa and Syria, and the rising problem posed by cyber terrorism.

    In the wake of the GCHQ snooping row, William Hague, the Foreign Secretary, praised the agencies’ work and cooperation with US counterparts.

    Speaking in America, he said “we should have nothing but pride” in the “intelligence-sharing relationship between Britain and the United States”. He added that both countries’ intelligence work operated “under the rule of law” and “only exists to protect” people’s freedoms.

    Mr Osborne confirmed on Tuesday that the NHS and schools budgets would continue to rise.

    Money is also expected to be diverted from the health budget to local authorities to fund social care. Norman Lamb, a health minister, recently warned of an impending crisis in social care as councils struggled to fund enough places for ailing pensioners.

    Last week, council leaders warned Mr Osborne that street lights may have to be switched off and libraries closed unless NHS funding was diverted to help pay for elderly care.

    They said the amount of money spent on social care has been cut by a fifth in less than three years and they were preparing to reduce budgets further.

    Mr Osborne agreed for £2 billion to be transferred from the NHS to the social care sector in his previous Spending Review, but councils said much of the money has gone on propping up the system because of the ageing population.

    Ministers are also expected to set out the entitlement criteria for state help. The Government has pledged to cap the maximum bill that anyone faces for social care at £72,000 from 2016, and the details of how this will work are to be announced this week.

    Earl Howe, a health minister, was asked about the growing problem in social care, with hospitals often forced not to discharge elderly patients who are infirm but not ill because they have nowhere to go. He said there would be “more news” about increased funding for social care on Wednesday and sources confirmed that the social care budget would rise after several years of cuts.

    Danny Alexander, the Chief Secretary to the Treasury, also hinted that the Government may speed up the introduction of its community budgets programme, which is designed to make public sector services share operations.

    He urged MPs to “listen carefully” to the Chancellor’s statement for more news after being asked about the programme’s national implementation.

    By Robert Winnett, Political Editor
    10:00PM BST 25 Jun 2013

    Find this story at 25 June 2013

    © Copyright of Telegraph Media Group Limited 2013

    Operation Tempora: GCHQ in fresh snooping row as it eavesdrops on phones and the internet

    Data includes recordings of telephone calls, contents of emails, details of messages on social media and the history of internet use

    Britain’s electronic eavesdropping centre, GCHQ, has started collecting data from the network of fibre-optic cables carrying the world’s telephone calls and internet traffic, it was reported tonight.

    The massive programme of surveillance allows the agency to store vast volumes of information for up to 30 days which it can then study for evidence of terrorist and criminal activity.

    The claims, in The Guardian, will provoke a fresh civil liberties storm following recent allegations that thousands of Britons could have been spied on by GCHQ through a covert link with the US National Security Agency (NSA).

    According to the paper, the agency has been running Operation Tempora for 18 months under which it gains access to transatlantic cables carrying data about phone calls and internet use. It is said to share information gleaned from it with the NSA.

    The data includes recordings of telephone calls, contents of emails, details of messages on social media and the history of internet use.

    Documents seen by the paper suggest that by last year GCHQ was handling 600m “telephone events” each day, had tapped more than 200 fibre-optic cables and was able to process data from at least 46 at a time.

    A source told The Guardian that the eavesdropping allowed the security services to arrest three people planning attacks on last year’s London Olympics, as well as terrorist cells in the Midlands and Luton. It has also been used against child exploitation networks and to boost cyberdefence.

    A GCHQ spokesman said: “It is longstanding practice that we do not comment on intelligence matters.”

    He added: “GCHQ takes its obligations under the law very seriously. Our work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Intelligence and Security Committee.”

    * Edward Snowden has been charged in his absence by US prosecutors with spying and theft of government property. The charges are included in sealed documents filed by prosecutors.

    Nigel Morris
    Saturday, 22 June 2013

    Find this story at 22 June 2013

    © independent.co.uk

    MI5 feared GCHQ went ‘too far’ over phone and internet monitoring

    Amid leaks from NSA whistleblower Edward Snowden, senior intelligence source reveals worries were voiced in 2008

    GCHQ taps can intercept UK and US phone and internet traffic. Photograph: EPA

    Senior figures inside British intelligence have been alarmed by GCHQ’s secret decision to tap into transatlantic cables in order to engage in the bulk interception of phone calls and internet traffic.

    According to one source who has been directly involved in GCHQ operations, concerns were expressed when the project was being discussed internally in 2008: “We felt we were starting to overstep the mark with some of it. People from MI5 were complaining that they were going too far from a civil liberties perspective … We all had reservations about it, because we all thought: ‘If this was used against us, we wouldn’t stand a chance’.”

    The Guardian revealed on Friday that GCHQ has placed more than 200 probes on transatlantic cables and is processing 600m “telephone events” a day as well as up to 39m gigabytes of internet traffic. Using a programme codenamed Tempora, it can store and analyse voice recordings, the content of emails, entries on Facebook, the use of websites as well as the “metadata” which records who has contacted who. The programme is shared with GCHQ’s American partner, the National Security Agency.

    Interviews with the UK source and the NSA whistleblower Edward Snowden raise questions about whether the programme:

    ■ Exploits existing law which was passed by parliament without any anticipation that it would be used for this purpose.

    ■ For the first time allows GCHQ to process bulk internal UK traffic which is routed overseas via these cables.

    ■ Allows the NSA to engage in bulk intercepts of internal US traffic which would be forbidden in its own territory.

    ■ Functions with no effective oversight.

    The key law is the Regulation of Investigatory Powers Act 2000, Ripa, which requires the home secretary or foreign secretary to sign warrants for the interception of the communications of defined targets. But the law also allows the foreign secretary to sign certificates that authorise GCHQ to trawl for broad categories of information on condition that one end of the communication is outside the UK.

    According to the UK source: “Not so long ago, this was all about attaching crocodile clips to copper wires. And it was all about voice. Now, it’s about the internet – massive scale – but still using the same law that was devised for crocodile clips. Ripa was primarily designed for voice, not for this level of interception. They are going round Ripa. The legislation doesn’t exist for this. They are using old legislation and adapting it.”

    The source claimed that even the conventional warrant system has been distorted – whereas police used to ask for a warrant before intercepting a target’s communications, they will now ask GCHQ to intercept the target’s communications and then use that information to seek a warrant.

    There is a particular concern that the programme allows GCHQ to break the boundary which stopped it engaging in the bulk interception of internal UK communications. The Ripa requirement that one end of a communication must be outside the UK was a significant restriction when it was applied to phone calls using satellites, but it is no longer effective in the world of fibre-optic cables. “The point is that this is an island,” the source said. “Everything comes and goes – nearly everything – down fibre-optic cables. You make a mobile phone call, it goes to a mast and then down into a fibre-optic cable, under the ground and away. And even if the call is UK to UK, it’s very likely – because of the way the system is structured – to go out of the UK and come back in through these fibre-optic channels.”

    Internet traffic is also liable to be routed internationally even if the message is exchanged between two people within the UK. “At one point, I was told that we were getting 85% of all UK domestic traffic – voice, internet, all of it – via these international cables.”

    Last year, the government was mired in difficulty when it tried to pass a communications bill that became known as the “snoopers’ charter”, and would have allowed the bulk interception and storage of UK voice calls and internet traffic. The source says this debate was treated with some scepticism inside the intelligence community – “We’re sitting there, watching them debate the snoopers’ charter, thinking: ‘Well, GCHQ have been doing this for years’.”

    There are similar concerns about the role of the NSA. It could have chosen to attach probes to the North American end of the cables and documents shown to the Guardian by Edward Snowden suggest that key elements of the Tempora filtering process were designed by the NSA. Instead, the NSA agency has exported its computer programs and 250 of its analysts to operate the system from the UK.

    Initial inquiries by the Guardian have failed to explain why this has happened, but US legislators are likely to want to check whether the NSA has sought to bypass legal or policy requirements which restrict its activity in the US. This will be particularly sensitive if it is confirmed that Tempora is also analysing internal US traffic.

    The UK source challenges the official justification for the programme; that it is necessary for the fight against terrorism and serious crime: “This is not scoring very high against those targets, because they are wise to the monitoring of their communications. If the terrorists are wise to it, why are we increasing the capability?

    “The answer is that you can’t stop it. It is a self-fulfilling prophecy. The more we develop communications technology, the more they develop technology to intercept it. There was MS Chat – easy. Then Yahoo chat – did that, too. Then Facebook. Then Skype. Then Twitter. They keep catching up. It is good for us, but it is bad for us.”

    It is clear from internal paperwork that GCHQ has created systems to restrain the use of this powerful tool and to ensure that its use complies not only with Ripa but also with the 1998 Human Rights Act, which requires essentially that the use of the data must be proportional to the crime or threat investigated. Defenders insist that the mass of data is heavily filtered by the programme so that only that relating to legitimate targets is analysed.

    However, there are doubts about the effectiveness of this. First, according to the UK source, “written definitions for targeting and filtering are very elastic. They are wide open to interpretation.” The target areas defined by the Ripa certificates are secret.

    Second, there is further room for interpretation when human analysts become involved in using the filtered intelligence to produce what are known as “contact chains”. “Here is target A. But who is A talking to? Now we’re into B and C and D.” If analysts believe it is proportional, they can look at all the traffic – content and metadata – relating to all of the target’s contact.” GCHQ audits a sample of its analysts’ work – believed to be 5% every six months – but even the statistical results of these audits are also secret.

    Beyond the detail of the operation of the programme, there is a larger, long-term anxiety, clearly expressed by the UK source: “If there was the wrong political change, it could be very dangerous. All you need is to have the wrong government in place. It is capable of abuse because there is no independent scrutiny.”

    Nick Davies
    The Observer, Saturday 22 June 2013 20.18 BST

    Find this story at 22 June 2013
    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    G20 summit: NSA targeted Russian president Medvedev in London

    Leaked documents reveal Russian president was spied on during visit, as questions are raised over use of US base in Britain

    US spies intercepted communications of the then Russian president, Dmitry Medvedev, during a G20 summit in London. Photograph: Alexander Zemlianichenko/AP

    American spies based in the UK intercepted the top-secret communications of the then Russian president, Dmitry Medvedev, during his visit to Britain for the G20 summit in London, leaked documents reveal.

    The details of the intercept were set out in a briefing prepared by the National Security Agency (NSA), America’s biggest surveillance and eavesdropping organisation, and shared with high-ranking officials from Britain, Australia, Canada and New Zealand.

    The document, leaked by the NSA whistleblower Edward Snowden and seen by the Guardian, shows the agency believed it might have discovered “a change in the way Russian leadership signals have been normally transmitted”.

    The disclosure underlines the importance of the US spy hub at RAF Menwith Hill in Harrogate, North Yorkshire, where hundreds of NSA analysts are based, working alongside liaison officers from GCHQ.

    The document was drafted in August 2009, four months after the visit by Medvedev, who joined other world leaders in London, including the US president, Barack Obama, for the event hosted by the British prime minister, Gordon Brown.

    Medvedev arrived in London on Wednesday 1 April and the NSA intercepted communications from his delegation the same day, according to the NSA paper, entitled: “Russian Leadership Communications in support of President Dmitry Medvedev at the G20 summit in London – Intercept at Menwith Hill station.”

    The document starts with two pictures of Medvedev smiling for the world’s media alongside Brown and Obama in bilateral discussions before the main summit.
    RAF Menwith Hill in North Yorkshire. Photograph: Nigel Roddis/Reuters

    The report says: “This is an analysis of signal activity in support of President Dmitry Medvedev’s visit to London. The report details a change in the way Russian leadership signals have been normally transmitted. The signal activity was found to be emanating from the Russian embassy in London and the communications are believed to be in support of the Russian president.”

    The NSA interception of the Russian leadership at G20 came hours after Obama and Medvedev had met for the first time. Relations between the two leaders had been smoothed in the runup to the summit with a series of phone calls and letters, with both men wanting to establish a trusting relationship to discuss the ongoing banking crisis and nuclear disarmament.

    In the aftermath of their discussions on 1 April, the two men issued a joint communique saying they intended to “move further along the path of reducing and limiting strategic offensive arms in accordance with the treaty on the non-proliferation of nuclear weapons”.

    A White House official who briefed journalists described the meeting as “a very successful first meeting focused on real issues”. The official said it had been important for the men to be open about the issues on which they agreed and disagreed. Obama had stressed the need to be candid, the official noted.

    While it has been widely known the two countries spy on each other, it is rare for either to be caught in the act; the latest disclosures will also be deeply embarrassing for the White House as Obama prepares to meet Vladimir Putin, who succeeded Medvedev as president, in the margins of the G8 summit this week.

    The two countries have long complained about the extent of each other’s espionage activities, and tit-for-tat expulsions of diplomats are common. A year after Obama met Medvedev, the US claimed it had broken a highly sophisticated spy ring that carried out “deep cover” assignments in the US.

    Ten alleged Russian spies living in America were arrested.

    Putin was withering of the FBI-led operation: “I see that your police have let themselves go and put some people in jail, but I guess that is their job. I hope the positive trend that we have seen develop in our bilateral relations recently will not be harmed by these events.” Last month, the Russians arrested an American in Moscow who they alleged was a CIA agent.

    The new revelations underline the significance of RAF Menwith Hill and raise questions about its relationship to the British intelligence agencies, and who is responsible for overseeing it. The 560-acre site was leased to the Americans in 1954 and the NSA has had a large presence there since 1966.

    It has often been described as the biggest surveillance and interception facility in the world, and has 33 distinct white “radomes” that house satellite dishes. A US base in all but name, it has British intelligence analysts seconded to work alongside NSA colleagues, though it is unclear how the two agencies obtain and share intelligence – and under whose legal authority they are working under.

    Ewen MacAskill, Nick Davies, Nick Hopkins, Julian Borger and James Ball
    The Guardian, Monday 17 June 2013

    Find this story at 17 June 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    GCHQ intercepted foreign politicians’ communications at G20 summits

    Exclusive: phones were monitored and fake internet cafes set up to gather information from allies in London in 2009

    Documents uncovered by the NSA whistleblower, Edward Snowden, reveal surveillance of G20 delegates’ emails and BlackBerrys. Photograph: Guardian

    Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts, according to documents seen by the Guardian. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic.

    The revelation comes as Britain prepares to host another summit on Monday – for the G8 nations, all of whom attended the 2009 meetings which were the object of the systematic spying. It is likely to lead to some tension among visiting delegates who will want the prime minister to explain whether they were targets in 2009 and whether the exercise is to be repeated this week.

    The disclosure raises new questions about the boundaries of surveillance by GCHQ and its American sister organisation, the National Security Agency, whose access to phone records and internet data has been defended as necessary in the fight against terrorism and serious crime. The G20 spying appears to have been organised for the more mundane purpose of securing an advantage in meetings. Named targets include long-standing allies such as South Africa and Turkey.

    There have often been rumours of this kind of espionage at international conferences, but it is highly unusual for hard evidence to confirm it and spell out the detail. The evidence is contained in documents – classified as top secret – which were uncovered by the NSA whistleblower Edward Snowden and seen by the Guardian. They reveal that during G20 meetings in April and September 2009 GCHQ used what one document calls “ground-breaking intelligence capabilities” to intercept the communications of visiting delegations.

    This included:

    • Setting up internet cafes where they used an email interception programme and key-logging software to spy on delegates’ use of computers;

    • Penetrating the security on delegates’ BlackBerrys to monitor their email messages and phone calls;

    • Supplying 45 analysts with a live round-the-clock summary of who was phoning who at the summit;

    • Targeting the Turkish finance minister and possibly 15 others in his party;

    • Receiving reports from an NSA attempt to eavesdrop on the Russian leader, Dmitry Medvedev, as his phone calls passed through satellite links to Moscow.

    The documents suggest that the operation was sanctioned in principle at a senior level in the government of the then prime minister, Gordon Brown, and that intelligence, including briefings for visiting delegates, was passed to British ministers.

    A briefing paper dated 20 January 2009 records advice given by GCHQ officials to their director, Sir Iain Lobban, who was planning to meet the then foreign secretary, David Miliband. The officials summarised Brown’s aims for the meeting of G20 heads of state due to begin on 2 April, which was attempting to deal with the economic aftermath of the 2008 banking crisis. The briefing paper added: “The GCHQ intent is to ensure that intelligence relevant to HMG’s desired outcomes for its presidency of the G20 reaches customers at the right time and in a form which allows them to make full use of it.” Two documents explicitly refer to the intelligence product being passed to “ministers”.
    One of the GCHQ documents. Photograph: Guardian

    According to the material seen by the Guardian, GCHQ generated this product by attacking both the computers and the telephones of delegates.

    One document refers to a tactic which was “used a lot in recent UK conference, eg G20”. The tactic, which is identified by an internal codeword which the Guardian is not revealing, is defined in an internal glossary as “active collection against an email account that acquires mail messages without removing them from the remote server”. A PowerPoint slide explains that this means “reading people’s email before/as they do”.

    The same document also refers to GCHQ, MI6 and others setting up internet cafes which “were able to extract key logging info, providing creds for delegates, meaning we have sustained intelligence options against them even after conference has finished”. This appears to be a reference to acquiring delegates’ online login details.

    Another document summarises a sustained campaign to penetrate South African computers, recording that they gained access to the network of their foreign ministry, “investigated phone lines used by High Commission in London” and “retrieved documents including briefings for South African delegates to G20 and G8 meetings”. (South Africa is a member of the G20 group and has observer status at G8 meetings.)
    Another excerpt from the GCHQ documents. Photograph: Guardian

    A detailed report records the efforts of the NSA’s intercept specialists at Menwith Hill in North Yorkshire to target and decode encrypted phone calls from London to Moscow which were made by the Russian president, Dmitry Medvedev, and other Russian delegates.

    Other documents record apparently successful efforts to penetrate the security of BlackBerry smartphones: “New converged events capabilities against BlackBerry provided advance copies of G20 briefings to ministers … Diplomatic targets from all nations have an MO of using smartphones. Exploited this use at the G20 meetings last year.”

    The operation appears to have run for at least six months. One document records that in March 2009 – the month before the heads of state meeting – GCHQ was working on an official requirement to “deliver a live dynamically updating graph of telephony call records for target G20 delegates … and continuing until G20 (2 April).”

    Another document records that when G20 finance ministers met in London in September, GCHQ again took advantage of the occasion to spy on delegates, identifying the Turkish finance minister, Mehmet Simsek, as a target and listing 15 other junior ministers and officials in his delegation as “possible targets”. As with the other G20 spying, there is no suggestion that Simsek and his party were involved in any kind of criminal offence. The document explicitly records a political objective – “to establish Turkey’s position on agreements from the April London summit” and their “willingness (or not) to co-operate with the rest of the G20 nations”.

    The September meeting of finance ministers was also the subject of a new technique to provide a live report on any telephone call made by delegates and to display all of the activity on a graphic which was projected on to the 15-sq-metre video wall of GCHQ’s operations centre as well as on to the screens of 45 specialist analysts who were monitoring the delegates.

    “For the first time, analysts had a live picture of who was talking to who that updated constantly and automatically,” according to an internal review.

    A second review implies that the analysts’ findings were being relayed rapidly to British representatives in the G20 meetings, a negotiating advantage of which their allies and opposite numbers may not have been aware: “In a live situation such as this, intelligence received may be used to influence events on the ground taking place just minutes or hours later. This means that it is not sufficient to mine call records afterwards – real-time tip-off is essential.”

    In the week after the September meeting, a group of analysts sent an internal message to the GCHQ section which had organised this live monitoring: “Thank you very much for getting the application ready for the G20 finance meeting last weekend … The call records activity pilot was very successful and was well received as a current indicator of delegate activity …

    “It proved useful to note which nation delegation was active during the moments before, during and after the summit. All in all, a very successful weekend with the delegation telephony plot.”

    Ewen MacAskill, Nick Davies, Nick Hopkins, Julian Borger and James Ball
    The Guardian, Monday 17 June 2013

    Find this story at 17 June 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    G20 summit: Britain plunged into diplomatic row over claims GCHQ spied on foreign politicians

    Intelligence services were even said to have set up internet cafés at the summit venues which they used to read emails

    Britain was plunged into a diplomatic row last night following claims that foreign politicians and diplomats were repeatedly spied upon when they attended two G20 summit meetings in London.

    The allegations provoked anger in Turkey, Russia and South Africa, whose dignitaries were reportedly targeted by the covert surveillance operations in 2009 while Gordon Brown was Prime Minister.

    The intelligence services were even said to have set up internet cafés at the summit venues which they used to read emails sent by visiting officials.

    David Cameron refused yesterday to comment on the allegations, which proved an embarrassing distraction for him as the leaders of G8 nations gathered for a two-day meeting at Lough Erne, Northern Ireland.

    However, one British source said he was not surprised by the claims and said it was always assumed other delegations tried to listen in to other countries’ private discussions at international summits.

    Turkey, up to 15 of whose officials could have been snooped on in London, spelt out its fury and contacted the UK’s ambassador to Ankara to demand an explanation. It described the report in the Guardian as “very worrying”, particularly as Turkey and Britain are both members of Nato.

    “We want an official and satisfactory explanation,” said a spokesman for the Turkish foreign ministry. “If these allegations are true, this is going to be scandalous for the UK.

    “At a time when international co-operation depends on mutual trust, respect and transparency, such behaviour by an allied country is unacceptable.”

    Clayson Monyela, a spokesman for South Africa’s foreign ministry said in his twitter feed that the matter was “extremely disturbing” and was “receiving attention”.

    He said Britain and South Africa had cordial relations and called on London to investigate the claims “with a view to take strong & visible action”.

    Alexei Pushkov, the chief of foreign affairs committee in the lower house of Russian parliament, tweeted: “It’s a scandal! The U.S. and British special services tapped (then President Dmitry) Medvedev’s phone at the 2009 G-20 summit. The US denies it, but we can’t trust them.”

    Sergei Devyatov, a spokesman for the Federal Protection Service, which provides security for Russian government officials, said in a statement: “The Federal Protective Service is taking every necessary measure to provide the appropriate level of confidentiality of information for top-ranking officials of the country.”

    According to yesterday’s report, secret documents show that delegates to the two summits had their computers monitored and phones intercepted on the Government’s orders.

    The Guardian said the leaked papers suggested the operation was sanctioned at a senior level in Mr Brown’s government. One briefing paper said the head of GCHQ was about to meet David Miliband, who was the Foreign Secretary at the time.

    One former Brown aide told the Independent yesterday: “We always assumed that everyone else did it at such meetings. We were advised not to plug in our laptops, use photocopiers, wi-fi or our usual Blackberrys – we would be given a different one for the duration of a summit.

    “Traditionally the French were always at it. Others joined in so as not to be at a disadvantage. It was about knowing the thinking in the other delegations. But usually it didn’t yield much that was very surprising. It was regarded as fair game because every government did the same. I don’t know if it ever extended from governments to civil society or the media, that would be different and much more sinister.”

    Tackled about the reports, Mr Cameron said today: “We never comment on security or intelligence issues and I am not about to start now. I don’t make comments on security or intelligence issues – that would be breaking something that no government has previously done.”

    David Miliband could not be contacted last night.

    Nigel Morris, Andrew Grice
    Tuesday, 18 June 2013

    Find this story at 18 June 2013

    © independent.co.uk

    UK intelligence agencies planned to spy on Commonwealth summit delegates

    Top-secret document, prepared by GCHQ, contained proposals to target Commonwealth allies at heads of government summit

    The Queen and Commonwealth leaders at the heads of government summit in Trinidad. Photograph: Luis Acosta/AFP/Getty Images

    UK intelligence agencies planned to spy on delegates to the Commonwealth heads of government meeting in 2009, including being asked to obtain information to give UK ministers an advantage in talks with their Commonwealth counterparts, according to a top-secret document seen by the Guardian.

    The meeting, which takes place every two years, was held in Trinidad in 2009. The UK delegation was headed by the Queen, with Prince Philip also in attendance, along with Gordon Brown, the then prime minister, David Miliband, then foreign secretary, and Douglas Alexander, then international development secretary.

    A page from an internal top-secret intranet of GCHQ, shared with the NSA, discovered by the 29-year-old whistleblower Edward Snowden and seen by the Guardian, shows a list of “key intelligence requirements” set out for the summit.

    Alongside notes to check for threats against the security of the UK delegation during the visit, the document lists “Intelligence to inform UK senior’s [sic] Bi-lats”, “Initelligence [sic] on South Africa’s views on Zimbabwe prior to Brown/Zuma meeting” and “climate change reporting”.

    The revelation that UK intelligence agencies made plans to target ministers and officials from Commonwealth countries, as well as the targeting of G20 officials disclosed elsewhere, is likely to raise tensions among the Commonwealth nations, who may seek clarity over whether their officials were bugged, and if so to what extent.

    The note, which was prepared in advance of the meeting, also sets out a schedule for different UK agencies to set up their activities in Trinidad. MI6 were tasked to set up several days before the event, with GCHQ’s operation beginning with the arrival of delegates. The Guardian is not publishing the original document as it contains logistical details and some limited references to personnel.

    The 2009 Commonwealth meeting, which was also attended by Nicolas Sarkozy, then president of France, appears to have been the first time MI6 – formally known as SIS, or the Secret Intelligence Service – had been asked to gather intelligence from a Commonwealth heads of government gathering.

    “SIS have no past history of targeting this meeting,” the document notes in an explanation of why operations might be limited in their scope.

    As it was prepared in advance of the Commonwealth meeting, the memo does not confirm to what extent surveillance was carried out, or even whether planned operations actually took place.

    However, it does stress to agency staff that “we will be measured on our ability to deliver”.

    The memo also shows that the agencies were preparing to brief senior ministers, and the prime minister, during the conference.

    The memo noted that Lady Kinnock was available for briefings from 25 to 29 November, David Miliband could be briefed from 26 to 29 November, and Gordon Brown on 29 November only.

    There is no indication as to whether the briefings actually took place, or whether the ministers were aware of the security services’ plans for the summit.

    Ewen MacAskill, Nick Davies, Nick Hopkins, Julian Borger and James Ball
    The Guardian, Sunday 16 June 2013 20.47 BST

    Find this story at 16 June 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Warning of a ‘private army’ running Britain after government increases spending on security firm G4S by £65million

    Controversial firm saw income from UK taxpayer rise by 20% last year
    Company earned £394million in 2012-13, up from £328.5million
    Labour MP Barry Sheerman warns of over-reliance on private contractors

    Controversial security firm G4S has enjoyed a 20 per cent surge in government contracts despite a string of blunders, new figures show.

    The company – which failed to recruit enough guards for the London Olympics – earned £394million from the taxpayer in 2012-13, up from £328.5million a year earlier.

    The revelation sparked claims it was becoming the ‘private army’ of the state.

    Security: The controversial firm G4S has seen a 20 per cent increase in its income from the UK government, raising fears of an over-reliance on a ‘private army’

    With just weeks before the London Olympics opened in July last year, G4S admitted it would not be able to provide the thousands of guards it had promised.

    Its reputation was severely damaged when 3,500 troops were called in to provide security at the biggest events.

    In the wake of the debacle MPs called on the government to think again before awarding more lucrative contracts to the firm.

    But it seems to have done little to dent its reputation in Whitehall, and next week it will provide security guarding the world’s most powerful men and women at the G8 summit at Lough Erne.

    More…
    Tories launch web assault on Labour and Lib Dems to put pressure on MPs to ‘Let Britain Decide’ on Europe
    Number of over-65s still in work doubles in two decades to top 1million for the first time
    Public-private pay gap widens even further: Average private sector earnings have ‘fallen faster’ than state employees during the recession

    Labour MP Barry Sheerman, who obtained the figures on government spending with G4S, said he was worried about an increasing over-reliance on a small number of companies.

    He warned: ‘The trouble is a lot of contractors are in a monopoly. They do seem to be swelling up and getting bigger and bigger and we are getting to the stage where the over-reliance on one company troubles you.

    ‘I am becoming increasingly worried about the monopoly position that G4S have in security services.

    ‘They are becoming the private army of Her Majesty’s Government. There is something going on that I think we need to shine a spotlight on.’

    Blunder: The army had to be called in for the London Olympics after G4S failed to recruit enough guards last summer

    Nick Buckles, who last month quit as G4S chief executive, admitted the Olympic security contract had been a ‘humiliating shambles’ for the company but Labour MP Barry Sheerman (right), who obtained the figures, warned of a few firms having a monopoly on state contracts

    Most of the hike in Government spending on G4S contracts was down to an extra £51 million spent by the Ministry of Justice on contracts with the company.

    A spokesman for the department said the increase was down to G4S being given contracts to run prisons at Birmingham and Oakwood, as well as managing the facilities of a large part of Her Majesty’s Courts and Tribunal Service.

    The Department for Work and Pensions more than doubled its spend on G4S contracts – up from nearly £13.8 million to more than £32.1 million.
    G4S: A HISTORY OF BLUNDERS

    The UK-based security firm traces its roots back to a guarding company founded in Denmark in 1901.

    G4S was formed when Group 4 merged with Securicor in 2004. The company has a long record of blunders including:

    In 1993 Group 4 became the first private company to run prisoner escort services,m and lost seven inmates in three weeks

    A year later a hunger striker escaped from Campsfield House detention centre, guarded by Group 4

    In 1997 it emerged the firm had transferred a prisoner between two vans on a petrol station forecourt

    Three prisoners escaped from Peterborough Crown Court in 2001

    In 2011, G4S staff lost a set of cell keys just days after taking over Birmingham Prison Workers put an electronic tag on criminal Christopher Lowcock’s artificial limb

    In 2012 the firm failed to train enough guards for the London Games which meant 3,500 soldiers had to be recalled from leave

    In March this year a G4S guard at Heathrow ordered Royal Navy engineer Nicky Howse to change out of her uniform before flying to the US because it was ‘offensive’

    A contract awarded to G4S for the Government’s Work Programme accounted for the increase, Employment Minister Mark Hoban said in his answer to Mr Sheerman’s question.

    The figures do not include spending by the Department for Communities and Local Government which has not yet answered the MP’s question.

    Mr Sheerman said it was ‘amazing’ that so much was being spent on G4S when it was failing to pay Olympic subcontractors that were ‘not complicit in the debacle’ of the company’s handling of security at London 2012.

    ‘I thought it was amazing that such an amount is being spent on one major contractor, also at a time when we still know that G4S have failed to pay subcontractors who have worked for them on the Olympic site,’ Mr Sheerman said.

    He said some small and medium-sized businesses who worked on the Olympic site were made to subcontract to G4S by Locog, but now have not been paid.

    ‘I don’t know why they haven’t paid them, it is just bad principles,’ he said.

    ‘They were told at one stage in the development they were running the logistics and security of the athlete’s village.

    ‘Once that was finished they became subcontractors and told to be subcontractors to G4S.

    ‘One would have thought Locog would have leaned on G4S to do the honourable thing to the subcontractors.

    ‘They were not complicit in the debacle that occurred when the army came in.’

    Kim Challis, G4S CEO of government and outsourcing solutions, said: ‘We have been working with the UK government for more than two decades, delivering the highest levels of service and under a high degree of monitoring and oversight.

    ‘We have won every contract we have been awarded by bidding in a highly competitive environment, based on delivering an effective service for the best deal for the taxpayer, with a number of providers challenging for the work.

    ‘We have a strong track record of delivering for our UK Government customers and are proud of the service our 11,000 employees provide to them, and the general public, every single day.’

    Former G4S company boss Nick Buckles, who admitted the London 2012 contract had been a ‘humiliating shambles, last month quit his £1.2million-a-year role as chief executive.

    He clung on to his job in the immediate aftermath of the Olympics debacle but the firm’s reputation suffered badly and in recent weeks poor trading caused shares to slump by more than 13 per cent in one day.

    This month, G4S’s AGM was interrupted by protesters making reference to Jimmy Mubenga – an Angolan man who died while being deported from the UK by G4S guards.

    In July last year, prosecutors said they would be taking no action against the three G4S staff over the death.

    By Matt Chorley, Mailonline Political Editor

    PUBLISHED: 12:36 GMT, 12 June 2013 | UPDATED: 08:42 GMT, 13 June 2013

    Find this story at 13 June 2013

    © Associated Newspapers Ltd

    Microsoft founder Bill Gates buys into G4S

    Microsoft founder Bill Gates has given a vote of confidence to embattled British security firm G4S, despite a recent profit warning and ongoing controversy over the company’s Israeli prison contracts and the death of an Angolan man.

    The US tech titan’s private investment vehicle, Cascade Investment, and his high-profile charitable fund, the Bill & Melinda Gates Foundation, poured an extra £16m into G4S stock on Thursday, to increase their joint stake in the security giant to 3.2pc. The total holding is now worth around £110m.

    Mr Gates’ endorsement will come as welcome relief following a year blighted by the company’s failure to supply enough security staff for the London Olympics. The fiasco eventually claimed the scalp of chief executive Nick Buckles, but only after a difficult first quarter in Europe prompted the company to issue a profits warning in May.

    Last week, board members endured a stormy annual meeting, at which they faced repeated questions over three Israeli prison contracts in occupied Palestine and the death of Angolan deportee Jimmy Mubenga in 2010. Despite protests, G4S’ new chief executive Mr Almanza insisted at the fraught meeting that an independent study concluded that the company had not breached any aspect of “international humanitarian law”.

    But this would not be the first time the $36.4bn Bill & Melinda Gates Foundation, the largest of its kind, has invested in a company that has faced fierce public criticism. The charitable trust holds stakes in BP and Exxon Mobil, which have both come under fire over catastrophic oil spills.

    Mr Gates also has a history of investing in British companies, including Carpetright, Diageo and JJB Sports.

    “The best guess would be that given the changes that have taken place at G4S over the past year, it’s probably an opportunity for G4S to set out a clear path,” said Steve Woolf, support services analyst at Numis.

    “The underlying business is still very good. The share price has been quite beleaguered over the past 12 months. Now there is a chance to begin again and reinforce the core strategy.”

    The Bill & Melinda Gates Foundation was established by Mr Gates and his wife in 2000 with the goal of eradicating poverty and combating the world’s deadliest diseases.

    By Denise Roland
    4:29PM BST 10 Jun 2013

    Find this story at 10 June 2013

    © Copyright of Telegraph Media Group Limited 2013

    Woolwich suspect’s brother ‘harassed and threatened by MI6 and MI5’

    The brother of one of the men charged with the murder of Drummer Lee Rigby in Woolwich has claimed he was “harassed and threatened” by the British security services.

    Michael Adebolajo’s younger brother, Jeremiah, 26, said he met MI6 intelligence officers numerous times while he was working in Saudia Arabia and was quizzed by MI5 early last year on a trip home to London.

    He described a series of meetings, at the British Embassy in Riyadh, at airports and at other locations which he says he felt compelled to attend. At one stage, he claims he was stopped from flying on holiday so he could attend a meeting.

    Mr Adebolajo, who cannot discuss his brother’s case for legal reasons, says he was first approached by MI6 early in 2011 when he was teaching English at the University of Ha’il in Nejd.

    The approach from the British Embassy asking him to attend a meeting to discuss “life in Saudi Arabia” came a few weeks after his brother had been arrested in Kenya near the Somali border and deported to Britain.

    During the meetings he was questioned about his brother-in-law James Thompson and asked about two other men who he was told had travelled to Yemen in advance of a terror attack on the UK.

    Mr Adebolajo told The Times: “They were never openly aggressive, but they were always implicitly threatening. There was never the understanding that if I wanted I could stand up and say, that’s enough. There was always the understanding that that I have to co-operate or I would lose my job and I don’t know what else.”

    He said the officers, who admitted they were from the security services, were particularly interested in the two men who had travelled to Yemen but denied their claims that he had been in contact with them.

    “They were always looking for my knowledge and dealings with the two main indivuals they had shown me. They asked me biographical stuff, what mosques did I go to, do I pray, that sort of thing. Like they were trying to build a profile of me.”

    When Drummer Rigby was killed on May 22 in Woolwich, Mr Adebolajo says he recognised his brother from a video posted online. He contacted his parents and said: “My Dad was so upset, distraught.”

    Michael Adebolajo will next appear in court alongside co-defendant Michael Adebowale, 22, of Greenwich, south-east London, for a preliminary hearing on June 28.

    Justin Davenport, Crime Editor
    20 June 2013

    Find this story at 20 June 2013

    © Evening Standard Limited

    Woolwich murder, the MI6 connection: Younger brother of Michael Adebolajo ‘was paid thousands to spy in Middle East’

    The younger brother of one of the men accused of murdering Drummer Lee Rigby was paid thousands of pounds by MI6 as part of spying operations in the Middle East, The Mail on Sunday has discovered.

    Jeremiah Adebolajo, who uses the name Abul Jaleel, was also asked to help ‘turn’ his brother, Michael, to work for MI5, who were already aware of Michael’s close links to extremist groups.

    The claims are made by the Adebolajo family and a well-placed source who contacted The Mail on Sunday.

    Jeremiah Adebolajo, 26, who works as an English teacher at a university in Saudi Arabia and returned to Britain this week, is to be questioned about his brother by Scotland Yard counter-terrorism detectives today.

    Government sources have already confirmed that Michael Adebolajo was known to MI5. Last week it was alleged that he rebuffed efforts by the security service to recruit him as a spy.

    Michael, 28, was discharged from hospital on Friday and was yesterday charged with the murder of Drummer Rigby and attempted murder of two police officers on May 22 in Woolwich, South London.

    Now it has emerged that MI5’s sister agency, MI6, had targeted Jeremiah, a married teacher based at the University of Ha’il.

    MI5 and MI6 work closely together on counter-terrorism operations. MI5 focuses on home security, while MI6 targets threats from overseas.

    A document seen by The Mail on Sunday details concerns raised by Jeremiah’s family about MI6’s alleged harassment in April last year.

    In it, Jeremiah’s sister, Blessing Adebolajo, 32, who works as a human resources assistant in London, says her brother was approached by MI6 while he was working at the University of Ha’il – an important strategic location in the Middle East because it takes only one hour by plane to reach 11 Arab capitals.

    Jeremiah Adeboljao was working at the University of Ha’il in Saudi Arabia when he was approached by MI6

    Complaint: A redacted copy of the allegations made by the Adebolajo family

    A friend of Jeremiah has confirmed her account.

    The friend said: ‘They asked him about Michael and asked him to help “turn” him to work for MI5.

    ‘They also told him to go to certain hotels, order a cup of tea and wait for his contact.

    ‘On these occasions he was handed £300, and was paid to fly first-class and stay in five-star hotels.’

    The document, prepared by case workers with the charity Cageprisoners, says Blessing approached the East London charity for help because she was worried about the harassment and intimidation of both her brothers by the security and intelligence services.

    She says MI6 bought a ticket so Jeremiah could fly to an Intercontinental hotel in another Middle East country (believed to be the United Arab Emirates) and that he was given local currency worth more than £1,000.

    She also alleges Jeremiah told her that he was interrogated about specific people and was shown pictures of himself with named individuals taken in the UK. But Blessing told Cageprisoners that Jeremiah had ‘strongly’ rejected MI6’s offer to work as one of their agents.

    Blessing Adebolajo says her brother Jeremiah was approached by MI6 and asked to become an informant

    As a result of this rejection, his sister says he was ‘intimidated’ until he was finally told that he would be stopped from leaving the UK.

    The friend said that two years ago Jeremiah was approached by UK security officers when he was held at Heathrow on his way back from Saudi Arabia.

    During the interview, he was warned about what happens to Muslims who don’t help the Government and was shown documents that confirmed people he knew were being held in prisons throughout the world.

    Police and security services are under huge pressure to explain what they know about Adebolajo and his alleged accomplice, Michael Adebowale. Despite warnings stretching back ten years, Michael Adebolajo is said to have been considered ‘low risk’ by MI5. He was photographed at high-profile protests – even standing next to hate preacher Anjem Choudary.

    He was arrested in Kenyan 2010 over his alleged plans to travel to Somalia to join terror group Al-Shabaab before being returned to the UK. Jeremiah married Charlotte Patricia Taylor in 2008 at Sutton Register Office in Surrey.

    Shortly afterwards the couple are believed to have left for Saudi Arabia where Jeremiah found work teaching. The University of Ha’il is one of Saudi Arabia’s most progressive education establishments and was established by Royal Decree in 2005. It consists of five colleges – Sciences, Medicine and Medical Sciences, Engineering, Computer Science and Engineering, and a Community College – and has more than 16,000 students.

    By Robert Verkaik
    PUBLISHED: 21:02 GMT, 1 June 2013 | UPDATED: 21:03 GMT, 1 June 2013

    Find this story at 1 June 2013

    © Associated Newspapers Ltd

    UK pays price for MI5 courting terror

    The brutal murder of an off-duty British soldier in broad daylight in the southeast London district of Woolwich raises new questions about the British government’s national security strategy, at home and abroad. Officials have highlighted the danger of “self-radicalizing” cells inspired by Internet extremism, but this ignores overwhelming evidence that major UK terror plots have been incubated by the banned al-Qaeda-linked group formerly known as Al Muhajiroun.

    Equally, it is no surprise that the attackers had been seen earlier on the radar of MI5, the UK’s domestic counter-intelligence and security agency. While Al Muhajiroun’s emir, Syrian cleric Omar

    Bakri Mohammed – currently self-exiled to Tripoli in northern Lebanon – has previously claimed “public immunity” due to murky connections with British intelligence, compelling evidence suggests such connections might still be operational in the context of foreign policy imperatives linked to oil and gas interests.

    Security services and the Woolwich suspect
    Despite being proscribed, Al Muhajiroun has continued to function with impunity in new incarnations, most recently under the banner of Izhar Ud-Deen-il-Haq – run under the tutelage of Bakri’s London-based deputy, British-born Anjem Choudary.

    Almost every major terrorist attack and plot in the UK has in some way been linked to Choudary’s extremist network. The Woolwich attack was no exception. Anjem Choudary himself admitted to knowing one of the attackers, Michael “Mujahid” Adebolajo, as someone who “attended our meetings and my lectures”.

    Adebolajo was a regular at Al Muhajiroun’s Woolwich High Street dawah (propagation) stall, was “tutored” by Omar Bakri himself, and had attended the group’s meetings between 2005 and 2011.

    According to intelligence sources, both attackers were known to MI5 and MI6, which is concerned with foreign intelligene, and had appeared on “intelligence watch lists”, and Adebolajo had “featured in several counter-terrorist investigations” as a “peripheral figure” for the “last eight years” – suggesting his terrorist activities began precisely when he joined Al Muhajiroun.

    In particular, credible reports suggest he was high on MI5’s priority for the past three years, with family and friends confirming that he was repeatedly harassed by the agency to become an informant – as late as six months ago.

    In this context, the touted “lone wolf” hypothesis is baseless. For instance, while the recently convicted “Birmingham 11”, sentenced last month for their role in a bombing plot in the UK, had access to al-Qaeda’s Inspire magazine and Anwar al-Awlaki’s video speeches, they had also attended al-Qaeda terrorist training camps in Pakistan. This could only happen through an established UK-based Islamist network with foreign connections.

    Al Muhajiroun is the only organization that fits the profile. One in five terrorist convictions in the UK for more than a decade were for people who were either members of or had links to Al Muhajiroun. Last year, four Al Muhajiroun members were convicted at Woolwich Crown Court of planning to bomb the London Stock Exchange.

    Inspired by Awlaki’s teachings, the plotters had also been taught by Choudary’s longtime Al Muhajiroun colleague, ex-terror convict Abu Izzadeen. But this is just the tip of the iceberg.

    MI6’s terror Network
    In 1996, Omar Bakri founded Al Muhajiroun with Anjem Choudary. According to John Loftus, a former US Army Intelligence Officer and Justice Department prosecutor, three senior Al Muhajiroun figures at the time – Bakri, Abu Hamza, and Haroon Rashid Aswat – had been recruited by MI6 that year to facilitate Islamist activities in the Balkans.

    The objective was geopolitical expansion – destabilizing former Soviet republics, sidelining Russia and paving the way for the Trans-Balkan oil pipeline protected by incoming North Atlantic Treaty Organization “peacekeeping” bases.

    “This is about America’s energy security”, said then US energy secretary Bill Richardson: “It’s also about preventing strategic inroads by those who don’t share our values. We’re trying to move these newly independent countries toward the West. We would like to see them reliant on Western commercial and political interests rather than going another way. We’ve made a substantial political investment in the Caspian, and it’s very important to us that both the pipeline map and the politics come out right.”

    On February 10, 1998, Bakri and Choudary issued and signed a “fatwa” – a religious ruling – titled “Muslims in Britain Declare War Against the US and British governments”, which warned that the governments of “non-Muslim countries” must “stay away from Iraq, Palestine, Pakistan, Arabia, etc or face a full scale war of jihad which will be the responsibility of every Muslim around the world to participate in” – “including the Muslims in the USA and in Britain” who should “confront by all means whether verbally, financially, politically or militarily the US and British aggression”.

    The same year, Bakri was one of a select few to receive a fax from Osama bin Laden in Afghanistan outlining four objectives for a jihad against the US, including hijacking civilian planes.

    Public Immunity
    In 2000, Bakri admitted to training British Muslims to fight as jihadists in Palestine, Kashmir, Chechnya or South Lebanon. Recruits were “learning firearms and explosives use, surveillance and other skills” and “would be expected to join a jihad being waged in one country or another”. That year, he boasted: “The British government knows who we are. MI5 has interrogated us many times. I think now we have something called public immunity. There is nothing left. You can label us … put us behind bars, but it’s not going to work.”

    Labour Party MP Andrew Dismore told parliament the following year about a month after 9/11 that Bakri’s private security firm, Sakina Security Services, “sends people overseas for jihad training with live arms and ammunition”, including training camps “in Pakistan and Afghanistan”, and even at “many different sites in the United Kingdom”.

    Hundreds of Britons were being funneled through such training only to return to the UK advocating that Whitehall and Downing Street be attacked as “legitimate targets”. Though Sakina was raided by police and shut down, Bakri and Hamza were not even arrested, let alone charged or prosecuted.

    It later emerged that the US’ Federal Bureau of Investigation had flagged up the unusual presence of Al Muhajiroun activists at Arizona flight schools in the US in the summer preceding 9/11, many of whom had terrorist connections, including one described as a close bin Laden associate.

    The London bombings
    In 2003, two Al Muhajiroun members carried out a suicide bombing in Tel Aviv, Israel. That year, authorities began tracking an al-Qaeda ringleader in Britain, Mohammed Quayyum Khan. By 2004, the surveillance operation uncovered a plot to plant fertilizer bombs around the UK, prepared by a cell of 18 people, most of whom were Al Muhajiroun members who had studied under Bakri and Choudary. Quayyum Khan, like the latter, remains free.

    The 7/7 bombers, also Al Muhajiroun members, were connected to both terror plots – Mohamed Sidique Khan had been friends with the Tel Aviv bombers, and had even travelled to Israel weeks before their suicide attack. Khan went on to learn to make explosives in a terrorist training camp set up by Al Muhajiroun’s British and American members in northern Pakistan.

    A year before 7/7, Bakri warned of a “well-organized group” linked to al-Qaeda “on the verge of launching a big operation” against London. Then just months before the 7/7 bombings, The Times picked up Bakri telling his followers in Internet lectures: “I believe the whole of Britain has become Dar al-Harb [land of war]. The kuffar [non-believer] has no sanctity for their own life or property.” Muslims are “obliged” to “join the jihad… wherever you are”, and suicide bombings are permitted because “Al-Qaeda… have the emir”.

    Entrapment gone crazy
    The strange reluctance to prosecute Al Muhajiroun activists despite their support for al-Qaeda terrorism seems inexplicable. But has Britain’s support for al-Qaeda affiliated extremists abroad granted their Islamist allies at home “public immunity”?

    In early 2005, shortly before the July 7 London bombings, the Wall Street Journal’s Pulitzer Prize winning journalist Ron Suskind interviewed Bakri after he was told by an MI5 official that the cleric “had helped MI5 on several of its investigations”.

    Suskind recounts in his book, The Way of the World, that when asked why, Bakri told him: “Because I like it here. My family’s here. I like the health benefits.” Bakri reiterated this in an interview in early 2007 after his move to Tripoli, Lebanon, claiming, “We were able to control the Muslim youth… The radical preacher that allows a venting of a point of view is preventing violence.”

    Suskind observed: “Bakri enjoyed his notoriety and was willing to pay for it with information he passed to the police… It’s a fabric of subtle interlocking needs: the [British authorities] need be in a backchannel conversation with someone working the steam valve of Muslim anger; Bakri needs health insurance”.

    Why would MI5 and MI6 retain the services of someone as dangerous as Bakri given the overwhelming evidence of his centrality to the path to violent radicalization? On the one hand, it would seem that, through Al Muhajiroun, MI5 is spawning many of the plots it lays claim to successfully foiling – as the FBI is also doing.

    On the other, the strategy aligns conveniently with narrow geopolitical interests rooted in Britain’s unflinching subservience to wider US strategy in the Muslim world.

    The not-so-new great game
    Little has changed since the Great Game in the Balkans. According to Alastair Crooke, a former MI6 officer and Middle East adviser to EU foreign policy chief Javier Solana, the Saudis are mobilizing Islamist extremists to service mutual US-Saudi interests: “US officials speculated as to what might be done to block this vital corridor [from Iran to Syria], but it was Prince Bandar of Saudi Arabia who surprised them by saying that the solution was to harness Islamic forces. The Americans were intrigued, but could not deal with such people. Leave that to me, Bandar retorted.”

    This region-wide strategy involves sponsorship of Salafi jihadists in Syria, Libya, Egypt, Lebanon, Yemen, and Iraq. Praising Obama’s appropriation of this policy, John Hannah – former national security advisor to vice president Dick Cheney – rejoiced that the idea was to “weaken the Iranian mullahs; undermine the Assad regime; support a successful transition in Egypt; facilitate Gaddafi’s departure; reintegrate Iraq into the Arab fold; and encourage a negotiated solution in Yemen.”

    The strategy’s endgame? Petro-politics, once again, is center-stage, with the US-UK seeking to dominate regional oil and gas pipeline routes designed, in the words of Saudi expert John Bradley “to disrupt and emasculate the awakenings that threaten absolute monarchism” in the Persian Gulf petro-states.

    The seeds of this clandestine alliance with Islamists go back more than six years, when Seymour Hersh reported that the George W Bush administration had “cooperated with Saudi Arabia’s government, which is Sunni, in clandestine operations” intended to weaken the Shi’ite Hezbollah in Lebanon.

    “The US has also taken part in clandestine operations aimed at Iran and its ally Syria,” wrote Hersh, “a byproduct of which is ‘the bolstering of Sunni extremist groups’ hostile to the United States and sympathetic to al-Qaeda”. He also noted that “the Saudi government, with Washington’s approval, would provide funds and logistical aid to weaken the government of President Bashir Assad, of Syria.”

    In April 2007, the Lebanese Daily Star reported that the United States had earmarked US$60 million to reinforce Interior Ministry forces and Sunni organizations identified as “jihadists”.

    Did Omar Bakri benefit from this? Having settled in Lebanon, Bakri told one journalist at the time, “Today, angry Lebanese Sunnis ask me to organize their jihad against the Shi’ites… Al-Qaeda in Lebanon… are the only ones who can defeat Hezbollah.”

    And last year, Bakri boasted, “I’m involved with training the mujahideen [fighters] in camps on the Syrian borders and also on the Palestine side.” The trainees included four British Islamists “with professional backgrounds” who would go on to join the war in Syria. Bakri also claimed to have trained “many fighters”, including people from Germany and France, since arriving in Lebanon.

    That Bakri appears to be benefiting from the US strategy to support Islamist extremists in the region is particularly worrying given the British government’s acknowledgement that a “substantial number” of Britons are fighting in Syria, who “will seek to carry out attacks against Western interests… or in Western states”.

    With the EU embargo against supplying arms to Syrian rebels lifted this month after UK Prime Minister David Cameron’s pledge to support the rebels – some of whom are al-Qaeda affiliated Islamists with links to extremists at home – the question must be asked whether Britain’s security services remain compromised by short-sighted geopolitical interests rooted in our chronic dependency on fossil fuels.

    Unfortunately the British government’s latest proposals to deal with violent radicalization – Internet censorship, a lower threshold for banning “extremist” groups – deal not with the failures of state policy, but with the symptoms of those failures. Perhaps governments have tacitly accepted that terrorism, after all, is the price of business as usual.

    Dr Nafeez Mosaddeq Ahmed is an international security expert who writes for The Guardian at his Earth Insight blog. He is the author of The London Bombings: An Independent Inquiry (2006). His work was used by the Coroner’s Inquiry into the July 7 2005 bombings in London and the 9/11 Commission.

    May 30, ’13
    By Nafeez Mosaddeq Ahmed

    Find this story at 30 May 2013

    © Copyright 1999 – 2013 Asia Times Online (Holdings), Ltd.
    © Copyright 2013 Nafeez Mosaddeq Ahmed

    << oudere artikelen  nieuwere artikelen >>