• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Agreements with private companies protect U.S. access to cables’ data for surveillance (2013)

    The U.S. government had a problem: Spying in the digital age required access to the fiber-optic cables traversing the world’s oceans, carrying torrents of data at the speed of light. And one of the biggest operators of those cables was being sold to an Asian firm, potentially complicating American surveillance efforts.

    Enter “Team Telecom.”

    In months of private talks, the team of lawyers from the FBI and the departments of Defense, Justice and Homeland Security demanded that the company maintain what amounted to an internal corporate cell of American citizens with government clearances. Among their jobs, documents show, was ensuring that surveillance requests got fulfilled quickly and confidentially.

    This “Network Security Agreement,” signed in September 2003 by Global Crossing, became a model for other deals over the past decade as foreign investors increasingly acquired pieces of the world’s telecommunications infrastructure.

    The publicly available agreements offer a window into efforts by U.S. officials to safeguard their ability to conduct surveillance through the fiber-optic networks that carry a huge majority of the world’s voice and Internet traffic.

    The agreements, whose main purpose is to secure the U.S. telecommunications networks against foreign spying and other actions that could harm national security, do not authorize surveillance. But they ensure that when U.S. government agencies seek access to the massive amounts of data flowing through their networks, the companies have systems in place to provide it securely, say people familiar with the deals.

    Negotiating leverage has come from a seemingly mundane government power: the authority of the Federal Communications Commission to approve cable licenses. In deals involving a foreign company, say people familiar with the process, the FCC has held up approval for many months while the squadron of lawyers dubbed Team Telecom developed security agreements that went beyond what’s required by the laws governing electronic eavesdropping.

    The security agreement for Global Crossing, whose fiber-optic network connected 27 nations and four continents, required the company to have a “Network Operations Center” on U.S. soil that could be visited by government officials with 30 minutes of warning. Surveillance requests, meanwhile, had to be handled by U.S. citizens screened by the government and sworn to secrecy — in many cases prohibiting information from being shared even with the company’s executives and directors.

    “Our telecommunications companies have no real independence in standing up to the requests of government or in revealing data,” said Susan Crawford, a Yeshiva University law professor and former Obama White House official. “This is yet another example where that’s the case.”

    The full extent of the National Security Agency’s access to fiber-optic cables remains classified. The Office of the Director of National Intelligence issued a statement saying that legally authorized data collection “has been one of our most important tools for the protection of the nation’s — and our allies’ — security. Our use of these authorities has been properly classified to maximize the potential for effective collection against foreign terrorists and other adversaries.”

    It added, “As always, the Intelligence and law enforcement communities will continue to work with all members of Congress to ensure the proper balance of privacy and protection for American citizens.”

    Collecting information

    Documents obtained by The Washington Post and Britain’s Guardian newspaper in recent weeks make clear how the revolution in information technology sparked a revolution in surveillance, allowing the U.S. government and its allies to monitor potential threats with a reach impossible only a few years earlier.

    Yet any access to fiber-optic cables allows for possible privacy intrusions into Americans’ personal communications, civil libertarians say.

    As people worldwide chat, browse and post images through online services, much of the information flows within the technological reach of U.S. surveillance. Though laws, procedural rules and internal policies limit how that information can be collected and used, the data from billions of devices worldwide flow through Internet choke points that the United States and its allies are capable of monitoring.

    This broad-based surveillance of fiber-optic networks runs parallel to the NSA’s PRISM program, which allows analysts to access data from nine major Internet companies, including Google, Facebook, Microsoft, Yahoo, AOL and Apple, according to classified NSA PowerPoint slides. (The companies have said the collection is legal and limited.)

    One NSA slide titled, “Two Types of Collection,” shows both PRISM and a separate effort labeled “Upstream” and lists four code names: Fairview, Stormbrew, Blarney and Oakstar. A diagram superimposed on a crude map of undersea cable networks describes the Upstream program as collecting “communications on fiber cables and infrastructure as data flows past.”

    The slide has yellow arrows pointing to both Upstream and PRISM and says, “You Should Use Both.” It also has a header saying “FAA 702 Operations,” a reference to a section of the amended Foreign Intelligence Surveillance Act that governs surveillance of foreign targets related to suspected terrorism and other foreign intelligence.

    Under that provision, the government may serve a court order on a company compelling it to reach into its networks for data on multiple targets who are foreigners reasonably believed to be overseas. At an Internet gateway, the government may specify a number of e-mail addresses of foreigners to be targeted without the court signing off on each one.

    When the NSA is collecting the communications of a foreign, overseas target who is speaking or e-mailing with an American, that American’s e-mail or phone call is considered to be “incidentally” collected. It is considered “inadvertently” collected if the target actually turns out to be an American, according to program rules and people familiar with them. The extent of incidental and inadvertent collection has not been disclosed, leading some lawmakers to demand disclosure of estimates of how many Americans’ communications have been gathered. No senior intelligence officials have answered that question publicly.

    Using software that scans traffic and “sniffs out” the targeted e-mail address, the company can pull out e-mail traffic automatically to turn over to the government, according to several former government officials and industry experts.

    It is unclear how effective that approach is compared with collecting from a “downstream” tech company such as Google or Facebook, but the existence of separate programs collecting data from both technology companies and telecommunications systems underscores the reach of government intelligence agencies.

    “People need to realize that there are many ways for the government to get vast amounts of e-mail,” said Chris Soghoian, a technology expert with the American Civil Liberties Union.

    Controlling the data flow

    The drive for new intelligence sources after the Sept. 11, 2001, attacks relied on a key insight: American companies controlled most of the Internet’s essential pipes, giving ample opportunities to tap the torrents of data flowing by. Even terrorists bent on destruction of the United States, it turned out, talked to each other on Web-based programs such as Microsoft’s Hotmail.

    Yet even data not handled by U.S.-based companies generally flowed across parts of the American telecommunications infrastructure. Most important were the fiber-optic cables that largely have replaced the copper telephone wires and the satellite and microwave transmissions that, in an earlier era, were the most important targets for government surveillance.

    Fiber-optic cables, many of which lie along the ocean floor, provide higher-quality transmission and greater capacity than earlier technology, with the latest able to carry thousands of gigabits per second.

    The world’s hundreds of undersea cables now carry 99 percent of all intercontinental data, a category that includes most international phone calls, as well, says TeleGeography, a global research firm.

    The fiber-optic networks have become a rich source of data for intelligence agencies. The Guardian newspaper reported last month that the Government Communications Headquarters, the British equivalent of the NSA, taps and stores data flowing through the fiber-optic cables touching that nation, a major transit point for data between Europe and the Americas. That program, code-named Tempora, shares data with the NSA, the newspaper said.

    Tapping undersea transmission cables had been a key U.S. surveillance tactic for decades, dating back to the era when copper lines carrying sensitive telephone communications could be accessed by listening devices divers could place on the outside of a cable’s housing, said naval historian Norman Polmar, author of “Spy Book: The Encyclopedia of Espionage.”

    “The U.S. has had four submarines that have been outfitted for these special missions,” he said.

    But the fiber-optic lines — each no thicker than a quarter — were far more difficult to tap successfully than earlier generations of undersea technology, and interception operations ran the risk of alerting cable operators that their network had been breached.

    It’s much easier to collect information from any of dozens of cable landing stations around the world — where data transmissions are sorted into separate streams — or in some cases from network operations centers that oversee the entire system, say those familiar with the technology who spoke on the condition of anonymity to discuss sensitive intelligence matters.

    Expanding powers

    In the aftermath of the Sept. 11 attacks, the NSA said its collection of communications inside the United States was constrained by statute, according to a draft report by the agency’s inspector general in 2009, which was obtained by The Post and the Guardian. The NSA had legal authority to conduct electronic surveillance on foreigners overseas, but the agency was barred from collecting such information on cables as it flowed into and through the United States without individual warrants for each target.

    “By 2001, Internet communications were used worldwide, underseas cables carried huge volumes of communications, and a large amount of the world’s communications passed through the United States,” the report said. “Because of language used in the [Foreign Intelligence Surveillance] Act in 1978, NSA was required to obtain court orders to target e-mail accounts used by non-U.S. persons outside the United States if it intended to intercept the communications at a webmail service within the United States. Large numbers of terrorists were using such accounts in 2001.”

    As a result, after White House and CIA officials consulted with the NSA director, President George W. Bush, through a presidential order, expanded the NSA’s legal authority to collect communications inside the United States. The President’s Surveillance Program, the report said, “significantly increased [NSA’s] access to transiting foreign communications.”

    Gen. Michael Hayden, then the NSA director, described that information as “the real gold of the program” that led to the identification of threats within the United States, according to the inspector general’s report.

    Elements of the President’s Surveillance Program became public in 2005, when the New York Times reported the government’s ability to intercept e-mail and phone call content inside the United States without court warrants, sparking controversy. The FISA court began oversight of those program elements in 2007.

    As these debates were playing out within the government, Team Telecom was making certain that surveillance capacity was not undermined by rising foreign ownership of the fiber-optic cables that the NSA was using.

    The Global Crossing deal created particular concerns. The company had laid an extensive network of undersea cables in the world, but it went bankrupt in 2002 after struggling to handle more than $12 billion in debt.

    Two companies, one from Singapore and a second from Hong Kong, struck a deal to buy a majority stake in Global Crossing, but U.S. government lawyers immediately objected as part of routine review of foreign investment into critical U.S. infrastructure.

    President Gerald Ford in 1975 had created an interagency group — the Committee on Foreign Investment in the United States, or CFIUS — to review deals that might harm U.S. national security. Team Telecom grew out of that review process. Those executive branch powers were expanded several times over the decades and became even more urgent after the Sept. 11 attacks, when the Defense Department became an important player in discussions with telecommunications companies.

    The Hong Kong company soon withdrew from the Global Crossing deal, under pressure from Team Telecom, which was worried that the Chinese government might gain access to U.S. surveillance requests and infrastructure, according to people familiar with the negotiations.

    Singapore Technologies Telemedia eventually agreed to a slate of concessions, including allowing half of the board of directors of a new subsidiary managing the undersea cable network to consist of American citizens with security clearances. They would oversee a head of network operations, a head of global security, a general counsel and a human resources officer — all of whom also would be U.S. citizens with security clearances. The FBI and the departments of Defense, Justice and Homeland Security had the power to object to any appointments to those jobs or to the directors who had to be U.S. citizens.

    U.S. law already required that telecommunications companies doing business in the United States comply with surveillance requests, both domestic and international. But the security agreement established the systems to ensure that compliance and to make sure foreign governments would not gain visibility into the working of American telecommunications systems — or surveillance systems, said Andrew D. Lipman, a telecommunications lawyer who has represented Global Crossing and other firms in negotiating such deals.

    “These Network Security Agreements flesh out the details,” he said.

    Lipman, a partner with Bingham McCutchen, based in Washington, said the talks with Team Telecom typically involve little give and take. “It’s like negotiating with the Motor Vehicle Department,” he said.

    Singapore Technologies Telemedia sold Global Crossing in 2011 to Level 3 Communications, a company based in Colorado. But the Singaporean company maintained a minority ownership stake, helping trigger a new round of review by Team Telecom and a new Network Security Agreement that added several new conditions.

    A spokesman for Level 3 Communications declined to comment for this article.

    By Craig Timberg and Ellen Nakashima, Published: July 7, 2013

    Find this story at 7 July 2013

    © 1996-2014 The Washington Post

    Microsoft handed the NSA access to encrypted messages (2013)

    • Secret files show scale of Silicon Valley co-operation on Prism
    • Outlook.com encryption unlocked even before official launch
    • Skype worked to enable Prism collection of video calls
    • Company says it is legally compelled to comply

    Microsoft has collaborated closely with US intelligence services to allow users’ communications to be intercepted, including helping the National Security Agency to circumvent the company’s own encryption, according to top-secret documents obtained by the Guardian.

    The files provided by Edward Snowden illustrate the scale of co-operation between Silicon Valley and the intelligence agencies over the last three years. They also shed new light on the workings of the top-secret Prism program, which was disclosed by the Guardian and the Washington Post last month.

    The documents show that:

    • Microsoft helped the NSA to circumvent its encryption to address concerns that the agency would be unable to intercept web chats on the new Outlook.com portal;

    • The agency already had pre-encryption stage access to email on Outlook.com, including Hotmail;

    • The company worked with the FBI this year to allow the NSA easier access via Prism to its cloud storage service SkyDrive, which now has more than 250 million users worldwide;

    • Microsoft also worked with the FBI’s Data Intercept Unit to “understand” potential issues with a feature in Outlook.com that allows users to create email aliases;

    • In July last year, nine months after Microsoft bought Skype, the NSA boasted that a new capability had tripled the amount of Skype video calls being collected through Prism;

    • Material collected through Prism is routinely shared with the FBI and CIA, with one NSA document describing the program as a “team sport”.

    The latest NSA revelations further expose the tensions between Silicon Valley and the Obama administration. All the major tech firms are lobbying the government to allow them to disclose more fully the extent and nature of their co-operation with the NSA to meet their customers’ privacy concerns. Privately, tech executives are at pains to distance themselves from claims of collaboration and teamwork given by the NSA documents, and insist the process is driven by legal compulsion.

    In a statement, Microsoft said: “When we upgrade or update products we aren’t absolved from the need to comply with existing or future lawful demands.” The company reiterated its argument that it provides customer data “only in response to government demands and we only ever comply with orders for requests about specific accounts or identifiers”.

    In June, the Guardian revealed that the NSA claimed to have “direct access” through the Prism program to the systems of many major internet companies, including Microsoft, Skype, Apple, Google, Facebook and Yahoo.

    Blanket orders from the secret surveillance court allow these communications to be collected without an individual warrant if the NSA operative has a 51% belief that the target is not a US citizen and is not on US soil at the time. Targeting US citizens does require an individual warrant, but the NSA is able to collect Americans’ communications without a warrant if the target is a foreign national located overseas.

    Since Prism’s existence became public, Microsoft and the other companies listed on the NSA documents as providers have denied all knowledge of the program and insisted that the intelligence agencies do not have back doors into their systems.

    Microsoft’s latest marketing campaign, launched in April, emphasizes its commitment to privacy with the slogan: “Your privacy is our priority.”

    Similarly, Skype’s privacy policy states: “Skype is committed to respecting your privacy and the confidentiality of your personal data, traffic data and communications content.”

    But internal NSA newsletters, marked top secret, suggest the co-operation between the intelligence community and the companies is deep and ongoing.

    The latest documents come from the NSA’s Special Source Operations (SSO) division, described by Snowden as the “crown jewel” of the agency. It is responsible for all programs aimed at US communications systems through corporate partnerships such as Prism.

    The files show that the NSA became concerned about the interception of encrypted chats on Microsoft’s Outlook.com portal from the moment the company began testing the service in July last year.

    Within five months, the documents explain, Microsoft and the FBI had come up with a solution that allowed the NSA to circumvent encryption on Outlook.com chats

    A newsletter entry dated 26 December 2012 states: “MS [Microsoft], working with the FBI, developed a surveillance capability to deal” with the issue. “These solutions were successfully tested and went live 12 Dec 2012.”

    Two months later, in February this year, Microsoft officially launched the Outlook.com portal.

    Another newsletter entry stated that NSA already had pre-encryption access to Outlook email. “For Prism collection against Hotmail, Live, and Outlook.com emails will be unaffected because Prism collects this data prior to encryption.”

    Microsoft’s co-operation was not limited to Outlook.com. An entry dated 8 April 2013 describes how the company worked “for many months” with the FBI – which acts as the liaison between the intelligence agencies and Silicon Valley on Prism – to allow Prism access without separate authorization to its cloud storage service SkyDrive.

    The document describes how this access “means that analysts will no longer have to make a special request to SSO for this – a process step that many analysts may not have known about”.

    The NSA explained that “this new capability will result in a much more complete and timely collection response”. It continued: “This success is the result of the FBI working for many months with Microsoft to get this tasking and collection solution established.”

    A separate entry identified another area for collaboration. “The FBI Data Intercept Technology Unit (DITU) team is working with Microsoft to understand an additional feature in Outlook.com which allows users to create email aliases, which may affect our tasking processes.”

    The NSA has devoted substantial efforts in the last two years to work with Microsoft to ensure increased access to Skype, which has an estimated 663 million global users.

    One document boasts that Prism monitoring of Skype video production has roughly tripled since a new capability was added on 14 July 2012. “The audio portions of these sessions have been processed correctly all along, but without the accompanying video. Now, analysts will have the complete ‘picture’,” it says.

    Eight months before being bought by Microsoft, Skype joined the Prism program in February 2011.

    According to the NSA documents, work had begun on smoothly integrating Skype into Prism in November 2010, but it was not until 4 February 2011 that the company was served with a directive to comply signed by the attorney general.

    The NSA was able to start tasking Skype communications the following day, and collection began on 6 February. “Feedback indicated that a collected Skype call was very clear and the metadata looked complete,” the document stated, praising the co-operation between NSA teams and the FBI. “Collaborative teamwork was the key to the successful addition of another provider to the Prism system.”

    ACLU technology expert Chris Soghoian said the revelations would surprise many Skype users. “In the past, Skype made affirmative promises to users about their inability to perform wiretaps,” he said. “It’s hard to square Microsoft’s secret collaboration with the NSA with its high-profile efforts to compete on privacy with Google.”

    The information the NSA collects from Prism is routinely shared with both the FBI and CIA. A 3 August 2012 newsletter describes how the NSA has recently expanded sharing with the other two agencies.

    The NSA, the entry reveals, has even automated the sharing of aspects of Prism, using software that “enables our partners to see which selectors [search terms] the National Security Agency has tasked to Prism”.

    The document continues: “The FBI and CIA then can request a copy of Prism collection of any selector…” As a result, the author notes: “these two activities underscore the point that Prism is a team sport!”

    In its statement to the Guardian, Microsoft said:

    We have clear principles which guide the response across our entire company to government demands for customer information for both law enforcement and national security issues. First, we take our commitments to our customers and to compliance with applicable law very seriously, so we provide customer data only in response to legal processes.

    Second, our compliance team examines all demands very closely, and we reject them if we believe they aren’t valid. Third, we only ever comply with orders about specific accounts or identifiers, and we would not respond to the kind of blanket orders discussed in the press over the past few weeks, as the volumes documented in our most recent disclosure clearly illustrate.

    Finally when we upgrade or update products legal obligations may in some circumstances require that we maintain the ability to provide information in response to a law enforcement or national security request. There are aspects of this debate that we wish we were able to discuss more freely. That’s why we’ve argued for additional transparency that would help everyone understand and debate these important issues.

    In a joint statement, Shawn Turner, spokesman for the director of National Intelligence, and Judith Emmel, spokeswoman for the NSA, said:

    The articles describe court-ordered surveillance – and a US company’s efforts to comply with these legally mandated requirements. The US operates its programs under a strict oversight regime, with careful monitoring by the courts, Congress and the Director of National Intelligence. Not all countries have equivalent oversight requirements to protect civil liberties and privacy.

    They added: “In practice, US companies put energy, focus and commitment into consistently protecting the privacy of their customers around the world, while meeting their obligations under the laws of the US and other countries in which they operate.”

    • This article was amended on 11 July 2013 to reflect information from Microsoft that it did not make any changes to Skype to allow Prism collection on or around July 2012.

    Glenn Greenwald, Ewen MacAskill, Laura Poitras, Spencer Ackerman and Dominic Rushe
    The Guardian, Friday 12 July 2013

    Find this story at 12 July 2013

    © 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Microsoft soll seit Jahren mit US-Ermittlern kooperieren (2013)

    Microsoft arbeitet angeblich intensiv mit US-Geheimdiensten zusammen. Nach Informationen, die Edward Snowden dem “Guardian” zugespielt hat, soll der Konzern den Ermittlern Zugang zu E-Mails und Skype-Gesprächen gewährt und sogar die firmeneigene Verschlüsselung ausgehebelt haben.

    Hamburg/London – Edward Snowden hat mit seinen Enthüllungen über die globale Datenschnüffelei der US-Geheimdienste nicht nur die amerikanische Politik in helle Aufregung versetzt, sondern auch die dortige IT-Branche. Giganten wie Facebook, Apple, Google und Microsoft haben bisher versucht, den Eindruck zu erwecken, ihre Zusammenarbeit mit den US-Behörden beschränke sich auf das Nötigste.

    Jetzt aber berichtet der britische “Guardian”, wie Microsoft mit den Ermittlern kooperiert. Demnach zeigen Informationen von Snowden, dass das Unternehmen seit drei Jahren intensiv mit US-Geheimdiensten zusammenarbeitet.

    Die National Security Agency (NSA) habe etwa die Sorge geäußert, Web-Chats auf dem neuen Outlook.com-Portal nicht mitlesen zu können. Microsoft habe daraufhin der NSA geholfen, die konzerneigene Verschlüsselungstechnik zu umgehen. Dieses Vorgehen soll sich dem Bericht zufolge nicht auf die Web-Chats beschränkt haben: Die NSA soll auch Zugang zu E-Mails auf Outlook.com und Hotmail trotz der Verschlüsselung gehabt haben.

    Auch der Internettelefoniedienst Skype, den Microsoft im Oktober 2011 gekauft hat, geriet ins Visier der NSA: Laut “Guardian” hat die Firma Geheimdiensten ermöglicht, im Rahmen des “Prism”-Überwachungsprogramms sowohl Video- als auch Audio-Unterhaltungen mitzuschneiden.

    Microsoft begründete sein Vorgehen mit rechtlichen Zwängen: “Wenn wir Produkte verbessern, müssen wir uns weiterhin Anfragen beugen, die mit dem Gesetz in Einklang sind.” Das Unternehmen betonte, dass es Kundendaten nur auf Anfrage der Regierung herausgebe – und auch das nur, wenn es um spezifische Konten oder Nutzer gehe.

    Spannungen zwischen Silicon Valley und Obama-Regierung

    Aus den Unterlagen geht laut “Guardian” hervor, dass das durch “Prism” gesammelte Material routinemäßig an das FBI und den US-Auslandsgeheimdienst CIA geht. In einem NSA-Dokument sei von einem “Mannschaftssport” die Rede.

    Die neuen Informationen zeigen nach Angaben des “Guardian” auch, dass es Spannungen zwischen dem Silicon Valley, Standort zahlreicher Computerunternehmen, und der Regierung von US-Präsident Barack Obama gibt. Alle großen Technologiefirmen drängten die US-Regierung, ihnen zu erlauben, das Ausmaß der Zusammenarbeit mit den Behörden öffentlich zu machen, um den Datenschutzbedenken ihrer Kunden gerecht zu werden.

    11. Juli 2013, 23:34 Uhr

    Find this story at 11 July 2013

    © SPIEGEL ONLINE 2013

    HOW THE F.B.I. CRACKED A CHINESE SPY RING

    In the magazine earlier this month, I wrote about Greg Chung, a Chinese-American engineer at Boeing who worked on NASA’s space-shuttle program. In 2009, Chung became the first American to be convicted in a jury trial on charges of economic espionage, for passing unclassified technical documents to China.

    While reporting the story, I learned a great deal about an earlier investigation involving another Chinese-American engineer, named Chi Mak, who led F.B.I. agents to Greg Chung. The Mak case, which began in 2004, was among the F.B.I.’s biggest counterintelligence investigations, involving intense surveillance that went on for more than a year.

    The stakes were high: at that time, the F.B.I. did not have a stellar record investigating Chinese espionage. Three years earlier, the government had been publicly humiliated by its failed attempt to prosecute the Chinese-American scientist Wen Ho Lee on charges of passing nuclear secrets from the Los Alamos National Laboratory to China, in a case that came to be seen by some observers as an example of racial prejudice. The investigation of Chi Mak—followed by the successful investigation and prosecution of Greg Chung—turned out to be a milestone in the F.B.I.’s efforts against Chinese espionage, and demonstrated that Chinese spies had indeed been stealing U.S. technological secrets.

    While Chung volunteered his services to China out of what seemed to be love for his motherland, the F.B.I. believed that Mak was a trained operative who had been planted in the U.S. by Chinese intelligence. Beginning in 1988, Mak had worked at Power Paragon, a defense company in Anaheim, California, that developed power systems for the U.S. Navy. The F.B.I. suspected that Mak, who immigrated to the U.S. from Hong Kong in the late nineteen-seventies, had been passing sensitive military technology to China for years.

    The investigation began when the F.B.I. was tipped off to a potential espionage threat at Power Paragon. The case was assigned to a special agent named James Gaylord; since the technologies at risk involved the Navy, Gaylord and his F.B.I. colleagues were joined by agents from the Naval Criminal Investigation Service. Mak was put under extensive surveillance: the investigators installed a hidden camera outside his home, in Downey, California, to monitor his comings and goings, and surveillance teams followed him wherever he went. All of his phone calls were recorded.

    A short and energetic sixty-four-year-old with a quick smile, Mak was a model employee at Power Paragon. Other workers at the company often turned to him for help in solving problems, and Mak provided it with the enthusiasm of a man who appeared to live for engineering. His assimilation into American life was limited to the workplace: he and his wife, Rebecca, led a quiet life, never socializing with neighbors. Rebecca was a sullen, stern woman whose proficiency in English had remained poor during her two and a half decades in the United States. She never went anywhere without Mak, except to take a walk around the neighborhood in the morning.

    Sitting around the house—secret audio recordings would later show—the two often talked about Chinese politics, remarking that Mao, like Stalin, was misunderstood by history. The influence of Maoist ideology was, perhaps, evident in the Maks’ extreme frugality: they ate their meals off of newspapers, which they would roll up and toss in the garbage. Every Saturday morning, after a game of tennis, they drove to a gas station and washed their car using the mops and towels there. From the gas station, the Maks drove to a hardware store and disappeared into the lumber section for ten minutes, never buying anything. For weeks, the agents following them wondered if the Maks were making a dead drop, but it turned out that the lumber section offered free coffee at that hour.

    * * *
    One evening in September, 2004, Gaylord drove to a playground next to the freeway in Downey. About two dozen of Gaylord’s colleagues from the F.B.I. were already gathered there, including a team from the East Coast that specialized in making clandestine entries into the homes of investigation suspects. That night, they planned to conduct a secret search of Mak’s house. Mak and Rebecca were vacationing in Alaska, and this gave agents an opportunity to use a court order authorizing them to enter the Maks’ residence in their absence.

    For weeks, agents had been watching Blandwood Road, the street the Maks lived on, researching the nightly patterns of nearby neighbors. The person next door routinely woke up at three to go to the bathroom, walking past a window that offered a partial view into the Maks’ house. Behind the Maks’ residence was a dog that was given to barking loudly. A neighbor across the street came out every morning at four to smoke a cigarette. If any of them were to raise an alarm, the search would not remain secret. Mak would find out and, if he was indeed a spy, it would become harder to find evidence against him.

    Shortly before midnight, Gaylord and two other agents got into a Chevy minivan with the middle and back rows of seats removed. The vehicle was identical in appearance to the one that Mak drove; it would raise no suspicions even if neighbors happened to notice it. The agents lay down flat in the back of the van, leaving only the driver visible from the street. After getting the go-ahead from a surveillance team, the van pulled out from the playground and drove to Blandwood Road, stopping a short distance from the Maks’ house.

    The group of entry specialists was already inside the house. Gaylord gently opened the front door and entered, letting two other agents in behind him. The men stood motionless, waiting for their eyes to adjust to the darkness. Everything they could see was covered in a thick layer of dust, including a model airplane on a coffee table and a vacuum cleaner in the hallway. In the dim light, Gaylord saw stacks of documents, some two to three feet high, everywhere: by the front door, on the dinner table, in the home office.

    The agents began photographing the documents, taking care to put them back exactly as they had been. Among the stacks were manuals and designs for power systems on U.S. Navy ships and concepts for new naval technologies under development. One set of documents contained information about the Virginia-class submarines, describing ways to cloak submarine propellers and fire anti-aircraft weapons underwater.

    The agents took pictures of other materials: tax returns, travel documents, and an address book listing Mak’s contacts, including several other engineers of Chinese origin living in California. This is where the F.B.I. first came across the name Greg Chung.

    * * *
    The F.B.I. was also watching Chi Mak’s younger brother, Tai Mak, who had moved to the U.S. from Hong Kong in 2001. Tai was a broadcast engineer for a Hong Kong-based satellite-television channel, Phoenix TV, which is partly owned by the Chinese government. He lived in Alhambra, about twelve miles from Downey, with his wife, Fuk Li, and their two teen-age children, Billy and Shirley.

    Fuk and Rebecca didn’t get along, and would bad-mouth each other to their husbands. Still, the two families got together every few weeks, usually at a Chinese restaurant in Alhambra, which has a large Chinese-American population. A frequent topic of conversation was Fuk’s aging mother, who lived alone in Guangzhou. Fuk and Tai were concerned about her health, and they depended on a family friend named Pu Pei-liang, a scholar at the Center for Asia Pacific Studies at Sun Yat-sen University, to check on her periodically.

    Every week, agents inspected the trash from both families’ houses, after offloading it from a garbage truck. “It’s not a fun duty, especially in the summertime, here in California,” Gaylord told me. The job fell mostly to Gaylord’s younger colleagues, who would lay the garbage out in a parking lot or a garage and rummage through it.

    The trash searches and the surveillance went on for months, but they yielded no evidence. “I never said it, but I thought, Wow, we’re using a lot of resources, but we haven’t proved anything yet,” Gaylord told me. Then, one day in February, 2005, Jessie Murray, an agent who spoke Mandarin, found several torn-up bits of paper with Chinese text while going through Chi and Rebecca’s trash. She put them in a Ziploc bag and brought them to the office.

    The agents assembled the contents of the bag like a jigsaw puzzle. Patched together, the pieces constituted two documents, one handwritten and the other machine-printed. Gunnar Newquist, an investigator assigned to the case by the N.C.I.S., spotted an English phrase at the bottom of the handwritten sheet. “DDX,” he said, reading it aloud. “That’s a Navy destroyer.”

    The handwritten text turned out to be a list of naval technologies and programs: submarine propulsion networks; systems for defending against nuclear, chemical, and biological attacks; and others. On the printed sheet were instructions about going to conferences to collect information. Gaylord was certain that the two documents were tasking lists from Chinese intelligence.

    DDX-handwritten-tasking-list-580.jpg

    Tasking-List-(Machine-Written)-580.jpg

    In October, the F.B.I. made another covert entry into Chi Mak’s house and installed a hidden camera above the dining-room table; the surveillance video from that camera can be seen below. Days later, on a Sunday morning, agents observed Mak sitting at the table, inserting CDs into a laptop and talking to Rebecca about the information that he was copying. All of it related to the Navy, including a paper about developing a quieter motor for submarines, a project that Mak was in charge of at Power Paragon.

    Combing through translated phone conversations from the previous week, investigators learned that Fuk and Tai were planning to leave California for China the following Friday. They discovered a call that Tai had made to Pu, the family friend in Guangzhou, which Tai began with a strange introduction: “I am with Red Flower of North America.” Tai told Pu that he was coming to China for the spring trade show, and that he was bringing an assistant. Pu asked him to call upon arriving at the Guangzhou airport, using a phone card that Pu had given him earlier. Tai was clearly speaking in code: he wasn’t connected to any organization named Red Flower, and it was autumn, not spring.

    The following day, Tai and Fuk talked about the upcoming trip. Fuk asked if they would have to carry a heavy load of documents from Chi Mak, as they had done in the past. Tai assured her that, this time, they only needed to put the information on disks, using the computer that Pu had given them.

    Fuk and Tai were arrested at the Los Angeles airport after security agents searched their luggage and found an encrypted disk containing the files that Chi Mak had copied. On the same night, F.B.I. agents arrested Chi and Rebecca Mak just as they were preparing for bed. The two sat silently on the couch while agents searched the house, for the first time with the lights turned on.

    * * *
    During a six-week jury trial in 2007, government prosecutors painted Chi Mak as a trained spy who started his career as an intelligence officer for the Chinese government during his years in Hong Kong. Mak’s first assignment, according to the prosecution, was monitoring the movements of U.S. Navy ships entering and leaving the Hong Kong harbor during the Vietnam War, a job that Mak performed assiduously while working at his sister’s tailor shop. Gunnar Newquist testified that, in an interview given to Newquist and a fellow N.C.I.S. agent shortly after his arrest, Mak had confessed to sending information about commercial and military technologies to China since the early eighties. Mak denied making any such confession.

    On May 10, 2007, the jury convicted Mak on charges of conspiring to export U.S. military technology to China and acting as an unregistered agent of a foreign government. Weeks later, Tai, Fuk, and their son, Billy, pleaded guilty to being part of the conspiracy. Rebecca Mak pleaded guilty to being an unregistered foreign agent. Mak was sentenced to twenty-four and a half years; Tai received a sentence of ten years. Fuk and Billy were deported to China, as was Rebecca—after she had spent three years in prison.

    When I went to see Mak, last summer, at the Federal Correctional Institution, in Lompoc, California, a minimum-security prison near Vandenberg Air Force Base, he denied that he had ever worked for Chinese intelligence. Mak also insisted that Chung hadn’t spied for China, either. He said that they had both been unfairly targeted by investigators, as part of a politically motivated campaign against China by U.S. law enforcement agencies. The reason he’d come to the U.S. in the seventies, Mak said, was not to work as a sleeper agent—as the prosecution had claimed—but to advance professionally and to see the world. At one point, he caught himself going on at length about an aircraft-powering generator he had helped to design in the eighties. “When I talk technical, I get excited,” he said, grinning sheepishly.

    His enthusiasm waned when I asked him about the list of military technologies that the F.B.I. had recovered from his trash. He told me that he’d found it inside a book on Chinese medicine that his nephew, Billy, brought back for him from a trip to China. “Maybe somebody was trying to take advantage of Billy,” he said. When I pressed him to guess who the sender of the list might have been, Mak got fidgety and grim. “It could have been Pu Pei-liang,” he said, finally. He insisted that the only thing he’d ever done with the list was tear it up.

    Mak acknowledged that he’d sent papers to Pu in the past, but said that they were all from the open literature. The CDs he’d given to Tai before Tai’s aborted trip to China didn’t contain anything sensitive, either, he said, alleging that the prosecution had greatly exaggerated their importance. Still, I asked, who were the CDs meant for? Mak narrowed his eyes, as if trying hard to remember. “I’m not too sure,” he said. “I’m not too sure.”

    MAY 16, 2014
    POSTED BY YUDHIJIT BHATTACHARJEE

    Find this story at 16 May 2014

    © 2013 Condé Nast.

    Dongfan “Greg” Chung, Chinese Spy, Gets More Than 15 Years In Prison

    SANTA ANA, Calif. — A Chinese-born engineer convicted in the United States’ first economic espionage trial was sentenced Monday to more than 15 years in prison for stealing sensitive information on the U.S. space program with the intent of passing it to China.

    Dongfan “Greg” Chung, a Boeing stress analyst with high-level security clearance, was convicted in July of six counts of economic espionage and other federal charges for storing 300,000 pages of sensitive papers in his Southern California home. Prosecutors alleged the papers included information about the U.S. space shuttle, a booster rocket and military troop transports.

    Before reading the sentence, U.S. District Judge Cormac J. Carney said he didn’t know exactly what information Chung had passed to China over a 30-year period. But just taking the “treasure trove of documents” from Boeing Co., a key military contractor, constituted a serious crime, he said.

    “What I do know is what he did, and what he did pass, hurt our national security and it hurt Boeing,” the judge said.

    During brief remarks, Chung, 74, begged for a lenient sentence, saying he had taken the information to write a book.

    “Your honor, I am not a spy, I am only an ordinary man,” said Chung, who wore a tan prison jumpsuit with his hands cuffed to a belly chain as his wife and son watched from the audience. “Your honor, I love this country. … Your honor, I beg your pardon and let me live with my family peacefully.”

    Outside court, defense attorney Thomas Bienert said he would appeal.

    “We have a different view of the facts and the evidence than the judge,” Bienert said. “We think the sentence should have been a lot less given the conduct involved.”

    Prosecutors had requested a 20-year sentence, in part to send a message to other would-be spies, but the judge said he couldn’t determine exactly how much the breaches hurt Boeing and the nation.

    Carney also cited the engineer’s age and frail health in going with a sentence of 15 years and eight months. Chung had a stroke within the past two years and was hospitalized several days ago with a gastrointestinal problem, Bienert said.

    “It’s very difficult having to make a decision where someone is going to have to spend the rest of their adult life in prison,” Carney said. “I take no comfort or satisfaction in that.”

    Assistant U.S. Attorney Greg Staples noted in his sentencing papers that Chung had amassed $3 million in personal wealth while betraying his adopted country.

    “I know that there’s a lot of emotion on the defense side about what impact the sentence will have on the defendant, but I would like to put on the record that we are here speaking for the rest of the families in the United States who go to bed at night expecting that the security of this country is being looked out for,” Staples said.

    The government accused Chung of using his decades-long career at Boeing and Rockwell International to steal papers on aerospace and defense technologies.

    During the non-jury trial, the government showed photos of every available surface in Chung’s home covered with thick stacks of paper, and investigators testified about finding more documents in a crawl space. They said Boeing invested $50 million in the technology over a five-year period.

    Chung’s lawyers argued then – and again at sentencing – that he may have violated Boeing policy by bringing the papers home, but he didn’t break any laws, and the U.S. government couldn’t prove he had given secrets to China.

    The government believes Chung began spying for the Chinese in the late 1970s, a few years after he became a naturalized U.S. citizen and was hired by Rockwell.

    Chung worked for Rockwell until it was bought by Boeing in 1996. He stayed with the company until he was laid off in 2002, then was brought back a year later as a consultant. He was fired when the FBI began its investigation in 2006.

    When agents searched Chung’s home in Orange that year, they discovered thousands of pages of documents on a phased-array antenna being developed for radar and communications on the U.S. space shuttle and a $16 million fueling mechanism for the Delta IV booster rocket, used to launch manned space vehicles.

    Agents also found documents on the C-17 Globemaster troop transport used by the U.S. Air Force and militaries in Britain, Australia and Canada – but the government later dropped charges related to those finds.

    Prosecutors discovered Chung’s activities while investigating Chi Mak, another suspected Chinese spy living and working in Southern California. Mak was convicted in 2007 of conspiracy to export U.S. defense technology to China and sentenced to 24 years in prison.

    Chung was the first person to be tried under the economic espionage provision of the Economic Espionage Act, which was passed in 1996 after the U.S. realized China and other countries were targeting private businesses as part of their spy strategies.

    Since then, six economic espionage cases have settled before trial. In some of the cases, defendants were sentenced to just a year or two in prison.

    Another economic espionage case went to trial in San Jose after Chung’s conviction, but a jury deadlocked on charges against two men accused of stealing computer chip blueprints from their Silicon Valley employer.

    Prosecutors have previously tried cases under a different part of the 1996 act that deals with the theft of trade secrets.

    GILLIAN FLACCUS 02/ 8/10 04:52 PM ET AP

    Find this story at 2 August 2010

    Copyright © 2014 TheHuffingtonPost.com, Inc.

    Chinese-Born Man Guilty of Economic Spying (2009)

    In this Feb 19, 2008 file photo, Dongfan “Greg” Chung, is shown leaving the U.S. District Court in Santa Ana, Calif., with an unidentified woman. The prosecution and defense presented opening statements Tuesday June 2, 2009 in the first economic espionage case to reach trial in the United States. Prosecutors laid out their case against Chung, 73, in U.S. District Court in Santa Ana, Calif. AP PHOTO/ORANGE COUNTY REGISTER, CHRISTINA HOUSE

    A Chinese-born engineer was convicted Thursday of stealing trade secrets critical to the U.S. space program in the nation’s first economic espionage trial.

    A federal judge found former Boeing Co. engineer Dongfan “Greg” Chung guilty of six counts of economic espionage and other charges for taking 300,000 pages of sensitive documents that included information about the U.S. space shuttle and a booster rocket.

    “Mr. Chung has been an agent of the People’s Republic of China for over 30 years,” U.S. District Judge Cormac J. Carney said while issuing his ruling.

    Federal prosecutors accused the 73-year-old stress analyst of using his 30-year career at Boeing and Rockwell International to steal the documents. They said investigators found papers stacked throughout Chung’s house that included sensitive information about a fueling system for a booster rocket – documents that Boeing employees were ordered to lock away at the close of work each day. They said Boeing invested $50 million in the technology over a five-year period.

    The judge convicted Chung of six counts of economic espionage, one count of acting as a foreign agent, one count of conspiracy, and one count of lying to federal agent. He was acquitted of obstruction of justice.

    Chung opted for a non-jury trial that ended June 24. During the three-week trial, defense attorneys said Chung was a “pack rat” who hoarded documents at his house but insisted he was not a spy.

    They said Chung may have violated Boeing policy by bringing the papers home, but he didn’t break any laws and the U.S. government couldn’t prove he had given any of the information to China.

    Attorneys and prosecutors were not immediately available for comment after the verdict.

    The Economic Espionage Act was passed in 1996 to help the government crack down on the theft of information from private companies that contract with the government to develop U.S. space and military technologies.

    By CBSNEWSAPJuly 16, 2009, 1:18 PM

    Find this story at 16 July 2009

    © 2009 The Associated Press. All Rights Reserved. This material may not be published, broadcast, rewritten, or redistributed.

    Covert Inquiry by F.B.I. Rattles 9/11 Tribunals

    WASHINGTON — Two weeks ago, a pair of F.B.I. agents appeared unannounced at the door of a member of the defense team for one of the men accused of plotting the 9/11 terrorist attacks. As a contractor working with the defense team at Guantánamo Bay, Cuba, the man was bound by the same confidentiality rules as a lawyer. But the agents wanted to talk.

    They asked questions, lawyers say, about the legal teams for Ramzi bin al-Shibh, Khalid Shaikh Mohammed and other accused terrorists who will eventually stand trial before a military tribunal at Guantánamo. Before they left, the agents asked the contractor to sign an agreement promising not to tell anyone about the conversation.

    With that signature, Mr. bin al-Shibh’s lawyers say, the government turned a member of their team into an F.B.I. informant.

    The F.B.I.’s inquiry became the focus of the pretrial hearings at Guantánamo this week, after the contractor disclosed it to the defense team. It was a reminder that, no matter how much the proceedings at the island military prison resemble a familiar American trial, the invisible hand of the United States government is at work there in ways unlike anything seen in typical courtrooms.

    “It’s a courtroom with three benches,” said Eugene R. Fidell, who teaches military justice at Yale Law School. “There’s one person pretending to be the judge, and two other agencies behind the scenes exerting at least as much influence.”

    Thirteen years after 9/11, nobody has been convicted in connection with the attacks and, because of the F.B.I. visit, a trial could be delayed even longer. But it was only the latest in a string of strange events at Guantánamo Bay that, coupled with the decade-long delay, have undermined a process that was supposed to move swiftly, without the encumbrances of the civilian legal system and its traditional rules of evidence.

    Last year, as a lawyer for Mr. Mohammed was speaking during another hearing, a red light began flashing. Then the videofeed from the courtroom abruptly cut out. The emergency censorship system had been activated. But why? And by whom? The defense lawyer had said nothing classified. And the court officer responsible for protecting state secrets had not triggered the system. Days later, the military judge, Col. James L. Pohl, announced that he had been told that an “original classification authority” — meaning the C.I.A. — was secretly monitoring the proceedings. Unknown to everyone else, the agency had its own button, which the judge swiftly and angrily disconnected.

    Continue reading the main story
    X CLOSE

    Last year, the government acknowledged that microphones were hidden inside what looked like smoke detectors in the rooms where detainees met with their lawyers. Those microphones gave officials the ability to eavesdrop on confidential conversations, but the military said it never did so.

    “At some point, it just becomes silly,” said Glenn Sulmasy, a military law professor at the Coast Guard Academy who supports military trials for terrorism but said problems at Guantánamo Bay have undermined confidence in the system. “I don’t think we’re at that point yet, but at some point it just becomes surreal. It’s like there’s a shadow trial going on and we’re only finding out about it in bits and pieces.”

    The court has also been troubled by computer problems. A botched computer update gave prosecutors and defense lawyers access to the other side’s confidential work. And the Pentagon acknowledged inadvertently searching and copying defense lawyers’ emails but said nobody read them.

    Continue reading the main storyContinue reading the main story
    Advertisement

    “These things keep happening,” a defense lawyer, James Harrington, said this week as he asked for an investigation into the F.B.I.’s activities. The other instances seemed like government intrusion, Mr. Harrington said, but lawyers could not prove it. “Here it really happened.”

    The F.B.I. would not comment and military prosecutors said they knew nothing about the investigation. But the F.B.I. appears to be investigating how The Huffington Post got ahold of a 36-page manifesto that Mr. Mohammed had written in prison.

    The government hopes to start the trial early next year, but it is not clear whether this issue will result in another delay. Mr. Harrington said he wanted Colonel Pohl to question F.B.I. officials and determine whether anyone else on the defense team had been approached by or gave information to the government.

    “It’s just a horrible atmosphere to operate in,” Mr. Harrington said Friday. “It’s built on a shaky foundation, and one thing after another happens. I don’t see how anyone can have confidence in this process.”

    Continue reading the main story
    RECENT COMMENTS

    gmcnulty 24 days ago
    The 9/11 terrorist murdered my son that day in September but I am sickened by the actions of some within our government.No matter what there…
    GC 25 days ago
    I have zero faith in the bureaucrats that run (leach off) our country. I am an eye for an eye purist, but we have laws for a reason. The…
    RS 25 days ago
    This is what our country has become, our so-called Democracy land of the free and the CIA.
    SEE ALL COMMENTS
    Christopher Jenks, a Southern Methodist University law professor and a former military prosecutor, said he sympathized with the Guantánamo prosecutors, who appeared to have been just as surprised as defense lawyers by the appearance of the F.B.I. and C.I.A. in their cases.

    “You have these military prosecutors who are normally empowered to own their cases. And they don’t here,” Mr. Jenks said. If this were any other country’s system, Mr. Jenks said, “The reaction would be, ‘Oh my gosh. What a kangaroo process.’ ”

    President George W. Bush created the military tribunal system for suspected terrorists in 2001. Years of court challenges followed and after the Supreme Court struck down the tribunal’s rules in 2006, Congress hurriedly wrote new rules giving prisoners more rights. More changes followed in 2009 and the government says the process is far better and fairer now.

    The 9/11 trial, if it occurs, will be the biggest test of that system. Six detainees in other cases have pleaded guilty before military commissions. Two others have gone to trial and been found guilty, only to have their convictions thrown out by an appeals court.

    Greg McNeal, a former adviser to the top Guantánamo prosecutor, said the military tribunal system was ripe for episodes like the one with the F.B.I. because it is so new. The civilian system and the traditional military judicial system have well-established rules and precedents for handling issues that arise. “Because it’s new and different, they may have a sense that they can get away with things,” Mr. McNeal said. He added, “There are interagency fights happening behind the scenes that have been going on for the past decade.”

    The Obama administration had hoped to prosecute the 9/11 case in a New York criminal court. But it reversed course in the face of security fears and criticism that the government would grant constitutional rights to terrorists.

    While the military tribunals have been plagued by delays, the department has successfully prosecuted several terrorism cases in civilian courts. Most recently, prosecutors in Manhattan won a conviction against Sulaiman Abu Ghaith, the most senior adviser to Osama bin Laden to be tried in civilian court in the United States since 9/11.

    Attorney General Eric H. Holder Jr. noted that the New York case had proceeded from capture to conviction in about a year. “It is hard to imagine this case being presented with greater efficiency or greater speed,” he said.

    Correction: April 22, 2014
    An article on Saturday about the F.B.I.’s involvement in terrorism-related trials misspelled the surname of a Southern Methodist University law professor and former military prosecutor. He is Christopher Jenks, not Jencks.

    By MATT APUZZO APRIL 18, 2014

    Find this story at 18 April 2014

    © 2014 The New York Times Company

    Judge Demands Details on Detainee’s Time in Secret C.I.A. Prisons

    FORT MEADE, Md. — A military judge ordered prosecutors on Tuesday to turn over never-revealed details about the time a Guantánamo Bay detainee spent in secret C.I.A. prisons after his arrest in connection with the deadly attack on the destroyer Cole in Yemen.

    The order was a victory for defense lawyers representing the detainee, Abd al-Rahim al-Nashiri, who is accused of orchestrating the Oct. 12, 2000, bombing of the Cole in Aden, Yemen. The attack killed 17 American sailors, wounded 42 others and tore a huge hole into the side of the ship.

    Mr. Nashiri, who was born in Saudi Arabia, has been held at the United States military prison at Guantánamo Bay, Cuba, since 2006, after spending time at a series of secret C.I.A. prisons.

    A C.I.A. inspector general’s report said Mr. Nashiri, considered to have once been one of the most senior leaders in Al Qaeda, was waterboarded and threatened with a gun and a power drill because interrogators believed he was withholding information about possible attacks against the United States. Such practices were allowed under rules approved by the George W. Bush administration, but many have since been repudiated.

    Prosecutors, who can appeal Tuesday’s ruling, had argued that information about Mr. Nashiri’s time spent in C.I.A. custody was irrelevant. The defense says the case was tainted by C.I.A. actions in the secret prisons and could be used to spare him from the death penalty.

    The government has confirmed little about what happened in the C.I.A. prisons. Tuesday’s order, by Col. James L. Pohl, a judge with the United States Army, did not make any details available to the public. His order explicitly noted that all parties in the case are required to follow a protective order barring release of classified information.

    The judge said the government must provide details about Mr. Nashiri’s capture, detention, rendition and interrogation. The information the judge ordered the government to reveal included a chronology of how Mr. Nashiri was shuttled among the secret prisons, and how he was transported, clothed and restrained. The government must also provide reports, summaries of interrogations and any photos or videos documenting his confinement conditions.

    Under the rules for military commissions, prosecutors are barred from using any evidence or testimony obtained by coercion, and the defense has argued that all information from Mr. Nashiri is tainted by the harsh treatment he endured.

    The hearing was held Tuesday at Guantánamo Bay, but reporters were able to watch it here.

    By THE ASSOCIATED PRESSAPRIL 22, 2014

    Find this story at 22 April 2014

    © 2014 The New York Times Company

    Guantánamo trial judge orders CIA to account for treatment of detainee

    Judge James Pohl orders agency to produce detailed account of its detention of USS Cole bombing suspect at secret prison

    A judge overseeing the trials of terror suspects at Guantánamo Bay has ordered the CIA to turn over details of its treatment of a detainee in one of its secret prisons, a watershed ruling that sets the stage for the military commissions to learn much more than the US public about the agency’s brutal interrogations.

    While the ruling is still sealed, Judge James Pohl, an army colonel, issued the order on Monday for the CIA to produce a detailed account of its detention and interrogation of Abd al-Rahim al-Nashiri, who is charged with orchestrating the bombing of the USS Cole in 2000 that killed 17 US sailors.

    Details of the order, issued through the military commissions prosecution team, were first reported by the Miami Herald on Thursday.

    Pohl is also the judge overseeing the stalled 9/11 tribunal involving Khalid Sheikh Mohammed and four other detainees. Their defense attorneys have long bemoaned their lack of access to CIA information about the treatment of their clients before their 2006 arrival at Guantánamo, which they argue directly impacts their fitness to stand trial and the evidence underlying their cases.

    The defense teams in the 9/11 tribunal said on Thursday they would seek Pohl’s ruling on similar disclosure orders covering everything from a chronology of their clients’ detention, to any approvals by the CIA of the use of particular interrogation techniques.

    Pohl’s move comes as the CIA is locked in a bitter public battle with the Senate intelligence committee over the panel’s recent report into the agency’s post-9/11 torture programs. It opens a new front for the agency in an unexpected venue.

    A bright spot for the CIA may be that Pohl has not ruled that information regarding Nashiri’s treatment – which, according to declassified information, involved waterboarding and a threat with a gun and a revved power drill – must be made public, but rather turned over to the commission.

    Lawyers for one of the defendants, Ammar al-Baluchi, filed a motion on April 2 to acquire the Senate committee report. Lawyers for Baluchi and co-defendant Ramzi bin al-Shibh said that the defense teams were now petitioning Pohl to issue a similar order for CIA disclosure in their cases.

    “It is important to know what happened, who did it, where did it happen, who authorized it, who knew about it, and what was the result,” said Baluchi’s attorney, James Connell.

    “Those are the important thing to know in order to answer some of the hugest questions in this case: what was the pretrial treatment of the defendants, what was the impact on the admissibility of their statements, what impact does it have on the United States’ compliance with international standards, and what impact does it have on the appropriate sentence of the case, if any.”

    Pohl’s order to the CIA reportedly requires the agency to turn over more information than is contained in the portions of the report that the committee recently voted to declassify, including communications between the so-called “black site” prisons and agency headquarters; names of interrogators; and the techniques used on Nashiri.

    Brigadier General Mark Martins, the chief military commissions prosecutor in both cases, did not tip his hand as to whether he would contest the CIA disclosure order.

    “We are studying that ruling,” Martins said.

    “I can pledge that whatever happens, whatever we do will adhere to the rule of law and will be an effort to seek justice.”

    CIA spokesman Dean Boyd declined comment, saying: “As a general matter, CIA does not comment on ongoing court litigation.”

    Human rights advocates hailed Pohl’s ruling on the CIA as a potential transparency breakthrough.

    “For the first time, the CIA is being forced to disclose details about secret black sites and torture that it has fought for years to hide,” said Hina Shamsi, an attorney with the ACLU.

    “Without this information, defense lawyers cannot properly do their job and represent their client.”

    Andrea Prasow of Human Rights Watch said the Pohl ruling “represents a chink in the armor of secrecy that the US government erected around its torture program”.

    Along with the Senate report’s partial declassification, “it is only a matter of time before the public will learn the horrific details of officially sanctioned torture, and the pattern of lies designed not only to allow torture to continue, but to immunize torturers from prosecution,” Prasow said.

    If the prosecution believes the defense teams in either the Nashiri or the 9/11 case ought to receive CIA accounts of their treatment in the agency’s custody but the CIA disagrees, Connell said the tribunals in either case would have to be paused to resolve the dispute.

    “The agency with equities in that information can have a veto over the prosecution,” Connell said.

    Spencer Ackerman at Guantánamo Bay
    theguardian.com, Thursday 17 April 2014 18.39 BST

    Find this story at 17 April 2014

    © 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Guantánamo judge to CIA: Disclose ‘black site’ details to USS Cole defense lawyers

    GUANTANAMO BAY NAVY BASE, Cuba — The military judge in the USS Cole bombing case has ordered the CIA to give defense lawyers details — names, dates and places — of its secret overseas detention and interrogation of the man accused of planning the bombing, two people who have read the still-secret order said Thursday.

    Army Col. James L. Pohl issued the five-page order Monday. It was sealed as document 120C on the war court website Thursday morning and, according to those who have read it, orders the agency to provide a chronology of the overseas odyssey of Abd al Rahim al Nashiri, 49, from his capture in Dubai in 2002 to his arrival at Guantánamo four years later.

    The order sets the stage for a showdown between the CIA and a military judge, if the agency refuses to turn over the information to the prosecution for the defense teams. The order comes while the CIA fights a bitter, public battle with the Senate on its black site torture investigation.

    The judge’s order instructs prosecutors to provide nine categories of closely guarded classified CIA information to the lawyers — including the names of agents, interrogators and medical personnel who worked at the so-called black sites. The order covers “locations, personnel and communications,” interrogation notes and cables between the black sites and headquarters that sought and approved so-called enhanced interrogation techniques, the two sources said.

    It does not, however, order the government to turn over Office of Legal Counsel memos that both blessed and defined the so-called Torture Program that sent CIA captives to secret interrogations across the world after the Sept. 11, 2001 attacks — out of reach of International Committee of the Red Cross delegates.

    “It’s a nuclear bomb that may shut down the case,” said one person who read the order and is not a part of the Cole case.

    It covers so many of the agency’s closely guarded secrets that the source predicted “the prosecution would probably take an interlocutory appeal,” meaning rather than release the information Pentagon prosecutors will ask a military commissions appeals court to overrule Pohl.

    It was not known whether the CIA would assert a national security privilege. “As a general matter, CIA does not comment on ongoing court litigation,” said agency spokesman Dean Boyd.

    Different remedies sometimes suggested by defense attorneys in pretrial hearings range from abating the proceedings until the government complies to making life in prison, rather than military execution, the maximum possible penalty.

    The chief prosecutor, Army Brig. Gen. Mark Martins, would not comment on whether he would appeal.

    “We are studying that order,” he said, adding that the prosecution would comply with both “the rule of law” and “our discovery obligation.”

    Nashiri pretrial hearings are still scheduled for next week, he said.

    Defense lawyers at the five-man Sept. 11 war crimes trial said Thursday that, upon learning of Pohl’s order in the USS Cole case, they styled a motion seeking access to the same CIA information about their clients.

    After the Miami Herald disclosed the order Thursday morning, Nashiri’s civilian lawyer, Rick Kammen, cast it as material that “the prosecution has publicly resisted producing.”

    “The prosecution’s argument that the defense is precluded from checking the government’s work is frivolous. One of the defense functions is to check the government’s story,” he said. “The biggest cause of reversals in capital cases is due to prosecutorial withholding of exculpatory material including material relevant to punishment.”

    He added: “We also note that the CIA has lied to at least three federal courts, the 9/11 Commission and, according to the newspapers, Congress. This demonstrated history of lying clearly obligates us to a full investigation.”

    Even if the prosecution does secure the information from the CIA and releases it to Nashiri’s lawyers, that does not necessarily mean that the public will get to know the details.

    The program is still classified, and Pohl ordered the material produced as discovery — for pretrial preparation in the case of Nashiri, the Saudi captive who the U.S. has called the mastermind of al-Qaida’s suicide bombing.

    Two men sailed a bomb-laden skiff alongside the Cole on Oct. 12, 2000, and blew themselves up, crippling the warship and killing 17 U.S. sailors.

    The development comes two weeks after the Senate voted to declassify a portion of an investigation of the so-called CIA torture program that could contain some of the answers sought by lawyers for Nashiri before his death-penalty trial. But the judge’s order appears to go further to a level of detail not provided in the executive summary, findings and recommendations that might be made public, if President Barack Obama agrees.

    It also follows the recent Pentagon release of unclassified portions of a secret Feb. 22 Cole case hearing among lawyers with security clearances that allow them to know certain aspects of the still-secret CIA Rendition, Detention and Interrogation (RDI) program.

    One person who read Pohl’s ruling this week said the order “largely ordered a huge amount of RDI material produced to the defense.” Pohl apparently at one point specifies that information must be unredacted, not blacked out.

    At that hearing, the lead prosecutor preparing for Nashiri’s Dec. 4 death-penalty tribunal, Navy Cmdr. Andrea Lockhart, argued that the government had provided the defense with anything “relevant” to trial preparation.

    The defense doesn’t have the authority to “double-check the government’s work,” Lockhart told the judge, “and they certainly don’t have the right to do their own independent investigation” of what happened to Nashiri.

    Pohl apparently concluded otherwise.

    Defense lawyers want to independently reconstruct what happened to Nashiri in secret confinement to challenge the integrity of certain evidence and to argue that his mistreatment disqualifies a death penalty sentence.

    The CIA waterboarded him, and an internal abuse investigation showed its agents interrogated Nashiri while he was nude and that they threatened him with a revving power drill, handgun and threats to sexually assault his mother.

    Chief prosecutor Martins, has already noted that the Obama administration revamped the tribunal to prohibit use of involuntary interrogations at trial. In the transcript, Lockhart says all mistreatment of Nashiri is now in the public domain.

    Navy Cmdr. Brian Mizer, one of Nashiri‘s lawyers, told the Miami Herald recently that an investigation of the treatment should determine whether any of Nashiri’s answers to questions at Guantánamo were truly voluntary: “You have to get back to the past to determine whether this is just a dog barking on command.”

    A military medical board has diagnosed Nashiri, 49, a self-described former millionnaire merchant from Mecca, as having post-traumatic stress disorder and a major depressive disorder.

    His lawyers want to interview officials who worked at the black sites, comb through manifests and read approved Standard Operating Procedures on so-called enhanced interrogation techniques that spelled out how to waterboard Nashiri in secret custody.

    Posted on Thursday, 04.17.14
    BY CAROL ROSENBERG

    Find this story at 17 April 2014

    Copyright 2014 Miami Herald Media Co.

    Secret Senate report harshly critical of CIA interrogations

    WASHINGTON — A secret Senate report on the CIA’s treatment of Al Qaeda detainees from 2001 to 2006 concludes that the spy agency used brutal, unauthorized interrogation techniques, misrepresented key elements of the program to policymakers and the public, and actively sought to undermine congressional oversight, officials who have read the report say.

    Contrary to previous assertions by President George W. Bush and CIA leaders, the use of harsh interrogation techniques — which many consider to be torture — did not produce game-changing intelligence that stopped terrorist attacks, the report concludes. Though detainees supplied useful intelligence after such treatment was applied, the report argues that the information could have been elicited through noncoercive methods.

    The 6,200-page report was produced by Democratic staffers on the Senate Intelligence Committee, which earlier this month voted 11 to 3 to seek declassification of a 480-page executive summary and a list of findings. The White House and the CIA will now decide what, if anything, must be censored for national security before the summary is released to the public.

    The report’s top-line conclusions amount to a scathing indictment of the CIA. Current and former agency officials and many Senate Republicans say they take issue with some of the findings, although not all the specific points of dispute are clear.

    “Given that the report remains classified, we are unable to comment,” CIA spokesman Dean Boyd wrote in an email. “Our response to the 2012 version of the report found several areas in which CIA and [the committee] agreed, and several other areas in which we disagreed.”

    After the terrorist attacks of Sept. 11, 2001, the CIA held Al Qaeda operatives in secret prisons in Europe and Asia and received permission to use sleep deprivation, stress positions, slapping, humiliation and other techniques to break down detainees viewed as uncooperative. Among the most controversial techniques was waterboarding, which creates a sensation of drowning.

    The Justice Department had authorized the CIA to use the techniques in a series of secret legal opinions that have since been rescinded.

    Bush and CIA officials involved in the program say it produced crucial, lifesaving intelligence. Critics say some of the techniques amounted to torture that was both immoral and ineffective.

    Those who have seen the report, who did not want to be identified discussing a classified document, say it concludes that the CIA misled the Justice Department, the White House and congressional leaders about key elements of the program and exaggerated the intelligence gained from using the harsh techniques. In many cases, the report says, the best intelligence a detainee provided was obtained before the techniques were used.

    Officials say the report also found that the CIA used techniques that hadn’t been approved by the Justice Department or CIA headquarters, and that even the approved techniques were far more brutal and harmful to detainees than the CIA communicated to senior policymakers and members of Congress who were briefed on the program.

    The program was so badly mismanaged that the CIA did not always have an accurate accounting of how many detainees it held, the report is said to conclude. Sources said the report found that much of the program was outsourced to contractors, including two psychologists, James Mitchell and Bruce Jessen, who were the architects of the program and personally conducted some of the waterboarding sessions.

    CIA employees who raised questions internally about the use of the coercive techniques were ignored, the report concludes, and CIA interrogators who committed misconduct were not held accountable. A Justice Department criminal investigation looking at whether CIA officers could be prosecuted in connection with the harsh interrogations ended in 2011 with no charges filed.

    Senate staffers spent years poring over millions of pages of CIA documents to complete the report. They were prevented from interviewing participants because a criminal investigation was ongoing, so they relied on interviews conducted by the CIA’s inspector general. The inspector issued a report in 2004 that criticized how some of the techniques were used, but also concluded the interrogation program as a whole produced useful intelligence.

    By KEN DILANIAN

    Find this story at 11 April 2014

    Copyright © 2014, Los Angeles Times

    NEW DOCUMENTS POINT TO CIA RENDITION NETWORK THROUGH DJIBOUTI

    Investigators mapped flight paths of private contractor planes that stopped in Djibouti, a suspected CIA ‘black site’

    New evidence culled from a court case involving CIA contractors has revealed flight paths through Djibouti that appear to indicate the country’s role as a hub of the CIA’s rendition network in Africa, according to documents released by the U.K.-based human rights group Reprieve and New York University’s Global Justice Clinic.

    The documents could support the case of Mohammad al-Asad, a former CIA detainee who is suing the government of Djibouti for its alleged role in hosting CIA “black sites” — specifically the one where he says he was detained and tortured for two weeks between December 2003 and January 2004. A Senate investigation into the agency’s “detention and interrogation program” had previously confirmed that several individuals had in fact been detained in Djibouti, according to two officials who read the still-classified report and spoke to Al Jazeera.

    Investigators behind the document release combed through contracts, invoices and letters put into evidence for a court case — which involved CIA contractors and was separate from the Djibouti allegations — and pieced together a series of rendition circuits, or flight paths, between 2003 and 2004. They include legs through Djibouti — even though the Horn of Africa did not appear to be a convenient stopover between the United States and Afghanistan, the circuits’ endpoints.

    “Djibouti was not on the way, it was a destination,” said Margaret Satterthwaite, al-Asad’s attorney and a professor at the Global Justice Clinic. “That’s kind of a telltale sign of a rendition circuit.”

    The evidence also implicated private companies — including Computer Sciences Corp. (CSC), DynCorp Systems and Solutions (which was purchased by CSC in 2003 and later divested), Richmor Aviation and First Flight — in the Africa rendition program for the first time.

    “These documents provide further evidence of how U.S. corporations played a crucial role in the CIA’s torture network, rendering people to torture around the world far from public scrutiny and even further from the rule of law,” said Kevin Lo, corporate social responsibility advocate at Reprieve.

    A spokesman for Computer Sciences Corp. said his company did not comment on “speculation about its clients or their activities” but added in an email to Al Jazeera: “CSC has had the privilege for over fifty years of supporting governments and private sector organizations worldwide, and has done so within the law.”

    Richmor Aviation and First Flight did not respond to Al Jazeera’s requests for comment in time for publication.

    Al-Asad’s case is currently under consideration by the African Commission on Human and Peoples’ Rights. In an exclusive interview with Al Jazeera, al-Asad, who is now 54 years old, said he was taken from his home in Tanzania to Djibouti, where he was detained for two weeks. He was then rendered to Afghanistan, where he says he was tortured at various points over the course of more than a year at several CIA black site prisons.

    Djibouti has vehemently denied “knowing” participation in any U.S. rendition or torture programs in the country. Its ambassador to the U.S., Roble Olhaye, called al-Asad a “liar.”

    “Everything about his case relies on hearsay and conjecture. There were no flights that came to Djibouti on that day he said he was brought to my country from Tanzania,” Olhaye said. “That was checked by our lawyers.”

    Human rights researchers say that after the 9/11 attacks, dozens of suspects captured by the U.S. were secretly detained, interrogated and tortured in Djibouti. Although President Barack Obama signed an executive order in 2009 banning the CIA’s use of black-site prisons, the order states that it does “not apply to facilities used only to hold people on a short-term, transitory basis.”

    And while Djibouti says it is not aware the CIA had ever operated a black-site prison on its soil, Olhaye pointed out: “If something was done in the context of the American base there, how would we know?”

    Camp Lemonier in Djibouti, which hosts the Combined Joint Task Force–Horn of Africa, is a known hub for U.S. drone operations against Al-Qaeda in Yemen and Al-Shabab in Somalia.

    Satterthwaite said the choice of Djibouti for a black site is logical not only because the country has been a strategic partner in the U.S. “war on terror” for more than a decade, but also because the country has a long history of silencing human rights advocates and journalists. “It’s not hard to keep things secret there,” she said.

    May 9, 2014 9:15AM ET
    by Michael Pizzi @michaelwpizzi

    Find this story at 9 May 2014

    © 2014 Al Jazeera America, LLC.

    SENATE REPORT SET TO REVEAL DJIBOUTI AS CIA ‘BLACK SITE’

    Horn of Africa nation has denied hosting secret prison facilities for US, but classified document may undermine claim

    The legal case of a former CIA detainee suing the government of Djibouti for hosting the facility where he says he was detained could be helped by the contents of a still-classified Senate report. Djibouti, a key U.S. ally, has denied for years that its territory has been used to keep suspected Al-Qaeda operatives in secret captivity. But the Senate investigation into the agency’s “detention and interrogation program” concluded that several people had been secretly detained in the tiny Horn of Africa state, two U.S. officials who read an early draft of the report told Al Jazeera.

    Official confirmation of Djibouti’s role in hosting “black sites” used in the CIA’s rendition program would be welcomed by Mohammad al-Asad, a Yemeni arrested at his home in Tanzania on Dec. 27, 2003, blindfolded and flown to a location he insists was Djibouti. Two U.S. officials who read an early draft of the report of the Senate Intelligence Committee’s investigation — and who requested anonymity because the report remains classified — were unaware of whether al-Asad’s case was specifically cited in the document. But they confirmed that the report found that several detainees had been held in Djibouti, and that at least two of them had been wrongfully detained.

    Djibouti’s Ambassador to the U.S., Roble Olhaye, told Al Jazeera his country was not a “knowing participant” in the CIA’s rendition program and he rejected claims by al-Asad that he was temporarily imprisoned there.

    However, Olhaye said, “If something was done in the context of the American base there how would we know?” But, he said, Djibouti’s agreement with the U.S. precluded the base from being used to house prisoners.

    Al-Asad said that after his arrival in the country he alleges was Djibouti, he was held in a prison cell and tortured. He said he was interrogated by an American woman about his connections to the now-defunct Saudi charity Al-Haramain. The group, later accused by the U.S. Treasury of supporting terrorism, had in 1994 rented apartment space from al-Asad in a building he owned in Tanzania.

    Asad
    Yemeni citizen Mohammad al-Asad
    In an exclusive interview with Al Jazeera, al-Asad, now 54 years old, said he was detained for about two weeks in Djibouti and then rendered to Afghanistan, where he says he was tortured at various points over the course of more than a year at several CIA black site prisons.

    Before he was released in 2005 and sent back to Yemen, he said, he received a visitor from Washington.

    “What I remember through the interpreter was that he said, ‘I am the head of the prison, and you will be the first one at the top of the list of the people we are going to release because we have nothing on you,’” al-Asad told Al Jazeera. “The interpreter said that he was the director of all the prisons.”

    Al-Asad was never charged with terrorism or related crimes, but he pleaded guilty in Yemen to making false statements and using forged documents to obtain his Tanzanian travel papers.

    Al-Asad, who still lives in Yemen, has been trying since his release to hold Djibouti officials accountable for his detention. In 2009, he sought redress from the African Commission on Human and Peoples’ Rights, a quasi-judicial body that has jurisdiction over Djibouti and other countries that approved the African Charter on Human and Peoples’ Rights. In the coming days, that commission, which is based in Gambia, is expected to decide whether it will take up al-Asad’s case.

    Olhaye called al-Asad a “liar”, adding, “Everything about his case relies on hearsay and conjecture. There were no flights that came to Djibouti on that day he said he was brought to my country from Tanzania. That was checked by our lawyers.”

    But John Sifton, the Asia advocacy director at Human Rights Watch, who has spent more than a decade investigating the CIA’s rendition, detention and interrogation program testified before the commission last year and said “the fact that the flight records of CIA aircraft that are public do not include a flight that matches Mr. al-Asad’s trajectory is not indicative of anything in and of itself.”

    Sifton said the CIA could “easily circumvent data collection” and “aircraft used by the CIA could easily be rendered untraceable while flying in and around Djibouti.”

    Al-Asad has based his legal case on flight records, collected by Human Rights Watch and the U.K.-based human rights charity Reprieve, demonstrating CIA-linked aircraft flying in and out of Djibouti (PDF).

    His lawyers have also obtained documents from Tanzanian immigration officials stating that al-Asad was sent to Djibouti on a Tanzanair aircraft after his 2003 arrest.

    “This is one of the most direct pieces of evidence we have showing that Djibouti is where our client was held before being handed to the rendition team on the tarmac,” said Margaret Satterthwaite, al-Asad’s attorney and a professor at New York University’s Global Justice Clinic.

    Al-Asad, who still lives in Yemen, has been trying since his release to hold Djibouti officials accountable for his detention.
    If the case proceeds, it will mark the first such investigation into the workings of the rendition program in Africa, and could open the door to additional legal challenges by former “war on terror” captives.

    A handful of similar cases are already pending before the European Court of Human Rights. However, U.S. courts — citing state secrecy — have rejected attempts by detainees to hold their former captors accountable.

    Al Jazeera’s sources noted that in addition to 6 million pages of CIA records, Senate committee investigators obtained some information about the wrongful detentions from people they characterized as “whistleblowers.” The U.S. officials declined to elaborate.

    Djibouti, a former French colony, has been one of the key U.S. counterterrorism partners for more than a decade, hosting the Combined Joint Task Force–Horn of Africa at Camp Lemonnier. The U.S. Air Force also reportedly uses Djibouti as a base for a fleet of drones to strike at Al-Qaeda and Al-Shabab suspects in Yemen and Somalia.

    According to human rights researchers, after 9/11 dozens of suspects captured by the U.S. were secretly detained, interrogated and tortured in Djibouti.

    The Obama administration, as recently as August 2012, reportedly continued to render suspects to Djibouti for short-term detention. Although President Barack Obama signed an executive order in 2009 banning the CIA’s use of black-site prisons, the order states that it does “not apply to facilities used only to hold people on a short-term, transitory basis.”

    Confirmation by the Senate Intelligence Committee of Djibouti’s role in the rendition program would be a “critical” development, said Satterthwaite.

    “The cooperation of countries all over the world — including Djibouti — was central to the operation of the U.S. rendition, secret detention, and torture program,” Satterthwaite said. “While the role of European partners such as Poland and Romania has been the subject of much reporting and investigation, the assistance of countries such as Djibouti has yet to be scrutinized. Further, as the home of a fleet of U.S. drones, Djibouti is an enormously important partner but has not received adequate scrutiny for its role in facilitating U.S. abuses.”

    The cooperation of countries all over the world — including Djibouti — was central to the operation of the U.S. rendition, secret detention, and torture program.
    Margaret Satterthwaite
    Al-Asad’s attorney
    Jonathan Horowitz, who works on national security and legal issues at the Open Society Justice Initiative, said al-Asad’s case provides the African human rights commission with an opportunity “to state that African governments can’t collude with other governments to abuse human rights, and they can’t use the fight against terrorism to justify violating people’s rights.”

    Last year, Open Society issued a report, Globalizing Torture, which found that 54 countries, including Djibouti, were complicit in the extraordinary rendition of 136 CIA prisoners. The nonpartisan Constitution Project also produced a Detainee Task Force report identifying Djibouti as a CIA rendition partner and focused heavily on al-Asad’s case to support its conclusions.

    “One of the things that is really important to recognize here is that the CIA torture and rendition program couldn’t have gone global without the assistance from other countries,” Horowitz said.

    Meanwhile, the U.S. continues to work on strengthening its counterterrorism relationship with Djibouti. Next week, Djibouti’s president, Ismaïl Omar Guelleh, will travel to the U.S. to meet with President Obama at the White House. Ambassador Olhaye does not believe the Senate’s report, if it is ever released, will identify his country as a rendition partner.

    “I don’t believe the Senate report will say anything about my government,” he said. “Maybe about the American base. Our prisons have not been participating in that kind of thing.” Olhaye said neither he nor anyone from his country has had any discussions with U.S. officials about the Senate’s report.

    May 2, 2014 5:00AM ET
    by Jason Leopold @JasonLeopold

    Find this story at 2 May 2014

    © 2014 Al Jazeera America, LLC.

    SENATE COMMITTEE VOTES TO DECLASSIFY PARTS OF TORTURE REPORT

    Senate investigators want public reckoning of torture tactics under Bush admin., despite CIA attempts to obstruct

    The Senate Select Committee on Intelligence voted 11-3 Thursday to declassify parts of a secret report on Bush-era interrogations of terrorism suspects.
    “The purpose of this review was to uncover the facts behind this secret program, and the results were shocking. The report exposes brutality that stands in stark contrast to our values as a nation. It chronicles a stain on our history that must never again be allowed to happen,” Sen. Dianne Feinstein, D-Calif., chairwoman of the committee, said in a statement. “This is not what Americans do.”
    Now that the 15-member panel votes has approved the declassification of a 400-page summary and the key findings of its report, the onus is on the Central Intelligence Agency and a reluctant White House to speed the release of one of the most definitive accounts about the government’s actions after the 9/11 attacks.

    The CIA will now start scanning the report’s contents for any passages that compromise national security.

    That has led to fears that the CIA, already accused of illegally monitoring the Senate’s investigation and deleting files, could sanitize key elements of what Senate investigators aim to be the fullest public reckoning of the “enhanced interrogation techniques” used on Al-Qaeda suspects in CIA-run prisons abroad. Feinstein has urged the White House to get involved.
    Thumbnail image for Senate CIA torture report could throw Gitmo hearings into chaos
    Senate CIA torture report could throw Gitmo hearings into chaos
    Release of study on detention program might further disrupt military commissions for terrorist suspects at Guantánamo

    Congressional aides and outside experts familiar with the document say it is highly critical of waterboarding and other harsh interrogation methods, and concludes among other things that such practices provided no key evidence in the hunt for Osama bin Laden. The CIA disputes many of the conclusions in the report.

    “It’s important to tell the world, ‘Yes, we made a mistake and we’re not going to do it again,'” said Sen. Angus King, a Maine independent who planned to vote for the summary’s release.

    Human rights groups and advocates too believe the release of the report crucial to ensuring that similar tactics are never adopted again and that the debate over torture is settled once and for all.
    “This information has been kept secret from the American people and from policymakers for years and keeping it secret just perpetuates the false impression that torture is effective and works,” said Laura Pitter, senior national security researcher at Human Rights Watch. “In fact, is is immoral, illegal and ineffective and never should be employed, and was a terrible mistake that the U.S. needs to reckon with on so m any levels.”

    But some in the intelligence community said the Senate report, which was written by the committee’s Democratic staff, was missing a key element: the voices of key CIA officials.

    Those missing include former Bush administration officials involved in authorizing the use of waterboarding and other harsh questioning methods, or managing their use in secret “black site” prisons overseas.

    “Neither I or anyone else at the agency who had knowledge was interviewed,” said Jose Rodriguez, the CIA’s chief clandestine officer in the mid-2000s, who had operational oversight over the detention and interrogation program. “They don’t want to hear anyone else’s narrative,” he said of the Senate investigation. “It’s an attempt to rewrite history.”

    Rodriguez himself is a key figure in the Senate report, not least for his order in 2005 to destroy 92 videotapes showing waterboarding of terror suspects and other harsh techniques.

    Rodriguez said the Senate’s report would be a “travesty” without input from him and officials such as former CIA directors Michael Hayden and Porter Goss. Congressional aides said the CIA’s own field reports, internal correspondence, cables and other documents described day-to-day handling of interrogations and the decision-making and actions of Rodriguez and others.

    Senate investigators have griped for years about what they contend is the CIA’s failure to be held accountable for the harsh methods used during the George W. Bush administration’s war on terror.

    Bad blood between Senate aides and the CIA ruptured into the open last month when Feinstein took to the Senate floor to accuse the agency of improperly monitoring the computer use of Senate staffers and deleting files, undermining the Constitution’s separation of powers. The CIA alleges the Senate panel illegally accessed certain documents. The Justice Department is reviewing criminal complaints against each side.

    Feinstein said this week she had “no idea” how long a declassification process would take, but expressed hope that it could be resolved in a matter of weeks.

    Amid all the distrust, Senate Democrats are pressing for President Barack Obama to step into the fray.

    Obama, who outlawed waterboarding after taking office, sought closure of the Guantanamo Bay detention camp and released long-secret, Bush-era legal documents on harsh interrogations. He has publicly supported declassification of at least the findings of the Senate committee’s report “so that the American people can understand what happened in the past, and that can help guide us as we move forward.”

    Still, the president has so far declined to weigh in publicly on Congress’ dispute with the CIA.

    April 3, 2014 12:19PM ET Updated 3:26PM ET
    Al Jazeera and The Associated Press

    Find this story at 3 April 2014

    © 2014 Al Jazeera America, LLC.

    UK urged to admit that CIA used island as secret ‘black site’ prison

    Human rights group representing Gaddafi opponent rendered to Libya via Diego Garcia says Britain must ‘come clean’ over role
    Jamie Doward

    The government is under mounting pressure to “come clean” about the role of an overseas UK territory leased to the US and allegedly used as a secret “black site” detention centre.

    An opponent of Colonel Gaddafi who was rendered in a joint MI6-CIA operation, and a leading human rights group representing him, have demanded that the foreign secretary, William Hague, clarify the UK’s position on Diego Garcia, an atoll in the Indian Ocean leased to the US until 2016. The Senate’s intelligence security committee is preparing to declassify a file that reportedly confirms that the CIA detained “high-value suspects on Diego Garcia” and that “the black site arrangement on the atoll was made with the ‘full cooperation’ of the British government”.

    The revelations are hugely troubling for the government and threaten to raise awkward questions about the UK’s relationship with the US, its closest security ally. They strengthen claims made by Abdel-Hakim Belhaj, a rebel military commander and opponent of Gaddafi, who was arrested in Malaysia and rendered with his pregnant wife to Libya, allegedly via Diego Garcia, in a joint US-UK intelligence operation.

    Papers discovered in Tripoli in 2011 show that the British security services were instrumental in helping Libya to seize Belhaj, who says he was tortured during his rendition and during his subsequent four-and-a-half-year incarceration by the Gaddafi regime. A flight plan confirmed the CIA had intended to render him via Diego Garcia.

    Belhaj, who unsuccessfully tried to bring a case against former foreign secretary Jack Straw, former senior MI6 official Sir Mark Allen, the security services and the Foreign Office, told the Observer that the Senate report raised new questions about the role played by the British overseas territory in facilitating the CIA’s extraordinary rendition programme.

    “The first time I heard that I had gone through a place called Diego Garcia was when I was told by the head of the Libyan intelligence, Moussa Koussa, during my first interrogation session in a prison outside Tripoli,” Belhaj said.

    “He was running the interrogation and was angry that it had taken a long time for me to arrive in Libya. I told him that the plane had stopped somewhere on the way from Bangkok. He told me that he knew, and that the plane had landed on an island in the Indian Ocean called Diego Garcia.

    “Perhaps he was showing off, or perhaps he had been given wrong information, I don’t know. I just know that the flight stopped somewhere. I was chained up in a very painful position and had no means to know where I was, or even whether my pregnant wife – who had been kidnapped at the same time – was with me.”

    Although the British government admitted in 2008 that two rendition flights carrying detainees had stopped for refuelling on Diego Garcia in 2002, it has consistently denied that detainees were held on it.

    “Each year the US government reaffirms to us during our official political-military discussions that all previous assurances since 2008 on this subject remain correct,” Mark Simmonds, the minister for overseas territories, wrote in a letter last month to Richard Ottaway, the chairman of parliament’s foreign affairs select committee. “Namely that, apart from two instances in Diego Garcia during 2002, there have been no other instances in which US intelligence flights landed in the United Kingdom, UK overseas territories or crown dependencies, with a detainee on board since 11 September 2001.”

    Polly Rossdale, deputy director at human rights group Reprieve, which has acted for Belhaj, said: “The government must come clean about the UK’s role in this dirty affair.”

    A spokesman for the Foreign Office declined to add any comment to what ministers had already told parliament.

    The Observer, Sunday 13 April 2014

    Find this story at 13 April 2014

    © 2014 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    << oudere artikelen  nieuwere artikelen >>