• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • New Snowden leaks reveal US, Australia’s Asian allies

    Singapore and South Korea are playing key roles helping the United States and Australia tap undersea telecommunications links across Asia, according to top secret documents leaked by former US intelligence contractor Edward Snowden. New details have also been revealed about the involvement of Australia and New Zealand in the interception of global satellite communications.
    A top secret United States National Security Agency map shows that the US and its “Five Eyes” intelligence partners tap high speed fibre optic cables at 20 locations worldwide. The interception operation involves cooperation with local governments and telecommunications companies or else through “covert, clandestine” operations.
    The undersea cable interception operations are part of a global web that in the words of another leaked NSA planning document enables the “Five Eyes” partners – the US, United Kingdom, Australia, Canada and New Zealand – to trace “anyone, anywhere, anytime” in what is described as “the golden age” signals intelligence.
    The NSA map, published by Dutch newspaper NRC Handelsblad overnight, shows that the United States maintains a stranglehold on trans-Pacific communications channels with interception facilities on the West coast of the United States and at Hawaii and Guam, tapping all cable traffic across the Pacific Ocean as well as links between Australia and Japan.
    The map confirms that Singapore, one of the world’s most significant telecommunications hubs, is a key “third party” working with the “Five Eyes” intelligence partners.
    In August Fairfax Media reported that Australia’s electronic espionage agency, the Defence Signals Directorate, is in a partnership with Singaporean intelligence to tap the SEA-ME-WE-3 cable that runs from Japan, via Singapore, Djibouti, Suez and the Straits of Gibraltar to Northern Germany.
    Australian intelligence sources told Fairfax that the highly secretive Security and Intelligence Division of Singapore’s Ministry of Defence co-operates with DSD in accessing and sharing communications carried by the SEA-ME-WE-3 cable as well as the SEA-ME-WE-4 cable that runs from Singapore to the south of France.
    Access to this major international telecommunications channel, facilitated by Singapore’s government-owned operator SingTel, has been a key element in an expansion of Australian-Singaporean intelligence and defence ties over the past 15 years.
    Majority owned by Temask Holdings, the investment arm of the Singapore Government, SingTel has close relations with Singapore’s intelligence agencies. The Singapore Government is represented on the company’s board by the head of Singapore’s civil service, Peter Ong, who was previously responsible for national security and intelligence co-ordination in the Singapore Prime Minister’s office.
    Australian intelligence expert, Australian National University Professor Des Ball has described Singapore’s signal’s intelligence capability as “probably the most advanced” in South East Asia, having first been developed in cooperation with Australia in the mid-1970s and subsequently leveraging Singapore’s position as a regional telecommunications hub.
    Indonesia and Malaysia have been key targets for Australian and Singaporean intelligence collaboration since the 1970s. Much of Indonesia’s telecommunications and Internet traffic is routed through Singapore.
    The leaked NSA map also shows South Korea is another key interception point with cable landings at Pusan providing access to the external communications of China, Hong Kong and Taiwan.
    South Korea’s National Intelligence Service has long been a close collaborator with the US Central Intelligence Agency and the NSA, as well as the Australian intelligence agencies. The Australian Security Intelligence Organisation recently engaged in legal action in an unsuccessful effort to prevent publication of details of South Korean espionage in Australia. ASIO Director-General David Irvine told the Federal Court that Australian and South Korean intelligence agencies had been cooperating for “over 30 years” and that any public disclose of NIS activities would be “detrimental” to Australia’s national security.
    The NSA map and other documents leaked by Mr Snowden and published by the Brazilian O Globo newspaper also reveal new detail on the integration of Australian and New Zealand signals intelligence facilities in the interception of satellite communications traffic by the “Five Eyes” partners.
    For the first time it is revealed that the DSD satellite interception facility at Kojarena near Geraldton in Western Australia is codenamed “STELLAR”. The New Zealand Government Communications Security Bureau facility at Waihopai on New Zealand’s South Island is codenamed “IRONSAND”. The codename for DSD’s facility at Shoal Bay near Darwin is not identified. However all three facilities are listed by the NSA as “primary FORNSAT (foreign satellite communications) collection operations”.
    Coverage of satellite communications across Asia and the Middle East is also supported by NSA facilities at the United States Air Force base at Misawa in Japan, US diplomatic premises in Thailand and India, and British Government Communications Headquarters facilities in Oman, Nairobi in Kenya and at the British military base in Cyprus.
    The leaked NSA map also shows that undersea cables are accessed by the NSA and the British GCHQ through military facilities in Djibouti and Oman, thereby ensuring maximum coverage of Middle East and South Asian communications.
    November 24, 2013
    Philip Dorling
    Find this story at 24 November 2013
    Copyright © 2013 Fairfax Media

    How we spied on the Indonesians and how expats are targeted overseas

    THEIR clandestine activities may be directly in the spotlight, but Australian spies have for decades been listening in on our neighbours.
    Modern spooks have two main methods of tapping the mobile phones of people of interest in cities such as Jakarta. The first option is to install a physical bugging device in the actual handset, to forward calls to a third number – but this requires access to the handset.
    For high-security targets, Australian agents use electronic scanners and very powerful computers to monitor phone numbers of interest via microwave towers (small metal towers that look like venetian blinds) located on top of buildings across Jakarta and all modern cities.
    The latter was employed to tap the phones of Indonesian President Susilo Bambang Yudhoyono, his wife and key ministers.
    Getting hold of a handset is a tricky business so the preferred method for the spooks employed by the Australian Signals Directorate (formerly Defence Signals Directorate) is to monitor microwave phone towers located on top of most buildings in Jakarta and indeed any other major city.
    The material, known at this point as “first echelon”, is captured by computers located in secure rooms at the Australian Embassy where information is filtered before it is forwarded by secure means to super computers located at ASD headquarters. They are located inside the maximum security building ‘M’, protected by high voltage electric fences, at Defence’s Russell Office complex in Canberra. Here it is processed and analysed as “second echelon” product.
    In less busy locations, or where the target phone number is known, an off-the-shelf scanner can be programmed to intercept mobile phone calls.
    In cities such as Jakarta enterprising business people now offer a mobile bugging service where for a fee of between $300 and $1000 they will arrange to “borrow” a mobile phone, insert a bugging device and then return it to a relieved owner. Whenever the phone rings or is used to access a network the call is diverted to another handset or recording device.
    Government staff understand that if their phone goes missing and then turns up they should dispose of it and get a new one.
    But for the average citizen, say a teacher at an English speaking school in Jakarta whose phone was bugged by an angry ex-girlfriend, phone tapping is a serious matter. And it is more common than many expatriates might think.
    There is a thriving business in phone tapping for private or industrial or state espionage reasons in cities such as Jakarta, Singapore and Bangkok. Industrial espionage is widespread in cities around the world including Sydney, Melbourne and Canberra.
    Compared to the operations of ASD and its powerful scanners, super computers and army of analysts these operations are small beer.
    Prime Minister Tony Abbott was quick to point out in the wake of the phone tapping scandal that every country spied and he was right.
    However Indonesia has nowhere near the capacity for espionage that Australia and our close “five eyes” allies – the US, UK, Canada and New Zealand – posses.
    After the 2002 Bali bombings the DSD, Australian Federal Police and Telstra went to Indonesia and showed Indonesian intelligence agencies how to tap into the networks of the terrorist group Jemaah Islamiah (JI).
    Unlike Australia much of Indonesia’s electronic surveillance capacity is directed at internal problems such as the insurgencies in Aceh and West Papua.
    According to one of Australia’s leading experts on electronic spying, Professor Des Ball from the Australian National University, there is really no point in conducting such intercept operations unless a country has the whole picture. That is satellite communications, cable communications and radio communications.
    “Microwave mobile phone calls are very hit and miss,” he said.
    Australia owns the big picture thanks to an expensive and extensive network of listening posts in Jakarta, Bangkok and Port Moresby and powerful satellite ground stations at HMAS Harman in Canberra, Shoal Bay near Darwin, Morundah near Wagga in NSW, Cabarlah near Toowoomba in Qld and Geraldton in WA.
    This interception network is monitoring communications from Singapore to the Pacific Islands including Indonesia’s Palapa satellite.
    Professor Ball said there had been huge growth in Australia’s eavesdropping capacity in recent years. For example the number of dishes at Shoal Bay has gone from six to 15 and Geraldton has more than doubled its capacity including six American dishes for the exclusive use of the National Security Agency (NSA) whose lax security allowed Edward Snowden to abscond with top-secret information that is now being leaked.
    Unfortunately Australian taxpayers have no way of knowing how much is spent on these facilities or even how many staff are employed by the top-secret ASD. The numbers used to appear in the Defence annual report, but not anymore.
    Professor Ball said successive governments had allowed the electronic spooks to have a virtual free rein.
    “When briefings about the phone intercepts from SBY and his wife came in the government should have ordered the tapping to stop,” Professor Ball said.
    “It is important to have the capacity but you only use it when there is a conflict. Put it in, test it and keep it up to date, but don’t use it because unless you have to because it will come out.”
    Professor Ball also slammed Mr Abbott for saying that other countries (Indonesia) were doing exactly what Australia did, because they weren’t and they can’t.
    “They are not doing what we are doing and Abbott should have apologised or done what Bob Hawke did with Papua New Guinea in 1983.”
    Prime Minister Hawke went to Port Moresby after it was revealed that Australia spied on politicians there, but before he left he ordered the spooks switch to all monitoring equipment off for 48 hours. He was then able to say that Australia wasn’t doing it although as journalist Laurie Oakes pointed out he had to be “very careful with his tenses”.
    Tapping a friendly foreign leader’s phone is fraught enough. Recording the fact on clear power point slides and handing them to another country is just plain dumb.
    IAN MCPHEDRAN NATIONAL DEFENCE WRITER
    NEWS LIMITED NETWORK
    NOVEMBER 21, 2013 6:34PM
    Find this story at 21 November 2013
    News Ltd 2013 Copyright

    Spying rocks Indonesia-Australia relations

    Indonesia has officially downgraded the relationship, after Australia refused to apologise for espionage.
    A spy scandal involving an Australian attempt to tap the phone of Indonesia’s president has jeopardised crucial people smuggling and counter-terrorism co-operation between the two countries, officials have said.
    President Susilo Bambang Yudhoyono has temporarily suspended co-coordinated military operations with Australia, including those which target people-smuggling, after significant public outcry in Indonesia over the reports.
    “I find it personally hard to comprehend why the tapping was done. We are not in a cold war era,” President Yudhoyono said.
    Find out more with our exclusive interactive feature
    “I know Indonesians are upset and angry over what Australia has done to Indonesia. Our reactions will determine the future of the relationship and friendship between Indonesia and Australia – which actually have been going well.”
    Angry crowds mobbed Australia’s embassy in Jakarta, burning Australian and American flags on Thursday. Indonesia has officially downgraded its relationship with Australia and recalled its ambassador from Canberra.
    ‘Reasonable’ surveillance
    The country’s prime minister, Tony Abbott, has refused to apologise for what he calls “reasonable” surveillance, but promised to respond to the president’s request for an explanation “swiftly and courteously”.
    “I want to express … my deep and sincere regret about the embarrassment to the president and to Indonesia that’s been caused by recent media reporting,” Abbott told parliament.
    “As always, I am absolutely committed to building the closest possible relationship with Indonesia because that is overwhelmingly in the interests of both our countries.”
    I don’t believe Australia should be expected to apologise for reasonable intelligence-gathering activities
    Tony Abbott, Australian Prime Minister
    The situation erupted after documents leaked by former US National Security Agency contractor Edward Snowden, showed Australia’s Defence Signal’s Directorate recorded personal communications of President Yudhoyono, his wife, Ani Yudhoyono, and senior officials in 2009.
    The surveillance is understood to be part of a longstanding spying arrangement with the UK, USA, Canada and New Zealand, known as the “five eyes” intelligence partners.
    “I don’t believe Australia should be expected to apologise for reasonable intelligence-gathering activities,” Abbott told Australia’s parliament on Tuesday.
    “Importantly, in Australia’s case, we use all our resources including information to help our friends and allies, not to harm them,” Abbott said.
    The document leaked by Snowden was dated November 2009 and was published jointly by Guardian Australia and the Australian Broadcasting Corporation state television network.
    It details the attempted interception of various targets’ mobile phones and lists their specific phone models with slides marked “top secret” and the Australian Signals Directorate’s slogan: “Reveal their secrets, protect our own.”
    This leak came after previous documents released by Snowden revealed Australian embassies had participated in
    widespread US surveillance across Asia, including in Cambodia, China, Indonesia, Malaysia, Myanmar and Thailand.
    Strained relations
    The combined revelations have strained a bilateral relationship already under pressure over the Abbott government’s hardline asylum seeker policy to “turn back” boats coming to Australia, a controversial and highly emotive issue in the country.
    Professor Greg Fealy is an Indonesian politics specialist at the Australian National University. He told Al Jazeera the situation was becoming increasingly serious.
    “Every new day brings new sanctions from the Indonesian side and so far the Abbott government hasn’t responded well to it,” Fealy said.
    He believes relations between the two countries have not been this strained since the East Timor crisis in 1999, when Australia’s military went into East Timor during its transition from an Indonesian territory to independence.
    “It has the potential to get worse, with the Indonesians withdrawing further cooperation [with Australia] in many fields,” Fealy said.
    “If there is a sufficiently wide range of retaliation then this could possibly be worse than the crisis of 15 years ago.”
    Prime Minister Abbott has been encouraged to reassure President Yudhoyono that no further surveillance is taking place – similar to the conversation between US President Barack Obama and German Chancellor Angela Merkel after
    revelations her phone was also tapped.
    John McCarthy, a former Australian ambassador to Indonesia, said Abbott must contact Yudhoyono to make amends.
    “There is nothing, frankly, to prevent the prime minister saying to the president that it’s not happening and it’s not going to happen in the future. That’s what Obama did with Angela Merkel and I don’t see a problem with that,”
    McCarthy said.
    “It can’t be allowed just to fester. If it festers it will get worse and it will be much harder to deal with, particularly as the politics get hotter in Indonesia.”
    US blame
    Australian officials would also be expressing their frustration with the United States over this situation, according to Michael Wesley, professor of national security at the Australian National University.
    “There are a number of reasons Australian officials can legitimately be very irritated with the Americans. We’re in this mess because of an American security lapse,” Wesley told Al Jazeera.
    “I’m actually gobsmacked at both Snowden and Bradley Manning, at their ability to get highly classified documents and download them. It would be absolutely impossible for people of their level of access to do that in Australia.”
    “There should be real questions asked in the American intelligence community how this could have happened,” Professor Wesley said.
    Former NSA senior executive Thomas Drake said the “five eyes” utilise each other’s services for information on other nations.
    “Much of it is legit, but increasingly since 9/11 because of the sheer power of technology and access to the world’s communication systems … [agencies have] extraordinary access to even more data on just about anything and anybody,” Drake told ABC.
    Indonesia’s minister for religious affairs, Suryadharma Ali, also cancelled a planned visit to Australia following the response from Yudhoyono.
    Author and Indonesian political expert Professor Damien Kingsbury was due to host Ali at an event in Melbourne, and
    told Al Jazeera the snub was a concerning sign of the deterioration in relations.
    “It is still quite significant that a senior minister felt he couldn’t come to Australia at this time,” Kingsbury said.
    “It’s pretty disastrous, the issue has effectively ended ongoing diplomatic engagement between Australia and Indonesia.”
    “We’ve seen the cancellation and suspension of a number of points of engagement and that has quite distinct implications for Australian government policy in some areas. There is the possibility this matter could continue to escalate if it’s not adequately resolved,” Kingsbury said.
    ‘Uncomfortable’
    The bilateral relationship between the two nations will be “uncomfortable” but it will pass, according to former US assistant secretary of state for East Asia, Kurt Campbell.
    “The relationship will be strong again, but there is a ritual quality that I’m afraid you [Australia] will have to go through, and very little you can say now or do is going to ease the next couple of months,” Campbell told ABC.
    He said the practice of phone-tapping was an acceptable part of international relations.
    “I can tell you that some of the most sensitive spying is done by allies and friends.”
    “Some of the most difficult foreign policy challenges – terrorist attacks – actually emanated in Indonesia. Australia has good cause to understand the delicate dynamics that play out behind the scenes with regard to how Indonesia’s thinking about some of those movements and some of the actors inside its country,” Campbell said.
    Australian opposition leader Bill Shorten said the “vital” relationship between the two countries must be repaired.
    “No-one should underestimate what is at stake in maintaining this critical relationship on the best possible terms.
    “Co-operation between our countries is fundamental to our national interest – working together on people smuggling, terrorism, trade,” Shorten wrote in an opinion piece for The Guardian.
    Prime Minister Abbott is expected to respond to Indonesia’s request for a full written explanation into the phone tapping in the coming days.
    Geraldine Nordfeldt Last updated: 22 Nov 2013 15:00
    Find this story at 22 November 2013

    Indonesia voices anger at Australia alleged spying

    (CNN) — Indonesia summoned the Australian ambassador Monday to voice its anger at allegations that Australia tried to listen into the phone calls of Indonesian President Susilo Bambang Yudhoyono.
    Greg Moriarty. Australia’s ambassador to Indonesia, “took careful note of the issues raised and will report back to the Australian Government,” the Australian embassy in Jakarta said.
    Indonesia’s objections stem from reports in the Australian Broadcasting Corporation (ABC) and Guardian Australia that said Australian intelligence tracked Yudhoyono’s mobile phone for 15 days in August 2009, monitoring the calls he made and received.
    ‘We live in a post-Snowden age’
    Stone: ‘We’ve bugged the whole world’
    Fareed’s Take: Spying on allies
    The intelligence agency also tried to listen in on what was said on at least one occasion. But the call was less than a minute long and could not be successfully tapped, ABC reported.
    The two media outlets cited documents provided by Edward Snowden, the U.S. national security contractor turned leaker.
    “The Australian Government urgently needs to clarify on this news, to avoid further damage,” Indonesian presidential spokesman Teuku Faizasyah tweeted.
    “The damage has been done and now trust must be rebuilt,” he said in another tweet.
    Asked in parliament to comment on the reports, Australian Prime Minister Tony Abbott said, “all governments gather information and all governments know that every other government gathers information.”
    “The Australian Government never comments on specific intelligence matters,” he added. “This has been the long tradition of governments of both political persuasions and I don’t intend to change that today.”
    By the CNN Staff
    November 18, 2013 — Updated 1033 GMT (1833 HKT)
    Find this story at 18 November 2013
    © 2013 Cable News Network. Turner Broadcasting System, Inc.

    Australia spied on Indonesian president Susilo Bambang Yudhoyono, leaked Edward Snowden documents reveal

    Video: Watch: Michael Brissenden on how leaked documents prove Australia spied on SBY (ABC News)
    Photo: The documents show the DSD tracked activity on Susilo Bambang Yudhoyono’s mobile phone. (Reuters: Supri)
    Related Story: Live: Follow the unfolding reaction to this story
    Map: Australia
    Australian intelligence tried to listen in to Indonesian president Susilo Bambang Yudhoyono’s mobile phone, material leaked by NSA whistleblower Edward Snowden reveals.
    Documents obtained by the ABC and Guardian Australia, from material leaked by the former contractor at the US National Security Agency, show Australian intelligence attempted to listen in to Mr Yudhoyono’s telephone conversations on at least one occasion and tracked activity on his mobile phone for 15 days in August 2009.
    Spy games explained
    Australia’s role in the NSA spy program, including what it means for Indonesian relations.
    The top-secret documents are from Australia’s electronic intelligence agency, the Defence Signals Directorate (now called the Australian Signals Directorate), and show for the first time how far Australian spying on Indonesia has reached.
    The DSD motto stamped on the bottom of each page reads: “Reveal their secrets – protect our own.”
    The documents show that Australian intelligence actively sought a long-term strategy to continue to monitor the president’s mobile phone activity.
    The surveillance targets also included senior figures in his inner circle and even the president’s wife Kristiani Herawati (also known as Ani Yudhoyono).
    Also on the list of targets is the vice president Boediono, the former vice president Yussuf Kalla, the foreign affairs spokesman, the security minister, and the information minister.
    Mr Yudhoyono’s spokesman Teuku Faizasyah has responded to the revelations, saying: “The Australian Government needs to clarify this news, to avoid further damage … [but] the damage has been done.”
    Asked about the spying in Question Time today, Prime Minister Tony Abbott said: “First of all, all governments gather information and all governments know that every other government gathers information… the Australian government never comments on specific intelligence matters. This has been the long tradition of governments of both political persuasions and I don’t intend to change that today.”
    Documents list ‘who’s who’ of Indonesian government
    One page in the documentation lists the names and the 3G handsets the surveillance targets were using at the time.
    A number of the people on the list are lining up as potential candidates for the presidential election to replace Mr Yudhoyono next year.
    The documents are titled “3G impact and update” and appear to chart the attempts by Australian intelligence to keep pace with the rollout of 3G technology in Indonesia and across South-East Asia.
    A number of intercept options are listed and a recommendation is made to choose one of them and to apply it to a target – in this case the Indonesian leadership.
    The document shows how DSD monitored the call activity on Mr Yudhoyono’s Nokia handset for 15 days in August 2009.
    One page is titled “Indonesian President voice events” and provides what is called a CDR view. CDR are call data records; it can monitor who is called and who is calling but not necessarily what was said.
    Another page shows that on at least one occasion Australian intelligence did attempt to listen in to one of Mr Yudhoyono’s conversations.
    But according to the notes on the bottom of the page, the call was less than one minute long and therefore did not last long enough to be successfully tapped.
    Factbox: Indonesia and Australia
    Indonesia is one of Australia’s most important bilateral relationships.
    Indonesia was Australia’s 12th largest trade partner in 2012.
    Prime Minister Tony Abbott has pledged to increase two-way trade and investment flows.
    President Yudhoyono has visited Australia four times during his presidency, more than any predecessor.
    Asylum seekers remain a sticking point in relations; Australia seeks active cooperation.
    In 2012-13, Australia’s aid assistance to Indonesia was worth an estimated $541.6 million.
    Source: http://www.dfat.gov.au/geo/indonesia/indonesia_brief.html
    Given the diplomatic furore that has already surrounded the claims that the Australian embassy in Jakarta was involved in general spying on Indonesia, these revelations of specific and targetted surveillance activity at the highest level are sure to increase the tension with our nearest and most important neighbour significantly.
    On an official visit to Canberra last week, the Indonesian vice president publicly expressed Indonesia’s concern.
    “Yes, the public in Indonesia is concerned about this,” Boediono said.
    “I think we must look to come to some arrangement that guarantees intelligence information from each side is not used against the other.”
    Last week Prime Minister Tony Abbott was keen to play down the significance of the spying allegations, saying that he was very pleased “we have such a close, cooperative and constructive relationship with the Indonesian government”.
    That may be a little harder to say today.
    By national defence correspondent Michael Brissenden
    Updated Mon 18 Nov 2013, 8:11pm AEDT
    Find this story at 18 November 2013
    © 2013 ABC

    Australia’s spy agencies targeted Indonesian president’s mobile phone

    Secret documents revealed by Edward Snowden show Australia tried to monitor the mobile calls of Susilo Bambang Yudhoyono and his wife
    Susilo Bambang Yudhoyono, accompanied by his first lady, Kristiani Herawati, speaks to his Democratic party supporters during a rally in Banda Aceh, Aceh province, in March 2009. Photograph: Supri/Reuters
    Australia’s spy agencies have attempted to listen in on the personal phone calls of the Indonesian president, Susilo Bambang Yudhoyono, and have targeted the mobile phones of his wife, senior ministers and confidants, a top-secret document from whistleblower Edward Snowden reveals.
    The document, dated November 2009, names the president and nine of his inner circle as targets of the surveillance, including the vice-president, Boediono, who last week visited Australia. Other named targets include ministers from the time who are now possible candidates in next year’s Indonesian presidential election, and the first lady, Kristiani Herawati, better known as Ani Yudhoyono.
    When a separate document from Snowden, a former contractor to the US’s National Security Agency (NSA), showed Australia had spied on Indonesia and other countries from its embassies, the Indonesian foreign minister, Marty Natalegawa, reacted angrily and threatened to review co-operation on issues crucial to Australia such as people smuggling and terrorism.
    The revelation strained a bilateral relationship already under pressure over the Abbott government’s policy to “turn back” boats of asylum seekers coming to Australia. The new leak, published jointly by Guardian Australia and the Australian Broadcasting Corporation, reveals the specific top-level targets and is likely to seriously escalate those tensions.
    The leaked material is a slide presentation, marked top secret, from the Australian Department of Defence and the Defence Signals Directorate, or DSD, (now called the Australian Signals Directorate), dealing with the interception of mobile phones as 3G technology was introduced in Asia. It includes a slide titled Indonesian President Voice Intercept, dated August 2009 and another slide, titled IA Leadership Targets + Handsets, listing the president and the first lady as having Nokia E90-1s, Boediono as having a BlackBerry Bold 9000, as well as the type and make of the mobile phones held by the other targets.
    Also named as targets for the surveillance are Dino Patti Djalal, at the time the president’s foreign affairs spokesman, who recently resigned as Indonesia’s ambassador to the US and is seeking the candidacy in next year’s presidential election for the president’s embattled Democratic party, and Hatta Rajasa, now minister for economic affairs and possible presidential candidate for the National Mandate party. Hatta was at the time minister for transport and his daughter is married to the president’s youngest son.
    A slide entitled Indonesian President Voice Intercept (August ’09), shows a call from an unknown number in Thailand to Yudhoyono. But the call did not last long enough for the DSD to fulfil its aims. “Nil further info at this time (didn’t make the dev threshold – only a sub-1minute call),” a note at the bottom says.
    Another slide, titled Indonesian President Voice Events, has a graphic of calls on Yudhoyono’s Nokia handset over 15 days in August 2009. It plots CDRs – call data records – which record the numbers called and calling a phone, the duration of calls, and whether it was a voice call or SMS. The agency, in what is standard procedure for surveillance, appears to have expanded its operations to include the calls of those who had been in touch with the president. Another slide, entitled Way Forward, states an imperative: “Must have content.”
    Also on the list of “IA Leadership Targets” are:
    • Jusuf Kalla, the former vice-president who ran as the Golkar party presidential candidate in 2009.
    • Sri Mulyani Indrawati, then a powerful and reforming finance minister and since 2010 one of the managing directors of the World Bank Group.
    • Andi Mallarangeng, a former commentator and television host who was at the time the president’s spokesman, and who was later minister for youth and sports before resigning amid corruption allegations.
    • Sofyan Djalil, described on the slide as a “confidant”, who until October 2009 was minister for state-owned enterprises.
    • Widodo Adi Sucipto, a former head of the Indonesian military who was until October 2009 security minister.
    Asked about the previous revelations about the embassies, Tony Abbott emphasised that they occurred during the administration of the former Labor government, that Australia’s activities were not so much “spying” as “research” and that its intention would always be to use any information “for good”. The prime minister has repeatedly insisted Australia’s relationship with Indonesia is “good and getting better”.
    Boediono said during his visit to Australia – before being revealed as an intended target of Australia’s surveillance – that the Indonesian public was “concerned” about the spying allegations.
    “I think we must look forward to come to some arrangement which guarantees that intelligence information from each side is not used against the other,” he said. “There must be a system.”
    At the bottom of each slide in the 2009 presentation is the DSD slogan: “Reveal their secrets – protect our own.” The DSD is credited with supplying the information.
    Yudhoyono now joins his German, Brazilian and Mexican counterparts as leaders who have been monitored by a member of Five Eyes, the collective name for the surveillance agencies of the US, Britain, Australia, New Zealand and Canada, who share information.
    Germany, Brazil and Mexico have all protested to the US over the infringement of privacy by a country they regarded as friendly. The German chancellor, Angela Merkel, reacted with outrage to the revelation that her personal mobile phone had been tapped by the US, calling President Barack Obama to demand an explanation. The US eventually assured the chancellor that her phone was “not currently being tapped and will not be in the future”.
    The Australian slide presentation, dated November 2009, deals with the interception of 3G mobile phones, saying the introduction of 3G in south-east Asia was nearly complete and providing dates for 3G rollout in Cambodia, Malaysia, the Philippines, Singapore and Thailand.
    Talking about future plans, the Australian surveillance service says it “must have content” and be able to read encrypted messages, which would require acquiring the keys that would unlock them. Other documents from Snowden show the intelligence agencies have made huge inroads in recent years in finding ways into encrypted messages.
    One of the slides, entitled DSD Way Forward, acknowledges that the spy agency’s resources are limited compared with its US and British counterparts. It says there is a “need to capitalise on UKUSA and industry capability”, apparently a reference to the help provided – willingly or under pressure – from telecom and internet companies. The slides canvass “options” for continued surveillance and the final slide advises: “Choose an option and apply it to a target (like Indonesian leadership).”
    The tension between Australia and Indonesia began in October when documents revealed by the German newspaper Der Spiegel and published by Fairfax newspapers revealed that Australian diplomatic posts across Asia were being used to intercept phone calls and data. The Guardian then revealed that the DSD worked alongside America’s NSA to mount a massive surveillance operation in Indonesia during a UN climate change conference in Bali in 2007.
    But these earlier stories did not directly involve the president or his entourage. Abbott made his first international trip as prime minister to Indonesia and has repeatedly emphasised the crucial importance of the bilateral relationship.
    Speaking after his meeting with Boediono last week, Abbott said: “All countries, all governments gather information. That’s hardly a surprise. It’s hardly a shock.
    “We use the information that we gather for good, including to build a stronger relationship with Indonesia and one of the things that I have offered to do today in my discussions with the Indonesian vice-president is to elevate our level of information-sharing because I want the people of Indonesia to know that everything, everything that we do is to help Indonesia as well as to help Australia. Indonesia is a country for which I have a great deal of respect and personal affection based on my own time in Indonesia.”
    Asked about the spying revelations in a separate interview, Abbott said: “To use the term spying, it’s kind of loaded language … researching maybe. Talking to people. Understanding what’s going on.”
    On Monday a spokesman for Abbott said: “Consistent with the long-standing practice of Australian governments, and in the interest of national security, we do not comment on intelligence matters.”
    It remains unclear exactly who will contest next year’s Indonesian presidential election, in which Yudhoyono, having already served two terms, is not eligible to stand. Based on recent polling, the popular governor of Jakarta, Joko Widodo, known as Jokowi, and former general Prabowo Subianto would be frontrunners.
    Ewen MacAskill in New York and Lenore Taylor in Canberra
    theguardian.com, Monday 18 November 2013 00.58 GMT
    Find this story at 18 November 2013
    Find the documents at
     
    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    In the shadows of international law

    German intelligence services collect data from asylum seekers that could have security relevance and turn it over to the US. In some instances this could be a breach of international law.
    In its ongoing “war on terror,” the United States, for years, has been carrying out so-called targeted killings of suspected terrorists with the help of unmanned drone aircraft. Information about possible targets is also passed on to the US intelligence services by their German counterparts, who have gleaned that information from asylum seekers.
    Germany’s Central Survey Office (HBW) regularly conducts background checks on asylum seekers. The agency, like the Federal Intelligence Service (BND), answers directly to the chancellor, and is particularly interested in information about suspected terrorists in the asylum seeker’s country of origin.
    Theoretically, as German media have pointed out, the transfer of this information could lead to the targeted killing of a person by the United States, making Germany an indirect participant in that action – and that could be a violation of international law, according to Robert Frau, an expert on the subject at Viadrina University in Frankfurt/Oder.
    “If Germany were to hand over data to the Americans, which were then used for illegal actions, then Germany would be abetting a breach of international law,” said Frau.
    Interpretations of international law
    There is no consensus among law experts, however, whether or not drone attacks and targeted killings are a violation of international law, and as such, whether Germany, in passing on information, would be abetting a breach of the law.
    This MQ-9 Reaper is one of the main drones used by the US for clandestine air operations
    In armed conflicts, persons participating directly in combat operations are legitimate targets. “In such cases, a drone attack is no different than using a missile, or having soldiers fire their weapons,” said Frau.
    A targeted killing in that scenario would not be a violation of international law. Both the United States and Germany, for example, are involved in an armed conflict in Afghanistan. Therefore, if Germany passes information to the US on German citizens in Afghanistan and the US uses that information for a targeted killing, that is not a breach of international law, Frau explained.
    The situation would be different in Somalia, however. “Germany is not involved in armed conflict there and outside of an armed conflict there are other rules. That means, as a matter of principle, such killings are not legal,” Frau stressed.
    No German collusion is known
    Hans-Christian Ströbele admits that no German participation is known
    It is next to impossible to prove whether or not Germany in the past ever provided information that led to a targeted killing. When asked, the German government points to the necessity of keeping sensitive information secret.
    Even the highly critical Green politician, Hans-Christian Ströbele, who is a member of the Parliamentary Control Committee that oversees the intelligence services and has access to secret government files, has said that he has no knowledge of any such cases.
    Ströbele did say, however, that there was also no way to totally exclude it either. Germany, he said, had no way of knowing what the US did with the information it received from Berlin.
    Once data is passed on, one can assume the US intelligence services will use it as they see fit, agrees law expert Frau. Germany “cannot pass on data with the explicit request that they not be used for illegal acts,” he said.
    Date 26.11.2013
    Author Sven Pöhle / gb
    Editor John Blau
    Find this story at 26 November 2013
    © 2013 Deutsche Welle |

    German spies keep tabs on asylum-seekers

    German law promises refuge to those persecuted in their home countries. Now it has been revealed that German intelligence uses the asylum process to find out more about those coming here – and those who stay behind.
    When refugees apply for asylum in Germany they have to go through a long process before their stay is approved. Employees of the Federal Office for Migration and Refugees ask them questions about the situation in their home country and whether they face political persecution.
    They agency is also interested in finding out how refugees arrived in Germany, whether criminal smugglers helped them and whether applicants entered other European countries before arriving in Germany. If they did, international law says they must return to the country of entry.
    Victor Pfaff says the HBW are not mysterious
    But unknown to the public, there is another authority that can take charge of the process. The Berlin-based Office for Interrogation (HBW) is officially part of the chancellor’s office. Since 1958 if has gathered information to help Germany’s domestic Federal Intelligence Service (BND). Many observers believe it is in reality part of the BND.
    Journalists from the daily “Süddeutsche Zeitung” and public broadcaster NDR reported that HBW employees ask whether asylum-seekers know specific people in their home countries who might belong to a terrorist organization or have information about weapons caches. In theory, this information could be used by intelligence services to find or kill terrorists.
    A dangerous game?
    Lawyers who advise asylum-seekers about their rights frequently encounter the HBW. Victor Pfaff has been working in Frankfurt as an asylum-rights lawyer for more than 40 years. He has met many HBW employees, finding them always to be very polite and happy to hand out their business cards. “We shouldn’t enshroud them in a fog of mystery,” he said.
    Pfaff said the agency denies being part of the BND, even though both organizations report directly to the chancellor.
    Asylum-seekers had never complained to him that this questioning caused them problems, Pfaff said. On the contrary, he sometimes approached the HBW for help in speeding up difficult asylum cases. He said if his clients are able to provide useful information, their residence permits can be issued in a matter of days.
    But deals like this only happen rarely, Pfaff said, warning that information can also be gathered without consent. “It is problem if German intelligence is secretly present at a an asylum hearing and provides this information to foreign intelligence.” If this happened, asylum-seekers might feel they were being used. Pfaff said he had heard of such cases, and believed they posed a danger, because terrorists could take revenge and kill alleged traitors.
    Refugees can spend years in camps such as this one in Friedland, Lower Saxony
    Warnings for attempted spying
    Claus-Ulrich Prössl heads the Cologne Refugee Council, an organization that assists asylum-seekers throughout the procedure. Prössl said he believes the BND and the HBW are closely connected, and had even heard of cases where people were questioned by BND employees. “A few refugees were hoping that their asylum process would go more quickly, while other refugees did not understand what was going on and were worried.”
    Prössl warns asylum-seekers to be careful: “Unfortunately, after the NSA affair, we have to assume that all information will be passed on.” He said he did not see any data protection or confidentiality and worried that the information thus gathered would not stay within the borders of Germany. There must be a reason, he said, why the state of North Rhine-Westphalia had given up on its own security questioning.
    Cologne-based lawyer Zaza Koschuaschwili also warns applicants about questions that have nothing to do with the actual asylum process. Sometimes the quality of the available simultaneous translators is poor:”It often happens that interpreters is add their own interpretations or opinions to a statement.” His clients would often complain that they had been musunderstood, he added.
    As a lawyer and a native of Georgia, Koschuaschwili can speak both languages and knows his clients’ rights. But whenever the HBW gets involved, attorneys are frequently excluded from interviews.
    Refugees give information to the HBW in the hope of gaining residency
    Participation is not meant to have drawbacks
    DW asked the HBW for an interview to shed light on the relationship between itself and the BND. Its director promised to provide the desired information once a series of questions had been discussed with the chancellor’s office. That process is still ongoing.
    Six months ago, Sharmila H. came to Germany from Afganistan. Although she is still waiting for her interview, she says one thing is already clear to her: “I will not answer just any questions,” if intelligence agencies speak to her – just who she is and why she came here.
    Pfaff and Koschuaschwili wish to reassure those who are unwilling to cooperate with German intelligence that they should have no fear about the regular procedure for granting asylum.
    Sharmila H. hopes they are right.
    Date 22.11.2013
    Author Wolfgang Dick / ns
    Editor Simon Bone
    Find this story at 22 November 2013
    © 2013 Deutsche Welle

    Asylum Seekers in Germany Unwittingly Used As Intelligence Sources

    In Somalia, Yusuf A. owned two houses and several cars. He had money and power as a politician with a seat in parliament and occasionally even in the cabinet. Now he lives in a shabby apartment in a small industrial park in Munich. Yusuf hasn’t yet found work and frequently falls ill. He’s lost his wealth, but at least he’s safe. In Somalia, he was under threat from al-Shabaab Islamists. Then it went beyond threats. One day a grenade landed in his house, killing a colleague of his. Yusuf fled to Germany.
    He was granted permanent residency with amazing swiftness and was allowed to send for his wife and seven children to join him. The German authorities—and they probably weren’t alone—showed great interest in Yusuf. In the span on seven weeks authorities called him in for questioning five times. The meetings lasted hours. Hearings conducted by the Federal Office for Migration and Refugees usually aren’t that involved. But in the case of Yusuf A., another authority came into play: the Main Office for Questioning (the Hauptstelle für Befragungswesen, HBW for short), which was established in during Cold War times to interview refugees and immigrants.
    The mysterious agency specializes in drawing on information it teases out of refugees. Just like the Federal Intelligence Service (Bundesnachrichtendienst, the BND, the counterpart to the U.S.’s Central Intelligence Agency), it falls under the purview of the Chancellor’s office. Even the federal government is tight-lipped about the intelligence operations conducted within the HBW. This is about secret intelligence, after all.
    Old records at Berlin’s administrative court show, however, that the HBW (first created by Germany’s Western allies) has been under the control of the BND since the 1950s. One BND report from 1983 calls witnesses in the HBW asylum process an “opening in the shadows.” That would make the HBW an institution built on a shadow world.
    The refugees are expected to give extensive testimony. Testimony about conditions back home, preferably about politicians, terrorists and their networks.
    Yusuf won’t say exactly what he told the officers at the HBW. But he will give us one detail; during a meeting he gave up the telephone number of an al-Shabaab leader. He knew a woman who came from the same town and, at the urging of the German officers, coaxed the al-Shabaab leader’s number out of her. He also found out that the Islamist leader seldom used his cellphone and even then used it only briefly. He mostly let his associates speak for him, switching their phones often.
    Yusuf now wonders if it was right to pass on the number to the Germans. Cellphone numbers help to locate people, and if the German authorities get a hold of important numbers, the BND can hand them over to the U.S.
    The United States is leading a drone war in Somalia that is legally questionable and continually claims the lives of people who have nothing to do with terrorist groups such as al-Shabaab or Al-Qaida. Yusuf knows that.
    He says, “You have to attack al-Shabaab. They are evil people.” But he doesn’t want innocent civilians to die in the name of shutting down al-Shabaab.
    Refugees like Yusuf who are interviewed by the HBW aren’t told later what was done with the information they provided.
    Immigrant as informant
    Asylum seekers in Germany are unwittingly being used as intelligence sources. Not every immigrant is called for questioning, but some receive letters from the HBW. They read; “the security situation worldwide” makes it necessary that the government of the Federal Republic of Germany gain information “about the political and social issues in your home country.” The HBW is charged with “collecting reliable information.”
    An HBW questionnaire for Afghanis reads: “The people in my hometown openly support the Taliban”—”yes” and “no”. The HBW wants to know how the supply of doctors and drinking water is, how foreign soldiers are perceived, and whether people believe that Afghanistan’s government can stabilize the situation. The questions are written in Afghanistan’s official language, Dari.
    Once you’ve filled out the questionnaire, it’s not over. Sometimes two women from the HBW, accompanied by a translator, arrive for a more personal chat. One lawyer from northern Germany says her client was allowed to stay in Germany because of his work helping the U.S. Army in his home country of Afghanistan. Later she learned her client had been questioned by the HBW in a refugee camp. She calls the cooperation between refugees and the HBW a “balancing act”. It’s not yet clear, lawyers say, what’s done with the information from these surveys and interviews or what effect participation—or nonparticipation—has on the refugees’ fate.
    The Germany government says participation in the surveys is voluntary and has no influence on the duration or success of the asylum process. But it’s striking how quickly refugees are taken in when they pique the interest of the HBW. Attorneys argue that their clients are especially vulnerable after such an HBW interview session if they are subsequently sent back to their home countries. In many of these refugees’ homelands, it’s not exactly seen as a good thing to be talking to a western intelligence agency.
    The German government talks about “post-refuge rationale” that occurs after leaving one’s homeland. If such a “post-refuge rationale” is apparent during the HBW questioning, it will be considered as part of the asylum application. That sounds complicated, especially since the government says there’s no reward system at play.
    In off-the-record interviews, several attorneys said clearly: refugees who cooperate with the HBW can expect a speedy process and permanent residency in Germany. Lawyers are mostly shut out of these interview sessions. The authorities explicitly advise the asylum seekers to come without legal representation.
    One Somali interpreter who has translated for asylum seekers for many years is convinced that there’s a rewards system at play: “It’s made clear to these people that if they cooperate they will be accepted quicker.” The interpreter came to Germany more than 20 years ago and has assisted many asylum seekers over the years. He fears giving his name would put his work and himself at risk. He says sometimes strange people come to hearings at the Federal Office for Migration and Refugees calling themselves interns. “The intern doesn’t come to simply any hearing, but rather just when he thinks someone knows something.” Then the refugee is asked about Islamist groups in great detail. Many refugees come from regions where the U.S. has dropped bombs using unmanned predator drones. Drones are a weapon against which you can’t protect yourself, says the interpreter. “People live in fear.”
    Victor Pfaff, a lawyer from Frankfurt, witnessed in the 1970s how asylum seekers had to move through three rooms during an application procedure. One room where the German officials sat, one where representatives from the U.S. intelligence agencies awaited them. The sign read “Liaison Officer “. It was only later that Pfaff learned of the HBW. He considers the agency to be legitimate and thinks it’s in Germany’s interest to make sure no one who poses a security risk should be allowed to remain in the country. That’s one possible outcome of the HBW surveys. But when it comes to cooperation with foreign intelligence agencies, “it could be problematic,” Pfaff says.
    The 1980s it came out that the information Turkish refugees had given the HBW/BND somehow landed at the Turkish intelligence agency. A BND officer at the time testified that it be “grave misconduct” if the authorities had been responsible for such a huge slip-up. But the agencies do work together with Turkish intelligence agencies on projects including those in the area of anti-terrorism.
    The methods, explanation and assertions from that case sound oddly similar. Three years ago, an insider published an essay under the pseudonym Jack Dawson in the Journal for Intelligence, Propaganda and Security Studies. He wrote that the HBW was a part of a larger interrogation program in Germany, the United Kingdom and the U.S. called the Tripartite Debriefing Programme. France is said to have taken part earlier in its existence.
    British and U.S. intelligence officials celebrated the 50th anniversary of the HBW along with their German counterparts in Berlin in 2008.
    After Dawson’s revelations British and American intelligence officers began questioning asylum seekers in Germany sometimes even without their German colleagues. Asked in late October, Dawson said that, to the best of his knowledge, the Tripartite program still runs strong. The goal remains the same: gain intelligence from the refugee questioning sessions.
    You could even say: whoever wants German protection isn’t safe from American intelligence agencies.
    Confronted with Dawson’s information, the German government seems struck by a telling silence. In stilted language, officials refer to rules of confidentiality. “An in-depth answer to the question would reveal details about methods, jeopardizing the future ability and performance of the HBW and BND.” Questions put to U.S. officials about HBW still remains unanswered.
    It’s not very easy to pay a visit the HBW headquarters at 150 Hohenzollerndamm in Berlin’s Wilmersdorf district. Surely, that’s by design. In front of the building lies a well-maintained yard. The HBW offices are housed on the fourth floor, where officers can look down from a bay window. But getting up there isn’t simple. There are no stairs that lead to the HBW offices—only an elevator, which requires a key.
    There are other HBW offices in Nuremberg, Maiz and Hanover and six refugee reception centers. The German government won’t say anything on the topic. It merely confirms that there is a duty station at the border transit camp in Friedland, in central Germany. In total, just 40 people work at the HBW.
    Meanwhile the interviewers have switched their focus towards Afghanistan, Somalia, Iraq and Syria. At the end of 2012, in response to questions posed by the Green Party, the German government said that since 2000, some 500 to 1,000 “briefings” with refugees and emigrants were conducted, each applicant enduring two to five question sessions each.
    But not every asylum seeker is telling the truth. In 1999, the Iraqi Rafed Ahmed Alwan came to the refugee reception center in Zirndorf, near Nuremberg and was questioned there. He provided the BND with information about purported biochemical weapon laboratories in Iraq, which was forwarded to American officials. The C.I.A. gave him the codename Curveball. His statements were later used by the U.S. government to justify the invasion into Iraq.
    But the alleged facts were wrong. There were no labs. Alwan, AKA Curveball, got a Germany passport and a contract at some sham offices at, of all places, the BND.
    Coincidentally, the BND currently seeks “freelancers” who speak Somali. Applicants are asked to discreetly submit their letters of interest.
    November 20, 2013 02:54 pm CET
    By Christian Fuchs, John Goetz, Hans Leyendecker, Klaus Ott, Niklas Schenck, Tanjev Schultz
    Find this story at 20 November 2013
    © Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH

    Geheimer Krieg BND will umstrittene Befragungsstelle auflösen

    Die sogenannte Hauptstelle für Befragungswesen ist wenig bekannt, aber sehr umstritten: Asylbewerber werden dort von deutschen und ausländischen Geheimdienstlern ausgehorcht. Die Bundesregierung bestätigt nun diese Praxis. Lange soll es die Stelle aber nicht mehr geben.
    Die umstrittene “Hauptstelle für Befragungswesen”, die dem Bundesnachrichtendienst zugeordnet ist, soll aufgelöst werden. Das geht aus einer schriftlichen Antwort der Bundesregierung auf eine Frage von Linksfraktionsvize Jan Korte hervor, die der Nachrichtenagentur dpa vorliegt. Die personelle Ausstattung der Dienststelle sei bereits schrittweise reduziert worden, heißt es darin.
    In der Antwort räumt die Regierung ein, dass in der Einrichtung Asylbewerber auch durch Vertreter “der alliierten Partnerdienste ohne deutsche Begleiter” befragt wurden. Es könne außerdem nicht ausgeschlossen werden, dass Informationen aus den Befragungen “auch zum militärischen Lagebild” der Partnerdienste beitragen könnten. Korte kritisierte die Praxis scharf.
    500 bis 800 “Vorgespräche”
    Nach Recherchen von NDR und Süddeutscher Zeitung im Rahmen des Projekts Geheimer Krieg horchten deutsche Geheimdienstler in der Hauptstelle für Befragungswesen Asylbewerber systematisch aus und gaben Hinweise aus diesen Befragungen an die USA weiter. Diese wiederum nutzen solche Informationen auch für den Einsatz von Kampfdrohnen. Es gibt zudem Hinweise, dass auch britische und amerikanische Nachrichtendienstler in Deutschland Asylbewerber befragen.
    Bilder
    Geheime Außenstellen des BND Sie sind mitten unter uns
    Anzeige
    In der Antwort der Regierung heißt es, in den vergangenen zwei bis drei Jahren hätten durchschnittlich 500 bis 800 “Vorgespräche” pro Jahr stattgefunden. Im Anschluss seien etwa 200 bis 300 Personen befragt worden. Seit der Gründung der Dienststelle 1958 seien an den Befragungen alliierte Nachrichtendienste beteiligt.
    Wenn ausländische Geheimdienstler alleine mit Asylbewerbern sprächen, habe der BND “im Vor- und Nachgang” die Aufsicht. Die Ergebnisse der Gespräche würden außerdem im “Meldungssystem” des BND erfasst, bei Bedarf “bereinigt” – etwa im Hinblick auf Datenschutz – und erst dann an die ausländischen Partner weitergegeben. 60 Prozent der erhobenen Informationen der Dienststelle gingen auf diesem Wege an ausländische Geheimdienste.
    Korte bezeichnete dies als “absurd”. “Wir sollen mal wieder für dumm verkauft werden”, sagte er der dpa. “Befragungen finden auch durch US-Geheimdienstler statt, aber die Befragungsergebnisse werden angeblich nur nach Prüfung und Freigabe an die USA weitergereicht – und die Befrager haben natürlich alles sofort wieder vergessen und erzählen ihren Dienststellen nichts.”
    Zur Nutzung der Informationen aus den Gesprächen mit Asylbewerbern schreibt die Regierung: “Zielsetzung der Befragungen war und ist zu keiner Zeit die Gewinnung von Informationen zur Vorbereitung von Drohneneinsätzen.” Es sei aber nicht auszuschließen, dass die Erkenntnisse auch zum militärischen Lagebild der ausländischen Partner beitragen könnten.
    Geheimer Krieg Deutschlands Rolle im “Kampf gegen den Terror”
    Eine Serie der Süddeutschen Zeitung und des NDR +++ Panorama-Film “Geheimer Krieg” +++ interaktive Datenbank: Spionen auf der Spur +++ Sonderseite zum Projekt: geheimerkrieg.de +++ alle Artikel finden Sie hier: sz.de/GeheimerKrieg +++ englische Version hier +++
    Personal soll reduziert werden
    Korte reagierte empört: “Erschreckend ist, dass die Regierung die Berichterstattung der letzten Wochen komplett bestätigen muss, aber scheinbar keinerlei Problem erkennen kann”, sagte er. Niemand könne ausschließen, dass Erkenntnisse aus den Befragungen auch für das gezielte Töten durch Drohnen benutzt würden. “Das ohnehin fragwürdige geheimdienstliche Abschöpfen von Asylsuchenden muss sofort ersatzlos beendet werden”, forderte er.
    Die geplante Auflösung der Hauptstelle zeige, dass die derzeitige Praxis offenbar ohnehin entbehrlich sei. Der BND habe die Dienststelle “seit längerem einer Effizienzkontrolle unterzogen” und das Personal dort reduziert, heißt es weiter in der Antwort der Regierung. Ziel sei, die Befragungen direkt in den Krisenregionen im Ausland zu verstärken.
    29. November 2013 20:24
    Find this story at 29 November 2013
    © Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH

    Geheimer Krieg Deutsche Behörde horcht Asylbewerber aus

    Wer Informationen über mutmaßliche islamistische Terrorgruppen hat, soll schneller als Asylbewerber anerkannt werden: Die geheime “Hauptstelle für Befragungswesen” befragt Flüchtlinge – das Wissen könnten die USA beim Einsatz von Kampf-Drohnen nutzen.
    Beim Einsatz von Kampf-Drohnen greifen US-Geheimdienste auch auf Informationen zurück, die von Asylbewerbern in Deutschland stammen. Nach Angaben eines früheren hochrangigen Pentagon-Mitarbeiters fließen solche Erkenntnisse in das “Zielerfassungssystem” der US-Dienste ein. Selbst scheinbar banale Informationen könnten manchmal reichen, “ein Ziel zu bestätigen – und vielleicht auch dafür, einen Tötungsbefehl auszulösen”. Deutsche Behörden würden angeblich die USA systematisch mit Hinweisen versorgen, die von Flüchtlingen stammen. Dazu können auch die Handydaten von Terrorverdächtigen gehören.
    Nach Recherchen der Süddeutschen Zeitung und des Norddeutschen Rundfunks spielt dabei die geheimnisumwitterte “Hauptstelle für Befragungswesen” (HBW), die dem Kanzleramt untersteht, eine zentrale Rolle. Die Bundesregierung macht über die Struktur des HBW selbst bei Anfragen im Parlament keine genauen Angaben. Die Behörde war ursprünglich von den Westalliierten eingerichtet und dann 1958 von der damaligen Bundesregierung übernommen worden. Sie wurde dem Bundesnachrichtendienst zugeordnet.
    Geheimer Krieg
    Wie Geheimdienste Asylbewerber benutzen
    Yusuf A. war in Somalia ein Mann mit Macht, ein Politiker mit Geld und mehreren Autos. Dann muss er nach Deutschland fliehen. Bei Gesprächen über seinen Asylantrag sind nicht nur Beamte vom Bundesamt für Flüchtlinge anwesend. geheimerkrieg.de
    Es gibt Hinweise, dass auch britische und amerikanische Nachrichtendienstler in Deutschland Asylbewerber befragen. Manchmal angeblich sogar allein, ohne deutsche Kollegen. In einer internationalen Fachzeitschrift berichtete ein Insider, die Hauptstelle sei Teil eines gemeinsamen Befragungsprogramms von Deutschland, Großbritannien und den USA.
    Die HBW führt heute nach amtlichen Angaben jährlich 500 bis 1000 Vorgespräche mit Flüchtlingen und befragt anschließend 50 bis 100 von ihnen intensiv. Ein Schwerpunkt der Befragungen liegt derzeit offenbar bei Flüchtlingen aus Somalia, Afghanistan und Syrien.
    Das Bundesinnenministerium teilte jüngst auf eine Anfrage der Linken zur Aufnahme von Syrern mit, dass derzeit jeden Monat etwa zehn Flüchtlinge von der HBW “kontaktiert” würden.
    Dolmetschern und Anwälten zufolge, die Asylbewerber betreuen, interessiert sich die Hauptstelle vor allem für Flüchtlinge, die Angaben über mutmaßliche islamistische Terrorgruppen machen können. Wer mit der Hauptstelle kooperiere, werde oft mit einer schnellen Anerkennung als Asylbewerber belohnt und dürfe in der Bundesrepublik bleiben.
    Die Bundesregierung bestreitet, dass es solche Belohnungen gibt und betont, zudem seien die Befragungen freiwillig. Über eine Zusammenarbeit von HBW und BND äußert sich die Regierung nicht. Sie ließ eine umfassende Anfrage zu der Behörde weitgehend unbeantwortet. Detaillierte Angaben würden die “weitere Arbeitsfähigkeit und Aufgabenerfüllung von HBW und BND gefährden”, erklärte die Regierung.
    Die HBW, die im Kalten Krieg viele Hundert Mitarbeiter hatte, soll heute nur noch knapp vierzig Mitarbeiter beschäftigen. Die Zentrale der Behörde liegt in Berlin. Weitere Büros soll sie in insgesamt sechs Aufnahmelagern für Flüchtlinge haben.
    19. November 2013 18:59
    Von John Goetz und Hans Leyendecker
    Find this story at 19 November 2013
    © Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH

    Die Operationen der US-Dienste in Deutschland

    Drohnen kommen heute immer häufiger zum Einsatz – auch, um damit Menschen zu töten.
    Alles begann mit einem Anruf aus Somalia: Ein Mann aus Mogadischu berichtete dem Panorama Team von einem amerikanischen Drohnenangriff. Das Ziel war ein Terrorist der Terrorgruppe al-Shabaab. Aber wie so häufig in diesem Krieg starb nicht nur der Terrorist, sondern auch Zivilisten. An einem Tag im Oktober vor zwei Jahren wurde der Vater des Anrufers durch US-Kampfdrohnen getötet. Er war ein unschuldiger Kamelbauer, der zur falschen Zeit am falschen Ort war.
    Der Film “Geheimer Krieg”, für den Panorama Reporter zwei Jahre recherchiert haben, erzählt die Geschichte des Mannes, der sterben musste, weil die USA ihren Krieg gegen den Terror fast weltweit führen. Im Jemen, in Pakistan und in Afrika bringen sie Verdächtige aus der Luft um – ohne Anklage, ohne Anwalt, ohne Gerichtsurteil.
    Panorama: Geheimer Krieg
    Sehen Sie hier das gesamte Video der Panorama Sendung von 28. November 2013.
    Systematische Einbindung Deutschlands
    John Goetz vor der amerikanischen Botschaft in Berlin: Wird von hier das Regierungsviertel abgehört?
    John Goetz und sein Team zeigen, wie vor allem Deutschland in diesen leisen und versteckten Krieg eingebunden ist: Der Bundesnachrichtendienst (BND) befragt systematisch Flüchtlinge aus Krisenregionen, um deren Informationen – auch über mögliche Ziele – an die Amerikaner weiterzugeben.
    Das Afrika-Kommando der US-Streitkräfte sitzt in Stuttgart. Von hier kommen die Befehle für Drohnenangriffe auf Menschen in Afrika. Über die Airbase in Ramstein läuft die Kommunikation der Drohnenpiloten mit den fliegenden Kampfrobotern über Somalia. Und eine Firma, die Terrorverdächtige für die CIA entführt hat, bekommt seit Jahren Millionenaufträge von der Bundesregierung in sensiblen Bereichen.
    Bundesregierung und US-Botschaft wiegeln ab
    Auf Anfrage wiegelt die Bundesregierung ab: Es würden nur Informationen an US-Dienste weitergegeben, mit denen keine Drohnenangriffe geplant werden könnten. Außerdem lägen “der Bundesregierung keine eigenen gesicherten Erkenntnisse zu von US-Streitkräften in der Bundesrepublik Deutschland angeblich geplanten oder geführten Einsätzen vor”. Auch die amerikanische Botschaft in Berlin widerspricht den Rechercheergebnissen. Es seien “Halbwahrheiten, Spekulationen und Unterstellungen”, sowie “ungeheuerliche Behauptungen”.
    Weltweite Recherchen
    Am Beispiel des ermordeten Kamelbauern aus Somalia und anderen konkreten Fällen zeigt die Dokumentation erstmals, wie deutsche Dienste und US-Einrichtungen in Deutschland an der Ermordung von unschuldigen Zivilisten durch Drohnen in Afrika beteiligt sind. Dafür haben die Reporter in Afrika, den USA, in der Türkei, Deutschland und in Moskau bei Edward Snowden recherchiert.
    Die Ausstrahlung des Films ist der Höhepunkt der Serie “Geheimer Krieg”, in der der Norddeutsche Rundfunk und die “Süddeutsche Zeitung” seit gut zwei Wochen darüber berichten, wie das US-Militär und die amerikanischen und britischen Geheimdienste den Kampf gegen den Terrorismus aus Deutschland steuern und kontrollieren.
    28.11.13 | 21:45 Uhr
    von John Goetz & Niklas Schenck
    Find this story at 28 November 2013
    © Norddeutscher Rundfunk

    Meet the Spies Doing the NSA’s Dirty Work; This obscure FBI unit does the domestic surveillance that no other intelligence agency can touch.

    With every fresh leak, the world learns more about the U.S. National Security Agency’s massive and controversial surveillance apparatus. Lost in the commotion has been the story of the NSA’s indispensable partner in its global spying operations: an obscure, clandestine unit of the Federal Bureau of Investigation that, even for a surveillance agency, keeps a low profile.
    When the media and members of Congress say the NSA spies on Americans, what they really mean is that the FBI helps the NSA do it, providing a technical and legal infrastructure that permits the NSA, which by law collects foreign intelligence, to operate on U.S. soil. It’s the FBI, a domestic U.S. law enforcement agency, that collects digital information from at least nine American technology companies as part of the NSA’s Prism system. It was the FBI that petitioned the Foreign Intelligence Surveillance Court to order Verizon Business Network Services, one of the United States’ biggest telecom carriers for corporations, to hand over the call records of millions of its customers to the NSA.
    But the FBI is no mere errand boy for the United States’ biggest intelligence agency. It carries out its own signals intelligence operations and is trying to collect huge amounts of email and Internet data from U.S. companies — an operation that the NSA once conducted, was reprimanded for, and says it abandoned.
    The heart of the FBI’s signals intelligence activities is an obscure organization called the Data Intercept Technology Unit, or DITU (pronounced DEE-too). The handful of news articles that mentioned it prior to revelations of NSA surveillance this summer did so mostly in passing. It has barely been discussed in congressional testimony. An NSA PowerPoint presentation given to journalists by former NSA contractor Edward Snowden hints at DITU’s pivotal role in the NSA’s Prism system — it appears as a nondescript box on a flowchart showing how the NSA “task[s]” information to be collected, which is then gathered and delivered by the DITU.
    But interviews with current and former law enforcement officials, as well as technology industry representatives, reveal that the unit is the FBI’s equivalent of the National Security Agency and the primary liaison between the spy agency and many of America’s most important technology companies, including Google, Facebook, YouTube, and Apple.
    The DITU is located in a sprawling compound at Marine Corps Base Quantico in Virginia, home of the FBI’s training academy and the bureau’s Operational Technology Division, which runs all the FBI’s technical intelligence collection, processing, and reporting. Its motto: “Vigilance Through Technology.” The DITU is responsible for intercepting telephone calls and emails of terrorists and foreign intelligence targets inside the United States. According to a senior Justice Department official, the NSA could not do its job without the DITU’s help. The unit works closely with the “big three” U.S. telecommunications companies — AT&T, Verizon, and Sprint — to ensure its ability to intercept the telephone and Internet communications of its domestic targets, as well as the NSA’s ability to intercept electronic communications transiting through the United States on fiber-optic cables.
    For Prism, the DITU maintains the surveillance equipment that captures what the NSA wants from U.S. technology companies, including archived emails, chat-room sessions, social media posts, and Internet phone calls. The unit then transmits that information to the NSA, where it’s routed into other parts of the agency for analysis and used in reports.
    After Prism was disclosed in the Washington Post and the Guardian, some technology company executives claimed they knew nothing about a collection program run by the NSA. And that may have been true. The companies would likely have interacted only with officials from the DITU and others in the FBI and the Justice Department, said sources who have worked with the unit to implement surveillance orders.
    “The DITU is the main interface with providers on the national security side,” said a technology industry representative who has worked with the unit on many occasions. It ensures that phone companies as well as Internet service and email providers are complying with surveillance law and delivering the information that the government has demanded and in the format that it wants. And if companies aren’t complying or are experiencing technical difficulties, they can expect a visit from the DITU’s technical experts to address the problem.
    * * *
    Recently, the DITU has helped construct data-filtering software that the FBI wants telecom carriers and Internet service providers to install on their networks so that the government can collect large volumes of data about emails and Internet traffic.
    The software, known as a port reader, makes copies of emails as they flow through a network. Then, in practically an instant, the port reader dissects them, removing only the metadata that has been approved by a court.
    The FBI has built metadata collection systems before. In the late 1990s, it deployed the Carnivore system, which the DITU helped manage, to pull header information out of emails. But the FBI today is after much more than just traditional metadata — who sent a message and who received it. The FBI wants as many as 13 individual fields of information, according to the industry representative. The data include the route a message took over a network, Internet protocol addresses, and port numbers, which are used to handle different kinds of incoming and outgoing communications. Those last two pieces of information can reveal where a computer is physically located — perhaps along with its user — as well as what types of applications and operating system it’s running. That information could be useful for government hackers who want to install spyware on a suspect’s computer — a secret task that the DITU also helps carry out.
    The DITU devised the port reader after law enforcement officials complained that they weren’t getting enough information from emails and Internet traffic. The FBI has argued that under the Patriot Act, it has the authority to capture metadata and doesn’t need a warrant to get them. Some federal prosecutors have gone to court to compel port reader adoption, the industry representative said. If a company failed to comply with a court order, it could be held in contempt.
    The FBI’s pursuit of Internet metadata bears striking similarities to the NSA’s efforts to obtain the same information. After the 9/11 terrorist attacks, the agency began collecting the information under a secret order signed by President George W. Bush. Documents that were declassified Nov. 18 by Barack Obama’s administration show that the agency ran afoul of the Foreign Intelligence Surveillance Court after it discovered that the NSA was collecting more metadata than the court had allowed. The NSA abandoned the Internet metadata collection program in 2011, according to administration officials.
    But the FBI has been moving ahead with its own efforts, collecting more metadata than it has in the past. It’s not clear how many companies have installed the port reader, but at least two firms are pushing back, arguing that because it captures an entire email, including content, the government needs a warrant to get the information. The government counters that the emails are only copied for a fraction of a second and that no content is passed along to the government, only metadata. The port reader is designed also to collect information about the size of communications packets and traffic flows, which can help analysts better understand how communications are moving on a network. It’s unclear whether this data is considered metadata or content; it appears to fall within a legal gray zone, experts said.
    * * *
    The DITU also runs a bespoke surveillance service, devising or building technology capable of intercepting information when the companies can’t do it themselves. In the early days of social media, when companies like LinkedIn and Facebook were starting out, the unit worked with companies on a technical solution for capturing information about a specific target without also capturing information related to other people to whom the target was connected, such as comments on posts, shared photographs, and personal data from other people’s profiles, according to a technology expert who was involved in the negotiations.
    The technicians and engineers who work at the DITU have to stay up to date on the latest trends and developments in technology so that the government doesn’t find itself unable to tap into a new system. Many DITU employees used to work for the telecom companies that have to implement government surveillance orders, according to the industry representative. “There are a lot of people with inside knowledge about how telecommunications work. It’s probably more intellectual property than the carriers are comfortable with the FBI knowing.”
    The DITU has also intervened to ensure that the government maintains uninterrupted access to the latest commercial technology. According to the Guardian, the unit worked with Microsoft to “understand” potential obstacles to surveillance in a new feature of Outlook.com that let users create email aliases. At the time, the NSA wanted to make sure that it could circumvent Microsoft’s encryption and maintain access to Outlook messages. In a statement to the Guardian, Microsoft said, “When we upgrade or update products we aren’t absolved from the need to comply with existing or future lawful demands.” It’s the DITU’s job to help keep companies in compliance. In other instances, the unit will go to companies that manufacture surveillance software and ask them to build in particular capabilities, the industry representative said.
    The DITU falls under the FBI’s Operational Technology Division, home to agents, engineers, electronic technicians, computer forensics examiners, and analysts who “support our most significant investigations and national security operations with advanced electronic surveillance, digital forensics, technical surveillance, tactical operations, and communications capabilities,” according to the FBI’s website. Among its publicly disclosed capabilities are surveillance of “wireline, wireless, and data network communication technologies”; collection of digital evidence from computers, including audio files, video, and images; “counter-encryption” support to help break codes; and operation of what the FBI claims is “the largest fixed land mobile radio system in the U.S.”
    The Operational Technology Division also specializes in so-called black-bag jobs to install surveillance equipment, as well as computer hacking, referred to on the website as “covert entry/search capability,” which is carried out under law enforcement and intelligence warrants.
    The tech experts at Quantico are the FBI’s silent cybersleuths. “While [the division’s] work doesn’t typically make the news, the fruits of its labor are evident in the busted child pornography ring, the exposed computer hacker, the prevented bombing, the averted terrorist plot, and the prosecuted corrupt official,” according to the website.
    According to former law enforcement officials and technology industry experts, the DITU is among the most secretive and sophisticated outfits at Quantico. The FBI declined Foreign Policy’s request for an interview about the unit. But in a written statement, an FBI spokesperson said it “plays a key role in providing technical expertise, services, policy guidance, and support to the FBI and the intelligence community in collecting evidence and intelligence through the use of lawfully authorized electronic surveillance.”
    In addition to Carnivore, the DITU helped develop early FBI Internet surveillance tools with names like CoolMiner, Packeteer, and Phiple Troenix. One former law enforcement official said the DITU helped build the FBI’s Magic Lantern keystroke logging system, a device that could be implanted on a computer and clandestinely record what its user typed. The system was devised to spy on criminals who had encrypted their communications. It was part of a broader surveillance program known as Cyber Knight.
    In 2007, Wired reported that the FBI had built another piece of surveillance malware to track the source of a bomb threat against a Washington state high school. Called a “computer and Internet protocol address verifier,” it was able to collect details like IP addresses, a list of programs running on an infected computer, the operating system it was using, the last web address visited, and the logged-in user name. The malware was handled by the FBI’s Cryptologic and Electronic Analysis Unit, located next door to the DITU’s facilities at Quantico. Wired reported that information collected by the malware from its host was sent via the Internet to Quantico.
    The DITU has also deployed what the former law enforcement official described as “beacons,” which can be implanted in emails and, when opened on a target’s computer, can record the target’s IP address. The former official said the beacons were first deployed to track down kidnappers.
    * * *
    Lately, one of the DITU’s most important jobs has been to keep track of surveillance operations, particularly as part of the NSA’s Prism system, to ensure that companies are producing the information that the spy agency wants and that the government has been authorized to obtain.
    The NSA is the most frequent requester of the DITU’s services, sources said. There is a direct fiber-optic connection between Quantico and the agency’s headquarters at Fort Meade, Maryland; data can be moved there instantly. From the companies’ perspective, it doesn’t much matter where the information ends up, so long as the government shows up with a lawful order to get it.
    “The fact that either the targets are coming from the NSA or the output goes to the NSA doesn’t matter to us. We’re being compelled. We’re not going to do any more than we have to,” said one industry representative.
    But having the DITU act as a conduit provides a useful public relations benefit: Technology companies can claim — correctly — that they do not provide any information about their customers directly to the NSA, because they give it to the DITU, which in turn passes it to the NSA.
    But in the government’s response to the controversy that has erupted over government surveillance programs, FBI officials have been conspicuously absent. Robert Mueller, who stepped down as the FBI’s director in September, testified before Congress about disclosed surveillance only twice, and that was in June, before many of the NSA documents that Snowden leaked had been revealed in the media. On Nov. 14, James Comey gave his first congressional testimony as the FBI’s new director, and he was not asked about the FBI’s involvement in surveillance operations that have been attributed to the NSA. Attorney General Eric Holder has made few public comments about surveillance. (His deputy has testified several times.)
    The former law enforcement official said Holder and Mueller should have offered testimony and explained how the FBI works with the NSA. He was concerned by reports that the NSA had not been adhering to its own minimization procedures, which the Justice Department and the FBI review and vouch for when submitting requests to the Foreign Intelligence Surveillance Court.
    “Where they hadn’t done what was represented to the court, that’s unforgivable. That’s where I got sick to my stomach,” the former law enforcement official said. “The government’s position is, we go to the court, apply the law — it’s all approved. That makes for a good story until you find out what was approved wasn’t actually what was done.”
    BY SHANE HARRIS | NOVEMBER 21, 2013
    Find this story at 21 November 2013
    ©2013 The Slate Group, LLC.

    FBI Pursuing Real-Time Gmail Spying Powers as “Top Priority” for 2013

    For now, law enforcement has trouble monitoring Gmail communications in real time
    Despite the pervasiveness of law enforcement surveillance of digital communication, the FBI still has a difficult time monitoring Gmail, Google Voice, and Dropbox in real time. But that may change soon, because the bureau says it has made gaining more powers to wiretap all forms of Internet conversation and cloud storage a “top priority” this year.
    Last week, during a talk for the American Bar Association in Washington, D.C., FBI general counsel Andrew Weissmann discussed some of the pressing surveillance and national security issues facing the bureau. He gave a few updates on the FBI’s efforts to address what it calls the “going dark” problem—how the rise in popularity of email and social networks has stifled its ability to monitor communications as they are being transmitted. It’s no secret that under the Electronic Communications Privacy Act, the feds can easily obtain archive copies of emails. When it comes to spying on emails or Gchat in real time, however, it’s a different story.
    That’s because a 1994 surveillance law called the Communications Assistance for Law Enforcement Act only allows the government to force Internet providers and phone companies to install surveillance equipment within their networks. But it doesn’t cover email, cloud services, or online chat providers like Skype. Weissmann said that the FBI wants the power to mandate real-time surveillance of everything from Dropbox and online games (“the chat feature in Scrabble”) to Gmail and Google Voice. “Those communications are being used for criminal conversations,” he said.
    While it is true that CALEA can only be used to compel Internet and phone providers to build in surveillance capabilities into their networks, the feds do have some existing powers to request surveillance of other services. Authorities can use a “Title III” order under the “Wiretap Act” to ask email and online chat providers furnish the government with “technical assistance necessary to accomplish the interception.” However, the FBI claims this is not sufficient because mandating that providers help with “technical assistance” is not the same thing as forcing them to “effectuate” a wiretap. In 2011, then-FBI general counsel Valerie Caproni—Weissmann’s predecessor—stated that Title III orders did not provide the bureau with an “effective lever” to “encourage providers” to set up live surveillance quickly and efficiently. In other words, the FBI believes it doesn’t have enough power under current legislation to strong-arm companies into providing real-time wiretaps of communications.
    Because Gmail is sent between a user’s computer and Google’s servers using SSL encryption, for instance, the FBI can’t intercept it as it is flowing across networks and relies on the company to provide it with access. Google spokesman Chris Gaither hinted that it is already possible for the company to set up live surveillance under some circumstances. “CALEA doesn’t apply to Gmail but an order under the Wiretap Act may,” Gaither told me in an email. “At some point we may expand our transparency report to cover this topic in more depth, but until then I’m not able to provide additional information.”
    Either way, the FBI is not happy with the current arrangement and is on a crusade for more surveillance authority. According to Weissmann, the bureau is working with “members of intelligence community” to craft a proposal for new Internet spy powers as “a top priority this year.” Citing security concerns, he declined to reveal any specifics. “It’s a very hard thing to talk about publicly,” he said, though acknowledged that “it’s something that there should be a public debate about.”
    Ryan Gallagher is a journalist who reports from the intersection of surveillance, national security, and privacy for Slate’s Future Tense blog. He is also a Future Tense fellow at the New America Foundation.
    By Ryan Gallagher
    Find this story at 26 March 2013
    © 2013 The Slate Group, LLC.

    Is NSA Prism the New FBI Carnivore?

    From the ‘Uncle Sam is Watching’ files:
    Lots of concern and talk in the last couple of days over the Washington Post’s leaked government story on PRISM.
    The TL;dr version is that PRISM was/is an NSA operation that routes American’s private information to the NSA where it can be analyzed in the interest of national security.
    While the revelation about NSA PRISM is new – the fact that the U.S. Government has active programs to surveil the Internet for email and otherwise is not.
    Back in 2005 it was revealed that the FBI had to abandon it’s own Internet surveillance effort known as Carnivore. With Carnivore, the FBI was quite literally injesting email and Internet content en masse from the U.S .
    Officially known as the Digital Collection System 1000 (DCS-1000), Carnivore captures data traffic that flows through an Internet service provider (ISP). The system prompted a flurry of criticism from privacy advocates when it was announced in 2000 during the Clinton administration.
    At the time that Carnivore was shut down, the Electronic Privacy Information Center (EPIC) speculated that, “FBI’s need for Carnivore-like Internet surveillance tools is decreasing, likely because ISPs are providing Internet traffic information directly to the government.”
    Eight years later, it looks like EPIC was right – since it would appear based on the WaPo report that the NSA has been getting info directly from providers.
    I saw the head of the NSA, General Alexander speak at Defcon last year and he’s slotted to speak as a keynote at Black Hat this year. I wonder if he’ll actually show up now given the revelation of PRISM.
    By Sean Michael Kerner | June 06, 2013
    Find this story at 6 June 2013
    Copyright 2013 QuinStreet Inc.

    << oudere artikelen  nieuwere artikelen >>