• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Lockerbie bomber release linked to arms deal, according to secret letter

    The release of the Lockerbie bomber was linked by the Government to a £400 million arms-export deal to Libya, according to secret correspondence obtained by The Sunday Telegraph.

    An email sent by the then British ambassador in Tripoli details how a prisoner transfer agreement would be signed once Libya “fulfils its promise” to buy an air defence system.

    The disclosure is embarrassing for members of the then Labour government, which always insisted that Abdelbaset al-Megrahi’s release was not linked to commercial deals.

    The email, which contained a briefing on the UK’s relations with Colonel Muammar Gaddafi’s regime, was sent on June 8 2008 by Sir Vincent Fean, the then UK ambassador, to Tony Blair’s private office, ahead of a visit soon after he stepped down as prime minister.

    Mr Blair flew to Tripoli to meet Gaddafi on June 10, in a private jet provided by the dictator, one of at least six visits Mr Blair made to Libya after quitting Downing Street.

    The briefing, which runs to 1,300 words, contains revealing details about how keen Britain was to do deals with Gaddafi. It also suggests that:
    Related Articles
    Blair helped Gaddafi in £1bn legal row 04 Aug 2013
    Convicted Lockerbie bomber Megrahi dies in Libya 20 May 2012
    Libya minister says Lockerbie case is ‘closed’ 28 Feb 2013
    Libya: Tony Blair and Gaddafi’s secret meetings 17 Sep 2011
    ‘If Megrahi is sent to Scotland, he will die’ 28 Aug 2011
    Lockerbie bomber al-Megrahi maintains innocence 30 Aug 2011

    • the UK made it a key objective for Libya to invest its £80  billion sovereign wealth fund through the City of London

    • the UK was privately critical of then President George Bush for “shooting the US in the foot” by continuing to put a block on Libyan assets in America, in the process scuppering business deals

    • the Department for International Development was eager to use another Libyan fund worth £130 million to pay for schemes in Sierra Leone and other poverty-stricken countries.

    The release of Megrahi in August 2009 caused a huge furore, with the Government insisting he had been released on compassionate grounds because he was suffering from terminal cancer, and that the decision was taken solely by the Scottish government.

    Megrahi had been convicted in 2001 of the murder of 270 people when PanAm flight 103 from London to New York blew up over Lockerbie in Scotland in 1988. It remains Britain’s single worst terrorist atrocity.

    Libya had been putting pressure on the UK to release Megrahi and in May 2007, just before he left Downing Street, Mr Blair travelled to Sirte to meet Gaddafi and Al-Baghdadi Ali al-Mahmoudi, Libya’s then prime minister.

    At that meeting, according to Sir Vincent’s email, Mr Blair and Mr Baghdadi agreed that Libya would buy the missile defence system from MBDA, a weapons manufacturer part-owned by BAE Systems. The pair also signed a memorandum of understanding (MoU) for a prisoner transfer agreement (PTA), which the Libyans believed would pave the way for Megrahi’s release.

    The British government initially intended the agreement to explicitly exclude Megrahi. However, ministers relented under pressure from Libya.

    In December 2007, Jack Straw, then justice secretary, told his Scottish counterpart that he had been unable to secure an exclusion, but said any application to transfer Megrahi under the agreement would still have to be signed off by Scottish ministers.

    With Mr Blair returning in June 2008 — as a guest of Gaddafi on his private jet — the government appears to have used the chance to press its case for the arms deal to be sealed. At the time, Britain was on the brink of an economic and banking crisis, and Libya, through the Libyan Investment Authority, had billions of pounds in reserves.

    Sir Vincent gave Mr Blair’s office a briefing on the state of relations with Libya. The email suggests that Mr Blair was being used as a conduit.

    Sir Vincent wrote: “There is one bilateral issue which I hope TB [Tony Blair] can raise, as a legacy issue. On 29 May 07 in Sirte, he and Libya’s PM agreed that Libya would buy an air defence system (Jernas) from the UK (MBDA). One year on, MBDA are now back in Tripoli (since 8 June) aiming to agree and sign the contract now — worth £400 million, and up to 2,000 jobs in the UK.

    “Saif [Gaddafi’s son] says they are to come back to conclude; but there is opposition within the Libyan armed forces, from those in the Russian defence equipment camp. We think we have Col Q’s [Gaddafi’s] goodwill for this contract: it would be very helpful if he expressed it more clearly. This issue can also be raised with Libya’s PM, and the Planning Minister. It was PM Baghdadi who told the media on 29 May 07 that Libya would buy British.

    “Linked (by Libya) is the issue of the 4 bilateral Justice agreements about which TB signed an MoU with Baghdadi on 29 May. The MoU says they will be negotiated within the year: they have been. They are all ready for signature in London as soon as Libya fulfils its promise on Jernas.”

    The PTA was signed in November 2008 by Bill Rammell, a foreign office minister.

    Megrahi was diagnosed with prostate cancer and released in August 2009 on compassionate grounds when he was given three months to live. He died in May 2012.

    The Libyans never signed the arms deal, MBDA said yesterday. “MBDA operates, at all times, strictly within the limits of clearly defined export licensing regimes issued by the relevant Government authorities,” a spokesman said.

    “All MBDA’s dealings with Libya were purely commercial and in accordance with the EU directive at the time.”

    The disclosure of the email, which was obtained by The Sunday Telegraph as a result of a Freedom of Information request, angered the relatives of victims of the bombing.

    Pam Dix, whose brother Peter died at Lockerbie, said: “It appears from this email that the British government was making a clear correlation between arms dealing with Libya and the signing of the prisoner transfer agreement.

    “We were told Megrahi’s release was a matter strictly for the Scottish government but this shows the dirty dealing that was going on behind the scenes.”

    Lord Mandelson, who was business secretary when Megrahi was released, said he was unaware of any possible links between commercial deals and negotiations over a release.

    He said: “Based on the information that I was given at the time, I made clear the government’s position. I was not aware of the correspondence covered in this FOI request.”

    Jack Straw, who negotiated the PTA, said no deals were done over Megrahi, and it was always a decision for the Scottish government.

    The email from Sir Vincent also informed Mr Blair on the latest stage of Megrahi’s bid for release, and urged him to fend off any demands that he be sent back. By 2008, Megrahi was appealing against his conviction for mass murder.

    “Col Q may very well raise Megrahi,” wrote Sir Vincent, “Saif [Gaddafi’s son] raised the case … last week. It is now before the Scottish Appeal Court and sub-judice.

    “While the appeal is current, no request to invoke the PTA can be made in that case. Were the appeal to fail and a request for Megrahi’s return to Libya were to be made subsequently, it would be for Scottish ministers to decide on any such request — not a question for HMG [Her Majesty’s Government].”

    A spokesman for Mr Blair said that the prisoner transfer agreements did not relate to Megrahi. The email, he added, did not show “that the UK government was trying to link the defence deal and Megrahi”.

    He said: “Actually it shows the opposite — that any linkage was from the Libyan side.

    “As far as we’re aware there was no linkage on the UK side. What the email in fact shows is that, consistent with what we have always said, it was made clear to the then Libyan leader that the release of Megarahi was a matter for Scotland and was not a matter for Her Majesty’s Government.

    “As we’ve said before, the subjects of the conversations during Mr Blair’s occasional visits was [sic] primarily Africa, as Libya was for a time head of the African Union; but also the Middle East and how Libya should reform and open up.

    “Of course the Libyans, as they always did, raised Megrahi. Mr Blair explained, as he always did, in office and out of it, that it was not a decision for the UK government but for the Scottish Executive [formerly the name for the Scottish government].”

    By Robert Mendick, and Edward Malnick
    9:03PM BST 27 Jul 2013

    Find this story at 27 July 2013

    © Copyright of Telegraph Media Group Limited 2013

    NSA and GCHQ – too close for comfort

    It makes sense for the US and UK to co-operate and share, but payments between the two agencies must mean influence

    ‘One budget report states GCHQ (right) will spend money according to NSA and UK government requirements – in that order.’ Photographs: EPA/NSA; Barry Batchelor/PA

    The intelligence files leaked by the whistleblower Edward Snowden have highlighted two major issues that are specific to Britain. Neither have been welcomed by the government or our security agencies, and most of the political classes are trying to ignore them too. The first involves tactics.

    Thanks to Snowden, we have found out about techniques that have given GCHQ the capability to suck up vast amounts of people’s personal data from the cables that carry the internet in and out of the country.

    The programme, called Tempora, is unquestionably ingenious, but it is underpinned by laws that are outdated and poorly worded.

    Even the most sympathetic of scrutinising bodies – the parliamentary intelligence and security committee (ISC) – has put a question mark over this legislative framework.

    The second issue involves British strategic thinking. The files seen by the Guardian are explicit about the importance of the UK’s relationship with the US, and the desire for GCHQ to be as tightly bound as possible to its US counterpart, the National Security Agency. They will doubtless be welcomed by anyone who believes that the need for a “special relationship” with Washington – which has underpinned UK foreign policy since the second world war – is pre-eminent.

    But in the light of these latest revelations, it is also right to assess the price we are paying for this relationship, and the compromises that come with it.

    Without Snowden, we would not have known that the NSA pays GCHQ tens of millions of pounds a year.

    These are the payments we actually know about – there may be others, because so many of our intelligence projects and programmes are historic and interlinked.

    Yet none of the bodies that have notional responsibility for overseeing the money flowing into and out of GCHQ – the National Audit Office (NAO), the public accounts committee, the ISC – have ever mentioned these sums.

    The NAO and the public accounts committee almost certainly didn’t know about them. It is worth dwelling on this. The US government is paying money to support Britain’s most important intelligence-gathering service. Would this be regarded as normal, or acceptable, in any other institution, such as the police or the military, both of whom work closely with the US?

    And what does the US expect to get from this investment? Quite a bit, seems to be the answer. The influence the NSA has over GCHQ seems considerable. Whether this is down to the money, or the pressure a senior partner in a relationship can bring to bear, is not entirely clear.

    Common sense suggests it’s a mixture of the two. What is clear is this: the Snowden files are littered with remarks from GCHQ senior and middle managers worrying about the NSA “ask” and whether the British agency is doing enough to meet it.

    One budget report states GCHQ will spend money according to NSA and UK government requirements – in that order. Does GCHQ feel compromised by this? If it does, it seems the imperative of keeping close to the Americans is overriding. That appears to be the view of the Cabinet Office too.

    Asked about the NSA payments, the American demands and the concerns that the UK might be vulnerable to being pushed about, the Cabinet Office said: “In a 60-year close alliance it is entirely unsurprising that there are joint projects in which resources and expertise are pooled, but the benefits flow in both directions.”

    It may be entirely unsurprising in Whitehall that our subservience has been institutionalised in this way, but everyone else is entitled to ask whether that makes it healthy or right.

    People are also entitled to ponder whether the price of keeping the Americans so close might involve undertaking some of their “dirty work” – developing intelligence-gathering techniques that are beyond the US legislative and judicial framework, but can be accommodated within ours.

    Critics of the ISC argue it is simply too under-resourced and uncritical to give plausible answers to such questions; and the pronouncements of ministers who sign hundreds of warrants every year are hardly reassuring.

    It would be naive to think that the US and the UK could work – or would want to work – in isolation of each other when its government-class shares many of the same perspectives on the world.

    There are many advantages to sharing intelligence. But sovereignty and independence are important too. The NSA and GCHQ seem deeply enmeshed and interlinked, but the line between the agencies needs to be drawn more clearly.

    Follow Nick Hopkins by emailBeta

    Nick Hopkins
    theguardian.com, Thursday 1 August 2013 16.04 BST

    Find this story at 1 August 2013

    © 2013 Guardian News and Media Limited or its affiliated companies.

    Exclusive: NSA pays £100m in secret funding for GCHQ

    • Secret payments revealed in leaks by Edward Snowden
    • GCHQ expected to ‘pull its weight’ for Americans
    • Weaker regulation of British spies ‘a selling point’ for NSA

    The NSA paid £15.5m towards redevelopments at GCHQ’s site in Bude, north Cornwall, which intercepts communications from the transatlantic cables that carry internet traffic. Photograph: Kieran Doherty/Reuters

    The US government has paid at least £100m to the UK spy agency GCHQ over the last three years to secure access to and influence over Britain’s intelligence gathering programmes.

    The top secret payments are set out in documents which make clear that the Americans expect a return on the investment, and that GCHQ has to work hard to meet their demands. “GCHQ must pull its weight and be seen to pull its weight,” a GCHQ strategy briefing said.

    The funding underlines the closeness of the relationship between GCHQ and its US equivalent, the National Security Agency. But it will raise fears about the hold Washington has over the UK’s biggest and most important intelligence agency, and whether Britain’s dependency on the NSA has become too great.

    In one revealing document from 2010, GCHQ acknowledged that the US had “raised a number of issues with regards to meeting NSA’s minimum expectations”. It said GCHQ “still remains short of the full NSA ask”.

    Ministers have denied that GCHQ does the NSA’s “dirty work”, but in the documents GCHQ describes Britain’s surveillance laws and regulatory regime as a “selling point” for the Americans.

    The papers are the latest to emerge from the cache leaked by the American whistleblower Edward Snowden, the former NSA contractor who has railed at the reach of the US and UK intelligence agencies.

    Snowden warned about the relationship between the NSA and GCHQ, saying the organisations have been jointly responsible for developing techniques that allow the mass harvesting and analysis of internet traffic. “It’s not just a US problem,” he said. “They are worse than the US.”

    As well as the payments, the documents seen by the Guardian reveal:

    • GCHQ is pouring money into efforts to gather personal information from mobile phones and apps, and has said it wants to be able to “exploit any phone, anywhere, any time”.

    • Some GCHQ staff working on one sensitive programme expressed concern about “the morality and ethics of their operational work, particularly given the level of deception involved”.

    • The amount of personal data available to GCHQ from internet and mobile traffic has increased by 7,000% in the past five years – but 60% of all Britain’s refined intelligence still appears to come from the NSA.

    • GCHQ blames China and Russia for the vast majority of cyber-attacks against the UK and is now working with the NSA to provide the British and US militaries with a cyberwarfare capability.

    The details of the NSA payments, and the influence the US has over Britain, are set out in GCHQ’s annual “investment portfolios”. The papers show that the NSA gave GCHQ £22.9m in 2009. The following year the NSA’s contribution increased to £39.9m, which included £4m to support GCHQ’s work for Nato forces in Afghanistan, and £17.2m for the agency’s Mastering the Internet project, which gathers and stores vast amounts of “raw” information ready for analysis.

    The NSA also paid £15.5m towards redevelopments at GCHQ’s sister site in Bude, north Cornwall, which intercepts communications from the transatlantic cables that carry internet traffic. “Securing external NSA funding for Bude has protected (GCHQ’s core) budget,” the paper said.

    In 2011/12 the NSA paid another £34.7m to GCHQ.

    The papers show the NSA pays half the costs of one of the UK’s main eavesdropping capabilities in Cyprus. In turn, GCHQ has to take the American view into account when deciding what to prioritise.

    A document setting out GCHQ’s spending plans for 2010/11 stated: “The portfolio will spend money supplied by the NSA and UK government departments against agreed requirements.”

    Other documents say the agency must ensure there has been “an appropriate level of contribution … from the NSA perspective”.

    The leaked papers reveal that the UK’s biggest fear is that “US perceptions of the … partnership diminish, leading to loss of access, and/or reduction in investment … to the UK”.

    When GCHQ does supply the US with valuable intelligence, the agency boasts about it. In one review, GCHQ boasted that it had supplied “unique contributions” to the NSA during its investigation of the American citizen responsible for an attempted car bomb attack in Times Square, New York City, in 2010.

    No other detail is provided – but it raises the possibility that GCHQ might have been spying on an American living in the US. The NSA is prohibited from doing this by US law.

    Asked about the payments, a Cabinet Office spokesman said: “In a 60-year alliance it is entirely unsurprising that there are joint projects in which resources and expertise are pooled, but the benefits flow in both directions.”

    A senior security source in Whitehall added: “The fact is there is a close intelligence relationship between the UK and US and a number of other countries including Australia and Canada. There’s no automaticity, not everything is shared. A sentient human being takes decisions.”

    Although the sums represent only a small percentage of the agencies’ budgets, the money has been an important source of income for GCHQ. The cash came during a period of cost-cutting at the agency that led to staff numbers being slashed from 6,485 in 2009 to 6,132 last year.

    GCHQ seems desperate to please its American benefactor and the NSA does not hold back when it fails to get what it wants. On one project, GCHQ feared if it failed to deliver it would “diminish NSA’s confidence in GCHQ’s ability to meet minimum NSA requirements”. Another document warned: “The NSA ask is not static and retaining ‘equability’ will remain a challenge for the near future.”

    In November 2011, a senior GCHQ manager working in Cyprus bemoaned the lack of staff devoted to one eavesdropping programme, saying: “This is not sustainable if numbers reduce further and reflects badly on our commitments to the NSA.”

    The overriding necessity to keep on the right side of the US was revealed in a UK government paper that set out the views of GCHQ in the wake of the 2010 strategic defence and security review. The document was called: “GCHQ’s international alliances and partnerships: helping to maintain Britain’s standing and influence in the world.” It said: “Our key partnership is with the US. We need to keep this relationship healthy. The relationship remains strong but is not sentimental. GCHQ must pull its weight and be seen to pull its weight.”

    Astonishingly, the document admitted that 60% of the UK’s high-value intelligence “is based on either NSA end-product or derived from NSA collection”. End product means official reports that are distillations of the best raw intelligence.

    Another pitch to keep the US happy involves reminding Washington that the UK is less regulated than the US. The British agency described this as one of its key “selling points”. This was made explicit two years ago when GCHQ set out its priorities for the coming years.

    “We both accept and accommodate NSA’s different way of working,” the document said. “We are less constrained by NSA’s concerns about compliance.”

    GCHQ said that by 2013 it hoped to have “exploited to the full our unique selling points of geography, partnerships [and] the UK’s legal regime”.

    However, there are indications from within GCHQ that senior staff are not at ease with the rate and pace of change. The head of one of its programmes warned the agency was now receiving so much new intelligence that its “mission management … is no longer fit for purpose”.

    In June, the government announced that the “single intelligence account” fund that pays for GCHQ, MI5 and MI6 would be increased by 3.4% in 2015/16. This comes after three years in which the SIA has been cut from £1.92bn to £1.88bn. The agencies have also been told to make £220m savings on existing programmes.

    The parliamentary intelligence and security committee (ISC) has questioned whether the agencies were making the claimed savings and said their budgets should be more rigorously scrutinised to ensure efficiencies were “independently verifiable and/or sustainable”.

    The Snowden documents show GCHQ has become increasingly reliant on money from “external” sources. In 2006 it received the vast majority of its funding directly from Whitehall, with only £14m from “external” funding. In 2010 that rose to £118m and by 2011/12 it had reached £151m. Most of this comes from the Home Office.

    Follow Julian Borger by emailBeta
    Nick Hopkins and Julian Borger
    The Guardian, Thursday 1 August 2013 16.04 BST

    Find this story at 1 August 2013

    © 2013 Guardian News and Media Limited or its affiliated companies.

    Other Agencies Clamor for Data N.S.A. Compiles

    WASHINGTON — The National Security Agency’s dominant role as the nation’s spy warehouse has spurred frequent tensions and turf fights with other federal intelligence agencies that want to use its surveillance tools for their own investigations, officials say.

    Agencies working to curb drug trafficking, cyberattacks, money laundering, counterfeiting and even copyright infringement complain that their attempts to exploit the security agency’s vast resources have often been turned down because their own investigations are not considered a high enough priority, current and former government officials say.

    Intelligence officials say they have been careful to limit the use of the security agency’s troves of data and eavesdropping spyware for fear they could be misused in ways that violate Americans’ privacy rights.

    The recent disclosures of agency activities by its former contractor Edward J. Snowden have led to widespread criticism that its surveillance operations go too far and have prompted lawmakers in Washington to talk of reining them in. But out of public view, the intelligence community has been agitated in recent years for the opposite reason: frustrated officials outside the security agency say the spy tools are not used widely enough.

    “It’s a very common complaint about N.S.A.,” said Timothy H. Edgar, a former senior intelligence official at the White House and at the office of the director of national intelligence. “They collect all this information, but it’s difficult for the other agencies to get access to what they want.”

    “The other agencies feel they should be bigger players,” said Mr. Edgar, who heard many of the disputes before leaving government this year to become a visiting fellow at Brown University. “They view the N.S.A. — incorrectly, I think — as this big pot of data that they could go get if they were just able to pry it out of them.”

    Smaller intelligence units within the Drug Enforcement Administration, the Secret Service, the Pentagon and the Department of Homeland Security have sometimes been given access to the security agency’s surveillance tools for particular cases, intelligence officials say.

    But more often, their requests have been rejected because the links to terrorism or foreign intelligence, usually required by law or policy, are considered tenuous. Officials at some agencies see another motive — protecting the security agency’s turf — and have grown resentful over what they see as a second-tier status that has undermined their own investigations into security matters.

    At the drug agency, for example, officials complained that they were blocked from using the security agency’s surveillance tools for several drug-trafficking cases in Latin America, which they said might be connected to financing terrorist groups in the Middle East and elsewhere.

    At the Homeland Security Department, officials have repeatedly sought to use the security agency’s Internet and telephone databases and other resources to trace cyberattacks on American targets that are believed to have stemmed from China, Russia and Eastern Europe, according to officials. They have often been rebuffed.

    Officials at the other agencies, speaking only on the condition of anonymity because they were not authorized to discuss the tensions, say the National Security Agency’s reluctance to allow access to data has been particularly frustrating because of post-Sept. 11 measures that were intended to encourage information-sharing among federal agencies.

    In fact, a change made in 2008 in the executive order governing intelligence was intended to make it easier for the security agency to share surveillance information with other agencies if it was considered “relevant” to their own investigations. It has often been left to the national intelligence director’s office to referee the frequent disputes over how and when the security agency’s spy tools can be used. The director’s office declined to comment for this article.

    Typically, the agencies request that the N.S.A. target individuals or groups for surveillance, search its databases for information about them, or share raw intelligence, rather than edited summaries, with them. If those under scrutiny are Americans, approval from the secret Foreign Intelligence Surveillance Court is required.

    The security agency, whose mission is to spy overseas, and the F.B.I., its main partner in surveillance operations, dominate the process as the Justice Department’s main “customers” in seeking warrants from the intelligence court, with nearly 1,800 approved by the court last year.

    In a statement, the security agency said that it “works closely with all intelligence community partners, and embeds liaison officers and other personnel at those agencies for the express purpose of ensuring N.S.A. is meeting their requirements and providing support to their missions.”

    The security agency’s spy tools are attractive to other agencies for many reasons. Unlike traditional, narrowly tailored search warrants, those granted by the intelligence court often allow searches through records and data that are vast in scope. The standard of evidence needed to acquire them may be lower than in other courts, and the government may not be required to disclose for years, if ever, that someone was the focus of secret surveillance operations.

    Decisions on using the security agency’s powers rest on many complicated variables, including a link to terrorism or “foreign intelligence,” the type of surveillance or data collection that is being conducted, the involvement of American targets, and the priority of the issue.

    “Every agency wants to think that their mission has to be the highest priority,” said a former senior White House intelligence official involved in recent turf issues.

    Other intelligence shops usually have quick access to N.S.A. tools and data on pressing matters of national security, like investigating a terrorism threat, planning battlefield operations or providing security for a presidential trip, officials say. But the conflicts arise during longer-term investigations with unclear foreign connections.

    In pressing for greater access, a number of smaller agencies maintain that their cases involve legitimate national security threats and could be helped significantly by the N.S.A.’s ability to trace e-mails and Internet activity or other tools.

    Drug agency officials, for instance, have sought a higher place for global drug trafficking on the intelligence community’s classified list of surveillance priorities, according to two officials.

    Dawn Dearden, a drug agency spokeswoman, said it was comfortable allowing the N.S.A. and the F.B.I. to take the lead in seeking surveillance warrants. “We don’t have the authority, and we don’t want it, and that comes from the top down,” she said.

    But privately, intelligence officials at the drug agency and elsewhere have complained that they feel shut out of the process by the N.S.A. and the F.B.I. from start to finish, with little input on what groups are targeted with surveillance and only sporadic access to the classified material that is ultimately collected.

    Sometimes, security agency and bureau officials accuse the smaller agencies of exaggerating links to national security threats in their own cases when pushing for access to the security agency’s surveillance capabilities. Officials from the other agencies say that if a link to national security is considered legitimate, the F.B.I. will at times simply take over the case itself and work it with the N.S.A.

    In one such case, the bureau took control of a Secret Service investigation after a hacker was linked to a foreign government, one law enforcement official said. Similarly, the bureau became more interested in investigating smuggled cigarettes as a means of financing terrorist groups after the case was developed by the Bureau of Alcohol, Tobacco, Firearms and Explosives.

    Mr. Edgar said officials in the national intelligence director’s office occasionally allow other agencies a role in identifying surveillance targets and seeing the results when it is relevant to their own inquiries. But more often, he acknowledged, the office has come down on the side of keeping the process held to an “exclusive club” at the N.S.A., the F.B.I. and the Justice Department, with help from the Central Intelligence Agency on foreign issues.

    Officials in the national intelligence director’s office worry about opening the surveillance too widely beyond the security agency and the F.B.I. for fear of abuse, Mr. Edgar said. The two intelligence giants have been “burned” by past wiretapping controversies and know the political consequences if they venture too far afield, he added.

    “I would have been very uncomfortable if we had let these other agencies get access to the raw N.S.A. data,” he said.

    As furious as the public criticism of the security agency’s programs has been in the two months since Mr. Snowden’s disclosures, “it could have been much, much worse, if we had let these other agencies loose and we had real abuses,” Mr. Edgar said. “That was the nightmare scenario we were worried about, and that hasn’t happened.”

    Eric Schmitt contributed reporting.

    August 3, 2013
    By ERIC LICHTBLAU and MICHAEL S. SCHMIDT

    Find this story at 3 August 2013

    © 2013 The New York Times Company

    For Western Allies, a Long History of Swapping Intelligence

    BERLIN — When Edward J. Snowden disclosed the extent of the United States data mining operations in Germany, monitoring as many as 60 million of the country’s telephone and Internet connections in one day and bugging its embassy, politicians here, like others in Europe, were by turns appalled and indignant. But like the French before them, this week they found themselves backpedaling.

    In an interview released this week Mr. Snowden said that Germany’s intelligence services are “in bed” with the National Security Agency, “the same as with most other Western countries.” The assertion has added to fresh scrutiny in the European news media of Berlin and other European governments that may have benefited from the enormous American snooping program known as Prism, or conducted wide-ranging surveillance operations of their own.

    The outrage of European leaders notwithstanding, intelligence experts and historians say the most recent disclosures reflect the complicated nature of the relationship between the intelligence services of the United States and its allies, which have long quietly swapped information on each others’ citizens.

    “The other services don’t ask us where our information is from and we don’t ask them,” Mr. Snowden said in the interview, conducted by the documentary filmmaker Laura Poitras and Jacob Appelbaum, a computer security researcher, and published this week in the German magazine Der Spiegel. “This way they can protect their political leaders from backlash, if it should become public how massively the private spheres of people around the globe are being violated.”

    Britain, which has the closest intelligence relationship with the United States of any European country, has been implicated in several of the data operations described by Mr. Snowden, including claims that Britain’s agencies had access to the Prism computer network, which monitors data from a range of American Internet companies. Such sharing would have allowed British intelligence agencies to sidestep British legal restrictions on electronic snooping. Prime Minister David Cameron has insisted that its intelligence services operate within the law.

    Another allegation, reported by The Guardian newspaper, is that the Government Communications Headquarters, the British surveillance center, tapped fiber-optic cables carrying international telephone and Internet traffic, then shared the information with the N.S.A. This program, known as Tempora, involved attaching intercept probes to trans-Atlantic cables when they land on British shores from North America, the report said.

    President François Hollande of France was among the first European leaders to express outrage at the revelations of American spying, and especially at accusations that the Americans had spied on French diplomatic posts in Washington and New York.

    There is no evidence to date that French intelligence services were granted access to information from the N.S.A., Le Monde reported last week, however, that France’s external intelligence agency maintains a broad telecommunications data collection system of its own, amassing metadata on most, if not all, telephone calls, e-mails and Internet activity coming in and out of France.

    Mr. Hollande and other officials have been notably less vocal regarding the claims advanced by Le Monde, which authorities in France have neither confirmed nor denied.

    Given their bad experiences with domestic spying, first under the Nazis and then the former the East German secret police, Germans are touchy when it comes to issues of personal privacy and protection of their personal data. Guarantees ensuring the privacy of mail and all forms of long-distance communications are enshrined in Article 10 of their Constitution.

    When the extent of the American spying in Germany came to light the chancellor’s spokesman, Steffen Seibert, decried such behavior as “unacceptable,” insisting that, “We are no longer in the cold war.”

    But experts say ties between the intelligence services remain rooted in agreements stemming from that era, when West Germany depended on the United States to protect it from the former Soviet Union and its allies in the East.

    “Of course the German government is very deeply entwined with the American intelligence services,” said Josef Foschepoth, a German historian from Freiburg University. Mr. Foschepoth spent several years combing through Germany’s federal archives, including formerly classified documents from the 1950s and 1960s, in an effort to uncover the roots of the trans-Atlantic cooperation.

    In 1965, Germany’s foreign intelligence service, known by the initials BND, was created. Three years later, the West Germans signed a cooperation agreement effectively binding the Germans to an intensive exchange of information that continues up to the present day, despite changes to the agreements.

    The attacks on Sept. 11, 2001, in the United States saw a fresh commitment by the Germans to cooperate with the Americans in the global war against terror. Using technology developed by the Americans and used by the N.S.A., the BND monitors networks from the Middle East, filtering the information before sending it to Washington, said Erich Schmidt-Eenboom, an expert on secret services who runs the Research Institute for Peace Politics in Bavaria.

    In exchange, Washington shares intelligence with Germany that authorities here say has been essential to preventing terror attacks similar to those in Madrid or London. It is a matter of pride among German authorities that they have been able to swoop in and detain suspects, preventing several plots from being carried out.

    By focusing the current public debate in Germany on the issue of personal data, experts say Chancellor Angela Merkel is able to steer clear of the stickier questions about Germany’s own surveillance programs and a long history of intelligence sharing with the United States, which still makes many Germans deeply uncomfortable, more than two decades after the end of the cold war.

    “Every postwar German government, at some point, has been confronted with this problem,” Mr. Foschepoth said of the surveillance scandal. “The way that the chancellor is handling it shows that she knows very well, she is very well informed and she wants the issue to fade away.”

    Reporting contributed by Stephen Castle from London, Scott Sayare from Paris and Eric Schmitt from Washington.

    July 9, 2013
    By MELISSA EDDY

    Find this story at 9 July 2013

    © 2013 The New York Times Company

    Spy access to NZ used as bargaining tool

    The Southern Cross Cable Network links Australia, New Zealand and the United States.

    The ability for US intelligence agencies to access internet data was used as a bargaining tool by a Telecom-owned company trying to keep down the cost of the undersea cable from New Zealand.

    Lawyers acting for Southern Cross Cable quoted a former CIA and NSA director who urged the Senate to “exploit” access to data for an intelligence edge.

    The value of intercepted communications to the US was raised during negotiations last year which could increase internet costs 15 per cent.

    Documents on the Federal Communications Commission website show the issue was raised by lawyers acting for “undersea cable operators”, including Southern Cross Cables, half-owned by Telecom and owner of the 28,900km cable which links New Zealand to the internet.

    Lawyers acting for the cable operators told the FCC there were benefits to their clients not having to pay for their cables to land on US soil.

    The FCC was told the number of internet connections passing through the US was dropping.

    “There has long been speculation that US surveillance following implementation of the Patriot Act could push internet content and information storage outside the United States-to the detriment of the United States.”

    The legal team footnoted the statement with a 2006 quote from former CIA director and National Security Agency director General Michael Hayden, who set up domestic wiretapping and widespread internet snooping during his terms as an intelligence chief.

    He was quoted as saying: “Because of the nature of global telecommunications, we are playing with a tremendous home-field advantage, and we need to exploit that edge.

    “We also need to protect that edge, and we need to protect those who provide it to us.”

    In other documents, Southern Cross Cables raised the possibility of submarine cables coming to land in Canada or Mexico.

    Southern Cross Cables lawyer Nikki Shone said the company was legally obliged to co-operate with US laws and it was in relation to those obligations that “it noted that the FCC’s proposed universal services charges could harm US security interests by encouraging infrastructure to bypass the United States”.

    She said Southern Cross Cable was “wholly unaware of recently disclosed US surveillance programmes”.

    A Telecom spokesman cited the company’s contract with residential customers, which tells them it will pass on their information without permission if it believes it is legally required to do so or if it is necessary “to help maintain the law”.

    Telecom Users Association chief executive Paul Brislen said revelations about US interception of internet traffic meant “we have to assume that all our communications are intercepted”.

    He said internet and telecoms companies had to comply with US rules or be shut out of lucrative contracts.

    Mr Brislen believed the cable from Auckland to Los Angeles was secure but said intelligence agencies would access information beyond the landing stations.

    Tech Liberty director Thomas Beagle said any use of American services and networks exposed data to being captured by the US.

    But shifting to other countries “will just expose you to surveillance from their national governments”.

    “It seems that we now have the choice between taking the time to understand and implement secure encryption or choosing services based on which governments we don’t mind spying on us.”

    By David Fisher @DFisherJourno
    5:30 AM Saturday Aug 10, 2013

    Find this story at 10 August 2013

    © Copyright 2013, APN Holdings NZ Limited

    US spy agencies eavesdrop on Kiwi

    The New Zealand military received help from US spy agencies to monitor the phone calls of Kiwi journalist Jon Stephenson and his associates while he was in Afghanistan reporting on the war.

    Stephenson has described the revelation as a serious violation of his privacy, and the intrusion into New Zealand media freedom has been slammed as an abuse of human rights.

    The spying came at a time when the New Zealand Defence Force was unhappy at Stephenson’s reporting of its handling of Afghan prisoners and was trying to find out who was giving him confidential information.

    The monitoring occurred in the second half of last year when Stephenson was working as Kabul correspondent for the US McClatchy news service and for various New Zealand news organisations.

    The Sunday Star-Times has learned that New Zealand Defence Force personnel had copies of intercepted phone “metadata” for Stephenson, the type of intelligence publicised by US intelligence whistleblower Edward Snowden. The intelligence reports showed who Stephenson had phoned and then who those people had phoned, creating what the sources called a “tree” of the journalist’s associates.

    Advertisement

    New Zealand SAS troops in Kabul had access to the reports and were using them in active investigations into Stephenson.

    The sources believed the phone monitoring was being done to try to identify Stephenson’s journalistic contacts and sources. They drew a picture of a metadata tree the Defence Force had obtained, which included Stephenson and named contacts in the Afghan government and military.

    The sources who described the monitoring of Stephenson’s phone calls in Afghanistan said that the NZSIS has an officer based in Kabul who was known to be involved in the Stephenson investigations.

    And since early in the Afghanistan war, the GCSB has secretly posted staff to the main US intelligence centre at Bagram, north of Kabul. They work in a special “signals intelligence” unit that co-ordinates electronic surveillance to assist military targeting. It is likely to be this organisation that monitored Stephenson.

    Stephenson and the Defence Force clashed in the Wellington High Court two weeks ago after it claimed Stephonson had invented a story about visiting an Afghan base.

    The Human Rights Foundation says Defence Force involvement in monitoring a journalist is an abuse of fundamental human rights.

    “Don’t they understand the vital importance of freedom of the press?” spokesman Tim McBride said. “Independent journalism is especially important in a controversial war zone where the public has a right to know what really happens and not just get military public relations,” he said.

    The news has emerged as the Government prepares to pass legislation which will allow the Defence Force to use the GCSB to spy on New Zealanders.

    The Stephenson surveillance suggests the Defence Force may be seeking the GCSB assistance, in part, for investigating leaks and whistleblowers.

    Stephenson said monitoring a journalist’s communications could also threaten the safety of their sources “by enabling security authorities to track down and intimidate people disclosing information to that journalist”.

    He said there was “a world of difference between investigating a genuine security threat and monitoring a journalist because his reporting is inconvenient or embarrassing to politicians and defence officials”.

    The Star-Times asked Chief of Defence Force Rhys Jones and Defence Minister Jonathan Coleman if they were aware of the surveillance of Stephenson, if they approved of it and whether they authorised the investigation of Stephenson (including the phone monitoring).

    They were also asked if they thought journalists should be classified as threats. Neither answered the questions.

    Defence Force spokesman Geoff Davies said: “As your request relates to a legal matter involving Jon Stephenson which is still before the court, it would not be appropriate for the Chief of Defence Force to comment.”

    In fact, none of the issues before that court relate to the surveillance or security manual.

    Coleman’s press secretary said the minister was not available for comment and to try again next week.

    Green Party co-leader Russel Norman said the monitoring of Stephenson demonstrates that the security services see the media and journalists as a legitimate target.

    “Democracy totally relies on a free and independent press,” he said. “Current attempts to strengthen the security apparatus for monitoring New Zealanders is deeply disturbing and menacing for democracy.”

    An internal Defence document leaked to the Star-Times reveals that defence security staff viewed investigative journalists as “hostile” threats requiring “counteraction”. The classified security manual lists security threats, including “certain investigative journalists” who may attempt to obtain “politically sensitive information”.

    The manual says Chief of Defence Force approval is required before any NZDF participation in “counter intelligence activity” is undertaken. (See separate story)

    Stephenson took defamation action against the Defence Force after Jones claimed that Stephenson had invented a story about visiting an Afghan base as part of an article about mishandling of prisoners.

    Although the case ended with a hung jury two weeks ago, Jones conceded during the hearing that he now accepted Stephenson had visited the base and interviewed its Afghan commander.

    Victoria University lecturer in media studies Peter Thompson said the Afghanistan monitoring and the security manual’s view of investigative journalists confirmed the concerns raised in the High Court case.

    There was “a concerted and deliberate effort to denigrate that journalist’s reputation for political ends”.

    There is currently controversy in the United States over government monitoring of journalists. In May the Associated Press reported that the Justice Department had secretly obtained two months’ worth of phone records of its reporters and editors.

    The media organisation said it was a “massive and unprecedented intrusion” into its news gathering process.

    PROBING JOURNALISTS DEEMED THREAT

    A leaked New Zealand Defence Force security manual reveals it sees three main “subversion” threats it needs to protect itself against: foreign intelligence services, organisations with extreme ideologies and “certain investigative journalists”.

    In the minds of the defence chiefs, probing journalists apparently belong on the same list as the KGB and al Qaeda.

    The manual’s first chapter is called “Basic Principles of Defence Security”. It says a key part of protecting classified information is investigating the “capabilities and intentions of hostile organisations and individuals” and taking counteraction against them.

    The manual, which was issued as an order by the Chief of Defence Force, places journalists among the hostile individuals. It defines “The Threat” as espionage, sabotage, subversion and terrorism, and includes investigative journalists under the heading “subversion”.

    Subversion, it says, is action designed to “weaken the military, economic or political strength of a nation by undermining the morale, loyalty or reliability of its citizens.”

    It highlights people acquiring classified information to “bring the Government into disrepute”.

    This threat came from hostile intelligence services and extreme organisations, and “there is also a threat from certain investigative journalists who may seek to acquire and exploit official information for similar reasons”, it says.

    Viewing journalism as a security threat has serious implications. The manual states that “plans to counter the activities of hostile intelligence services and subversive organisations and individuals must be based on accurate and timely intelligence concerning the identity, capabilities and intentions of the hostile elements”.

    It says “one means of obtaining security intelligence is the investigation of breaches of security”.

    This is where the security manual may be relevant to the monitoring of Jon Stephenson’s phone calls. The Defence Force was unhappy at Stephenson’s access to confidential information about prisoner handling in Afghanistan and began investigating to discover his sources.

    The manual continues that “counter intelligence” means “activities which are concerned with identifying and counteracting the threat to security”, including by individuals engaged in “subversion”.

    It notes: “The New Zealand Security Intelligence Service is the only organisation sanctioned to conduct Counter Intelligence activities in New Zealand. [Chief of Defence Force] approval is required before any NZDF participation in any CI activity is undertaken.”

    Under the NZSIS Act, subversion is a legal justification for surveillance of an individual.

    The sources who described the monitoring of Stephenson’s phone calls in Afghanistan said the NZSIS has an officer based in Kabul who was known to be involved in the Stephenson investigations.

    To reinforce its concern, the defence security manual raises investigative journalists a second time under a category called “non-traditional threats”. The threat of investigative journalists, it says, is that they may attempt to obtain “politically sensitive information”.

    Politically sensitive information, such as the kind of stories that Stephenson was writing, is however about politics and political accountability, not security. Metro magazine editor Simon Wilson, who has published a number of Jon Stephenson’s prisoner stories, said the Defence Force seemed to see Stephenson as the “enemy”, as a threat to the Defence Force.

    “But that’s not how Jon works and how journalism works,” he said. “Jon is just going about his business as a journalist.”

    The New Zealand Defence Force “seems to be confusing national security with its own desire not to be embarrassed by disclosures that reveal it has broken the rules”, he said.

    Last updated 05:00 28/07/2013
    NICKY HAGER

    Find this story at 28 july 2013

    © 2011 Fairfax New Zealand Limited

    Bundesheer-Lauschstation als Teil einer US-Peilkette

    Die Amerikaner finanzierten den Horchposten Königswarte bei Hainburg und banden ihn in ein ganzes Netz ein, das sich von Norwegen über Deutschland bis Italien zog.

    Das österreichische Heeresnachrichtenamt (HNA) und der US-Militärgeheimdienst (NSA) tauschen seit mehr als 50 Jahren Informationen aus. Einer der Angelpunkte der Kooperation ist der Horchposten auf der Königswarte bei Hainburg an der Grenze zur Slowakei. Finanziert haben die Station die Amerikaner. Das bestätigte ein Sprecher des Verteidigungsministeriums bereits in der Samstagsausgabe der „Presse“. Das Nachrichtenmagazin „Profil“ förderte nun weitere Details zutage.
    Redaktionspraktikum 2013

    „Die Presse“ fördert mit Sommerpraktika Nachwuchsjournalisten mit Migrationshintergrund. Jetzt Praktikanten kennenlernen und Wissenswertes erfahren. Weitere Informationen »

    Demnach waren die 1958 errichtete Königswarte und kleinere Stationen in Neulengbach, Großharras, Gols, Pirka bei Graz und Stockham bei Wels Teil einer amerikanischen Peilkette, die sich von Norwegen über Deutschland bis nach Italien zog. Österreich war der einzige neutrale Staat in diesem Nato-Lauschverbund. Die USA haben die immer noch aktive Anlage auf der Königswarte ständig erneuert. Von dort aus konnten vor 1989 Gespräche weit hinter dem Eisernen Vorhang belauscht werden. Jetzt stellt sich die Frage, ob immer noch in dieselbe Richtung gehorcht wird. Wie „Die Presse“ erfuhr, verhalfen die Österreicher der NSA zu Informationen, die 2007 zur Ergreifung einer deutschen Terrorzelle, der Sauerland-Gruppe, geführt haben.

    Mit den abgefangenen Daten hat das Bundesheer laut „Profil“ immer schon wenig anfangen können. Die Bänder seien stets zu einer US-Station nahe Frankfurt geflogen worden. Wie „Die Presse“ berichtete, hat die NSA im Kalten Krieg einen Vertrag mit dem HNA abgeschlossen. In den Nullerjahren, nach den Terroranschlägen vom 11. September 2001, soll das Dokument erneuert und ergänzt worden sein. Das bestätigten mehrere Quellen, sowohl Politiker als auch hochrangige Beamte aus dem Sicherheitsbereich. Das Verteidigungsministerium wollte sich nichtdazu äußern, die US-Botschaft in Wien ebenso wenig, sie betonte jedoch die „sehr gute Kooperation mit dem österreichischen Militär und den österreichischen Nachrichtendiensten“.

    FPÖ-Chef Heinz-Christian Strache forderte Bundeskanzler Faymann und Verteidigungsminister Klug auf, unverzüglich Stellung zum Geheimvertrag mit der NSA zu nehmen. Es müsse überprüft werden, inwieweit die Neutralität verletzt worden sei.

    13.07.2013 | 17:57 | von CHRISTIAN ULTSCH (Die Presse)

    Find this story at 13 July 2013

    © 2013 DiePresse.com

    NSA hat Vertrag mit Österreich abgeschlossen

    Die National Security Agency schloss im Kalten Krieg eine Vereinbarung mit dem Heeresnachrichtenamt und finanzierte dessen Horchposten bei Hainburg. Im Krieg gegen den Terror haben Österreich und die USA das Abkommen erneuert.

    Es ist eines der großen Geheimnisse der Republik, aber wirklich gut gehütet ist es nicht: Das neutrale Österreich hat mit dem US-Nachrichtendienst NSA (National Security Agency) einen Vertrag abgeschlossen. Darin sind die Rahmenbedingungen für die Zusammenarbeit und den Informationsaustausch zwischen der US-Überwachungsbehörde und dem Heeresnachrichtenamt HNaA, dem Auslandsnachrichtendienst des österreichischen Bundesheeres, festgelegt. Seine Wurzeln hat das Dokument im Kalten Krieg, doch nach den Terroranschlägen vom 11. September 2001 hat es der damalige NSA-Direktor, Michael Hayden, erneuern lassen. Das erfuhr „Die Presse“ aus mehreren Quellen: von österreichischen Politikern und hochrangigen Beamten im Sicherheitsbereich.
    Die erste Wahl bei politischer Berichterstattung!

    Für alle, die im Superwahljahr 2013 objektiv und bestens informiert sein wollen, gibt´s jetzt die “Presse” und die “Presse am Sonntag” 8 Wochen um 8 Euro. Weitere Informationen »

    Michael Bauer, der Sprecher des Verteidigungsministeriums, will die Existenz des NSA-Vertrags mit Österreich weder bestätigen noch dementieren: „Ich kann dazu nichts sagen.“ Auch die US-Botschaft in Wien äußert sich nicht zu der Vereinbarung. Sie weist jedoch ausdrücklich auf die „sehr gute Kooperation mit dem österreichischen Militär und den österreichischen Nachrichtendiensten“ hin.
    Minister Klug schweigt

    Die NSA war zuletzt auch Thema im parlamentarischen Unterausschuss für Landesverteidigung. Doch Verteidigungsminister Gerald Klug zog es vor, über den Vertrag zu schweigen. Dass das Heeresnachrichtenamt als Kontaktstelle für die NSA fungiert, ist bekannt. Das Verteidigungsressort hat diesen Umstand nach einem Bericht der „Presse“ vom 13. Juni nicht abgestritten. Damals wie heute betont das Ministerium jedoch, dass das HNaA keinen Massenaustausch von Daten mit anderen Nachrichtendiensten betreibe.

    Wie breit der Fluss österreichischer Daten in die USA ist, darüber gehen die Einschätzungen auseinander. Ein Geheimdienst-Insider gab sich gegenüber der „Presse“ überzeugt, dass die Amerikaner in der Lage sind, jegliche elektronische Kommunikation abzufangen. Allein mithilfe ihres Überwachungsprogramms Prism kann die NSA die Verbindungsdaten jeglichen Internetverkehrs aufzeichnen, der über US-Server läuft. Das gestand der US-Botschafter in Wien bei einem Treffen mit Innenministerin Johanna Mikl-Leitner ein. Nachzuvollziehen ist ihre Empörung nicht ganz. Denn ihr Verfassungsschutz ist im Bild über die Aktivitäten der NSA in Österreich.

    Die Amerikaner sind unglücklich über den Verlauf der Diskussion seit den Enthüllungen des Ex-NSA-Mitarbeiters Snowden. Denn ihre Dienste nehmen nicht nur, sie geben auch. So halfen sie jüngst bei der Befreiung der österreichischen Geisel im Jemen. Umgekehrt lieferte Österreich angeblich Informationen an die NSA, die 2007 zur Ergreifung der Sauerland-Gruppe, einer deutschen Terrorzelle, führten.

    Die Partnerschaft zwischen österreichischen und US-Geheimdiensten reicht lang zurück, in die Zeit, als Europa noch geteilt war. Einer ihrer Brennpunkte war immer die Königswarte, ein Horchposten des Heeresnachrichtenamts bei Hainburg an der Grenze zur Slowakei, dort, wo früher der Eiserne Vorhang verlief. Die Österreicher waren in der Lage, von den niederen Karpaten aus tief in das sowjetische Imperium hineinzuhören. Ihre Informationen teilten sie zuweilen mit den Amerikanern.
    Unterschrieb Platter das Papier?

    Auch 24 Jahre nach Ende des Kalten Kriegs ist die Lauschstation des HNaA noch in Betrieb. Vor einiger Zeit wurde sie erneuert. In Militärkreisen kursieren Gerüchte, dass die teure Ausrüstung auf der Königswarte aus den USA stamme. Unter anderem das sei in einem Appendix zum NSA-Vertrag mit Hayden in den Nullerjahren vereinbart worden. Das Papier soll die Unterschrift von Günther Platter tragen, der 2003 bis 2007 Verteidigungsminister war. Im Büro des heutigen Tiroler Landeshauptmannes will man davon nichts wissen.

    Michael Bauer, der Sprecher des Verteidigungsministeriums, bestreitet, dass die Amerikaner die Renovierung der Königswarte finanziert hätten. Ob sie freilich Equipment zur Verfügung stellten, kann der Oberst nicht sagen. Was er jedoch bestätigen kann, ist für das historische Selbstverständnis Österreichs brisant: „Die Königswarte war zur Zeit des Kalten Krieges ein Vorposten der Amerikaner. Sie haben die Anlage finanziell unterstützt.“ Wirklich neutral agierte Österreich schon damals nicht.

    (“Die Presse” Printausgabe vom 13.07.2013)

    12.07.2013 | 17:08 | VON RAINER NOWAK UND CHRISTIAN ULTSCH (Die Presse)

    Find this story at 12 July 2013

    © 2013 DiePresse.com

    The NSA’s mass and indiscriminate spying on Brazilians

    As it does in many non-adversarial countries, the surveillance agency is bulk collecting the communications of millions of citizens of Brazil
    Follow Glenn Greenwald on security and liberty by emailBeta

    The National Security Administration headquarters in Fort Meade, Maryland. Whistleblower Edward Snowden worked as a data miner for the NSA in Hawaii. Photograph: Jim Lo Scalzo/EPA

    I’ve written an article on NSA surveillance for the front page of the Sunday edition of O Globo, the large Brazilian newspaper based in Rio de Janeiro. The article is headlined (translated) “US spied on millions of emails and calls of Brazilians”, and I co-wrote it with Globo reporters Roberto Kaz and Jose Casado. The rough translation of the article into English is here. The main page of Globo’s website lists related NSA stories: here.

    As the headline suggests, the crux of the main article details how the NSA has, for years, systematically tapped into the Brazilian telecommunication network and indiscriminately intercepted, collected and stored the email and telephone records of millions of Brazilians. The story follows an article in Der Spiegel last week, written by Laura Poitras and reporters from that paper, detailing the NSA’s mass and indiscriminate collection of the electronic communications of millions of Germans. There are many more populations of non-adversarial countries which have been subjected to the same type of mass surveillance net by the NSA: indeed, the list of those which haven’t been are shorter than those which have. The claim that any other nation is engaging in anything remotely approaching indiscriminate worldwide surveillance of this sort is baseless.

    As those two articles detail, all of this bulk, indiscriminate surveillance aimed at populations of friendly foreign nations is part of the NSA’s “FAIRVIEW” program. Under that program, the NSA partners with a large US telecommunications company, the identity of which is currently unknown, and that US company then partners with telecoms in the foreign countries. Those partnerships allow the US company access to those countries’ telecommunications systems, and that access is then exploited to direct traffic to the NSA’s repositories. Both articles are based on top secret documents provided by Edward Snowden; O Globo published several of them.

    The vast majority of the GuardianUS’s revelations thus far have concerned NSA domestic spying: the bulk collection of telephone records, the PRISM program, Obama’s presidential directive that authorizes domestic use of cyber-operations, the Boundless Informant data detailing billions of records collected from US systems, the serial falsehoods publicly voiced by top Obama officials about the NSA’s surveillance schemes, and most recently, the bulk collection of email and internet metadata records for Americans. Future stories in the GuardianUS will largely continue to focus on the NSA’s domestic spying.

    But contrary to what some want to suggest, the privacy rights of Americans aren’t the only ones that matter. That the US government – in complete secrecy – is constructing a ubiquitous spying apparatus aimed not only at its own citizens, but all of the world’s citizens, has profound consequences. It erodes, if not eliminates, the ability to use the internet with any remnant of privacy or personal security. It vests the US government with boundless power over those to whom it has no accountability. It permits allies of the US – including aggressively oppressive ones – to benefit from indiscriminate spying on their citizens’ communications. It radically alters the balance of power between the US and ordinary citizens of the world. And it sends an unmistakable signal to the world that while the US very minimally values the privacy rights of Americans, it assigns zero value to the privacy of everyone else on the planet.

    This development – the construction of a worldwide, ubiquitous electronic surveillance apparatus – is self-evidently newsworthy, extreme, and dangerous. It deserves transparency. People around the world have no idea that all of their telephonic and internet communications are being collected, stored and analyzed by a distant government. But that’s exactly what is happening, in secrecy and with virtually no accountability. And it is inexorably growing, all in the dark. At the very least, it merits public understanding and debate. That is now possible thanks solely to these disclosures.
    The Guardian’s reporting

    One brief note on the Guardian is merited here: I’ve been continuously amazed by how intrepid, fearless and committed the Guardian’s editors have been in reporting these NSA stories as effectively and aggressively as possible. They have never flinched in reporting these stories, have spared no expense in pursuing them, have refused to allow vague and baseless government assertions to suppress any of the newsworthy revelations, have devoted extraordinary resources to ensure accuracy and potency, and have generally been animated by exactly the kind of adversarial journalistic ethos that has been all too lacking over the last decade or so (see this Atlantic article from yesterday highlighting the role played by the Guardian US’s editor-in-chief, Janine Gibson).

    I don’t need to say any of this, but do so only because it’s so true and impressive: they deserve a lot of credit for the impact these stories have had. To underscore that: because we’re currently working on so many articles involving NSA domestic spying, it would have been weeks, at least, before we would have been able to publish this story about indiscriminate NSA surveillance of Brazilians. Rather than sit on such a newsworthy story – especially at a time when Latin America, for several reasons, is so focused on these revelations – they were enthused about my partnering with O Globo, where it could produce the most impact. In other words, they sacrificed short-term competitive advantage for the sake of the story by encouraging me to write this story with O Globo. I don’t think many media outlets would have made that choice, but that’s the kind of journalistic virtue that has driven the paper’s editors from the start of this story.

    This has been a Guardian story from the start and will continue to be. Snowden came to us before coming to any other media outlet, and I’ll continue to write virtually all NSA stories right in this very space. But the O Globo story will resonate greatly in Brazil and more broadly in Latin America, where most people had no idea that their electronic communications were being collected in bulk by this highly secretive US agency. For more on how the Guardian’s editors have overseen the reporting of the NSA stories, see this informative interview on the Charlie Rose Show from last week with Gibson and Guardian editor-in-chief Alan Rusbridger:

    Glenn Greenwald
    theguardian.com, Sunday 7 July 2013 00.32 BST

    Find this story at 7 July 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Brazil wants answers on US surveillance

    Foreign Minister Antonio Patriota is deeply concerned about the scope of a US monitoring programme targeting Brazilians.

    Whistleblower Edward Snowden revealed top secret US surveillance programmes to alert the public [Reuters]

    Brazil’s foreign minister has said his government is worried by a report that the United States has collected data on millions of telephone and email conversations in his country and promised to push for international protection of internet privacy.

    Foreign Minister Antonio Patriota on Sunday expressed “deep concern at the report that electronic and telephone communications of Brazilian citizens are being the object of espionage by organs of American intelligence.

    “The Brazilian government has asked for clarifications” through the US Embassy in Brazil and Brazil’s embassy in Washington, he said.

    Patriota also said Brazil will ask the UN for measures “to impede abuses and protect the privacy” of internet users, laying down rules for governments.

    The O Globo newspaper reported over the weekend that information released by NSA leaker Edward Snowden shows that the number of telephone and email messages logged by the US National Security Agency in January alone was not
    far behind the 2.3 million reportedly collected in the United States.

    The spokesman for the US embassy in Brazil’s capital, Dean Chaves, said earlier that any response to the O Globo report would be issued in Washington.

    There was no immediate response from the office of the US national intelligence director’s office on Sunday, but in response to earlier reports of covert monitoring in Europe, the office said it would respond to concerns of specific nations through diplomatic channels.

    However, “as a matter of policy, we have made clear that the United States gathers foreign intelligence of the type gathered by all nations,” last month’s statement said, without providing further details.

    The chairman of the US Joint Chiefs of Staff warned Sunday that Snowden’s overall disclosures have undermined US relationships with other countries and affected what he calls “the importance of trust”.

    O Globo’s article said that “Brazil, with extensive digitalised public and private networks operated by large telecommunications and internet companies, appears to stand out on maps of the US agency as a priority target for telephony and data traffic, alongside nations such as China, Russia and Pakistan.”

    The report did not describe the sort of data collected, but the US programs appear to gather what is called metadata: Logs of message times, addresses and other information rather than the content of the messages.

    The report was co-authored by US journalist Glenn Greenwald, who has been key in earlier reports on Snowden’s revelations.

    In a column Sunday for the British-based newspaper The Guardian, Greenwald said that “the NSA has, for years, systematically tapped into the Brazilian telecommunication network and indiscriminately intercepted, collected and stored the email and telephone records of millions of Brazilians.”

    He said Brazil was merely an example of a global practice.

    Last Modified: 07 Jul 2013 20:49

    Find this story at 7 July 2013

    © www.aljazeera.com

    XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’

    • XKeyscore gives ‘widest-reaching’ collection of online data
    • NSA analysts require no prior authorization for searches
    • Sweeps up emails, social media activity and browsing history
    • NSA’s XKeyscore program – read one of the presentations

    One presentation claims the XKeyscore program covers ‘nearly everything a typical user does on the internet’

    A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

    The NSA boasts in training materials that the program, called XKeyscore, is its “widest-reaching” system for developing intelligence from the internet.

    The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian’s earlier stories on bulk collection of phone records and Fisa surveillance court oversight.

    The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.

    “I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

    US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”

    But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

    XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as their metadata.

    Analysts can also use XKeyscore and other NSA systems to obtain ongoing “real-time” interception of an individual’s internet activity.

    Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a ‘US person’, though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

    One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst’s ability to query the databases at any time.

    The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a “selector” in NSA parlance) associated with the individual being targeted.

    Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.

    One document notes that this is because “strong selection [search by email address] itself gives us only a very limited capability” because “a large amount of time spent on the web is performing actions that are anonymous.”

    The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.

    Analysts are warned that searching the full database for content will yield too many results to sift through. Instead they are advised to use the metadata also stored in the databases to narrow down what to review.

    A slide entitled “plug-ins” in a December 2012 document describes the various fields of information that can be searched. It includes “every email address seen in a session by both username and domain”, “every phone number seen in a session (eg address book entries or signature block)” and user activity – “the webmail and chat activity to include username, buddylist, machine specific cookies etc”.
    Email monitoring

    In a second Guardian interview in June, Snowden elaborated on his statement about being able to read any individual’s email if he had their email address. He said the claim was based in part on the email search capabilities of XKeyscore, which Snowden says he was authorized to use while working as a Booz Allen contractor for the NSA.

    One top-secret document describes how the program “searches within bodies of emails, webpages and documents”, including the “To, From, CC, BCC lines” and the ‘Contact Us’ pages on websites”.

    To search for emails, an analyst using XKS enters the individual’s email address into a simple online search form, along with the “justification” for the search and the time period for which the emails are sought.

    The analyst then selects which of those returned emails they want to read by opening them in NSA reading software.

    The system is similar to the way in which NSA analysts generally can intercept the communications of anyone they select, including, as one NSA document put it, “communications that transit the United States and communications that terminate in the United States”.

    One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications. Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:

    Chats, browsing history and other internet activity

    Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.

    An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.

    An analyst can monitor such Facebook chats by entering the Facebook user name and a date range into a simple search screen.

    Analysts can search for internet browsing activities using a wide range of information, including search terms entered by the user or the websites viewed.

    As one slide indicates, the ability to search HTTP activity by keyword permits the analyst access to what the NSA calls “nearly everything a typical user does on the internet”.

    The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.

    The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn “call events” collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.

    William Binney, a former NSA mathematician, said last year that the agency had “assembled on the order of 20tn transactions about US citizens with other US citizens”, an estimate, he said, that “only was involving phone calls and emails”. A 2010 Washington Post article reported that “every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications.”

    The XKeyscore system is continuously collecting so much internet data that it can be stored only for short periods of time. Content remains on the system for only three to five days, while metadata is stored for 30 days. One document explains: “At some sites, the amount of data we receive per day (20+ terabytes) can only be stored for as little as 24 hours.”

    To solve this problem, the NSA has created a multi-tiered system that allows analysts to store “interesting” content in other databases, such as one named Pinwale which can store material for up to five years.

    It is the databases of XKeyscore, one document shows, that now contain the greatest amount of communications data collected by the NSA.

    In 2012, there were at least 41 billion total records collected and stored in XKeyscore for a single 30-day period.

    Legal v technical restrictions

    While the Fisa Amendments Act of 2008 requires an individualized warrant for the targeting of US persons, NSA analysts are permitted to intercept the communications of such individuals without a warrant if they are in contact with one of the NSA’s foreign targets.

    The ACLU’s deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans’ communications without individualized warrants.

    “The government doesn’t need to ‘target’ Americans in order to collect huge volumes of their communications,” said Jaffer. “The government inevitably sweeps up the communications of many Americans” when targeting foreign nationals for surveillance.

    An example is provided by one XKeyscore document showing an NSA target in Tehran communicating with people in Frankfurt, Amsterdam and New York.

    In recent years, the NSA has attempted to segregate exclusively domestic US communications in separate databases. But even NSA documents acknowledge that such efforts are imperfect, as even purely domestic communications can travel on foreign systems, and NSA tools are sometimes unable to identify the national origins of communications.

    Moreover, all communications between Americans and someone on foreign soil are included in the same databases as foreign-to-foreign communications, making them readily searchable without warrants.

    Some searches conducted by NSA analysts are periodically reviewed by their supervisors within the NSA. “It’s very rare to be questioned on our searches,” Snowden told the Guardian in June, “and even when we are, it’s usually along the lines of: ‘let’s bulk up the justification’.”

    In a letter this week to senator Ron Wyden, director of national intelligence James Clapper acknowledged that NSA analysts have exceeded even legal limits as interpreted by the NSA in domestic surveillance.

    Acknowledging what he called “a number of compliance problems”, Clapper attributed them to “human error” or “highly sophisticated technology issues” rather than “bad faith”.

    However, Wyden said on the Senate floor on Tuesday: “These violations are more serious than those stated by the intelligence community, and are troubling.”

    In a statement to the Guardian, the NSA said: “NSA’s activities are focused and specifically deployed against – and only against – legitimate foreign intelligence targets in response to requirements that our leaders need for information necessary to protect our nation and its interests.

    “XKeyscore is used as a part of NSA’s lawful foreign signals intelligence collection system.

    “Allegations of widespread, unchecked analyst access to NSA collection data are simply not true. Access to XKeyscore, as well as all of NSA’s analytic tools, is limited to only those personnel who require access for their assigned tasks … In addition, there are multiple technical, manual and supervisory checks and balances within the system to prevent deliberate misuse from occurring.”

    “Every search by an NSA analyst is fully auditable, to ensure that they are proper and within the law.

    “These types of programs allow us to collect the information that enables us to perform our missions successfully – to defend the nation and to protect US and allied troops abroad.”

    Glenn Greenwald
    theguardian.com, Wednesday 31 July 2013 13.56 BST

    Find this story at 31 July 2013

    © 2013 Guardian News and Media Limited or its affiliated companies

    Snooping Fears; German Firms Race to Shield Secrets

    Edward Snowden’s revelations about data surveillance have left German firms feeling acutely vulnerable to industrial espionage. In the medium-sized business sector, which contains a host of world leaders in high-tech fields, the race is on to shield vital know-how.

    Markus Stäudinger is a cautious person — especially when he’s sitting in front of his computer. He’s an IT security expert at Gustav Eirich, a southern German engineering company that makes industrial mixing equipment, and he has been encrypting his emails for years. “While I was typing I always had in the back of my mind that it could still be deciphered,” says Stäudinger, 48. He has tried to entrench that mindset in his company.

    Stäudinger has spent years trying to enhance the security of Eirich’s data and communications. He kept telling colleagues to be careful when dealing with sensitive information. He installed extra security features on notebooks and smartphones before they were taken off company premises. Some of the firm’s 750 employees probably shook their heads at all this paranoia. But now, after the NSA revelations of whistleblower Edward Snowden, they all know that Stäudinger was right. “We were always aware that the intelligence services and business work closely together in the US,” said the IT expert. “When we heard about what’s been going on, it didn’t hit us completely out of the blue.”

    Other companies were taken by surprise, though. Be it Prism, Tempora or XKeyscore, reports about mass electronic surveillance and tapped Internet hubs and trans-Atlantic data lines have alarmed German companies. Many firms are now worried that the intelligence services aren’t just trying to pinpoint terrorists but to get at German industrial secrets as well. They fear that their lead over US, British and French competitors could be at risk. And they’ve suddenly realized that they’ve got to do something to protect themselves against the organized theft of data.

    “The reports of the activities of intelligence services are a wake-up call for many companies. It sent alarm bells ringing,” said Rainer Glatz, director of product and know-how protection at the VDMA German engineering association. In the past, warnings of hacker attacks and IT espionage often fell on deaf ears. But now Germany’s small and medium-sized business sector, or Mittelstand, often described as the backbone of the German economy, has woken up to the risk. “There is growing sensitivity,” said Glatz. “In many firms, the management boards are now thinking about how they can shield themselves better.”

    Spying Causes Billions of Euros in Damage

    Action is urgently needed. At most, only one in four Mittelstand firms has an IT security strategy, said Christian Schaaf, founder of the Munich-based consultancy Corporate Trust. Many have limited themselves to a simple firewall and a few anti-virus programs. But that’s not enough to keep out professional hackers, let alone the likes of the NSA. “Many companies are starting to realize that they have to cast a safety net over their data,” said Schaaf.

    There’s plenty to spy on in the Mittelstand, with its thousands of high-tech businesses, ranging from newly developed products to production processes and process control systems, as well as customer lists and price offers in contract tenders. Germany’s domestic intelligence agency, the Office for the Protection of the Constitution, estimates that industrial espionage causes damage totalling between €30 billion and €60 billion ($40 billion to $80 billion) per year. No one knows the exact figure because companies in Germany and across Europe tend to keep quiet when they find out they have been spied on. There are a number of reasons for this: They’re afraid of copycat espionage, they don’t want to reveal to potential new attackers where their weak points are and what they’re doing to protect themselves. And they’re afraid that they may lose customers if their data leaks become public.

    Engineering company Gustav Eirich would be worth spying on. The 150-year-old, family-owned business from Hardheim in the Odenwald region of southern Germany is among the world leaders in its field. Eirich’s machines can mix chemicals and all sorts of materials faster, more thoroughly and more efficiently than those of its international competitors. This is thanks to a host of inventions and innovations that the company has had patented. “Our know-how is our big competitive advantage,” said security chief Stäudinger. And Eirich is doing all it possibly can to protect that lead.

    Possible Boost For German Data Security Firms

    The company refrains from storing information in foreign data processing centers. Video conferences, data transmission and emails — Eirich handles all that via its own cloud server. Skype is forbidden, and the use of Facebook is discouraged. All staff members are given clear instructions to avoid any unintentional releases of sensitive data. As a rule, the company encrypts all emails it sends outside the firm, if the clients go along with that, and they use German software to do the encrypting. “With US programs the intelligence agency will definitely have the general key,” said Stäudinger. “That’s why we try to use domestic products whenever we can.” In Germany, security authorities usually don’t get access to the algorhythms of firms that offer encryption.

    Germany’s comparatively strict rules on data privacy protection represent a possible competitive advantage for German suppliers of IT security. Data processing centers based in Germany have been enjoying a strong increase in demand of late, said Gatz, VDMA’s IT security expert. Providers of private clouds such as Demando, a subsdiary of the Kaiserslautern municipal utility company, offer their customers their own server cabinets and can even make exclusive glass fiber lines available to them so that they don’t have to send sensitive data through the Internet.

    However, even such lines can be tapped into, and almost every encryption code can be cracked. “You can never guarantee 100 percent security,” said Stäudinger. “We know there’s a residual risk. But we set the hurdles as high as possible.” Maybe that will make potential attackers seek easier targets: among companies with less distrustful security chiefs.

    07/23/2013 06:04 PM
    By Claus Hecking

    Find this story at 23 July 2013

    © SPIEGEL ONLINE 2013

    Ghosts of the NSA Relics of Cold War Spying Dot Germany

    The National Security Agency has long been active in Germany, though much of its spying was conducted against the Eastern Bloc during the Cold War. Today, former listening stations and other facilities dot the German landscape.

    Tracking down traces of the National Security Agency in Germany isn’t particularly difficult. One merely has to head to Berlin and look for the city’s highest point. It can be found in the southwest corner of the city — Teufeslberg, or “Devil’s Mountain.” Made of piled up rubble gathered from Berlin following World War II, the “mountain” rises 115 meters (377 feet) above the nearby waterway known as the Havel.

    In the winter, it is the place where Berliners meet to sled; in the summer it is a haven for mountain bikers and daytrippers. And hobby historians: At the very top of the hill stands the most famous NSA relict in Germany — five gigantic white radar balls. The listening station was used until the end of the Cold War, primarily to spy on the east.

    Teufelsberg used to be part of the NSA’s global espionage network called Echelon, which the US intelligence service used to keep an eye on Moscow. From 1957 to 1991, the NSA maintained a presence on Teufelsberg and eavesdropped on satellite-based telephone conversations, filtered fax reports and analyzed Internet datasets. The NSA was still doing all that in 2013, as SPIEGEL recently reported, but it no longer requires the massive radar towers.

    Desolate and in Disrepair

    Today, the artificial hill looks desolate. When the Americans withdrew, the listening station began to fall into disrepair. The covering on the radomes is torn in many places, and inside the facility weeds are growing out of the debris.

    But it’s not just weather and age that have led the buildings to deteriorate. Shortly after the turn of the century, the government of the city-state of Berlin decided that guarding the empty facility had become too expensive. It then became the target of regular break-ins and vandalism. Rotraud von der Heide, an artist and the curator of the Initiative Teufelsberg, a group seeking to preserve the facility, says, “the facility is totally destroyed because private owners weren’t able to carry out their construction plans, and now the building permits have expired. For the past year-and-a-half, two young people have been leasing it.” Originally, a conference hotel had been envisioned for the site, but those plans ultimately failed.

    Those leasing the site are now responsible for security at the facility. Using revenues generated through frequent tours, they are financing the constant repairs required for the fence surrounding property. “New holes are cut in the fence every night, and we turn trespassers over to the police,” said von der Heide. “Earlier, people had parties in the facility. There were also copper thieves who ripped wires out of the walls. That’s no longer possible now.”

    Big Plans

    The initiative has big plans for the hill. During Germany’s “Day of Open Monuments,” in September, they plan to open the former listening station to the public for three days.

    By then, von der Heide plans to completely transform the area into one giant artwork. “The hill is becoming more and more fantastic. It’s a magical art space that is constantly changing,” the artist says. That’s also a product of anonymous graffiti artists whose paintings cover the massive walls and the insides of the radomes, she says.

    A second NSA listening station in Germany, located some 200 kilometers to the west — represents the opposite extreme. Whereas the Teufelsberg radomes were difficult to ignore, the facility in Schöningen, near Braunschweig, was more hidden. Mayor Henry Bäsecke says that there was an American facility in the nearby forest consisting of “containers and large antennas. But the facility has since been torn down. “There’s nothing left here, and nature is slowly reconquering the property,” Bäsecke says.

    At Least 17 Surveillance Hubs at Cold War Peak

    Some 50 kilometers south of Munich is yet another listening post of note. Bad Aibling the southernmost facility in a chain of such espionage centers operated in Germany by US intelligence agencies. In 1989, shortly before the end of the Cold War, SPIEGEL counted 17 such surveillance hubs. But it’s a figure that may have been even higher. The network extended from the town of Schleswig near the Danish border right down to the edge of the Alps. Most of the facilities were located close to the former border between West and East Germany, as close as possible to the enemy.

    In Bad Aibling, the outsized radomes of the disused listening station also dominate the landscape. In 2004, the Americans left, but Germany’s foreign intelligence agency, the BND, continues to operate nearby. The 17,000 resident city is hard at work transforming the 134 hectare (331 acre) property for civilian use. The community has already turned a small part of the property into sporting facilities, Peter Schmid of the city administration says. Here, local teams play football in the shadows of the radomes. The rest is to be built up by a property developer, with plans for a zero-energy settlement to be constructed.

    Still, the area’s eventful history hasn’t been forgotten. Since 2009, it has hosted an annual electro- and house-music festival that attracted 17,000 fans last year to revel between the radar towers and a former aircraft hangar. The name of the two-day festival recalls the American spy network: The Echelon festival.

    07/05/2013 03:24 PM
    By Johannes Korge

    Find this story at 5 July 2013

    © SPIEGEL ONLINE 2013

    „Prism ist nur die Spitze des Eisbergs“ NSA-Mitarbeiter: BND nutzt seit den 90ern Spähsoftware

    Eine Kuppel der ehemaligen Abhörstation der NSA auf dem Teufelsberg in Berlin
    Der BND und der US-Geheimdienst NSA arbeiten offenbar bereits 20 Jahre bei der Datenspionage zusammen. Einem Medienbericht zufolge wurden entsprechende Spähprogramme schon früher geteilt. Auch Kanzlerin Merkel könnte ausspioniert worden sein.
    Die Zusammenarbeit des Bundesnachrichtendienstes BND und der amerikanischen National Security Agency (NSA) bei der Nutzung von Spähsoftware war offenbar schon in den 1990er-Jahren intensiver als bislang bekannt. In einem Gespräch mit dem Magazin „Stern“ sagte der langjährige NSA-Mitarbeiter William Binney, der BND habe neben „Xkeyscore“ noch ein weiteres NSA-Ausspähprogramm genutzt. Der Entschlüsselungsspezialist arbeitete mehr als 30 Jahre in leitender Funktion bei der NSA und war viele Jahre auch für die technische Zusammenarbeit mit dem BND zuständig.

    Laut Binney soll die Zusammenarbeit im Bereich der Spähsoftware bereits Anfang der 1990er-Jahre begonnen haben. 1999 habe der BND von der NSA den Quellcode zum damals entwickelten Spähprogramm „Thin Thread“ erhalten. „Thin Thread“ sollte die Erfassung und Analyse von Verbindungsdaten wie Telefondaten, E-Mails oder Kreditkartenrechnungen weltweit ermöglichen. „Mein Ziel war es, den Datenverkehr der ganzen Welt zu erfassen“, sagte Binney dem „Stern“. Der BND sei „bis heute einer unserer wichtigsten Partner“.

    Mindestens 50 Spähprogramm lieferten Daten
    Auf der Basis von „Thin Thread“ sei eine Vielzahl von Abhör- und Spähprogrammen entwickelt worden. Eines der wichtigsten davon soll das Dachprogramm „Stellar Wind“ sein, dem nach Angaben von Binney mindestens 50 Spähprogramme Daten zugeliefert haben – auch die durch Edward Snowden bekannt gewordene Software „Prism“ zur direkten Erfassung von Telefon- und Internetdaten bei Telekommunikationsunternehmen.

    „Stellar Wind“ sei mindestens bis 2009, möglicherweise auch bis 2011 im Einsatz gewesen. Es werde heute wahrscheinlich unter anderem Namen fortgeführt, so Binney gegenüber dem Magazin.

    Nach Schätzungen von Binney speichert die NSA mittlerweile zwischen 40 und 50 Billionen Telefonate und E-Mails aus der ganzen Welt, vor allem Verbindungsdaten, aber auch Inhalte. Das von der NSA zurzeit gebaute Datenzentrum in Bluffdale im US-Bundesstaat Utah könne aufgrund seiner Kapazitäten „mindestens 100 Jahre der globalen Kommunikation speichern“, sagte Binney dem „Stern“. „Dieser Ort sollte uns endgültig in Angst und Schrecken versetzen. Die NSA will alles. Jederzeit.“ Er fügte hinzu: „Diese Macht gefährdet unsere Demokratie.“

    Regierungskommunikation im Visier der NSA
    Neben William Binney äußerten sich im „Stern“ zwei weitere ehemalige ranghohe NSA-Mitarbeiter, die zu Whistleblowern wurden: J. Kirk Wiebe, der für die Datenanalyse zuständig war, und Thomas Drake, der zur Führungsebene des Geheimdienstes gehörte. Binney trat im Oktober 2001 aus Protest gegen die NSA-Spähprogramme unter der Regierung von George W. Bush von seinem Posten zurück.
    Die Ex-Geheimdienstler halten es für möglich, dass selbst Daten von Kanzlerin Angela Merkels Handy auf den Servern der NSA landen. „Prism ist nur die Spitze des Eisbergs“, so Drake gegenüber dem „Stern“. „Ihre Kanzlerin könnte sich einmal für das Programm „Ragtime“ interessieren. Es dient unter anderem der Abschöpfung von Regierungskommunikation durch die NSA“. Auch Binney hält das Ausspionieren von Merkels Verbindungsdaten für nicht ausgeschlossen. „Ich würde sogar sagen, dass es durchaus möglich ist“, sagte er dem Magazin.

    Mittwoch, 24.07.2013, 16:59

    Find this story at 24 July 2013

    © FOCUS Online 1996-2013

    << oudere artikelen  nieuwere artikelen >>