• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • The ex-FBI informant with a change of heart: ‘There is no real hunt. It’s fixed’

    Craig Monteilh describes how he pretended to be a radical Muslim in order to root out potential threats, shining a light on some of the bureau’s more ethically murky practices

    Craig Monteilh: ‘It is all about entrapment.’ Photograph: The Washington Post

    Craig Monteilh says he did not balk when his FBI handlers gave him the OK to have sex with the Muslim women his undercover operation was targeting. Nor, at the time, did he shy away from recording their pillow talk.

    “They said, if it would enhance the intelligence, go ahead and have sex. So I did,” Monteilh told the Guardian as he described his year as a confidential FBI informant sent on a secret mission to infiltrate southern Californian mosques.

    It is an astonishing admission that goes to the heart of the intelligence surveillance of Muslim communities in America in the years after 9/11. While police and FBI leaders have insisted they are acting to defend America from a terrorist attack, civil liberties groups have insisted they have repeatedly gone too far and treated an entire religious group as suspicious.

    Monteilh was involved in one of the most controversial tactics: the use of “confidential informants” in so-called entrapment cases. This is when suspects carry out or plot fake terrorist “attacks” at the request or under the close supervision of an FBI undercover operation using secret informants. Often those informants have serious criminal records or are supplied with a financial motivation to net suspects.

    In the case of the Newburgh Four – where four men were convicted for a fake terror attack on Jewish targets in the Bronx – a confidential informant offered $250,000, a free holiday and a car to one suspect for help with the attack.

    In the case of the Fort Dix Five, which involved a fake plan to attack a New Jersey military base, one informant’s criminal past included attempted murder, while another admitted in court at least two of the suspects later jailed for life had not known of any plot.

    Such actions have led Muslim civil rights groups to wonder if their communities are being unfairly targeted in a spying game that is rigged against them. Monteilh says that is exactly what happens. “The way the FBI conducts their operations, It is all about entrapment … I know the game, I know the dynamics of it. It’s such a joke, a real joke. There is no real hunt. It’s fixed,” he said.

    But Monteilh has regrets now about his involvement in a scheme called Operation Flex. Sitting in the kitchen of his modest home in Irvine, near Los Angeles, Monteilh said the FBI should publicly apologise for his fruitless quest to root out Islamic radicals in Orange County, though he does not hold out much hope that will happen. “They don’t have the humility to admit a mistake,” he said.

    Monteilh’s story sounds like something out of a pulp thriller. Under the supervision of two FBI agents the muscle-bound fitness instructor created a fictitious French-Syrian alter ego, called Farouk Aziz. In this disguise in 2006 Monteilh started hanging around mosques in Orange County – the long stretch of suburbia south of LA – and pretended to convert to Islam.

    He was tasked with befriending Muslims and blanket recording their conversations. All this information was then fed back to the FBI who told Monteilh to act like a radical himself to lure out Islamist sympathizers.

    Yet, far from succeeding, Monteilh eventually so unnerved Orange County’s Muslim community that that they got a restraining order against him. In an ironic twist, they also reported Monteilh to the FBI: unaware he was in fact working undercover for the agency.

    Monteilh does not look like a spy. He is massively well built, but soft-spoken and friendly. He is 49 but looks younger. He lives in a small rented home in Irvine that blends into the suburban sprawl of southern California. Yet Monteilh knows the spying game intimately well.

    By his own account Monteilh got into undercover work after meeting a group of off-duty cops working out in a gym. Monteilh told them he had spent time in prison in Chino, serving time for passing fraudulent checks.

    It is a criminal past he explains by saying he was traumatised by a nasty divorce. “It was a bad time in my life,” he said. He and the cops got to talking about the criminals Monteilh had met while in Chino. The information was so useful that Monteilh says he began to work on undercover drug and organised crime cases.

    Eventually he asked to work on counter-terrorism and was passed on to two FBI handlers, called Kevin Armstrong and Paul Allen. These two agents had a mission and an alias ready-made for him.

    Posing as Farouk Aziz he would infiltrate local mosques and Islamic groups around Orange County. “Paul Allen said: ‘Craig, you are going to be our computer worm. Our guy that gives us the real pulse of the Muslim community in America’,” Monteilh said.

    The operation began simply enough. Monteilh started hanging out at mosques, posing as Aziz, and explaining he wanted to learn more about religion. In July, 2006, at the Islamic Center of Irvine, he converted to Islam.

    Monteilh also began attending other mosques, including the Orange County Islamic Foundation. Monteilh began circulating endlessly from mosque to mosque, spending long days in prayer or reading books or just hanging out in order to get as many people as possible to talk to him.

    “Slowly I began to wear the robes, the hat, the scarf and they saw me slowly transform and growing a beard. At that point, about three or four months later, [my FBI handlers] said: ‘OK, now start to ask questions’.”

    Those questions were aimed at rooting out radicals. Monteilh would talk of his curiosity over the concepts of jihad and what Muslims should do about injustices in the world, especially where it pertained to American foreign policy.

    He talked of access to weapons, a possible desire to be a martyr and inquired after like-minded souls. It was all aimed at trapping people in condemning statements. “The skill is that I am going to get you to say something. I am cornering you to say “jihad”,” he said.

    Of course, the chats were recorded.

    In scenes out of a James Bond movie, Monteilh said he sometimes wore a secret video recorder sewn into his shirt. At other times he activated an audio recorder on his key rings.

    Monteilh left his keys in offices and rooms in the mosques that he attended in the hope of recording conversations that took place when he was not there. He did it so often that he earned a reputation with other worshippers for being careless with his keys. The recordings were passed back to his FBI handlers at least once a week.

    He also met with them every two months at a hotel room in nearby Anaheim for a more intense debriefing. Monteilh says he was grilled on specific individuals and asked to view charts showing networks of relationships among Orange County’s Muslim population.

    He said the FBI had two basic aims. Firstly, they aimed to uncover potential militants. Secondly, they could also use any information Monteilh discovered – like an affair or someone being gay – to turn targeted people into becoming FBI informants themselves.

    None of it seemed to unnerve his FBI bosses, not even when he carried out a suggestion to begin seducing Muslim women and recording them.

    At one hotel meeting, agent Kevin Armstrong explained the FBI attitude towards the immense breadth of Operation Flex – and any concerns over civil rights – by saying simply: “Kevin is God.”

    Monteilh’s own attitude evolved into something very similar. “I was untouchable. I am a felon, I am on probation and the police cannot arrest me. How empowering is that? It is very empowering. You began to have a certain arrogance about it. It is almost taunting. They told me: ‘You are an untouchable’,” he said.

    But it was not always easy. “I started at 4am. I ended at 9.30pm. Really, it was a lot of work … Farouk took over. Craig did not exist,” he said. But it was also well paid: at the peak of Operation Flex, Monteilh was earning more than $11,000 a month.

    But he was wrong about being untouchable.

    Far from uncovering radical terror networks, Monteilh ended up traumatising the community he was sent into. Instead of embracing calls for jihad or his questions about suicide bombers or his claims to have access to weapons, Monteilh was instead reported to the FBI as a potentially dangerous extremist.

    A restraining order was also taken out against him in June 2007, asking him to stay away from the Islamic Center of Irvine. Operation Flex was a bust and Monteilh had to kill off his life as Farouk Aziz.

    But the story did not end there. In circumstances that remain murky Monteilh then sued the FBI over his treatment, claiming that they abandoned him once the operation was over.

    He also ended up in jail after Irvine police prosecuted him for defrauding two women, including a former girlfriend, as part of an illegal trade in human growth hormone at fitness clubs. (Monteilh claims those actions were carried out as part of another secret string operation for which he was forced to carry the can.)

    What is not in doubt is that Monteilh’s identity later became public. In 2009 the FBI brought a case against Ahmad Niazi, an Afghan immigrant in Orange County.

    The evidence included secret recordings and even calling Osama bin Laden “an angel”. That was Monteilh’s work and he outed himself to the press to the shock of the very Muslims he had been spying on who now realised that Farouk Aziz – the radical they had reported to the FBI two years earlier – had in fact been an undercover FBI operative.

    Now Monteilh says he set Niazi up and the FBI was trying to blackmail the Afghani into being an informant. “I built the whole relationship with Niazi. Through my coercion we talked about jihad a lot,” he said. The FBI’s charges against Niazi were indeed later dropped.

    Now Monteilh has joined an American Civil Liberties Union lawsuit against the FBI. Amazingly, after first befriending Muslim leaders in Orange County as Farouk Aziz, then betraying them as Craig Monteilh, he has now joined forces with them again to campaign for their civil liberties.

    That has now put Monteilh’s testimony about his year undercover is at the heart of a fresh legal effort to prove that the FBI operation in Orange County unfairly targeted a vulnerable Muslim community, trampling on civil rights in the name of national security.

    The FBI did not respond to a request from the Guardian for comment.

    It is not the first time Monteilh has shifted his stance. In the ACLU case Monteilh is now posing as the sorrowful informant who saw the error of his ways.

    But in previous court papers filed against the Irvine Police and the FBI, Monteilh’s lawyers portrayed him as the loyal intelligence asset who did sterling work tackling the forces of Islamic radicalism and was let down by his superiors.

    In those papers Monteilh complained that FBI agents did not act speedily enough on a tip he gave them about a possible sighting of bomb-making materials. Now Monteilh says that tip was not credible.

    Either way it does add up to a story that shifts with the telling. But that fact alone goes to the heart of the FBI’s use of such confidential informants in investigating Muslim communities.

    FBI operatives with profiles similar to Monteilh’s – of a lengthy criminal record, desire for cash and a flexibility with the truth – have led to high profile cases of alleged entrapment that have shocked civil rights groups across America.

    In most cases the informants have won their prosecutions and simply disappeared. Monteilh is the only one speaking out. But whatever the reality of his year undercover, Monteilh is almost certainly right about one impact of Operation Flex and the exposure of his undercover activities: “Because of this the Muslim community will never trust the FBI again.”

    Paul Harris in Irvine, California
    guardian.co.uk, Tuesday 20 March 2012 16.50 GMT

    Find this story at 20 March 2012

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Editor of The Progressive Calls for Eric Holder to Resign over Spying on Press, Occupy Protesters

    As the Obama administration faces criticism for the Justice Department’s spying on journalists and the IRS targeting of right-wing organizations, newly released documents show how the FBI, the Department of Homeland Security and local police forces partnered with corporations to spy on Occupy protesters in 2011 and 2012. Detailed in thousands of pages of records from counter terrorism and law enforcement agencies, the spying monitored the activists’ online usage and led to infiltration of their meetings. One document shows an undercover officer was dispatched in Arizona to infiltrate activists organizing protests around the American Legislative Exchange Council (ALEC), the secretive group that helps corporate America propose and draft legislation for states across the country. We’re joined by Matt Rothschild of The Progressive, who tackles the surveillance in his latest article, “Spying on Occupy Activists: How Cops and Homeland Security Help Wall Street.”

    Watch Part Two of interview here
    Transcript

    This is a rush transcript. Copy may not be in its final form.

    NERMEEN SHAIKH: We end our show with a look at newly revealed documents showing how police partnered with corporations to monitor the Occupy Wall Street movement. DBA Press and the Center for Media and Democracy have obtained thousands of pages of records from counterterrorism and law enforcement agencies that detail how so-called “fusion centers” monitored the Occupy Wall Street movement over the course of 2011 and 2012. These fusion centers are comprised of employees from municipal, county and federal counterterrorism and homeland security entities, as well as local police departments, the FBI and the Department of Homeland Security.

    The documents show how fusion center personnel spied on Occupy protesters, monitored their Facebook accounts, and infiltrated their meetings. One document showed how the Arizona fusion center dispatched an undercover officer to infiltrate activist groups organizing protests around the American Legislative Exchange Council, or ALEC, the secretive group that helps corporate America propose and draft legislation for states across the country. The undercover officer apparently worked for the benefit of the private entity ALEC despite being on the public payroll.

    AMY GOODMAN: Democracy Now! reached out to the Phoenix Police Department to join us on the show, but they declined our request. Sergeant Trent Crump in the media relations department said in an email, quote, “Occupy Phoenix presented itself with a great deal of civil unrest over a long period of time. We monitored available Intel all the time, as it is used for Intel-driven policing. Intel dictated resources and response tactics to address, mitigate, and manage this ongoing activity which was very fluid and changing day-to-day. This approach ensured that citizens can exercise their civil rights, while we protect the community at the same time,” they said.

    Well, for more, we go to Matt Rothschild, editor and publisher of The Progressive magazine, wrote the cover story for the June issue of the magazine, “Spying on Occupy Activists: How Cops and Homeland Security Help Wall Street,” the piece drawing heavily on the documents obtained by the Center for Media and Democracy and DBA Press. Matt Rothschild is also the author of You Have No Rights: Stories of America in an Age of Repression.

    Matt, welcome to Democracy Now! Just lay out what you have found.

    MATTHEW ROTHSCHILD: Hey, Amy. Thanks for having me on.

    Yeah, I mean, these documents from the Center for Media and Democracy and DBA Press show that law enforcement and Homeland Security have equated protesters, left-wing protesters, as terrorists. They have diverted enormous amounts of resources from counterterrorism efforts to spy on these local protesters, and then they’ve collaborated with the private sector, some of the very institutions—banks—that these protesters were aiming at. And as you read in that statement from the Phoenix Police Department, the effort was to mitigate these protests. I mean, why is law enforcement, why is Homeland Security, in the business of mitigating protests?

    NERMEEN SHAIKH: Well, I want to go to a response that we received from the Phoenix Police Department when we reached them for comment. And they said that they were not treating Occupy protesters as potential terrorists. They said, “[W]e are an all hazards incident management team, we have gathered information at all types of events [such as] Superbowl, World Series, SB 1070 protest etc.” So can you say how it is that their monitoring of Occupy protesters differed qualitatively from the other events that the Phoenix Police Department named?

    MATTHEW ROTHSCHILD: Sure. Well, they’re using resources from the Arizona Counter Terrorism Information Center, the Arizona fusion center, and they’re using Homeland Defense personnel in the Phoenix Police Department to track Occupy activists. So, it’s a little disingenuous of them to say they’re not treating these protesters as terrorists when they’re using their own anti-terrorist personnel to spend a lot of time simply tracking these activists. One of the police officers who was on the Homeland Defense Bureau of the Phoenix Police Department said she was primarily spending her time tracking Occupy activists on social media.

    AMY GOODMAN: We also asked the Phoenix police if law enforcement is infiltrating Occupy meetings. And he replied, quote, “Infiltrate? No. Attend open meetings? Yes.” Democracy Now! also asked Trent Crump if law enforcement tracked Occupy activists online. He replied, “Yes, we gather intel on a number of social media sites regularly.” So, what about this? And also, this issue of law enforcement monitoring the protests against ALEC, the American Legislative Exchange Council, when we asked him this, he said, “Yes, public safety.” Your response?

    MATTHEW ROTHSCHILD: Well, they not only monitored the ALEC protests in late November 2011, but they also sent a face sheet to the security personnel for ALEC, a face sheet of the faces and names and identities of Occupy protesters who have been doing some activism in the Phoenix area, to make the ALEC security personnel aware of who may be coming to their protests. They were also tracking—

    AMY GOODMAN: So the police are working with the companies and the organizations.

    MATTHEW ROTHSCHILD: Absolutely. Yeah, they were working with security for the American Legislative Exchange Council. They were also letting security know when Jesse Jackson was going to be in town to join an Occupy protest and an ALEC protest. Is that really their job to be passing information on to these private entities?

    And then, with some of the bank protests that Occupy Phoenix was planning, they were giving downtown banks all sorts of information. “Give downtown banks everything they need.” That was one internal memo from the Phoenix Police Department, when it was a day of protest against these banks and Occupy was urging the bank customers to cut up their credit cards from these banks. And which banks are we talking about? We’re talking about Bank of America, Wells Fargo, Chase—some of the very targets that Occupy had been protesting against. So, the question is: Who are the police department working for? Are they working for citizens? Are they working for the private sector? Are they working for the banks?

    NERMEEN SHAIKH: Can you put—Matt Rothschild, can you put this in a wider historical context? Is this kind of surveillance unprecedented in the U.S.? And what accounts for its occurrence during Occupy in the way that you describe?

    MATTHEW ROTHSCHILD: Well, unfortunately, it’s not unprecedented. There’s a terrible history of law enforcement and the FBI spying on left-wing activists, going back to the COINTELPRO program of the FBI in the ’60s and ’70s, where they infiltrated the Black Panther movement and the American Indian Movement. But interestingly, after those revelations came out, there were guidelines imposed by the Justice Department itself, the so-called Levi guidelines. Edward Levi was the attorney general under the Ford administration who said you can’t go spying on and infiltrating activist groups in this country unless there’s a predicate of criminal activity. Well, after 9/11, the Bush administration and Ashcroft, his attorney general, completely destroyed the Levi guidelines and let law enforcement do any kind of infiltration they want, without any necessity for any hint of criminal activity on the part of the activists.

    AMY GOODMAN: Matt Rothschild, you’ve called for the resignation of Attorney General Eric Holder. Why?

    MATTHEW ROTHSCHILD: Well, for a number of reasons, Amy, first of all, for this scandal about investigating reporters. I think that’s outrageous. We had more than a hundred AP reporters and editors that the Justice Department was gathering information on, and now we have the revelation about the Fox News reporter James Rosen, who was being accused of being a co-conspirator under the Espionage Act of 1917 simply for doing his reporting job. Also, the attorney general has been essentially waging war on whistleblowers under the Espionage Act.

    And on top of that, let’s remember, this attorney general, Eric Holder, has been rationalizing the assassination program that the Obama administration has been engaging in, saying that a drone can drop a bomb on a U.S. citizen anywhere in the world, and that U.S. citizen will already have had due process simply because the Obama administration itself or the president or the secretary of defense calls that person a terrorist. Now, that’s not due process, and that’s not what the Justice Department should be doing. Certainly the attorney general, the chief law enforcement officer of this country, should know better than that.

    AMY GOODMAN: Matthew Rothschild, isn’t he just carrying out President Obama’s policies?

    MATTHEW ROTHSCHILD: Well, he very well might be, and then we have a more serious problem. We have a serious problem at the very top with a president of the United States, again, like George W. Bush, engaging in illegal activity.

    AMY GOODMAN: We want to thank you for being with us. We’re going to do part two of the interview and post it at democracynow.org. Matt Rothschild, editor and publisher of The Progressive magazine, wrote the cover story for the June issue, “Spying on Occupy Activists: How Cops and Homeland Security Help Wall Street.”

    Wednesday, May 22, 2013

    Find this story at 22 May 2013

    Former Seattle Police Chief Norm Stamper on Paramilitary Policing From WTO to Occupy Wall Street

    We host a discussion on policing and the Occupy Wall Street movement with Chuck Wexler, director of the Police Executive Research Forum, which helped organize calls among police chiefs on how to respond to the Occupy protests, and with Norm Stamper, the former police chief of Seattle, who recently wrote an article for The Nation magazine titled “Paramilitary Policing from Seattle to Occupy Wall Street.” “Trust me, the police do not want to be put in this position. And cities really need to ask themselves, is there another way to handle this kind of conflict?” Wexler says. Stamper notes, “There are many compassionate, decent, competent police officers who do a terrific job day in and day out. There are others who are, quote, ‘bad apples.’ What both of them have in common is that they ‘occupy,’ as it were, a system, a structure that itself is rotten. And I am talking about the paramilitary bureaucracy.” We are also joined by Stephen Graham, author of “Cities Under Siege: The New Military Urbanism,” and by retired New York Supreme Court Judge Karen Smith, who worked as a legal observer Tuesday morning in New York after the police raided the Occupy Wall Street encampment. “I was there to take down the names of people who were arrested… As I’m standing there, some African-American woman goes up to a police officer and says, ‘I need to get in. My daughter’s there. I want to know if she’s OK.’ And he said, ‘Move on, lady.’ And they kept pushing with their sticks, pushing back. And she was crying. And all of a sudden, out of nowhere, he throws her to the ground and starts hitting her in the head,” says Smith. “I walk over, and I say, ‘Look, cuff her if she’s done something, but you don’t need to do that.’ And he said, ‘Lady, do you want to get arrested?’ And I said, ‘Do you see my hat? I’m here as a legal observer.’ He said, ‘You want to get arrested?’ And he pushed me up against the wall.” [includes rush transcript]
    Transcript

    This is a rush transcript. Copy may not be in its final form.

    JUAN GONZALEZ: Well, a number of questions have been raised about how much cities across the country have coordinated their actions against Occupy Wall Street. Oakland Mayor Jean Quan recently admitted in an interview with the BBC that she and leaders participated in a conference call.

    MAYOR JEAN QUAN: I was recently on a conference call of 18 cities across the country who had the same situation, where what had started as a political movement and a political encampment ended up being an encampment that was no longer in control of the people who started them. And what I think you’re starting to see is that the Occupy movement is looking for more stability. I spent a lot of last week talking to peaceful demonstrators, ones who wanted to separate themselves in my city away from the anarchist groups who had been looking for a confrontation with the police.

    AMY GOODMAN: The conference calls were organized by the Police Executive Research Forum, a national police group. For a discussion on policing and the Occupy Wall Street movement around the country, we’re joined by two people. Chuck Wexler is the director of the Police Executive Research Forum. And Norm Stamper is with us, the former police chief of Seattle, who recently wrote an article for The Nation magazine, titled “Paramilitary Policing from Seattle to Occupy Wall Street.”

    I want to start with Norm Stamper, because you just may have heard Dorli say, “Thank you, Norm Stamper,” as she got pepper-sprayed, today, remembering what it was like in 1999, as well, at the Battle of Seattle, at the time when you were presiding over the police actions. Your thoughts today?

    NORM STAMPER: Well, we made huge mistakes back in 1999, and I’m afraid they’re being repeated today across the country, in Seattle, in Oakland, and in all other cities where there have been confrontations between the police and members of the Occupy Wall Street movement.

    JUAN GONZALEZ: Well, Norm Stamper, in your article you mention that you think that there are institutional problems, structural problems in policing, that no matter who the political leaders are or what the top brass are, that these problems continue to crop up and appear to be getting worse.

    NORM STAMPER: I certainly do believe that. I think the drug war, which has put police officers against young people and poor people and people of color, the war on terrorism, the domestic dimensions of that war, have all served to increase the militarization of America’s police forces. And this is particularly tragic because, prior to these developments, we were on a path to create what I would call authentic partnerships with the community. That means no more unilateral decision making. It means, for example, today, police officers and Occupy movement leaders understanding the diffusion of that leadership, getting together and carving out rules of engagement, if you will, that will help protect public safety, public health, and also assure civil liberties, human rights and some degree of social justice.

    AMY GOODMAN: As I said, we’re also joined on the phone by Chuck Wexler, executive director of the Police Executive Research Forum that coordinated the conference call with mayors and police officials around the country. Can you talk about what’s happening today—the Occupy Oakland, the massive police response, the kind of police response we saw in Seattle with the pepper-spraying of not only Dorli Rainey, but many other people directly in the face—the conversation that took place, and why you coordinated this call, Chuck?

    CHUCK WEXLER: Well, yeah. Good morning.

    But first of all, a correction: we did not coordinate the call with the mayors. It was simply with police chiefs. And it originated from Boston and Portland. The police chiefs in those cities asked to just compare notes.

    You know, I think, you know, this movement has evolved since it started. It was very—you know, relatively peaceful. And quite frankly, I think a lot of the police officers had a lot in common with, you know, the demonstrators, in terms of the concerns about the economy and working-class people and so forth. But I think, you know, over time, in some cities, the nature of the demonstration has changed. But it’s hard to talk about it, you know, all over the United States, because I think you probably have—you know, it’s very idiosyncratic depending upon the city, depending upon the nature of who’s involved. But in some cities, it has—that the hand of the police has been forced by, you know, either violence or the changing nature of what’s been happening on the ground.

    I’m not—you know, I don’t have the details about Oakland and Seattle and so forth. I can just tell you—and I know Norm Stamper would agree, at least insofar as we learned a lot from what happened in Seattle, when he was chief up there, about handling demonstrators. And I think the police are far more careful about not wanting to be drawn into something that really has nothing to do with them, and really trying as much as they can to exercise restraint, to use intermediaries, to reach out to the leaders of these Occupy movements. The challenge is, there aren’t really any leaders, or if there are leaders, they don’t want to be leaders. So it’s difficult to know who’s responsible, who’s in charge. But I think, you know, the police today are far more careful about exercising restraint—I mean, by and large. I mean, you have 17,000 police agencies in the country, so, you know, it’s hard to make generalizations. But I do think that—you know, when the first Occupy Wall Street movement started, and police saw what happened on the bridge and so forth, and the police sort of getting drawn into that, there’s been really a reluctance on the part of the police, you know, to want to move, unless absolutely necessary. And so, I think the political structure within these cities has played a big role in determining what kind of action the police are going to take.

    AMY GOODMAN: Norm Stamper, your response?

    NORM STAMPER: Well, I have great respect for Chuck, and I do believe that since 1999 and the Battle in Seattle there have been many changes. My concern is, many of those changes have been for the worse. The officers, for example, in Oakland were dressed as my police officers were in Seattle, which is, in effect, for full—in full battle gear. We were using military tactics. I authorized the use of chemical agents on nonviolent offenders. I thought I had good justification at that time. I did not. The police officer in me was thinking about emergency vehicles, fire trucks, aid cars being able to get through a key intersection. The police chief in me should have said, “This is wrong,” and vetoed that decision. I will regret that decision for the rest of my life. We took a military response to a situation that was fundamentally nonviolent, in which Americans were expressing their views and their values, and used tear gas on them. And that was just plain wrong.

    JUAN GONZALEZ: Well, Chuck Wexler, I’d like to ask you about that, not only about this issue of the increased militarization, also that there have been other cities where law enforcement has taken a very different approach. In Philadelphia and Albany, the district attorney is refusing to—declining to prosecute cases of arrests of people who are being arrested for being in a park. But also, the way that the—some of the police forces are dealing with the press, and of the—because the press are supposed to be there to be able to be the eyes and ears of the public in these events, but increasingly you’re getting reporters arrested, removed, not allowed to be at the biggest flash points or to be able to take photos or to take camera shots of them.

    CHUCK WEXLER: Yeah. No, I mean, you know, it’s—the police response is going to vary from city to city. But let me just kind of back up a little bit and respond to what Norm said. You know, we—you know, I have a lot of respect for Norm Stamper, too. We learned a lot. He’s very forthcoming with what went right and what went wrong with the Battle for Seattle, if you will. But, you know, in fairness, you know, you were faced, Norm, in a very difficult situation, and in fact, there really hadn’t been many demonstrations up ’til Seattle. I mean, prior to the Vietnam era, there was a big lag time. But what was—what does happen in some of these events is you can have 90 percent of the people are there peacefully, and you have this small contingent—and I think, Norm, what you had in Seattle is you had this group of anarchists that somehow was able to cause such disturbances that it forced a reaction, that perhaps was an overreaction, but I don’t think the police were prepared for it. And today, you know, the police struggle between these two extremes, between people who go to exercise their First Amendment rights and then people who are there to cause, you know, damage and destruction.

    AMY GOODMAN: So, Norm Stamper, respond to that issue, why you still think you were wrong, that you’re taking issue with Chuck Wexler here, that given the situation in 1999 you now say you did the absolutely wrong thing.

    NORM STAMPER: Well, for five years after I retired, I remember being on book tour and having people come up to me and say, “I was on the streets, and I’ve got to tell you, I was shocked at the behavior of the police.” And I asked them about what was particularly shocking about the behavior, and it all came back to me. It came back to my authorization of the use of chemical agents, a euphemism for tear gas or pepper spray, and the effect that that had from that moment on and throughout the week.

    There is no question about what anarchists, by definition, or for that matter, even recreational rioters, who are simply sitting in a bar and see the action and get attracted to the downtown area—we had some of that—can help distract attention away from the cause itself and create major public safety issues for the police. Here’s my point: if the police and the community in a democratic society are really working hard—and it is hard work—to forge authentic partnerships rather than this unilateral, paramilitary response to these demonstrations, that the relationship itself serves as a shock absorber. Picture police officers helping to protect the demonstrators. Picture demonstrators saying, “We see people on the fringes, for example, who are essentially undemocratic in their tactics. And so, we need to work together to resolve that issue.” These resolutions are clearly not easy. One of the things that complicates the picture enormously is when a woman like Ms. Rainey is pepper-sprayed. When innocent people who are there to protest what I consider to be very legitimate grievances against corporate America, against a government that has, in many respects, been bought off by corporations, the police have a responsibility to be neutral. It should be apparent that I’m not neutral, but I’m no longer a cop. And police officers on the streets really do need to be neutral referees, and they need the help of their civilian, if I may use that term, partners.

    AMY GOODMAN: Speaking of neutral referees, I wanted to bring a judge into this discussion, retired New York Supreme Court Judge Karen Smith, who worked as a legal observer early Tuesday morning here in New York. I saw her right on the corner of Wall Street shortly after police raided the Occupy Wall Street encampment. Judge Smith, what did you see?

    JUDGE KAREN SMITH (ret.): Well, I arrived about 1:30, 1:40 in the morning, got out and walked to Dey and Broadway. And the police were in full riot gear. I mean, it was a paramilitary operation if there ever was one, I mean, which sets off—here it is, 1:30 in the morning, what we call a stealth eviction, 1:30 in the morning, and they were just lined up two blocks from—on either side from the park, so that nobody could get near, this solid wall of police.

    I was wearing—and I brought this—a hat, which says the “National Lawyers Guild Legal Observer.” And as you can see, in color, it’s quite bright. And at night—

    AMY GOODMAN: It’s fluorescent green.

    JUDGE KAREN SMITH (ret.): It’s fluorescent green. And then I was wearing it, and I had a pad and a pen, and I was there to take down the names of people who were arrested so we could follow them through the system and just observe what was going on. And as I’m standing there, some African-American woman goes up to a police officer and says, “I need to get in. My daughter’s there. I want to know if she’s OK.” And he said, “Move on, lady.” And he kept pushing—they kept pushing with their sticks, pushing back. And she said—and she was crying. And all of a sudden, out of nowhere, he throws her to the ground and starts hitting her in the head. And I walk over, and I say, “Look, cuff her if she’s done something, but you don’t need to do that.” And he said, “Lady, do you want to get arrested?” And I said, “Do you see my hat? I’m here as a legal observer.” He said, “You want to get arrested?” And he pushed me up against the wall.

    And, you know, it was late at night. There was a lot going on. People were—all of a sudden, there was like a cordon of police pushing everybody into Dey Street between Broadway and Church. And it seemed like they were setting everybody up to get arrested. And then they started—some people broke away, some of the police, and started running after people. I moved away and then decided that I needed to get on the other side. I received a call that there were things developing on Pine and Broadway, and so I moved all the way east to go around the police and then ended up on Pine and Broadway, which is really where I ran into you.

    JUAN GONZALEZ: And, of course, you had a personal interest, as well. Your son was also one of the participants in Occupy Wall Street.

    JUDGE KAREN SMITH (ret.): Yes, my son was a—he’s a staff person for SEIU 1199. And they were there in support. They were not going to get arrested, but they wanted to show the demonstrators and the occupiers that—and they’ve been supportive all along as one of the unions. And he was there. And I was watching carefully to make sure that he did not get hurt, as well. I was very concerned.

    At Pine and Broadway, it was sort of a standoff. People were—there was a lot of confusion. People didn’t know what was going on. There were some people that may have sat on some police cars just in comfort, but nobody was—I heard later on reports—talk about objectivity of the press—you know, that they were jumping up and down and they were taunting the police. The only time I ever saw on—when I first got there on Dey and Broadway, they were just saying, “Shame on you,” you know, to the police, and—but that was it. And down on Pine and Broadway, at least until about 4:30 in the morning, I didn’t see any provocation whatsoever.

    AMY GOODMAN: We’re going to lose the satellite for Dorli—for Dorli Rainey in Seattle. But I wanted to ask you, Dorli, what did it feel like to be pepper-sprayed in the face? This dramatic photograph of you being helped by two people right afterwards.

    DORLI RAINEY: Well, first of all, it’s very painful. And when they say there are no after effects, I still have a pain in my lungs, and my voice is kind of raspy. I don’t know how long that will last. But the thing really is not about me getting pepper-sprayed. It is a much bigger issue than that, and I would like everybody to keep that in mind, that while we’re getting pepper-sprayed, other issues are not being heard. And that’s my problem. I feel issues become a major focus to the detriment of the real issues that cause this whole problem.

    JUAN GONZALEZ: And I’d like to ask Chuck Wexler, this whole issue of the police chiefs trying to exchange information, was there any involvement of the Department of Homeland Security or the federal officials in the discussions with the various police chiefs?

    CHUCK WEXLER: Not on our conference call at all.

    But, you know, if I can just say a few things just in response to the last conversations. You know, this is really the struggle that the police have. This is why, you know, at the end of the day, you know, I think what Norm was saying about the partnerships and intermediaries and communication is so important, because this is a no-win situation for the police, that, you know—and one of the things we’ve learned out of the ’60s and out of the, you know, Chicago Democratic convention, and all the ways in—from the South, and all of the ways the police have had to handle these kind of situations is, you know, a minimum amount—a use of restraint. And I think that’s the real challenge here. The police don’t want to be in this situation. And whatever you can do to have intermediaries, like the judge, whatever, be the people that are intervening rather than the police, I think it’s a real—it’s a no-win situation for most police departments. They have worked really hard to develop partnerships with the community, the community policing all of those things. And sometimes you have one officer that does something—forgive me—stupid, and it characterizes the entire police force. But I think, you know, if you look at the restraint that police use today versus what they used 10, 20, 30 years ago, it’s substantially less use of force. But there are still mistakes, and there are still officers that are going to act inappropriately. And I think—

    AMY GOODMAN: Chuck Wexler, in New York, I mean, we saw a massive phalanx of police moving in. In the area where the judge was just describing, the police forced everyone out of the street onto the sidewalk and said, “Just get on the sidewalk!” They were screaming to everyone, “Get on the sidewalk!” As soon as people got on the sidewalk, they rushed them on the sidewalk up against the—up against the rails along the sidewalk. But I did want to ask you, how involved is FBI and Homeland Security in these discussions, Chuck Wexler?

    CHUCK WEXLER: We haven’t had—they haven’t been involved—maybe they’re involved at the local level, but nationally, at least on our conference calls, I don’t think—they didn’t have a role.

    JUAN GONZALEZ: There were some press reports that there were Homeland Security presentations urging that these arrests be conducted late at night.

    CHUCK WEXLER: That may have been done at the city level. It wasn’t on our conference calls. We had that—no one from, you know, Homeland Security made that kind of presentation, nor—you know, we were really—we were just comparing notes. We were like, how are different cities trying to deal with this in the most civil way possible? You know, what are some of the strategies? In some cities, for example, they didn’t have the police directly involved. They had, you know, the sanitation people and Health and Human Services and folks like that on the front end. And that was interesting, because why—I mean, at the end of the day, why are the police the ones that own this issue? I mean, because the police really don’t want to be the ones dismantling these encampments. But, you know, why is it, if you ask—you should ask cities, why do we put the police in these areas? Because, you know, at the end of the day, people feel as though you need some kind of legal authority or someone who’s going to come in. But trust me, the police do not want to be put in this position. And cities really need to ask themselves, is there another way to handle this—you know, this kind of conflict?

    JUAN GONZALEZ: And Karen Smith, you retired in 2010 as a Supreme Court judge, so you obviously have dealt, over many years, with the police department and police officials. Your sense—when we spoke a couple of days ago, you also talked about your sense that there was a really hostile or tense situation from the very beginning with how the police were responding to the protesters. Could you talk about that?

    JUDGE KAREN SMITH (ret.): Yes, well, I don’t know if Mr. Stamper was the one who said this, but I think it was structural. You—at night, 1:00 in the morning, people dressed in riot gear. There were trucks, remember, lined up for the sanitation to just throw people’s things in—computers and everything. And now people, I’m told, they can’t get their stuff. There was a them and us. I, I mean, worked with police officers for years. There are very—I agree that there are very good ones. It’s not individuals. It’s a system that’s being set up of us and them.

    And the other thing that needs to be brought out—and I think it was in the court case in front of Judge Stallman, who was a colleague of mine—is how often do you get the police and the state enforcing private property rights? The contradictions are tremendous, just that. I mean, as you pointed out in your article I read in some—and also even David Letterman last night, you know, points out, you know, it’s OK for prostitutes, drug dealers, and now we’re having our Christmas fair, where they’re putting up tents. You know, but that’s for profit. So that’s OK.

    AMY GOODMAN: Wait, explain that, because maybe people in other parts of the country don’t understand.

    JUDGE KAREN SMITH (ret.): Oh, at Christmas time in New York, and I think around the country, there are these little craft things that are set up for private businesses, and they put up tents, and they’re there—they have to leave by 11:00, but they’re—

    AMY GOODMAN: Tents all over, for example, Union Square.

    JUDGE KAREN SMITH (ret.): All over Union Square.

    JUAN GONZALEZ: In the parks, yes.

    JUDGE KAREN SMITH (ret.): In the parks, Columbus Circle. So that’s OK. But—and I don’t know what evidence was presented, because I wasn’t in court the other day, about the so-called sanitation violations that were the basis of the state using its authority to come in. But in the end, they were enforcing private property interests. And that’s really what—the message, I think, from the whole Occupy Wall Street’s about.

    AMY GOODMAN: We’re going to break and then come back to this discussion. And hopefully Ydanis Rodriguez will also be joining us, the New York City Council member who was arrested by police on Tuesday night, when they evicted the Occupy Wall Street encampment. And right now, down at Wall Street, arrests have already started. We will also get a report from there. This is Democracy Now! Back in a minute.

    [break]

    AMY GOODMAN: Ryan Devereaux is on the phone with us right now, Democracy Now! reporter on the scene outside the New York Stock Exchange. Ryan, what’s happening at this point?

    RYAN DEVEREAUX: I’ve made my way around the Financial District, and it looks like Occupy Wall Street protesters have blocked a number of intersections, sort of with the help of the NYPD and their barricades. Protesters have sat down in intersections. And right now, I’ve returned to the intersection of Wall Street and Hannover, about two blocks or so east of the New York Stock Exchange. About two dozen protesters or so had linked arms across the street, forming a line across [inaudible] the police blockade. They started chanting, “This is a nonviolent protest.” And then the police started shoving into them from behind as hard as they could and eventually broke through the line, knocking a number of protesters to the ground. The police then leaped onto the backs of the protesters. About three were arrested. And the blockade—the protesters’ line was cleared out of the streets and has now been replaced by scores of police officers in riot helmets. This is directly in front of the Deutsche Bank on Wall Street.

    AMY GOODMAN: We’re talking to Ryan Devereaux right near Wall Street. And the plans for today, Karen Smith, a former New York State Supreme Court judge, you have felt that the media has mischaracterized what the plans are for the protest, the mass protest today.

    JUDGE KAREN SMITH (ret.): Yes, particularly the statement that there were plans to take over the subways. There’s never been plans to take over the subways. What the plan was for the afternoon session, I’ve been told and been—and had meetings about so that I’m aware of it, is that they are planning to just have people give stories outside of subways, what they call soapboxes, on how the economics have affected them, and then to go into the subways and try to talk to the public on the subway trains on the way down to Foley Square later on, as to how this economy has affected them personally, to broaden the struggle on all—and they have what they call hubs throughout the city. There is no plan, and never has been, to take over any subway.

    AMY GOODMAN: I wanted to bring Stephen Graham into the discussion right now. We started speaking to him yesterday. He wrote the book Cities Under Siege: The New Military Urbanism. Just in from Britain, in Philadelphia. Can you talk about—as we were just speaking with the former police chief, Norm Stamper, of Seattle, and he oversaw the Battle of Seattle, how the police dealt with that—the militarization that we are seeing of police forces around our country?

    STEPHEN GRAHAM: Yes, well, it’s a longstanding process that has its roots in policies against drug use. It has its roots in the development of SWAT teams, Special Weapons and Tactics teams, and it has its use in some of the responses to the 1960s disturbances across the West, as well. And really, the effects of this, as we see in New York and elsewhere, is an increasing use of full-on riot squads, increasing use of non-lethal weapons, including things like acoustic systems that make it impossible for people to remain in spaces, including the pepper spray, including the tasers. And we have to remember, this is a really big growth industry that military and security corporations are investing heavily in terms of new research and development.

    JUAN GONZALEZ: And Stephen Graham, what’s the market? You’re talking about a growth industry. What are we talking about here in terms of investment of dollars by—because there are so many, obviously, municipalities in the United States with their own police forces?

    STEPHEN GRAHAM: Well, I mean, globally speaking, the so-called homeland security market is a real—is in real boom town—boom time, excuse me. I mean, in a world where actual defense contracts are often being reduced, a lot of the big companies are moving into civilian applications. They’re moving into these non-lethal weapons, moving into all of the technologies of crowd control and civilian disturbance control. And that has to be added to, of course, the much bigger markets that are growing in terms of broader questions of surveillance and security for buildings, for cities, for special events, as we see these systems established more and more in terms of everyday spaces and everyday bits of cities. So, I haven’t got figures at hand, I’m afraid, but it’s multibillion-dollar markets that are projected to grow globally at very, very high rates over the next 15 years, according to some of the recent market research reports.

    AMY GOODMAN: Norm Stamper, if you’re still on the line with us, former police chief of Seattle, does what Stephen Graham is saying ring a bell for you? Does it resonate with your experience?

    NORM STAMPER: Well, it certainly does. I might even add to that mix the increased privatization of the prison industry in the United States, where people are in fact making huge sums of money on the backs of those arrested for nonviolent drug offenses. And we’re talking really in the millions in this country. So I think there’s that that needs to be considered, as well.

    About the non-lethal tools at the disposal of local law enforcement, many of those were developed in the wake of a controversial shooting. We understand that cops got a dangerous job. It’s delicate. It’s demanding. There are situations that call for life-and-death decision making, oftentimes with no real time to contemplate options and possibilities. Let’s find non-lethal alternatives to that firearm. So, the motive is good. The question is, to what extent are those non-lethal weapons being abused today? We have seen far too many examples of tasers, for example, used in situations where no force was necessary. It’s just simply a way to get somebody to move faster or to get out of a car when they’re passively resistant.

    So, it’s important, I think, to understand the complexities of everything that we’re talking about. For example, there are many compassionate, decent, competent police officers who do a terrific job day in and day out. There are others who are, quote, “bad apples.” What both of them have in common is that they occupy, as it were, a system, a structure that itself is rotten. And I am talking about the paramilitary bureaucracy.

    AMY GOODMAN: We’re going to have to leave it there, Norm Stamper, but I thank you so much for being with us, as well as Stephen Graham and Chuck Wexler and Dorli Rainey and Karen Smith.

    Thursday, November 17, 2011

    Find this story at 17 November 2011

    Bank of America intelligence analyst shared Occupy DC info with police ‘They seemed pretty excited’

    Emails released by Washington D.C.’s Metropolitan Police Department about the Occupy Our Homes movement reveal frustration from one Bank of America intelligence analyst.

    Occupy our Homes, a part of the Occupy movement that began in fall 2011, gained headlines as protesters fought back against home foreclosures across the country. Bank of America Senior U.S. Crime and Intelligence Analyst Amanda Velazquez offered weary commentary in an Occupy email she shared with MPD in September 2012.

    “With all the Occupy DC leaders back home, it appears some concrete plans have materialized for the one-year anniversary. Our day for action is Tuesday, 2 October. I think there should be more participation that [sic] the last attempt against us; they seemed pretty excited …”

    The anniversary plans included two days of “plays, music, art, political discussions and general assemblies” in Freedom Plaza, according to the email Velazquez forwarded. The occupiers had been forcibly evicted by police in February 2012.

    The emails were requested as a part of the File for Aaron project.

    by Tom Nash on May 1, 2013, 1 p.m.

    Find this story at 1 May 2013

    © 2013 MuckRock

    The U.S. counter terrorism apparatus was used to monitor the Occupy Movement nationwide.

    On May 20, 2013, DBA Press and the Center for Media and Democracy released the results of a year-long investigation: “Dissent or Terror: How the Nation’s Counter Terrorism Apparatus, In Partnership With Corporate America, Turned on Occupy Wall Street.” The report, a distillation of thousands of pages of records obtained from counter terrorism/law enforcement agencies, details how state/regional “fusion center” personnel monitored the Occupy Wall Street movement over the course of 2011 and 2012.

    The report also examines how fusion centers and other counter terrorism entities that have emerged since the terrorist attacks of September 11, 2001 have worked to benefit numerous corporations engaged in public-private intelligence sharing partnerships. While the report examines many instances of fusion center monitoring of Occupy activists nationwide, the bulk of the report details how counter terrorism personnel engaged in the Arizona Counter Terrorism Information Center (ACTIC, commonly known as the “Arizona fusion center”) monitored and otherwise surveilled citizens active in Occupy Phoenix, and how this surveillance benefited a number of corporations and banks that were subjects of Occupy Phoenix protest activity.

    While small glimpses into the governmental monitoring of the Occupy Wall Street movement have emerged in the past, there has not been any reporting — until now — that details the breadth and depth with which the nation’s post-September 11, 2001 counter terrorism apparatus has been applied to politically engaged citizens exercising their Constitutionally-protected First Amendment rights.

    REPORT Dissent or Terror: How the Nation’s ‘Counter Terrorism’ Apparatus, in Partnership with Corporate America, Turned on Occupy Wall Street

    REPORT APPENDIX open records materials cited in report.

    PRESS RELEASE “New Report Details How Counter Terrorism Apparatus Was Used to Monitor Occupy Movement Nationwide”(PDF)

    SOURCE MATERIALS almost 10,000 pages of open records materials are archived on DBA Press.

    PRWATCH ARTICLE “Dissent or Terror: How Arizona’s Counter Terrorism Apparatus, in Partnership with Corporate Interests, Turned on Occupy Phoenix”
    Key Findings

    Key findings of this report include:
    How law enforcement agencies active in the Arizona fusion center dispatched an undercover officer to infiltrate activist groups organizing both protests of the American Legislative Exchange Council (ALEC) and the launch of Occupy Phoenix and how the work of this undercover officer benefited ALEC and the private corporations that were the subjects of these demonstrations.
    How fusion centers, funded in large part by the U.S. Department of Homeland Security, expended countless hours and tax dollars in the monitoring of Occupy Wall Street and other activist groups.
    How the U.S. Department of Homeland Security has financed social media “data mining” programs at local law enforcement agencies engaged in fusion centers.
    How counter terrorism government employees applied facial recognition technology, drawing from a state database of driver’s license photos, to photographs found on Facebook in the effort to profile citizens believed to be associated with activist groups.
    How corporations have become part of the homeland security “information sharing environment” with law enforcement/intelligence agencies through various public-private intelligence sharing partnerships. The report examines multiple instances in which the counter terrorism/homeland security apparatus was used to gather intelligence relating to activists for the benefit of corporate interests that were the subject of protests.
    How private groups and individuals, such as Charles Koch, Chase Koch (Charles’ son and a Koch Industries executive), Koch Industries, and the Koch-funded American Legislative Exchange Council have hired off-duty police officers — sometimes still armed and in police uniforms — to perform the private security functions of keeping undesirables (reporters and activists) at bay.
    How counter terrorism personnel monitored the protest activities of citizens opposed to the indefinite detention language contained in National Defense Authorization Act of 2012.
    How the FBI applied “Operation Tripwire,” an initiative originally intended to apprehend domestic terrorists through the use of private sector informants, in their monitoring of Occupy Wall Street groups. [Note: this issue was reported on exclusively by DBA/CMD in December, 2012.]

    Government Surveillance of Occupy Movement
    – by Beau Hodai, CMD/DBA

    Find this story at 22 May 2013

    Dissent or Terror: How the Nation’s ‘Counter Terrorism’ Apparatus, in Partnership with Corporate America, Turned on Occupy Wall Street

    SPYING ON AMERICANS: Obama’s Backdoor “Cybersecurity” Wiretap Bill Threatens Political and Private Rights; Spying on Social Media

    Under the guise of “cybersecurity,” the new all-purpose bogeyman to increase the secret state’s already-formidable reach, the Obama administration and their congressional allies are crafting legislation that will open new backdoors for even more intrusive government surveillance: portals into our lives that will never be shut.

    As Antifascist Calling has frequently warned, with the endless “War on Terror” as a backdrop the federal government, most notably the 16 agencies that comprise the so-called “Intelligence Community” (IC), have been constructing vast centralized databases that scoop-up and store all things digital–from financial and medical records to the totality of our electronic communications online–and do so without benefit of a warrant or probable cause.

    The shredding of constitutional protections afforded by the Fourth Amendment, granted to the Executive Branch by congressional passage of the Authorization for Use of Military Force (AUMF) after the 9/11 attacks, followed shortly thereafter by the oxymoronic USA Patriot Act set the stage for today’s depredations.

    Under provisions of multiple bills under consideration by the House and Senate, federal officials will be given broad authority over private networks that will almost certainly hand security officials wide latitude over what is euphemistically called “information-sharing” amongst corporate and government securocrats.

    As The Washington Post reported in February, the National Security Agency “has pushed repeatedly over the past year to expand its role in protecting private-sector computer networks from cyberattacks” but has allegedly “been rebuffed by the White House, largely because of privacy concerns.”

    “The most contentious issue,” Post reporter Ellen Nakashima wrote, “was a legislative proposal last year that would have required hundreds of companies that provide such critical services as electricity generation to allow their Internet traffic to be continuously scanned using computer threat data provided by the spy agency. The companies would have been expected to turn over evidence of potential cyberattacks to the government.”

    Both the White House and Justice Department have argued, according to the Post, that the “proposal would permit unprecedented government monitoring of routine civilian Internet activity.”

    National Security Agency chief General Keith Alexander, the dual-hatted commander of NSA and U.S. Cyber Command (USCYBERCOM), the Pentagon satrapy that wages offensive cyberwar, was warned to “restrain his public comments after speeches in which he argued that more expansive legal authority was necessary to defend the nation against cyberattacks.”

    While we can take White House “objections” with a proverbial grain of salt, they do reveal however that NSA, the largest and most well-funded of the secret state’s intel shops will use their formidable surveillance assets to increase their power while undermining civilian control over the military in cahoots with shadowy security corporations who do their bidding. (Readers are well-advised to peruse The Surveillance Catalog posted by The Wall Street Journal as part of their excellent What They Know series for insight into the burgeoning Surveillance-Industrial Complex).

    As investigative journalist James Bamford pointed out recently in Wired Magazine, “the exponential growth in the amount of intelligence data being produced every day by the eavesdropping sensors of the NSA and other intelligence agencies” is “truly staggering.”

    In a follow-up piece for Wired, Bamford informed us that when questioned by Congress, Alexander stonewalled a congressional subcommittee when asked whether NSA “has the capability of monitoring the communications of Americans, he never denies it–he simply says, time and again, that NSA can’t do it ‘in the United States.’ In other words it can monitor those communications from satellites in space, undersea cables, or from one of its partner countries, such as Canada or Britain, all of which it has done in the past.”

    Call it Echelon on steroids, the massive, secret surveillance program first exposed by journalists Duncan Campbell and Nicky Hager.

    And with the eavesdropping agency angling for increased authority to monitor the electronic communications of Americans, the latest front in the secret state’s ongoing war against privacy is “cybersecurity” and “infrastructure protection.”

    ‘Information Sharing’ or Blanket Surveillance?

    Among the four bills currently competing for attention, the most egregious threat to civil liberties is the Cyber Intelligence Sharing and Protection Act of 2011 (CISPA, H.R. 3523).

    Introduced by Mike Rogers (R-MI) and Dutch Ruppersberger (D-MD), the bill amends the National Security Act of 1947, adding language concerning so-called “cyber threat intelligence and information sharing.”

    “Cyber threat intelligence” is described as “information in the possession of an element of the intelligence community directly pertaining to a vulnerability of, or threat to, a system or network of a government or private entity, including information pertaining to the protection of a system or network from: (1) efforts to degrade, disrupt, or destroy such system or network; or (2) theft or misappropriation of private or government information, intellectual property, or personally identifiable information.”

    In keeping with other “openness” mandates of our Transparency Administration™ the Rogers bill will require the Director of National Intelligence (DNI) to establish procedures that permit IC elements to “share cyber threat intelligence with private-sector entities, and (2) encourage the sharing of such intelligence.”

    These measures however, will not protect the public at large from attacks by groups of organized cyber criminals since such intelligence is only “shared with certified entities or a person with an appropriate security clearance,” gatekeepers empowered by the state who ensure that access to information is “consistent with the need to protect U.S. national security, and used in a manner that protects such intelligence from unauthorized disclosure.”

    In other words, should “cleared” cyber spooks be directed by their corporate or government masters to install state-approved malware on private networks as we discovered last year as a result of the HBGary hack by Anonymous, it would be a crime punishable by years in a federal gulag if official lawbreaking were disclosed.

    The bill authorizes “a cybersecurity provider (a non-governmental entity that provides goods or services intended to be used for cybersecurity purposes),” i.e., an outsourced contractor from any one of thousands of spooky “cybersecurity” firms, to use “cybersecurity systems to identify and obtain cyber threat information in order to protect the rights and property of the protected entity; and share cyber threat information with any other entity designated by the protected entity, including the federal government.”

    Furthermore, the legislation aims to regulate “the use and protection of shared information, including prohibiting the use of such information to gain a competitive advantage and, if shared with the federal government, exempts such information from public disclosure.”

    And should the public object to the government or private entities trolling through their personal data in the interest of “keeping us safe” well, there’s an app for that too! The bill “prohibits a civil or criminal cause of action against a protected entity, a self-protected entity (an entity that provides goods or services for cybersecurity purposes to itself), or a cybersecurity provider acting in good faith under the above circumstances.”

    One no longer need wait until constitutional violations are uncovered, the Rogers bill comes with a get-out-of-jail-free card already in place for state-approved scofflaws.

    Additionally, the bill also “preempts any state statute that restricts or otherwise regulates an activity authorized by the Act.” In other words, in states like California where residents have “an inalienable right to privacy” under Article 1, Section 1 of the State Constitution, the Rogers bill would be abolish that right and effectively “legalize” unaccountable snooping by the federal government or other “self-protected,” i.e., private entities deputized to do so by the secret state.

    Social Media Spying

    How would this play out in the real world? As Government Computer News reported, hyped-up threats of an impending “cyber-armageddon” have spawned a host of new actors constellating America’s Surveillance-Industrial Complex: the social media analyst.

    “Companies and government agencies alike are using tools to sweep the Internet–blogs, websites, and social media such as Facebook and Twitter feeds–to find out what people are saying about, well, just about anything.”

    Indeed, as researchers Jerry Brito and Tate Watkins pointed out last year in Loving the Cyber Bomb?, “An industrial complex reminiscent of the Cold War’s may be emerging in cybersecurity today.”

    Brito and Watkins averred that “the military-industrial complex was born out of exaggerated Soviet threats, a defense industry closely allied with the military and Department of Defense, and politicians striving to bring pork and jobs home to constituents. A similar cyber-industrial complex may be emerging today, and its players call for government involvement that may be superfluous and definitely allows for rent seeking and pork barreling.”

    Enter social media analysis and the private firms out to make a buck–at our expense.

    “Not surprisingly,” GCN’s Patrick Marshall wrote, “intelligence agencies have already been looking at social media as a source of information. The Homeland Security Department has been analyzing traffic on social networks for at least the past three years.”

    While DHS claims it does not routinely monitor Facebook or Twitter, and only responds when it receives a “tip,” such assertions are demonstrably false.

    Ginger McCall, the director of the Electronic Electronic Privacy Information Center’s Open Government Program told GCN that the department is “explicitly monitoring for criticism of the government, for reports that reflect adversely on the agency, for public reaction to policy proposals.”

    But DHS isn’t the only agency monitoring social media sites such as Facebook and Google+.

    As Antifascist Calling reported back in 2009, according to New Scientist the National Security Agency “is funding research into the mass harvesting of the information that people post about themselves on social networks.”

    Not to be outdone, the CIA’s venture capital investment arm, In-Q-Tel, has poured millions of dollars into Visible Technologies, a Bellevue, Washington-based firm specializing in “integrated marketing, social servicing, digital experience management, and consumer intelligence.”

    According to In-Q-Tel “Visible Technologies has developed TruCast®, which takes an innovative and holistic approach to social media management. TruCast has been architected as an enterprise-level solution that provides the ability to track, analyze, and respond to social media from a single, Web-based platform.”

    Along similar lines, the CIA has heavily invested in Recorded Future, a firm which “extracts time and event information from the web. The company offers users new ways to analyze the past, present, and the predicted future.”

    The firm’s defense and intelligence analytics division promises to “help analysts understand trends in big data, and foresee what may happen in the future. Groundbreaking algorithms extract temporal and predictive signals from unstructured text. Recorded Future organizes this information, delineates results over interactive timelines, visualizes past trends, and maps future events–all while providing traceability back to sources. From OSINT to classified data, Recorded Future offers innovative, massively scalable solutions.”

    As Government Computer News pointed out, in January the FBI “put out a request for vendors to provide information about available technologies for monitoring and analyzing social media.” Accordingly, the Bureau is seeking the ability to:

    • Detect specific, credible threats or monitor adversarial situations.

    • Geospatially locate bad actors or groups and analyze their movements, vulnerabilities, limitations, and possible adverse actions.

    • Predict likely developments in the situation or future actions taken by bad actors (by conducting trend, pattern, association, and timeline analysis).

    • Detect instances of deception in intent or action by bad actors for the explicit purpose of misleading law enforcement.

    • Develop domain assessments for the area of interest (more so for routine scenarios and special events).

    So much for privacy in our Orwellian New World Order!

    Backdoor Official Secrets Act

    Social media “harvesting” by private firms hot-wired into the state’s Surveillance-Industrial Complex will be protected from challenges under provisions of CISPA.

    As the Electronic Frontier Foundation (EFF) pointed out, “a company that protects itself or other companies against ‘cybersecurity threats’ can ‘use cybersecurity systems to identify and obtain cyber threat information to protect the rights and property’ of the company under threat. But because ‘us[ing] cybersecurity systems’ is incredibly vague, it could be interpreted to mean monitoring email, filtering content, or even blocking access to sites. A company acting on a ‘cybersecurity threat’ would be able to bypass all existing laws, including laws prohibiting telcos from routinely monitoring communications, so long as it acted in ‘good faith’.”

    And as EFF’s Rainey Reitman and Lee Tien aver, the “broad language” concerning what constitutes a cybersecurity “threat,” is an invitation for the secret state and their private “partners” to include “theft or misappropriation of private or government information, intellectual property, or personally identifiable information.”

    “Yes,” Reitman and Tien wrote, “intellectual property. It’s a little piece of SOPA wrapped up in a bill that’s supposedly designed to facilitate detection of and defense against cybersecurity threats. The language is so vague that an ISP could use it to monitor communications of subscribers for potential infringement of intellectual property. An ISP could even interpret this bill as allowing them to block accounts believed to be infringing, block access to websites like The Pirate Bay believed to carry infringing content, or take other measures provided they claimed it was motivated by cybersecurity concerns.”

    More troubling, “the government and Internet companies could use this language to block sites like WikiLeaks and NewYorkTimes.com, both of which have published classified information.”

    Should CISPA pass muster it could serve as the basis for establishing an American “Official Secrets Act.” In the United Kingdom, the Act has been used against whistleblowers to prohibit disclosure of government crimes. But it does more than that. The state can also issue restrictive “D-Notices” that “advise” editors not to publish material on subjects deemed sensitive to the “national security.”

    EFF warns that “online publishers like WikiLeaks are currently afforded protection under the First Amendment; receiving and publishing classified documents from a whistleblower is a common journalistic practice. While there’s uncertainty about whether the Espionage Act could be brought to bear against WikiLeaks, it is difficult to imagine a situation where the Espionage Act would apply to WikiLeaks without equally applying to the New York Times, the Washington Post, and in fact everyone who reads about the cablegate releases.”

    And with the Obama regime’s crusade to prosecute and punish whistleblowers, as the recent indictment of former CIA officer John Kiriakou for alleged violations of the Espionage Act and the Intelligence Identities Protection Act for disclosing information on the CIA’s torture programs, we have yet another sterling example of administration “transparency”! While Kiriakou faces 30 years in prison, the former head of the CIA’s Directorate of Operations, Jose A. Rodriguez Jr., who was responsible for the destruction of 92 torture videotapes held by the Agency, was not charged by the government and was given a free pass by the Justice Department.

    As the World Socialist Web Site points out: “More fundamentally, the prosecution of Kiriakou is part of a policy of state secrecy and repression that pervades the US government under Obama, who came into office promising ‘the most transparent administration in history.’”

    Critic Bill Van Auken observed that Kiriakou’s prosecution “marks the sixth government whistleblower to be charged by the Obama administration under the Espionage Act, twice as many such prosecutions as have been brought by all preceding administrations combined. Prominent among them is Private Bradley Manning, who is alleged to have leaked documents exposing US war crimes to WikiLeaks. He has been held under conditions tantamount to torture and faces a possible death penalty.”

    “In all of these cases,” the World Socialist Web Site noted, “the World War I-era Espionage Act is being used to punish not spying on behalf of a foreign government, but exposing the US government’s own crimes to the American people. The utter lawlessness of US foreign policy goes hand in hand with the collapse of democracy at home.”

    The current crop of “cybersecurity” bills are sure to hasten that collapse.

    Under Rogers’ legislation, “the government would have new, powerful tools to go after WikiLeaks,” or anyone else who challenges the lies of the U.S. government by publishing classified information that contradicts the dominant narrative.

    By Tom Burghardt
    Global Research, April 10, 2012

    Find this story at 10 April 2013

    Copyright © 2005-2013 GlobalResearch.ca

    US: Silencing news sources?

    After the seizure of AP’s phone records, we ask if the US is still the land of the free for journalists and sources.

    On May 10th, the Associated Press news agency received an email from the US Department of Justice saying that records of more than 20 phone lines assigned to its reporters had been secretly seized as part of an investigation into a government leak.
    The government claimed it was a matter of national security, while the AP called it an unprecedented intrusion into its newsgathering operations. But should the journalistic community be so surprised? With the Obama White House’s track record on whistleblowers and WikiLeaks, the move to spy on AP seems consistent with an administration more committed to secrecy than ever before.
    Is the United States still the land of the free for journalists and their sources? In this week’s News Divide we speak to Laura Malone, legal counsel for the Associated Press; Jeremy Scahill, author of Dirty Wars; The World is a Battlefield; the investigative reporter Dana Priest of the Washington Post; and Ben Wizner from the American Civil Liberties Union.
    This week’s Newsbytes: After two years in hiding, a prominent Bahraini blogger reappears in the UK; Globovision, a leading opposition outlet in Venezuela, is sold to businessmen allegedly friendly with the government; and Islamabad is missing one of the most prominent Western journalists based there – the New York Times’ Declan Walsh was ordered to leave the country before the election.
    One of the lesser-known consequences of the US-led ‘war on terror’ has been a wave of anti-terrorism legislation in other countries. One of them is Ethiopia. It is not a country known for its freedom of the press and, with ongoing internal conflicts with separatist groups, and the powers that be keeping a wary eye on the nearby Arab Spring, the government in Addis Ababa has been cracking down on the media.
    It is doing so with an anti-terror law passed in 2009, which has led to the sentencing of 11 journalists, sent dozens of reporters into exile and has forced countless others to practice self-censorship. The Listening Post’s Nic Muirhead reports on the law that blurs the line between journalism and terrorism.
    Unless you have been in orbit or beyond, you have probably already seen our Video of the Week – it’s astronaut Chris Hadfield and his version of David Bowie’s Space Oddity, recorded while on board the International Space Station. It has been watched online and on TV millions of times over, but it is so good that we wanted to run it anyway.

    Listening Post Last Modified: 18 May 2013 08:09

    Find this story at 18 May 2013

    Is the Government Spying on Reporters; More Often Than We Think?

    There’s evidence that the Justice Department’s seizure of Associated Press phone records is far from unprecedented.

    The Justice Department’s seizure of call logs [1] related to phone lines used by dozens of Associated Press reporters has provoked a flurry of bipartisan criticism, most of which has cast the decision as a disturbing departure from the norm. AP head Gary Pruitt condemned the decision, part of an investigation into leaks of classified information, as a “massive and unprecedented intrusion.” Yet there’s plenty of circumstantial evidence suggesting the seizure may not be unprecedented—just rarely disclosed.

    The Justice Department is supposed to follow special rules [2] when it seeks the phone records of reporters, in recognition that such snooping conflicts with First Amendment values. As Pruitt complained in an angry letter to Attorney General Eric Holder, those logs provided the government a “road map” of the stories his reporters were investigating, and there is evidence that such seizures deter [3] anonymous sources from speaking to the press—whether they’re discussing classified programs or merely facts that embarrass the government.

    Federal regulations require that the attorney general personally approve such a move, ensure the request is narrow and necessary, and notify the news organization about the request—in advance whenever possible. In this case, however, the Justice Department seems to have used an indiscriminate vacuum-cleaner [4] approach—seeking information (from phone companies) about a wide range of phone numbers used by AP reporters—and it only notified AP after the fact.

    It wouldn’t be surprising if there were more cases like this we’ve never heard about. Here’s why: The Justice Department’s rules only say the media must be informed about “subpoenas” for “telephone toll records.” The FBI’s operations guidelines [5] interprets those rules quite literally, making clear the requirement “concerns only grand jury subpoenas.” That is, these rules don’t apply to National Security Letters [6], which are secret demands for information used by the FBI that don’t require judicial approval. The narrow FBI interpretation also doesn’t cover administrative subpoenas, which are issued by federal agencies without prior judicial review. Last year, the FBI issued NSLs for the communications and financial records of more than 6,000 Americans—and the number has been far higher in previous years. The procedures that do apply to those tools have been redacted from publicly available versions of the FBI guidelines. Thus, it’s no shocker the AP seizure would seem like an “unprecedented intrusion” if the government doesn’t think it has to tell us about the precedents. And there’s no telling if the Justice Department rules (and the FBI’s interpretation) allow the feds to seize without warning other types of electronic communications records that could reveal a journalist’s e-mail, chat, or Web browsing activity.

    Is it paranoid to fear the Justice Department and the FBI are sidestepping the rules? Consider a case first reported in 2008 [7], and discussed at length in a damning (but heavily redacted) 2010 report [8] from the Justice Department’s Office of the Inspector General. In this instance, the FBI obtained nearly two years of phone records for lines belonging to Washington Post and New York Times bureaus and reporters—even though the FBI had initially requested records covering only seven months. In what the OIG called a “serious abuse of the FBI’s authority to obtain information,” agents seized these records under false pretenses, “without any legal process or Attorney General approval.” And these records remained in the FBI’s database for over three years before the OIG or the press found out [7].

    It gets worse. The OIG report noted that the FBI had made “community of interest” requests to phone carriers; these requests sweep in not only the target’s call records, but those of people the target has spoken with—which can include reporters. Such requests can provide investigators an incredibly revealing portrait of entire social networks. Yet the OIG found that agents used boilerplate requests for information from the carriers; some claimed they submitted the requests without actually knowing exactly what “community of interest” meant, and even when they did it didn’t necessarily occur to them that they were likely to obtain reporter records through such requests. In other words, FBI agents often made these requests without fully understanding what they were requesting.

    By Julian Sanchez | Fri May. 17, 2013 1:01 PM PDT

    Find this story at 17 May 2013

    Copyright ©2013 Mother Jones and the Foundation for National Progress.

    AP records seizure just latest step in sweeping U.S. leak probe

    WASHINGTON (Reuters) – The Justice Department’s controversial decision to seize phone records of Associated Press journalists was just one element in a sweeping U.S. government investigation into media leaks about a Yemen-based plot to bomb a U.S. airliner, government officials said on Wednesday.

    The search for who leaked the information is being led by the U.S. Attorney’s Office in Washington and has involved extensive FBI interviews of personnel at the Justice Department, U.S. intelligence agencies, the White House’s National Security staff and the FBI itself.

    The interviews have been lengthy and thorough, said people who have been questioned in the investigation, but requested anonymity. Two of those interviewed said leak inquiries were always aggressive and that being questioned is a wearing and unpleasant experience.

    The investigation, which a law enforcement official has said was prompted by a May 7, 2012, AP story about the operation to foil the Yemen plot, appears to be ongoing. Some potential witnesses have been advised they are likely to be interviewed in the next two or three weeks.

    Officials in the office of Ronald Machen, the U.S. attorney for the District of Columbia, could not immediately be reached for comment.

    Attorney General Eric Holder, who recused himself from involvement in the case, largely sidestepped questions from angry lawmakers on Wednesday about his department’s secret seizure of AP records, which the news agency revealed on Monday.

    The seizure, denounced by critics as a gross intrusion into freedom of the press, has created an uproar in Washington and led to questions about how the Obama administration is balancing the need for national security with privacy rights.

    There are signs the administration’s efforts to find the alleged leaker were unproductive – at least before the Justice Department seized two months of records of phone calls by the AP and its journalists.

    “Seeking toll records associated with media organizations is undertaken only after all other reasonable alternative investigative steps have been taken,” Holder’s deputy, James Cole, said in a letter on Tuesday to AP President Gary Pruitt, who has protested the government’s action.

    In that letter, Cole revealed the Justice Department had conducted more than 550 interviews and reviewed tens of thousands of documents before subpoenaing phone company records of AP calls.

    Reuters was one of nearly 50 news organizations that signed a letter to Holder on Tuesday complaining about the AP phone record seizures.

    ‘BREATHTAKING SCOPE’

    Floyd Abrams, a prominent First Amendment and media attorney, said, “The breathtaking scope of these subpoenas served on the telephone companies might suggest that after all this time, they have no idea who they’re looking for.”

    Another possibility is “they are touching all bases” because they suspect someone but are not sure, said Abrams, a partner at Cahill Gordon and Reindel LLP in New York. He said it was difficult for an outsider to know.

    “I don’t think that there is any doubt that this is a serious investigation that they have spent a lot of time on and that they feel deeply about,” Abrams said. Justice’s targeting of a large number of phone lines and the AP journalists who use them “taken together, certainly makes it look like the largest, most intrusive action by the government vis-a-vis the press that I can remember.”

    Holder has called the leak “very, very serious” and said it “put the American people at risk.” He did not provide details.

    The AP has reported that it delayed reporting the story of how the United States had foiled a plot by a suicide bomber affiliated with Yemen-based Al Qaeda in the Arabian Peninsula, or AQAP, at the request of government officials, who said it would jeopardize national security. Once U.S. officials said those concerns were allayed, the AP said, it disclosed the plot.

    A law enforcement official said on Wednesday that because officials were so concerned and shocked by the leak, they opened an investigation into how the AP found out about the spy operation even before the news agency ran its initial story. The AP had contacted the government and asked for comment several days before the story was published.

    The AP’s first story reported the CIA had “thwarted an ambitious plot” by AQAP to attack an airline with a newly designed underwear bomb and said the FBI had acquired the bomb. The AP reported it did not know what had happened to the alleged bomber.

    A few hours after the story was published, John Brennan, then chief White House counterterrorism adviser and now director of the CIA, held a conference call with former counterterrorism officials who frequently appear as TV commentators. Brennan said the plot was never a threat to the U.S. public or air safety because Washington had “inside control” over it.

    (Editing by Warren Strobel and Peter Cooney)
    Wed, May 15 2013

    By Mark Hosenball and Tabassum Zakaria

    Find this story at 15 May 2013

    © Thomson Reuters 2011. All rights reserved.

    Exclusive: Did White House “spin” tip a covert op?

    WASHINGTON (Reuters) – White House efforts to soft-pedal the danger from a new “underwear bomb” plot emanating from Yemen may have inadvertently broken the news they needed most to contain.

    At about 5:45 p.m. EDT on Monday, May 7, just before the evening newscasts, John Brennan, President Barack Obama’s top White House adviser on counter-terrorism, held a small, private teleconference to brief former counter-terrorism advisers who have become frequent commentators on TV news shows.

    According to five people familiar with the call, Brennan stressed that the plot was never a threat to the U.S. public or air safety because Washington had “inside control” over it.

    Brennan’s comment appears unintentionally to have helped lead to disclosure of the secret at the heart of a joint U.S.-British-Saudi undercover counter-terrorism operation.

    A few minutes after Brennan’s teleconference, on ABC’s World News Tonight, Richard Clarke, former chief of counter-terrorism in the Clinton White House and a participant on the Brennan call, said the underwear bomb plot “never came close because they had insider information, insider control.”

    A few hours later, Clarke, who is a regular consultant to the network, concluded on ABC’s Nightline that there was a Western spy or double-agent in on the plot: “The U.S. government is saying it never came close because they had insider information, insider control, which implies that they had somebody on the inside who wasn’t going to let it happen.”

    DOUBLE AGENT

    The next day’s headlines were filled with news of a U.S. spy planted inside Yemen-based Al Qaeda in the Arabian Peninsula (AQAP), who had acquired the latest, non-metallic model of the underwear bomb and handed it over to U.S. authorities.

    At stake was an operation that could not have been more sensitive — the successful penetration by Western spies of AQAP, al Qaeda’s most creative and lethal affiliate. As a result of leaks, the undercover operation had to be shut down.

    The initial story of the foiling of an underwear-bomb plot was broken by the Associated Press.

    According to National Security Council spokesman Tommy Vietor, due to its sensitivity, the AP initially agreed to a White House request to delay publication of the story for several days.

    But according to three government officials, a final deal on timing of publication fell apart over the AP’s insistence that no U.S. official would respond to the story for one clear hour after its release.

    When the administration rejected that demand as “untenable,” two officials said, the AP said it was going public with the story. At that point, Brennan was immediately called out of a meeting to take charge of damage control.

    Relevant agencies were instructed to prepare public statements and urged to notify Congressional oversight panels. Brennan then started the teleconference with potential TV commentators.

    White House officials and others on the call insist that Brennan disclosed no classified information during that conference call and chose his words carefully to avoid doing so.

    The AP denies any quid pro quo was requested by them or rejected by the White House. “At no point did AP offer or propose a deal with regard to this story,” said AP spokesman Paul Colford.

    As for his appearance on ABC, Richard Clarke acknowledges he made a logical “leap” when he said that “inside control” meant “there was human inside control rather than anything else I could imagine.” But he adds that over the course of a week, ABC “took extraordinary measures … to make sure” that nothing it was planning to broadcast would damage ongoing counter-terrorism operations.

    PREMATURE SHUTDOWN

    As a result of the news leaks, however, U.S. and allied officials told Reuters that they were forced to end an operation which they hoped could have continued for weeks or longer.

    Several days after the first leaks, counter-terrorism sources confirmed to Reuters that a central role in the operation had been played by MI-5 and MI-6, Britain’s ultra-secretive domestic and foreign intelligence services, whose relationship with their American counterparts has been periodically strained by concern about leaks.

    These sources acknowledged that British authorities were deeply distressed that anything at all had leaked out about the operation.

    The White House places the blame squarely on AP, calling the claim that Brennan contributed to a leak “ridiculous.”

    “It is well known that we use a range of intelligence capabilities to penetrate and monitor terrorist groups,” according to an official statement from the White House national security staff.

    (Reporting By Mark Hosenball; Editing by Warren Strobel and Jim Loney)

    Fri, May 18 2012

    By Mark Hosenball

    Find this story at 18 May 2013

    © Thomson Reuters 2011

    Here’s the story the AP suspects led to sweeping Justice Dept. subpoena

    The Department of Justice secretly obtained Associated Press phone records from 20 different phone lines over two months, according to the news agency. The subpoenaed phones records included personal and office lines for several national security reporters and editors as well as “the main number for AP reporters in the House of Representatives press gallery.”

    Presumably, now that the story has broken, public pressure will compel some sort of explanation from the Department of Justice or the Obama administration. In the meantime, the AP’s own story on the incident strongly suggests a theory for what happened: that the DoJ was looking for the source on the AP’s May 2012 story about a successful CIA operation to thwart a Yemen-based terror plot, a sort of underwear bomber part two.

    Here’s what the AP says in its story about the subpoena:

    The government would not say why it sought the records. U.S. officials have previously said in public testimony that the U.S. attorney in Washington is conducting a criminal investigation into who may have leaked information contained in a May 7, 2012, AP story about a foiled terror plot. The story disclosed details of a CIA operation in Yemen that stopped an al-Qaida plot in the spring of 2012 to detonate a bomb on an airplane bound for the United States.

    In testimony in February, CIA Director John Brennan noted that the FBI had questioned him about whether he was AP’s source, which he denied. He called the release of the information to the media about the terror plot an “unauthorized and dangerous disclosure of classified information.”

    And here’s a snip from the original May 2012 AP story that the agency believes may have started it all. Note that the story seems to cite both the FBI and CIA, as well as revealing that the bomb may not have been detectable by then-current airport security scanners:

    US officials say the plot involved an “upgrade” of the underwear bomb that failed to detonate aboard a jetliner over Detroit on Christmas Day in 2009.

    This new bomb was also built to be used in a passenger’s underwear but contained a more refined detonation system.

    The FBI is examining the latest bomb to see whether it could have passed through airport security and brought down an airplane, officials said. They said the device did not contain metal, meaning it probably could have passed through an airport metal detector. But it was not clear whether new body scanners used in many airports would have detected it.

    The would-be suicide bomber, based in Yemen, had not yet picked a target or bought his plane tickets when the CIA stepped in and seized the bomb, officials said. It is not immediately clear what happened to the alleged bomber.

    By Max Fisher, Updated: May 13, 2013

    Find this story at 13 May 2013

    © The Washington Post Company

    FBI Conducts Threat Assessment on Antiwar.Com Journalists for Linking to Publicly Available Document

    Antiwar.com has a troubling story detailing how what appears to be either an FBI counterintelligence investigation of suspected Israeli spies or an attempt to track down everyone who had posted terrorist watch lists online led to the FBI to investigate the site and Justin Raimondo and Eric Garris.

    The story is troubling for several reasons:
    The report on Antiwar.com reveals the FBI’s Electronic Communications Unit (the same one involved in using exigent letters to get community of interest phone numbers) was already monitoring Antiwar.com when the FBI did a threat analysis of them in 2004.
    Based on the fact that they had posted two watch lists, that a number of people under investigation read the site, and other redacted reasons, the FBI recommended a preliminary investigation into whether (basically) they were spying.
    The report cited electronic communications collected under FISA. While that may be no more than 4 FISA references in another case out of the Newark Office (which appears to be a prior investigation tied to the Israelis), that’s not clear that that’s the only FISA-collected information here.
    Whether or not the FBI already had used FISA on Antiwar.com, the low bar for PATRIOT powers (connection to a counterterrorist or counterintelligence investigation; the Israeli investigation would qualify) means the government could have used PATRIOT powers to investigate them.

    So here’s my analysis.

    Someone emailed Antiwar.com this set of FOIAed FBI documents. The documents appear to show that the FBI did some research on Antiwar.com in 2004 and recommended a Preliminary Investigation of them to see if they were spies. Their research appears to include 4 pieces of electronic communication collected under FISA, though it appears those were collected in another case.

    The Contents of the FBI File

    What follows assumes that the documents are authentic (Antiwar.com did not FOIA this themselves and they just received it out of the blue). It’s possible they’re an elaborate forgery, but they certainly appear to be valid FBI documents.

    Roughly speaking, here’s what’s included in the document packet as a whole.
    1-2: The faxed copy of a 302 (interview report) dated September 16, 2002 related to the Israelis
    3-4: A transfer document
    5-26: A document, dated October 4, 2002, documented the return and translation of evidence taken from the Israelis as well as xeroxes of the evidence
    27-29: An interview report dated October 2, 2002, first requested September 10, 2002
    30-32: An October 29, 2002 report on photos confiscated from an Israeli when he was detained on October 30, 2001
    33-34: An April 23, 2003 report on an earlier arrest of four Israelis on August 14, 2001
    35: Mostly blank cover sheet
    36-37: An FBI handwriting analysis of documents taken from the Israelis
    38-51: A report, dated July 10, 2003, summarizing and closing the case on the Israelis
    52-58: A report, dated July 10, 2003, summarizing the results of the case on the Israelis
    59-61: Paperwork from February and April 2004 reopening and transferring the investigation of the Israelis
    62-71: A 10-page report, dated April 30, 2004, on Raimondo, Garris, and Antiwar.com
    72-84: Web printouts of antiwar.com related information
    85-89: Paperwork related to the closure of the investigation into the 5 Israelis and the destruction of evidence collected from them
    90-94: FOIA notations

    Only the two bolded sections pertain to Antiwar.com. The rest (plus–it appears from the title of the Scribd file, http://www.scribd.com/doc/62394765/1138796-001-303A-NK-105536-Section-6-944900, which appears to come from the Newark case number–at least five other sections) describes the FBI’s investigation of the five Israelis alleged to have filmed the destruction of the World Trade Center (read pages 38-51 for the most complete description of the FBI investigation). The short version of the conclusion in that investigation is that the Israelis did have ties to the Israeli government, but did not appear to have foreknowledge of the attack.

    The Antiwar.com Threat Assessment appears to have been forwarded to the counterterrorism people working on the Israeli case; it’s likely the FOIA asked for everything relating to the Israeli investigation.

    The Genesis of the Antiwar.com Threat Assessment

    Which brings us to the report on Antiwar.com itself.

    It appears that, in March 2004, the FBI may have done a search of everyone who had a 9/11 “watch list” available online.

    An electronic communication from the Counterterrorism, NTCS/TWWU to all field offices, dated 03/24/2004, advised that the post-9/11 “watch list,” “Project Lookout,” was posted on the Internet and may contain the names of individuals of active investigative interest. Different versions of these lists may be found on the Internet. This assessment was conducted on the findings discovered on www.antiwar.com.

    The file doesn’t actually say whether that’s why the FBI started investigating Antiwar.com. Rather, it says,

    While conducting research on the Internet, an untitled spreadsheet , dated 10/03/2001, was discovered on the website antiwar.com.

    Given the recently reopened investigation into the Israelis at that time, the FBI may have found it in research on them and used the watch list directive to conduct further investigation. Or it may have just been the watch list directive.

    The FBI’s Research into Antiwar.com

    As Raimondo notes, he posted links to that document–sourced clearly to Cryptome–in this post on the Israelis.

    Ostensibly to figure out how and why he was posting a terrorist watch list, the FBI:
    Did searches on its Universal Index on both Garris and Raimondo (there was significant material on one of them)
    Did a scan of the Electronic Case File, apparently finding:
    One completely redacted file
    A counterintelligence report forwarded from the Counterintelligence office to the Office
    Several documents (from a different FBI office) that appear to be based on posts of Raimondo (these have serial numbers reading “315M/N-SL-188252), though the second is a Letterhead Memo
    A document citing Antiwar.com as a source of information on US military aid to Israel
    A report on a peaceful protest in the UK including a reference to an article handed out at the protest citing antiwar.com
    A report on a Neo-Nazi conference at which a member recommended reading Antiwar.com for information on the Middle East conflict
    The contents of a seized hard drive showing its owner visited Antiwar.com between July 2002 and June 2003.
    Recorded six more completely redacted entries
    Looked up details on DMV, Dun and Bradstreet, Lexis Nexis, business, and phone searches
    Looked up several other database searches the description of which are redacted
    Cited four FISA-derived references from a case file in Newark, but with no description of contents
    Referred to a bunch of other articles on Antiwar.com, both access via Lexis Nexis and via web searches.

    The FBI’s Verdict: Further Investigation

    All of which the FBI used to come to the following conclusion:

    The rights of individuals to post information and to express personal views on the Internet should be honored and protected; however, some material that is circulated on the Internet can compromise current active FBI investigations. The discovery of two detailed Excel spreadsheets posted on www.antiwar.com may not be significant by itself since distribution of the information on such lists are wide spread. Many agencies outside of law enforcement have been utilizing this information to screen their employees. Still it is unclear whether www.antiwar.com may only be posting research material compiled from multiple sources or if there is material posted that is singular in nature and not suitable for public released. There are several unanswered questions regarding antiwar.com. It describes itself as a non-profit group that survives on generous donations from its readers. Who are these contributors and what are the funds used for? [two lines redacted] on www.antiwar.com. If this is so, then what is his true name? Two facts have been established by this assessment. Many individuals worldwide do view this website including individuals who are currently under investigation and [one line redacted].

    With the recommendations (for DC’s corrupt ECAU office):

    It is recommended that ECAU further monitor the postings on the website www.antiwar.com.

    And in San Francisco:

    It is recommended that a [Preliminary Investigation] be opened to determine if [redacted] are engaging in, or have engaged in, activities which constitute a threat to National Security on behalf of a foreign power.

    Now, it’s bad enough the FBI doesn’t consider Antiwar.com a journalistic site at all. It’s also pretty appalling that they used pretty unnecessary questions to justify further investigation.

    And remember, the bar for the FBI to use First Amendment “protected” reasons to investigate someone have been lowered since 2004.

    Apparently, for the FBI, advocating for peace and making a publicly available PDF available constitutes sufficient threat to conduct a counterintelligence investigation.

    Posted on August 22, 2011 by emptywheel

    Find this story at 22 August 2011

    AntiWar.com Editors Sue Over FBI Surveillance

    WASHINGTON — Two editors of AntiWar.com sued the FBI on Tuesday, alleging that the bureau has failed to comply with a Freedom of Information Act (FOIA) request for documents about the government’s investigation of the website.

    FBI documents posted online show that the bureau recommended opening an investigation into the website in 2004 after it posted terrorist watch-lists online.

    The Huffington Post | By Ryan J. Reilly Posted: 05/21/2013 5:13 pm EDT | Updated: 05/21/2013 6:04 pm EDT

    Find this story at 21 May 2013

    Copyright © 2013 TheHuffingtonPost.com, Inc

    Transcript: Obama Addresses Counterterrorism, Drones

    President Obama waves after addressing his administration’s drone and counterterrorism policies, as well as the military prison at Guantanamo Bay, in a speech at the National Defense University in Washington, D.C., on Thursday.

    President Obama’s remarks at the National Defense University on Thursday, as released by the White House:

    Good afternoon, everybody. Please be seated.

    It is a great honor to return to the National Defense University. Here, at Fort McNair, Americans have served in uniform since 1791 — standing guard in the earliest days of the Republic, and contemplating the future of warfare here in the 21st century.

    For over two centuries, the United States has been bound together by founding documents that defined who we are as Americans, and served as our compass through every type of change. Matters of war and peace are no different. Americans are deeply ambivalent about war, but having fought for our independence, we know a price must be paid for freedom. From the Civil War to our struggle against fascism, on through the long twilight struggle of the Cold War, battlefields have changed and technology has evolved. But our commitment to constitutional principles has weathered every war, and every war has come to an end.

    With the collapse of the Berlin Wall, a new dawn of democracy took hold abroad, and a decade of peace and prosperity arrived here at home. And for a moment, it seemed the 21st century would be a tranquil time. And then, on September 11, 2001, we were shaken out of complacency. Thousands were taken from us, as clouds of fire and metal and ash descended upon a sun-filled morning. This was a different kind of war. No armies came to our shores, and our military was not the principal target. Instead, a group of terrorists came to kill as many civilians as they could.

    And so our nation went to war. We have now been at war for well over a decade. I won’t review the full history. What is clear is that we quickly drove al Qaeda out of Afghanistan, but then shifted our focus and began a new war in Iraq. And this carried significant consequences for our fight against al Qaeda, our standing in the world, and — to this day — our interests in a vital region.

    Meanwhile, we strengthened our defenses — hardening targets, tightening transportation security, giving law enforcement new tools to prevent terror. Most of these changes were sound. Some caused inconvenience. But some, like expanded surveillance, raised difficult questions about the balance that we strike between our interests in security and our values of privacy. And in some cases, I believe we compromised our basic values — by using torture to interrogate our enemies, and detaining individuals in a way that ran counter to the rule of law.

    So after I took office, we stepped up the war against al Qaeda but we also sought to change its course. We relentlessly targeted al Qaeda’s leadership. We ended the war in Iraq, and brought nearly 150,000 troops home. We pursued a new strategy in Afghanistan, and increased our training of Afghan forces. We unequivocally banned torture, affirmed our commitment to civilian courts, worked to align our policies with the rule of law, and expanded our consultations with Congress.

    Today, Osama bin Laden is dead, and so are most of his top lieutenants. There have been no large-scale attacks on the United States, and our homeland is more secure. Fewer of our troops are in harm’s way, and over the next 19 months they will continue to come home. Our alliances are strong, and so is our standing in the world. In sum, we are safer because of our efforts.

    Now, make no mistake, our nation is still threatened by terrorists. From Benghazi to Boston, we have been tragically reminded of that truth. But we have to recognize that the threat has shifted and evolved from the one that came to our shores on 9/11. With a decade of experience now to draw from, this is the moment to ask ourselves hard questions — about the nature of today’s threats and how we should confront them.

    And these questions matter to every American.

    For over the last decade, our nation has spent well over a trillion dollars on war, helping to explode our deficits and constraining our ability to nation-build here at home. Our servicemembers and their families have sacrificed far more on our behalf. Nearly 7,000 Americans have made the ultimate sacrifice. Many more have left a part of themselves on the battlefield, or brought the shadows of battle back home. From our use of drones to the detention of terrorist suspects, the decisions that we are making now will define the type of nation — and world — that we leave to our children.

    So America is at a crossroads. We must define the nature and scope of this struggle, or else it will define us. We have to be mindful of James Madison’s warning that “No nation could preserve its freedom in the midst of continual warfare.” Neither I, nor any President, can promise the total defeat of terror. We will never erase the evil that lies in the hearts of some human beings, nor stamp out every danger to our open society. But what we can do — what we must do — is dismantle networks that pose a direct danger to us, and make it less likely for new groups to gain a foothold, all the while maintaining the freedoms and ideals that we defend. And to define that strategy, we have to make decisions based not on fear, but on hard-earned wisdom. That begins with understanding the current threat that we face.

    Today, the core of al Qaeda in Afghanistan and Pakistan is on the path to defeat. Their remaining operatives spend more time thinking about their own safety than plotting against us. They did not direct the attacks in Benghazi or Boston. They’ve not carried out a successful attack on our homeland since 9/11.

    Instead, what we’ve seen is the emergence of various al Qaeda affiliates. From Yemen to Iraq, from Somalia to North Africa, the threat today is more diffuse, with Al Qaeda’s affiliates in the Arabian Peninsula — AQAP — the most active in plotting against our homeland. And while none of AQAP’s efforts approach the scale of 9/11, they have continued to plot acts of terror, like the attempt to blow up an airplane on Christmas Day in 2009.

    Unrest in the Arab world has also allowed extremists to gain a foothold in countries like Libya and Syria. But here, too, there are differences from 9/11. In some cases, we continue to confront state-sponsored networks like Hezbollah that engage in acts of terror to achieve political goals. Other of these groups are simply collections of local militias or extremists interested in seizing territory. And while we are vigilant for signs that these groups may pose a transnational threat, most are focused on operating in the countries and regions where they are based. And that means we’ll face more localized threats like what we saw in Benghazi, or the BP oil facility in Algeria, in which local operatives — perhaps in loose affiliation with regional networks — launch periodic attacks against Western diplomats, companies, and other soft targets, or resort to kidnapping and other criminal enterprises to fund their operations.

    And finally, we face a real threat from radicalized individuals here in the United States. Whether it’s a shooter at a Sikh Temple in Wisconsin, a plane flying into a building in Texas, or the extremists who killed 168 people at the Federal Building in Oklahoma City, America has confronted many forms of violent extremism in our history. Deranged or alienated individuals — often U.S. citizens or legal residents — can do enormous damage, particularly when inspired by larger notions of violent jihad. And that pull towards extremism appears to have led to the shooting at Fort Hood and the bombing of the Boston Marathon.

    So that’s the current threat — lethal yet less capable al Qaeda affiliates; threats to diplomatic facilities and businesses abroad; homegrown extremists. This is the future of terrorism. We have to take these threats seriously, and do all that we can to confront them. But as we shape our response, we have to recognize that the scale of this threat closely resembles the types of attacks we faced before 9/11.

    In the 1980s, we lost Americans to terrorism at our Embassy in Beirut; at our Marine Barracks in Lebanon; on a cruise ship at sea; at a disco in Berlin; and on a Pan Am flight — Flight 103 — over Lockerbie. In the 1990s, we lost Americans to terrorism at the World Trade Center; at our military facilities in Saudi Arabia; and at our Embassy in Kenya. These attacks were all brutal; they were all deadly; and we learned that left unchecked, these threats can grow. But if dealt with smartly and proportionally, these threats need not rise to the level that we saw on the eve of 9/11.

    Moreover, we have to recognize that these threats don’t arise in a vacuum. Most, though not all, of the terrorism we faced is fueled by a common ideology — a belief by some extremists that Islam is in conflict with the United States and the West, and that violence against Western targets, including civilians, is justified in pursuit of a larger cause. Of course, this ideology is based on a lie, for the United States is not at war with Islam. And this ideology is rejected by the vast majority of Muslims, who are the most frequent victims of terrorist attacks.

    Nevertheless, this ideology persists, and in an age when ideas and images can travel the globe in an instant, our response to terrorism can’t depend on military or law enforcement alone. We need all elements of national power to win a battle of wills, a battle of ideas. So what I want to discuss here today is the components of such a comprehensive counterterrorism strategy.

    First, we must finish the work of defeating al Qaeda and its associated forces.

    In Afghanistan, we will complete our transition to Afghan responsibility for that country’s security. Our troops will come home. Our combat mission will come to an end. And we will work with the Afghan government to train security forces, and sustain a counterterrorism force, which ensures that al Qaeda can never again establish a safe haven to launch attacks against us or our allies.

    Beyond Afghanistan, we must define our effort not as a boundless “global war on terror,” but rather as a series of persistent, targeted efforts to dismantle specific networks of violent extremists that threaten America. In many cases, this will involve partnerships with other countries. Already, thousands of Pakistani soldiers have lost their lives fighting extremists. In Yemen, we are supporting security forces that have reclaimed territory from AQAP. In Somalia, we helped a coalition of African nations push al-Shabaab out of its strongholds. In Mali, we’re providing military aid to French-led intervention to push back al Qaeda in the Maghreb, and help the people of Mali reclaim their future.

    Much of our best counterterrorism cooperation results in the gathering and sharing of intelligence, the arrest and prosecution of terrorists. And that’s how a Somali terrorist apprehended off the coast of Yemen is now in a prison in New York. That’s how we worked with European allies to disrupt plots from Denmark to Germany to the United Kingdom. That’s how intelligence collected with Saudi Arabia helped us stop a cargo plane from being blown up over the Atlantic. These partnerships work.

    But despite our strong preference for the detention and prosecution of terrorists, sometimes this approach is foreclosed. Al Qaeda and its affiliates try to gain foothold in some of the most distant and unforgiving places on Earth. They take refuge in remote tribal regions. They hide in caves and walled compounds. They train in empty deserts and rugged mountains.

    In some of these places — such as parts of Somalia and Yemen — the state only has the most tenuous reach into the territory. In other cases, the state lacks the capacity or will to take action. And it’s also not possible for America to simply deploy a team of Special Forces to capture every terrorist. Even when such an approach may be possible, there are places where it would pose profound risks to our troops and local civilians — where a terrorist compound cannot be breached without triggering a firefight with surrounding tribal communities, for example, that pose no threat to us; times when putting U.S. boots on the ground may trigger a major international crisis.

    To put it another way, our operation in Pakistan against Osama bin Laden cannot be the norm. The risks in that case were immense. The likelihood of capture, although that was our preference, was remote given the certainty that our folks would confront resistance. The fact that we did not find ourselves confronted with civilian casualties, or embroiled in an extended firefight, was a testament to the meticulous planning and professionalism of our Special Forces, but it also depended on some luck. And it was supported by massive infrastructure in Afghanistan.

    And even then, the cost to our relationship with Pakistan — and the backlash among the Pakistani public over encroachment on their territory — was so severe that we are just now beginning to rebuild this important partnership.

    So it is in this context that the United States has taken lethal, targeted action against al Qaeda and its associated forces, including with remotely piloted aircraft commonly referred to as drones.

    As was true in previous armed conflicts, this new technology raises profound questions — about who is targeted, and why; about civilian casualties, and the risk of creating new enemies; about the legality of such strikes under U.S. and international law; about accountability and morality. So let me address these questions.

    To begin with, our actions are effective. Don’t take my word for it. In the intelligence gathered at bin Laden’s compound, we found that he wrote, “We could lose the reserves to enemy’s air strikes. We cannot fight air strikes with explosives.” Other communications from al Qaeda operatives confirm this as well. Dozens of highly skilled al Qaeda commanders, trainers, bomb makers and operatives have been taken off the battlefield. Plots have been disrupted that would have targeted international aviation, U.S. transit systems, European cities and our troops in Afghanistan. Simply put, these strikes have saved lives.

    Moreover, America’s actions are legal. We were attacked on 9/11. Within a week, Congress overwhelmingly authorized the use of force. Under domestic law, and international law, the United States is at war with al Qaeda, the Taliban, and their associated forces. We are at war with an organization that right now would kill as many Americans as they could if we did not stop them first. So this is a just war — a war waged proportionally, in last resort, and in self-defense.

    And yet, as our fight enters a new phase, America’s legitimate claim of self-defense cannot be the end of the discussion. To say a military tactic is legal, or even effective, is not to say it is wise or moral in every instance. For the same human progress that gives us the technology to strike half a world away also demands the discipline to constrain that power — or risk abusing it. And that’s why, over the last four years, my administration has worked vigorously to establish a framework that governs our use of force against terrorists –- insisting upon clear guidelines, oversight and accountability that is now codified in Presidential Policy Guidance that I signed yesterday.

    In the Afghan war theater, we must — and will — continue to support our troops until the transition is complete at the end of 2014. And that means we will continue to take strikes against high value al Qaeda targets, but also against forces that are massing to support attacks on coalition forces. But by the end of 2014, we will no longer have the same need for force protection, and the progress we’ve made against core al Qaeda will reduce the need for unmanned strikes.

    Beyond the Afghan theater, we only target al Qaeda and its associated forces. And even then, the use of drones is heavily constrained. America does not take strikes when we have the ability to capture individual terrorists; our preference is always to detain, interrogate, and prosecute. America cannot take strikes wherever we choose; our actions are bound by consultations with partners, and respect for state sovereignty.

    America does not take strikes to punish individuals; we act against terrorists who pose a continuing and imminent threat to the American people, and when there are no other governments capable of effectively addressing the threat. And before any strike is taken, there must be near-certainty that no civilians will be killed or injured — the highest standard we can set.

    Now, this last point is critical, because much of the criticism about drone strikes — both here at home and abroad — understandably centers on reports of civilian casualties. There’s a wide gap between U.S. assessments of such casualties and nongovernmental reports. Nevertheless, it is a hard fact that U.S. strikes have resulted in civilian casualties, a risk that exists in every war. And for the families of those civilians, no words or legal construct can justify their loss. For me, and those in my chain of command, those deaths will haunt us as long as we live, just as we are haunted by the civilian casualties that have occurred throughout conventional fighting in Afghanistan and Iraq.

    But as Commander-in-Chief, I must weigh these heartbreaking tragedies against the alternatives. To do nothing in the face of terrorist networks would invite far more civilian casualties — not just in our cities at home and our facilities abroad, but also in the very places like Sana’a and Kabul and Mogadishu where terrorists seek a foothold. Remember that the terrorists we are after target civilians, and the death toll from their acts of terrorism against Muslims dwarfs any estimate of civilian casualties from drone strikes. So doing nothing is not an option.

    Where foreign governments cannot or will not effectively stop terrorism in their territory, the primary alternative to targeted lethal action would be the use of conventional military options. As I’ve already said, even small special operations carry enormous risks. Conventional airpower or missiles are far less precise than drones, and are likely to cause more civilian casualties and more local outrage. And invasions of these territories lead us to be viewed as occupying armies, unleash a torrent of unintended consequences, are difficult to contain, result in large numbers of civilian casualties and ultimately empower those who thrive on violent conflict.

    So it is false to assert that putting boots on the ground is less likely to result in civilian deaths or less likely to create enemies in the Muslim world. The results would be more U.S. deaths, more Black Hawks down, more confrontations with local populations, and an inevitable mission creep in support of such raids that could easily escalate into new wars.

    Yes, the conflict with al Qaeda, like all armed conflict, invites tragedy. But by narrowly targeting our action against those who want to kill us and not the people they hide among, we are choosing the course of action least likely to result in the loss of innocent life.

    Our efforts must be measured against the history of putting American troops in distant lands among hostile populations. In Vietnam, hundreds of thousands of civilians died in a war where the boundaries of battle were blurred. In Iraq and Afghanistan, despite the extraordinary courage and discipline of our troops, thousands of civilians have been killed. So neither conventional military action nor waiting for attacks to occur offers moral safe harbor, and neither does a sole reliance on law enforcement in territories that have no functioning police or security services — and indeed, have no functioning law.

    Now, this is not to say that the risks are not real. Any U.S. military action in foreign lands risks creating more enemies and impacts public opinion overseas. Moreover, our laws constrain the power of the President even during wartime, and I have taken an oath to defend the Constitution of the United States. The very precision of drone strikes and the necessary secrecy often involved in such actions can end up shielding our government from the public scrutiny that a troop deployment invites. It can also lead a President and his team to view drone strikes as a cure-all for terrorism.

    And for this reason, I’ve insisted on strong oversight of all lethal action. After I took office, my administration began briefing all strikes outside of Iraq and Afghanistan to the appropriate committees of Congress. Let me repeat that: Not only did Congress authorize the use of force, it is briefed on every strike that America takes. Every strike. That includes the one instance when we targeted an American citizen — Anwar Awlaki, the chief of external operations for AQAP.

    This week, I authorized the declassification of this action, and the deaths of three other Americans in drone strikes, to facilitate transparency and debate on this issue and to dismiss some of the more outlandish claims that have been made. For the record, I do not believe it would be constitutional for the government to target and kill any U.S. citizen — with a drone, or with a shotgun — without due process, nor should any President deploy armed drones over U.S. soil.

    But when a U.S. citizen goes abroad to wage war against America and is actively plotting to kill U.S. citizens, and when neither the United States, nor our partners are in a position to capture him before he carries out a plot, his citizenship should no more serve as a shield than a sniper shooting down on an innocent crowd should be protected from a SWAT team.

    That’s who Anwar Awlaki was — he was continuously trying to kill people. He helped oversee the 2010 plot to detonate explosive devices on two U.S.-bound cargo planes. He was involved in planning to blow up an airliner in 2009. When Farouk Abdulmutallab — the Christmas Day bomber — went to Yemen in 2009, Awlaki hosted him, approved his suicide operation, helped him tape a martyrdom video to be shown after the attack, and his last instructions were to blow up the airplane when it was over American soil. I would have detained and prosecuted Awlaki if we captured him before he carried out a plot, but we couldn’t. And as President, I would have been derelict in my duty had I not authorized the strike that took him out.

    Of course, the targeting of any American raises constitutional issues that are not present in other strikes — which is why my administration submitted information about Awlaki to the Department of Justice months before Awlaki was killed, and briefed the Congress before this strike as well. But the high threshold that we’ve set for taking lethal action applies to all potential terrorist targets, regardless of whether or not they are American citizens. This threshold respects the inherent dignity of every human life. Alongside the decision to put our men and women in uniform in harm’s way, the decision to use force against individuals or groups — even against a sworn enemy of the United States — is the hardest thing I do as President. But these decisions must be made, given my responsibility to protect the American people.

    Going forward, I’ve asked my administration to review proposals to extend oversight of lethal actions outside of warzones that go beyond our reporting to Congress. Each option has virtues in theory, but poses difficulties in practice. For example, the establishment of a special court to evaluate and authorize lethal action has the benefit of bringing a third branch of government into the process, but raises serious constitutional issues about presidential and judicial authority. Another idea that’s been suggested — the establishment of an independent oversight board in the executive branch — avoids those problems, but may introduce a layer of bureaucracy into national security decision-making, without inspiring additional public confidence in the process. But despite these challenges, I look forward to actively engaging Congress to explore these and other options for increased oversight.

    I believe, however, that the use of force must be seen as part of a larger discussion we need to have about a comprehensive counterterrorism strategy — because for all the focus on the use of force, force alone cannot make us safe. We cannot use force everywhere that a radical ideology takes root; and in the absence of a strategy that reduces the wellspring of extremism, a perpetual war — through drones or Special Forces or troop deployments — will prove self-defeating, and alter our country in troubling ways.

    So the next element of our strategy involves addressing the underlying grievances and conflicts that feed extremism — from North Africa to South Asia. As we’ve learned this past decade, this is a vast and complex undertaking. We must be humble in our expectation that we can quickly resolve deep-rooted problems like poverty and sectarian hatred. Moreover, no two countries are alike, and some will undergo chaotic change before things get better. But our security and our values demand that we make the effort.

    This means patiently supporting transitions to democracy in places like Egypt and Tunisia and Libya — because the peaceful realization of individual aspirations will serve as a rebuke to violent extremists. We must strengthen the opposition in Syria, while isolating extremist elements — because the end of a tyrant must not give way to the tyranny of terrorism. We are actively working to promote peace between Israelis and Palestinians — because it is right and because such a peace could help reshape attitudes in the region. And we must help countries modernize economies, upgrade education, and encourage entrepreneurship — because American leadership has always been elevated by our ability to connect with people’s hopes, and not simply their fears.

    And success on all these fronts requires sustained engagement, but it will also require resources. I know that foreign aid is one of the least popular expenditures that there is. That’s true for Democrats and Republicans — I’ve seen the polling — even though it amounts to less than one percent of the federal budget. In fact, a lot of folks think it’s 25 percent, if you ask people on the streets. Less than one percent — still wildly unpopular. But foreign assistance cannot be viewed as charity. It is fundamental to our national security. And it’s fundamental to any sensible long-term strategy to battle extremism.

    Moreover, foreign assistance is a tiny fraction of what we spend fighting wars that our assistance might ultimately prevent. For what we spent in a month in Iraq at the height of the war, we could be training security forces in Libya, maintaining peace agreements between Israel and its neighbors, feeding the hungry in Yemen, building schools in Pakistan, and creating reservoirs of goodwill that marginalize extremists. That has to be part of our strategy.

    Moreover, America cannot carry out this work if we don’t have diplomats serving in some very dangerous places. Over the past decade, we have strengthened security at our embassies, and I am implementing every recommendation of the Accountability Review Board, which found unacceptable failures in Benghazi. I’ve called on Congress to fully fund these efforts to bolster security and harden facilities, improve intelligence, and facilitate a quicker response time from our military if a crisis emerges.

    But even after we take these steps, some irreducible risks to our diplomats will remain. This is the price of being the world’s most powerful nation, particularly as a wave of change washes over the Arab World. And in balancing the trade4offs between security and active diplomacy, I firmly believe that any retreat from challenging regions will only increase the dangers that we face in the long run. And that’s why we should be grateful to those diplomats who are willing to serve.

    Targeted action against terrorists, effective partnerships, diplomatic engagement and assistance — through such a comprehensive strategy we can significantly reduce the chances of large-scale attacks on the homeland and mitigate threats to Americans overseas. But as we guard against dangers from abroad, we cannot neglect the daunting challenge of terrorism from within our borders.

    As I said earlier, this threat is not new. But technology and the Internet increase its frequency and in some cases its lethality. Today, a person can consume hateful propaganda, commit themselves to a violent agenda, and learn how to kill without leaving their home. To address this threat, two years ago my administration did a comprehensive review and engaged with law enforcement.

    And the best way to prevent violent extremism inspired by violent jihadists is to work with the Muslim American community — which has consistently rejected terrorism — to identify signs of radicalization and partner with law enforcement when an individual is drifting towards violence. And these partnerships can only work when we recognize that Muslims are a fundamental part of the American family. In fact, the success of American Muslims and our determination to guard against any encroachments on their civil liberties is the ultimate rebuke to those who say that we’re at war with Islam.

    Thwarting homegrown plots presents particular challenges in part because of our proud commitment to civil liberties for all who call America home. That’s why, in the years to come, we will have to keep working hard to strike the appropriate balance between our need for security and preserving those freedoms that make us who we are. That means reviewing the authorities of law enforcement, so we can intercept new types of communication, but also build in privacy protections to prevent abuse.

    That means that — even after Boston — we do not deport someone or throw somebody in prison in the absence of evidence. That means putting careful constraints on the tools the government uses to protect sensitive information, such as the state secrets doctrine. And that means finally having a strong Privacy and Civil Liberties Board to review those issues where our counterterrorism efforts and our values may come into tension.

    The Justice Department’s investigation of national security leaks offers a recent example of the challenges involved in striking the right balance between our security and our open society. As Commander-in-Chief, I believe we must keep information secret that protects our operations and our people in the field. To do so, we must enforce consequences for those who break the law and breach their commitment to protect classified information. But a free press is also essential for our democracy. That’s who we are. And I’m troubled by the possibility that leak investigations may chill the investigative journalism that holds government accountable.

    Journalists should not be at legal risk for doing their jobs. Our focus must be on those who break the law. And that’s why I’ve called on Congress to pass a media shield law to guard against government overreach. And I’ve raised these issues with the Attorney General, who shares my concerns. So he has agreed to review existing Department of Justice guidelines governing investigations that involve reporters, and he’ll convene a group of media organizations to hear their concerns as part of that review. And I’ve directed the Attorney General to report back to me by July 12th.

    Now, all these issues remind us that the choices we make about war can impact — in sometimes unintended ways — the openness and freedom on which our way of life depends. And that is why I intend to engage Congress about the existing Authorization to Use Military Force, or AUMF, to determine how we can continue to fight terrorism without keeping America on a perpetual wartime footing.

    The AUMF is now nearly 12 years old. The Afghan war is coming to an end. Core al Qaeda is a shell of its former self. Groups like AQAP must be dealt with, but in the years to come, not every collection of thugs that labels themselves al Qaeda will pose a credible threat to the United States. Unless we discipline our thinking, our definitions, our actions, we may be drawn into more wars we don’t need to fight, or continue to grant Presidents unbound powers more suited for traditional armed conflicts between nation states.

    So I look forward to engaging Congress and the American people in efforts to refine, and ultimately repeal, the AUMF’s mandate. And I will not sign laws designed to expand this mandate further. Our systematic effort to dismantle terrorist organizations must continue. But this war, like all wars, must end. That’s what history advises. That’s what our democracy demands.

    And that brings me to my final topic: the detention of terrorist suspects. I’m going to repeat one more time: As a matter of policy, the preference of the United States is to capture terrorist suspects. When we do detain a suspect, we interrogate them. And if the suspect can be prosecuted, we decide whether to try him in a civilian court or a military commission.

    During the past decade, the vast majority of those detained by our military were captured on the battlefield. In Iraq, we turned over thousands of prisoners as we ended the war. In Afghanistan, we have transitioned detention facilities to the Afghans, as part of the process of restoring Afghan sovereignty. So we bring law of war detention to an end, and we are committed to prosecuting terrorists wherever we can.

    The glaring exception to this time-tested approach is the detention center at Guantanamo Bay. The original premise for opening GTMO — that detainees would not be able to challenge their detention — was found unconstitutional five years ago. In the meantime, GTMO has become a symbol around the world for an America that flouts the rule of law. Our allies won’t cooperate with us if they think a terrorist will end up at GTMO.

    During a time of budget cuts, we spend $150 million each year to imprison 166 people — almost $1 million per prisoner. And the Department of Defense estimates that we must spend another $200 million to keep GTMO open at a time when we’re cutting investments in education and research here at home, and when the Pentagon is struggling with sequester and budget cuts.

    As President, I have tried to close GTMO. I transferred 67 detainees to other countries before Congress imposed restrictions to effectively prevent us from either transferring detainees to other countries or imprisoning them here in the United States.

    These restrictions make no sense. After all, under President Bush, some 530 detainees were transferred from GTMO with Congress’s support. When I ran for President the first time, John McCain supported closing GTMO — this was a bipartisan issue. No person has ever escaped one of our super-max or military prisons here in the United States — ever. Our courts have convicted hundreds of people for terrorism or terrorism-related offenses, including some folks who are more dangerous than most GTMO detainees. They’re in our prisons.

    And given my administration’s relentless pursuit of al Qaeda’s leadership, there is no justification beyond politics for Congress to prevent us from closing a facility that should have never have been opened. (Applause.)

    AUDIENCE MEMBER: Excuse me, President Obama —

    THE PRESIDENT: So — let me finish, ma’am. So today, once again —

    AUDIENCE MEMBER: There are 102 people on a hunger strike. These are desperate people.

    THE PRESIDENT: I’m about to address it, ma’am, but you’ve got to let me speak. I’m about to address it.

    AUDIENCE MEMBER: You’re our Commander-In-Chief —

    THE PRESIDENT: Let me address it.

    AUDIENCE MEMBER: — you an close Guantanamo Bay.

    THE PRESIDENT: Why don’t you let me address it, ma’am.

    AUDIENCE MEMBER: There’s still prisoners —

    THE PRESIDENT: Why don’t you sit down and I will tell you exactly what I’m going to do.

    AUDIENCE MEMBER: That includes 57 Yemenis.

    THE PRESIDENT: Thank you, ma’am. Thank you. (Applause.) Ma’am, thank you. You should let me finish my sentence.

    Today, I once again call on Congress to lift the restrictions on detainee transfers from GTMO. (Applause.)

    I have asked the Department of Defense to designate a site in the United States where we can hold military commissions. I’m appointing a new senior envoy at the State Department and Defense Department whose sole responsibility will be to achieve the transfer of detainees to third countries.

    I am lifting the moratorium on detainee transfers to Yemen so we can review them on a case-by-case basis. To the greatest extent possible, we will transfer detainees who have been cleared to go to other countries.

    AUDIENCE MEMBER: — prisoners already. Release them today.

    THE PRESIDENT: Where appropriate, we will bring terrorists to justice in our courts and our military justice system. And we will insist that judicial review be available for every detainee.

    AUDIENCE MEMBER: It needs to be —

    THE PRESIDENT: Now, ma’am, let me finish. Let me finish, ma’am. Part of free speech is you being able to speak, but also, you listening and me being able to speak. (Applause.)

    Now, even after we take these steps one issue will remain — just how to deal with those GTMO detainees who we know have participated in dangerous plots or attacks but who cannot be prosecuted, for example, because the evidence against them has been compromised or is inadmissible in a court of law. But once we commit to a process of closing GTMO, I am confident that this legacy problem can be resolved, consistent with our commitment to the rule of law.

    I know the politics are hard. But history will cast a harsh judgment on this aspect of our fight against terrorism and those of us who fail to end it. Imagine a future — 10 years from now or 20 years from now — when the United States of America is still holding people who have been charged with no crime on a piece of land that is not part of our country. Look at the current situation, where we are force-feeding detainees who are being held on a hunger strike. I’m willing to cut the young lady who interrupted me some slack because it’s worth being passionate about. Is this who we are? Is that something our Founders foresaw? Is that the America we want to leave our children? Our sense of justice is stronger than that.

    We have prosecuted scores of terrorists in our courts. That includes Umar Farouk Abdulmutallab, who tried to blow up an airplane over Detroit; and Faisal Shahzad, who put a car bomb in Times Square. It’s in a court of law that we will try Dzhokhar Tsarnaev, who is accused of bombing the Boston Marathon. Richard Reid, the shoe bomber, is, as we speak, serving a life sentence in a maximum security prison here in the United States. In sentencing Reid, Judge William Young told him, “The way we treat you…is the measure of our own liberties.”

    AUDIENCE MEMBER: How about Abdulmutallab — locking up a 16-year-old — is that the way we treat a 16-year old? (Inaudible) — can you take the drones out of the hands of the CIA? Can you stop the signature strikes killing people on the basis of suspicious activities?

    THE PRESIDENT: We’re addressing that, ma’am.

    AUDIENCE MEMBER: — thousands of Muslims that got killed — will you compensate the innocent families — that will make us safer here at home. I love my country. I love (inaudible) —

    THE PRESIDENT: I think that — and I’m going off script, as you might expect here. (Laughter and applause.) The voice of that woman is worth paying attention to. (Applause.) Obviously, I do not agree with much of what she said, and obviously she wasn’t listening to me in much of what I said. But these are tough issues, and the suggestion that we can gloss over them is wrong.

    When that judge sentenced Mr. Reid, the shoe bomber, he went on to point to the American flag that flew in the courtroom. “That flag,” he said, “will fly there long after this is all forgotten. That flag still stands for freedom.”

    So, America, we’ve faced down dangers far greater than al Qaeda. By staying true to the values of our founding, and by using our constitutional compass, we have overcome slavery and Civil War and fascism and communism. In just these last few years as President, I’ve watched the American people bounce back from painful recession, mass shootings, natural disasters like the recent tornados that devastated Oklahoma. These events were heartbreaking; they shook our communities to the core. But because of the resilience of the American people, these events could not come close to breaking us.

    I think of Lauren Manning, the 9/11 survivor who had severe burns over 80 percent of her body, who said, “That’s my reality. I put a Band-Aid on it, literally, and I move on.”

    I think of the New Yorkers who filled Times Square the day after an attempted car bomb as if nothing had happened.

    I think of the proud Pakistani parents who, after their daughter was invited to the White House, wrote to us, “We have raised an American Muslim daughter to dream big and never give up because it does pay off.”

    I think of all the wounded warriors rebuilding their lives, and helping other vets to find jobs.

    I think of the runner planning to do the 2014 Boston Marathon, who said, “Next year, you’re going to have more people than ever. Determination is not something to be messed with.”

    That’s who the American people are — determined, and not to be messed with. And now we need a strategy and a politics that reflects this resilient spirit.

    Our victory against terrorism won’t be measured in a surrender ceremony at a battleship, or a statue being pulled to the ground. Victory will be measured in parents taking their kids to school; immigrants coming to our shores; fans taking in a ballgame; a veteran starting a business; a bustling city street; a citizen shouting her concerns at a President.

    The quiet determination; that strength of character and bond of fellowship; that refutation of fear — that is both our sword and our shield. And long after the current messengers of hate have faded from the world’s memory, alongside the brutal despots, and deranged madmen, and ruthless demagogues who litter history — the flag of the United States will still wave from small-town cemeteries to national monuments, to distant outposts abroad. And that flag will still stand for freedom.

    Thank you very, everybody. God bless you. May God bless the United States of America. (Applause.)

    May 23, 2013 3:29 PM

    Find this story at 23 May 2013

    Obama reframes counterterrorism policy with new rules on drones

    In a major address Thursday President Barack Obama sought to reframe the nation’s counterterrorism strategy, saying, “Our systematic effort to dismantle terrorist organizations must continue. But this war, like all wars, must end. That’s what history advises. That’s what our democracy demands.”

    Speaking at the National Defense University in Washington Obama said, “America is at a crossroads. We must define our effort not as a boundless ‘global war on terror’ – but rather as a series of persistent, targeted efforts to dismantle specific networks of violent extremists that threaten America.”

    In an attempt to define a new post-Sept. 11 era, Obama outlined new guidelines for the use of drones to kill terrorists overseas and pledged a

    President Barack Obama discusses civilian casualties resulting from U.S. drone strikes while speaking Thursday at the National Defense University

    renewed effort to close the military detention center in Guantanamo Bay. In the speech, Obama argued that, “In the years to come, not every collection of thugs that labels themselves al Qaida will pose a credible threat to the United States.” He warned that “unless we discipline our thinking and our actions, we may be drawn into more wars we don’t need to fight.”

    With efforts under way in Congress to redefine the 2001 authorization to use military force (AUMF) against al Qaida, Obama said he would work with Congress “in efforts to refine, and ultimately repeal, the AUMF’s mandate. And I will not sign laws designed to expand this mandate further.”

    Toward the end of Obama’s address as he discussed the Guantanamo detainees, he was repeatedly interrupted by heckling from Medea Benjamin, founder of the antiwar group Code Pink, whose members have frequently been arrested for disrupting hearings on Capitol Hill – but Obama patiently said that Benjamin’s concerns are “something to be passionate about.”

    “We must define the nature and scope of this struggle, or else it will define us, mindful of James Madison’s warning that ‘No nation could preserve its freedom in the midst of continual warfare.’ Neither I, nor any president, can promise the total defeat of terror,” he declared.

    As part of his redefinition of counterterrorism, the president announced several initiatives:
    Setting narrower parameters for the use of remotely piloted aircraft, or drones, to kill terrorists overseas and to limit collateral casualties;
    Renewing efforts to persuade Congress to agree to close the Guantanamo detention site in Cuba where 110 terrorist suspects are being held;
    Appointing a new envoy at the State Department and an official at the Defense Department who will attempt to negotiate transfers of Guantanamo detainees to other countries.
    Lifting the moratorium he imposed in 2010 on transferring some detainees at Guantanamo to Yemen. Obama imposed that moratorium after it was revealed that Detroit “underwear bomber” Umar Farouq Abdulmuttalab was trained in Yemen.

    Obama argued that when compared to the Sept. 11, 2001 attackers, “the threat today is more diffuse, with Al Qaida’s affiliates in the

    President Barack Obama talks about national security, Thursday, May 23, 2013, at the National Defense University at Fort McNair in Washington.

    Arabian Peninsula – AQAP – the most active in plotting against our homeland. While none of AQAP’s efforts approach the scale of 9/11 they have continued to plot acts of terror, like the attempt to blow up an airplane on Christmas Day in 2009.”

    So he said, “As we shape our response, we have to recognize that the scale of this threat closely resembles the types of attacks we faced before 9/11.”

    He said that the current threat is often from “deranged or alienated individuals – often U.S. citizens or legal residents – (who) can do enormous damage, particularly when inspired by larger notions of violent jihad. That pull towards extremism appears to have led to the shooting at Fort Hood, and the bombing of the Boston Marathon.”

    In discussing his drone strategy he indicated his remorse over the innocent people who had been killed: “it is a hard fact that U.S. strikes have resulted in civilian casualties, a risk that exists in all wars. For the families of those civilians, no words or legal construct can justify their loss. For me, and those in my chain of command, these deaths will haunt us as long as we live, just as we are haunted by the civilian casualties that have occurred through conventional fighting in Afghanistan and Iraq.”

    There remains considerable doubt about Obama’s ability to persuade a majority in Congress to change the current law on releasing detainees held there.

    Demonstrators stand near a mock drone at the gates of Fort McNair where President Barack Obama will speak at the National Defense University in Washington May 23, 2013.

    The defense spending bill which Obama signed into law last year prohibits any transfers to the United States of any detainee at Guantanamo who was held there on or before Jan. 20, 2009, the day Obama became president.

    And the law sets a very high legal bar for Defense Secretary Chuck Hagel to transfer a detainee to his country of origin or to any other foreign country.

    Hagel would need to certify to Congress that the detainee will not be transferred to a country that is a designated state sponsor of terrorism. The country must have agreed to take steps to ensure that the detainee cannot take action to threaten the United States, U.S. citizens, or its allies in the future.

    The law allows Hagel to use waivers in some cases to transfer detainees.

    In a mostly skeptical and sometimes dismissive reaction to Obama’s speech, key Republican senators said at a press conference that he still had not offered a coherent plan for what to do with the different types of detainees held at Guantanamo, some of whom they said need to be held indefinitely, while others might be eligible for release.

    Obama’s 2008 opponent, Sen. John McCain, R- Ariz., said that “to somehow argue that al Qaida is ‘on the run’ comes from a degree of unreality that to me is really incredible.” He argued that al Qaida is “expanding all over the Middle East” and in North Africa. He said repealing the congressional authorization to use military force “contradicts the reality of the facts on the ground.”

    By Tom Curry, National Affairs Writer, NBC News

    This story was originally published on Thu May 23, 2013 2:00 PM EDT

    Find this story at 23 May 2013

    © 2013 NBCNews.com

     

     

    << oudere artikelen  nieuwere artikelen >>