• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Most Terrorist Plots in the US Aren’t Invented by Al Qaeda — They’re Manufactured by the FBI

    The following is an excerpt from The Terror Factory: Inside the FBI’s Manufactured War on Terrorism [3] by Trevor Aaronson (Ig Publishing, 2012).

    Antonio Martinez was a punk. The twenty-two-year-old from Baltimore was chunky, with a wide nose and jet-black hair pulled back close to his scalp and tied into long braids that hung past his shoulders. He preferred to be called Muhammad Hussain, the name he gave himself following his conversion to Islam. But his mother still called him Tony, and she couldn’t understand her son’s burning desire to be the Maryland Mujahideen.

    As a young man, Martinez had been angry and lost. He’d dropped out of Laurel High School, in Prince George’s County, Maryland, and spent his teens as a small-time thief in the Washington, D.C., suburbs. By the age of sixteen, he’d been charged with armed robbery. In February 2008, at the age of eighteen, he tried to steal a car. Catholic University doctoral student Daniel Tobin was looking out of the window of his apartment one day when he saw a man driving off in his car. Tobin gave chase, running between apartment buildings and finally catching up to the stolen vehicle. He opened the passenger-side door and got in. Martinez, in the driver’s seat, dashed out and ran away on foot. Jumping behind the wheel, Tobin followed the would-be car thief. “You may as well give up running,” he yelled at Martinez. Martinez was apprehended and charged with grand theft of a motor vehicle—he had stolen the vehicle using an extra set of car keys which had gone missing when someone had broken into Tobin’s apartment earlier. However, prosecutors dropped the charges against Martinez after Tobin failed to appear in court.

    Despite the close call, Martinez’s petty crimes continued. One month after the car theft, he and a friend approached a cashier at a Safeway grocery store, acting as if they wanted to buy potato chips. When the cashier opened the register, Martinez and his friend grabbed as much money as they could and ran out of the store. The cashier and store manager chased after them, and later identified the pair to police. Martinez pleaded guilty to theft of one hundred dollars and received a ninety-day suspended sentence, plus six months of probation.

    Searching for greater meaning in his life, Martinez was baptized and became a Christian when he was twenty-one years old, but he didn’t stick with the religion. “He said he tried the Christian thing. He just really didn’t understand it,” said Alisha Legrand, a former girlfriend. Martinez chose Islam instead. On his Facebook page, Martinez wrote that he was “just a yung brotha from the wrong side of the tracks who embraced Islam.” But for reasons that have never been clear to his family and friends, Martinez drifted toward a violent, extremist brand of Islam. When the FBI discovered him, Martinez was an angry extremist mouthing off on Facebook about violence, with misspelled posts such as, “The sword is cummin the reign of oppression is about 2 cease inshallah.” Based on the Facebook postings alone, an FBI agent gave an informant the “green light” to get to know Martinez and determine if he had a propensity for violence. In other words, to see if he was dangerous.

    The government was setting the trap.

    On the evening of December 2, 2010, Martinez was in another Muslim’s car as they drove through Baltimore. A hidden device recorded their conversation. His mother had called, and Martinez had just finished talking to her on his cell phone. He was aggravated. “She wants me to be like everybody else, being in school, working,” he told his friend. “For me, it’s different. I have this zeal for deen and she doesn’t understand that.” Martinez’s mother didn’t know that her son had just left a meeting with a purported Afghan-born terrorist who had agreed to provide him with a car bomb. But she wasn’t the only one in the dark that night. Martinez himself didn’t know his new terrorist friend was an undercover agent with the Federal Bureau of Investigation and that the man driving the car—a man he’d met only a few weeks earlier—was a paid informant for federal law enforcement.

    Five days later, Martinez met again with the man he believed to be a terrorist. The informant was there, too. They were all, Martinez believed, brothers in arms and in Islam. In a parking lot near the Armed Forces Career Center on Baltimore National Pike, Martinez, the informant, and the undercover FBI agent piled into an SUV, where the undercover agent showed Martinez the device that would detonate the car bomb and how to use it. He then unveiled to the twenty-two-year-old the bomb in the back of the SUV and demonstrated what he’d need to do to activate it. “I’m ready, man,” Martinez said. “It ain’t like you seein’ it on the news. You gonna be there. You gonna hear the bomb go off. You gonna be, uh, shooting, gettin’ shot at. It’s gonna be real. … I’m excited, man.”

    That night, Martinez, who had little experience behind the wheel of a car, needed to practice driving the SUV around the empty parking lot. Once he felt comfortable doing what most teenagers can do easily, Martinez and his associates devised a plan: Martinez would park the bomb-on-wheels in the parking lot outside the military recruiting center. One of his associates would then pick him up, and they’d drive together to a vantage point where Martinez could detonate the bomb and delight in the resulting chaos and carnage.

    The next morning, the three men put their plan into action. Martinez hopped into the SUV and activated the bomb, as he’d been instructed, and then drove to the military recruiting station. He parked right in front. The informant, trailing in another car, picked up Martinez and drove him to the vantage point, just as planned. Everything was falling into place, and Martinez was about to launch his first attack in what he hoped would be for him a lifetime of jihad against the only nation he had ever known.

    Looking out at the military recruiting station, Martinez lifted the detonation device and triggered the bomb. Smiling, he watched expectantly. Nothing happened. Suddenly, FBI agents rushed in and arrested the man they’d later identify in court records as “Antonio Martinez a/k/a Muhammad Hussain.” Federal prosecutors in Maryland charged Martinez with attempted murder of federal officers and attempted use of a weapon of mass destruction. He faced at least thirty-five years in prison if convicted at trial.

    “This is not Tony,” a woman identifying herself as Martinez’s mother told a reporter after the arrest. “I think he was brainwashed with that Islam crap.” Joseph Balter, a federal public defender, told the court during a detention hearing that FBI agents had entrapped Martinez, whom he referred to by his chosen name. The terrorist plot was, Balter said, “the creation of the government—a creation which was implanted into Mr. Hussain’s mind.” He added: “There was nothing provided which showed that Mr. Hussain had any ability whatsoever to carry out any kind of plan.”

    Despite Balter’s claims, a little more than a year after his indictment, Martinez chose not to challenge the government’s charges in court. On January 26, 2012, Martinez dropped his entrapment defense and pleaded guilty to attempted use of a weapon of mass destruction under a deal that will require him to serve twenty-five years in prison—more years than he’s been alive. Neither Martinez nor Balter would comment on the reasons they chose a plea agreement, though in a sentencing hearing, Balter told the judge he believed the entire case could have been avoided had the FBI counseled, rather than encouraged, Martinez.

    The U.S. Department of Justice touted the conviction as another example of the government keeping citizens safe from terrorists. “We are catching dangerous suspects before they strike, and we are investigating them in a way that maximizes the liberty and security of law-abiding citizens,” U.S. attorney for the District of Maryland Rod J. Rosenstein said in a statement announcing Martinez’s plea agreement. “That is what the American people expect of the Justice Department, and that is what we aim to deliver.”

    Indeed, that is exactly what the Justice Department and the Federal Bureau of Investigation have been delivering throughout the decade since the attacks of September 11, 2001. But whether it’s what the American people expect is questionable, because most Americans today have no idea that since 9/11, one single organization has been responsible for hatching and financing more terrorist plots in the United States than any other. That organization isn’t Al Qaeda, the terrorist network founded by Osama bin Laden and responsible for the spectacular 2001 attacks on New York’s World Trade Center and the Pentagon in Washington, D.C. And it isn’t Lashkar-e-Taiba, Jaish-e-Mohammed, Al-Shabaab, Hamas, Palestinian Islamic Jihad, or any of the other more than forty U.S.-designated foreign terrorist organizations. No, the organization responsible for more terrorist plots over the last decade than any other is the FBI. Through elaborate and expensive sting operations involving informants and undercover agents posing as terrorists, the FBI has arrested and the Justice Department has prosecuted dozens of men government officials say posed direct—but by no means immediate or credible—threats to the United States.

    Just as in the Martinez case, in terrorism sting after terrorism sting, FBI and DOJ officials have hosted high-profile press conferences to announce yet another foiled terrorist plot. But what isn’t publicized during these press conferences is the fact that government-described terrorists such as Antonio Martinez were able to carry forward with their potentially lethal plots only because FBI informants and agents provided them with all of the means—in most cases delivering weapons and equipment, in some cases even paying for rent and doling out a little spending money to keep targets on the hook. In cities around the country where terrorism sting operations have occurred—among them New York City, Albany, Chicago, Miami, Baltimore, Portland, Tampa, Houston, and Dallas—a central question exists: Is the FBI catching terrorists or creating them?

    In the years since the attacks of September 11, 2001, the federal law enforcement profile of a terrorist has changed dramatically. The men responsible for downing the World Trade Center were disciplined and patient; they were also living and training in the United States with money from an Al Qaeda cell led by Kuwaiti-born Khalid Sheikh Mohammad. In the days and weeks following 9/11, federal officials anxiously awaited a second wave of attacks, which would be launched, they believed at the time, by several sleeper cells around the country. But the feared second wave never crashed ashore. Instead, the United States and allied nations invaded Afghanistan, Al Qaeda’s home base, and forced Osama bin Laden and his deputies into hiding. Bruised and hunted, Al Qaeda no longer had the capability to train terrorists and send them to the United States.

    In response, Al Qaeda’s leaders moved to what FBI officials describe as a “franchise model.” If you can’t run Al Qaeda as a hierarchal, centrally organized outfit, the theory went, run it as a franchise. In other words, export ideas—not terrorists. Al Qaeda and its affiliated organizations went online, setting up websites and forums dedicated to instilling their beliefs in disenfranchised Muslims already living in Western nations. A slickly designed magazine, appropriately titled Inspire, quickly followed. Article headlines included “I Am Proud to Be a Traitor to America,”9 and “Why Did I Choose Al-Qaeda?” Anwar al-Awlaki, the American-born, high-ranking Al Qaeda official who was killed in a U.S. drone strike in Yemen on September 30, 2011, became something of the terrorist organization’s Dear Abby. Have a question about Islam? Ask Anwar! Muslim men in nations throughout the Western world would email him questions, and al-Awlaki would reply dutifully, and in English, encouraging many of his electronic pen pals to violent action. Al-Awlaki also kept a blog and a Facebook page, and regularly posted recruitment videos to YouTube. He said in one video:

    I specifically invite the youth to either fight in the West or join their brothers in the fronts of jihad: Afghanistan, Iraq, and Somalia.

    I invite them to join us in our new front, Yemen, the base from which the great jihad of the Arabian Peninsula will begin, the base from which the greatest army of Islam will march forth.

    Al Qaeda’s move to a franchise model met with some success. U.S. army major Nadal Hassan, for example, corresponded with al-Awlaki before he killed thirteen people and wounded twenty-nine others in the Fort Hood, Texas, shootings in 2009. Antonio Martinez and other American-born men, many of them recent converts to Islam, also sent al-Awlaki messages or watched Al Qaeda propaganda videos online before moving forward in alleged terrorist plots.

    The FBI has a term for Martinez and other alleged terrorists like him: lone wolf. Officials at the Bureau now believe that the next terrorist attack will likely come from a lone wolf, and this belief is at the core of a federal law enforcement policy known variously as preemption, prevention, and disruption. FBI counterterrorism agents want to catch terrorists before they act, and to accomplish this, federal law enforcement officials have in the decade since 9/11 created the largest domestic spying network ever to exist in the United States. In fact, the FBI today has ten times as many informants as it did in the 1960s, when former FBI director J. Edgar Hoover made the Bureau infamous for inserting spies into organizations as varied as Reverend Dr. Martin Luther King Jr.’s and the Ku Klux Klan. Modern FBI informants aren’t burrowing into political groups, however; they are focused on terrorism, on identifying today the terrorist of tomorrow, and U.S. government officials acknowledge that while terrorist threats do exist from domestic organizations, such as white supremacist groups and the sovereign citizen movement, they believe the greatest threat comes from within U.S. Muslim communities due, in large part, to the aftereffects of the shock and awe Al Qaeda delivered on September 11, 2001.

    The FBI’s vast army of spies, located in every community in the United States with enough Muslims to support a mosque, has one primary function: to identify the next lone wolf. According to the Bureau, a lone wolf is likely to be a single male age sixteen to thirty-five. Therefore, informants and their FBI handlers are on the lookout for young Muslims who espouse radical beliefs, are vocal about their disapproval of U.S. foreign policy, or have expressed sympathy for international terrorist groups. If they find anyone who meets the criteria, they move him to the next stage: the sting, in which an FBI informant, posing as a terrorist, offers to help facilitate a terrorist attack for the target.

    On a cold February morning in 2011, I met with Peter Ahearn, a retired FBI special agent who directed the Western New York Joint Terrorism Task Force, in a coffee shop outside Washington, D.C., to talk about how the FBI runs its operations. Ahearn was among the Bureau’s vanguard as it transformed into a counterterrorism organization in the wake of 9/11. An average-built man with a small dimple on his chin and close-cropped brown hair receding in the front, Ahearn oversaw one of the earliest post-9/11 terrorism investigations, involving the so-called Lackawanna Six—a group of six Yemeni-American men living outside Buffalo, New York, who attended a training camp in Afghanistan and were convicted of providing material support to Al Qaeda. “If you’re doing a sting right, you’re offering the target multiple chances to back out,” Ahearn told me. “Real people don’t say, ‘Yeah, let’s go bomb that place.’ Real people call the cops.”

    Indeed, while terrorism sting operations are a new practice for the Bureau, they are an evolution of an FBI tactic that has for decades captured the imaginations of Hollywood filmmakers. In 1982, as the illegal drug trade overwhelmed local police resources nationwide and contributed to an increase in violent crime, President Ronald Reagan’s first attorney general, William French Smith, gave the FBI jurisdiction over federal drug crimes, which previously had been the exclusive domain of the U.S. Drug Enforcement Administration. Eager to show up their DEA rivals, FBI agents began aggressively sending undercover agents into America’s cities. This was relatively new territory for the FBI, which, during Hoover’s thirty-seven-year stewardship, had mandated that agents wear a suit and tie at all times, federal law enforcement badge easily accessible from the coat pocket. But an increasingly powerful Mafia and the bloody drug war compelled the FBI to begin enforcing federal laws from the street level. In searching for drug crimes, FBI agents hunted sellers as well as buyers, and soon learned one of the best strategies was to become part of the action.

    Most people have no doubt seen drug sting operations as portrayed in countless movies and television shows. At its most cliché, the scene is set in a Miami high-rise apartment, its floor-to-ceiling windows overlooking the cresting waves of the Atlantic Ocean. There’s a man seated at the dining table; he’s longhaired, with a scruffy face, and he has a briefcase next to him. But that’s not all. Hidden on the other side of the room is a camera making a grainy black-and-white recording of the entire scene. The apartment’s door swings open and two men saunter in, the camera recording their every move and word. Everyone sits down at the table. The two men hand over bundles of cash. The scruffy man then hands over the briefcase. The two guests of course expect to find cocaine inside. Instead, the briefcase is empty, and as soon as they open it to find the drugs missing, FBI agents rush in, guns drawn for the takedown. Federal law enforcement officials call this type of sting operation a “no-dope bust,” and it has been an effective tool for decades. It’s also the direct predecessor to today’s terrorism sting. Instead of empty briefcases, the FBI today uses inert bombs and disabled assault rifles, and now that counter-terrorism is the Bureau’s top priority, the investigation of major drug crimes has largely fallen back to the DEA. Just as no-dope busts resulted in the arrest and prosecution of those in the drug trade in the twentieth century, terrorism sting operations are resulting in the arrest and prosecution of would-be terrorists in this century.

    While the assumptions behind drug stings and terrorism stings are similar, there is a fundamental flaw in the assumption underpinning the latter. In drug stings, federal law enforcement officials assume that any buyer caught in a sting would have been able to buy or sell drugs elsewhere had that buyer not fallen into the FBI trap. The numbers support this assumption. In 2010, the most recent year for which data is available, the DEA seized 29,179 kilograms, or 64,328 pounds, of cocaine in the United States. Likewise, in terrorism stings, federal law enforcement officials assume that any would-be terrorists caught in a sting would have been able to acquire the means elsewhere to carry out their violent plans had they not been ensnared by the FBI. The problem with this assumption is that no data exists to support it, and what data is available suggests would-be Islamic terrorists caught in FBI terrorism stings never could have obtained the capability to carry out their planned violent acts were it not for the FBI’s assistance.

    In the ten years following 9/11, the FBI and the Justice Department indicted and convicted more than 150 people following sting operations involving alleged connections to international terrorism. Few of these defendants had any connection to terrorists, evidence showed, and those who did have connections, however tangential, never had the capacity to launch attacks on their own. In fact, of the more than 150 terrorism sting operation defendants, an FBI informant not only led one of every three terrorist plots, but also provided all the necessary weapons, money, and transportation.

    The FBI’s logic to support the use of terrorism stings goes something like this: By catching a lone wolf before he strikes, federal law enforcement can take him off the streets before he meets a real terrorist who can provide him with weapons and munitions. However, to this day, no example exists of a lone wolf, by himself unable to launch an attack, becoming operational through meeting an actual terrorist in the United States. In addition, in the dozens of terrorism sting operations since 9/11, the would-be terrorists are usually uneducated, unsophisticated, and economically desperate—not the attributes of someone likely to plan and launch a sophisticated, violent attack without significant help.

    Reprinted from The Terrorr Factory: Inside the FBI’s Manufactured War on Terrorism [3] — Copyright © 2012 by Trevor Aaronson. Reprinted with permission of Ig Publishing, Brooklyn, NY.

    February 15, 2013 |

    Find this story at 15 February 2013

    Whistleblower John Kiriakou: For Embracing Torture, John Brennan a “Terrible Choice to Lead the CIA”

    Days after he was sentenced to 30 months in prison, John Kiriakou — the first CIA official to be jailed for any reason relating to the torture program — denounces President Obama’s appointment of John Brennan to head the CIA. “I’ve known John Brennan since 1990,” Kiriakou says. “I worked directly for John Brennan twice. I think that he is a terrible choice to lead the CIA. I think that it’s time for the CIA to move beyond the ugliness of the post-September 11th regime, and we need someone who is going to respect the Constitution and to not be bogged down by a legacy of torture.”

    Find this story at 30 January 2013

    AMY GOODMAN: We’re going to talk about John Brennan right now, President Obama’s nominee to become the next chief of the CIA. The news agency Reuters is reporting that Brennan had detailed information on the agency’s torture program while serving there under President George W. Bush. Official records apparently show Brennan received regular internal CIA updates about the progress of torture techniques, including waterboarding. It’s unclear if Brennan raised any objections at the time he was made aware. Brennan’s confirmation hearing will be February 7th. In 2006, he gave an interview with Frontline on PBS where he said it was right for the Bush administration to, quote, “take off the gloves” after the 9/11 attacks.

    JOHN BRENNAN: The war, or the campaign against terrorism, is going to be a long one, and that the opposition, whether it be al-Qaeda or whether it be Iraq, doesn’t play by the Marquess of Queensbury rules, and therefore, you know, the U.S., in some areas, has to take off the gloves. And I think that’s entirely appropriate. I think we do have to take off the gloves in some areas, but within bounds, and at the right time, in the right way, and for the right reason, and with full understanding of what the consequences of that might be.

    AMY GOODMAN: That was John Brennan in 2006. When President Obama was first elected in his first term, he wanted to—John Brennan to be his director of Central Intelligence. There was such an outcry in the human rights community that John Brennan pulled his name out. Now, four years later, President Obama has officially nominated John Brennan once again to head the CIA. Our guest, John Kiriakou, is about to go to jail, was sentenced to 30 months in prison, worked for the CIA, there while John Brennan was there. Can you respond to what John Brennan knew, when he knew it, and the fact that President Obama wants him to be head of the CIA?

    JOHN KIRIAKOU: Sure. Obviously I can’t read John Brennan’s mind, but I can tell you that at the time that the torture techniques were being implemented, John Brennan was President Bush’s director of the National Counterterrorist Center. He was also, a little earlier than that, the deputy executive director and then, I believe, executive director of the CIA. That’s the number three ranking position in the CIA. So, he would have had to have been intimately involved in—not necessarily in carrying out the torture techniques, but in the policy, the torture policy—either that or he had to be brain dead, because you can’t be in positions like that, director of the National Counterterrorist Center and executive director of the CIA, without knowing what the CIA’s torture policies are.

    Now, I’m surprised, frankly, also, at the fact that there’s no outrage in the human rights community now that Mr. Brennan’s nomination has been made official. There was a great hue and cry in 2009 when he was initially floated for the position of CIA director. And I’m not sure why there’s a difference between four years ago and now. John Brennan certainly hasn’t changed.

    NERMEEN SHAIKH: John Kiriakou, I want to read a comment made by the judge at your sentencing hearing. Judge Leonie Brinkema sentenced you to 30 months in prison last Friday, saying, quote, “This case is not a case about a whistleblower. It’s a case about a man who betrayed a very solemn trust, and that is a trust to keep the integrity of his agency intact and specifically to protect the identity of co-workers. … I think 30 months is, frankly, way too light, because the message has to be sent to every covert agent that when you leave the agency you can’t just start all of a sudden revealing the names of the people with whom you worked,” the judge said. John Kiriakou, can you comment on that statement?

    JOHN KIRIAKOU: Sure. When Judge Brinkema accepted the plea deal in October, she called 30 months fair and appropriate. I can only think that with a courtroom packed full of journalists last Friday, she decided to seize the moment and make a statement that would be carried in the papers. I don’t know what changed between October and January, other than the fact that she and the prosecution had had several ex parte communications. What that means is the prosecutors were able to meet with the judge, related to my case, without the defense, my attorneys, being present. So we have no idea what it was that the prosecution told the judge. We were not allowed to defend ourselves. Indeed, Judge Brinkema denied 75 motions that we made asking for declassification of information so that I could present a defense. In August of 2012, after our motions had been denied, my attorneys and I walked out of the courtroom, and my attorney said, “We have no defense. She won’t let us say anything. She won’t let us defend you.” And so, we were forced into plea negotiations. But again, I’m not sure why the judge changed her position between October and January; it was inexplicable to me.

    AMY GOODMAN: Explain what that’s like in the courtroom, when they invoke national security, that the prosecutor can come forward and speak privately with the judge without your defense attorneys being there.

    JOHN KIRIAKOU: Yeah, I had never heard of such a thing before. But in August, when we made our 75 motions, we thought that the judge would block off two days to hear the 75. In fact, there had been a conversation with the prosecution, and so she blocked off an hour to hear the 75 motions. So we knew we were in trouble. And then, at the very start of the hearing, the prosecutor got up and said that he was requesting a Rule 4 conversation. I didn’t know what this was. My attorneys objected and said, “If you don’t want the defendant to hear, at least allow us to hear so that we can represent his interests.” And the judge said, “No, this is a national security case. I’m allowed an ex parte communication with the prosecutors.” So the prosecutors went up to the bench. We could hear them whispering. They came back to their table, and the judge said, “All 75 motions are denied.” And that was the end of it. We got up, and we walked out of court. And my attorneys said, “We have to negotiate a plea.”

    NERMEEN SHAIKH: Jesselyn—

    JOHN KIRIAKOU: It was extremely disheartening.

    NERMEEN SHAIKH: Jesselyn Radack, I wanted to ask about the legal implications of this case and how it fits into the treatment of government whistleblowers under the Obama administration.

    JESSELYN RADACK: Absolutely. To get to the point you just raised with John, I think the reason Judge Brinkema changed her opinion between October and last week is because the government submitted a secret statement that John was not allowed to see that played a large role in the sentencing hearing, but neither the public nor the defendant were allowed to see the statement, which is very Kafkaesque.

    But in the grander scheme, the prosecution of John Kiriakou and the war on whistleblowers, using the heavy handed Espionage Act, by charging people who dare to tell the truth as being enemies of the state, sends a very chilling message. And Judge Brinkema herself acknowledged that a strong message had to be sent, that secrets must be kept. But apparently, that only applies to people who are trying to reveal government abuses and illegality, because all of the people in the White House and the CIA who revealed classified information and—of undercover identities to the makers of a Hollywood film, Zero Dark Thirty, have done so with impunity and with lavish praise. So—

    AMY GOODMAN: Wait, can you say—can you say specifically what you’re talking about, Jesselyn Radack?

    JESSELYN RADACK: Yes. Specifically, the White House and the CIA were very involved in the making of Zero Dark Thirty, which pretends to be some kind of neutral film that implies torture led to the capture of Osama bin Laden, which it absolutely did not. In that process, a high-level Defense Department official, Michael Vickers, revealed the identity of an undercover Special Operations Command officer, but was not held to account for that. And the CIA revealed numerous classified pieces of information, including sources and methods. So when—yeah?

    AMY GOODMAN: Keep going.

    JESSELYN RADACK: So when the United States talks about the sanctity of keeping secrets, and both the judge and multiple statements by United States officials discussed that, they are the biggest leakers of all. And they do so with impunity.

    AMY GOODMAN: I wanted to talk about another whistleblower targeted by the Obama administration who has been former National Security Agency analyst. He’s Thomas Drake. He worked for the NSA for nearly seven years before blowing the whistle. Thomas Drake appeared on Democracy Now! last March.

    THOMAS DRAKE: The critical thing that I discovered was not just the massive fraud, waste and abuse, but also the fact that NSA had chosen to ignore a 23-year legal regime, which had been established in 1978, called the Foreign Intelligence Surveillance Act, with a Foreign Intelligence Surveillance Court, and which, at NSA, during the time that I was not only at NSA but also in the military flying on RC-135s overseas during the latter part of the Cold War, it was a contract, the one thing you did not do. It was the prime directive of NSA. It was the—the—First Amendment at NSA, which is, you do not spy on Americans—

    AMY GOODMAN: And what did you find?

    THOMAS DRAKE: —without a warrant. I found, much to my horror, that they had tossed out that legal regime, that it was the excuse of 9/11, which I was told was: Exigent conditions now prevailed, we essentially can do anything. We opened up Pandora’s box. We’re going to turn the United States of America into the equivalent of a foreign nation for the purpose of a—of dragnet, blanket electronic surveillance.

    AMY GOODMAN: That’s former National Security Agency analyst Thomas Drake. Jesselyn Radack, he is one of your clients. What happened to him?

    JESSELYN RADACK: Yes, I represented both Tom Drake and John Kiriakou. The government dropped all 10 felony counts against Tom Drake, and he pled guilty to a minor misdemeanor, the equivalent of a parking ticket. I find it appalling that the two men who revealed the biggest scandals of the Bush administration—namely warrantless wiretapping and torture—are the only two who have been criminally prosecuted for it, and not the people who secretly surveiled the communications of Americans, and not the people who were involved in the torture program, all of whom have been conferred immunity by either the president or by acts of Congress.

    AMY GOODMAN: John Kiriakou, you’re now—we are now—the president is President Obama. Did you see a change between President Obama and his predecessor, President Bush? And also, when you were talking about John Brennan, do you think he should head the CIA? What message do think that sends? And what has changed in the last four years, when he withdrew his name for consideration?

    JOHN KIRIAKOU: In 2010, when my book came out, I was giving a speech in Los Angeles, and a woman asked me a question about the difference between President Obama and President Bush. And I’ll never forget the question, because it was just so crazy. She said, “Can you explain the CIA’s position on the jihadization of American foreign policy under President Obama?” And I laughed, and I said, “Ma’am, with all due respect, President Obama’s foreign policy is an extension of President Bush’s foreign policy. If there’s any difference at all, President Obama is killing more people overseas than President Bush ever did.” So, no, I don’t think there’s any difference at all between the Bush foreign policy and the Obama foreign policy, which I think really is a shame for us, because there was a wonderful opportunity to take a different path and to reclaim our position as a moral leader in the world. So I’m disappointed in that.

    With regard to John Brennan, I’ve known John Brennan since 1990. I worked directly for John Brennan twice. I think that he is a terrible choice to lead the CIA. I think that it’s time for the CIA to move beyond the ugliness of the post-September 11th regime, and we need someone who is going to respect the Constitution and to not be bogged down by a legacy of torture. I think that President Obama’s appointment of John Brennan sends the wrong message to all Americans.

    AMY GOODMAN: You worked with him, directly for him. Did Brennan receive regular internal CIA updates about the progress of torture techniques, including waterboarding, as Reuters is reporting?

    JOHN KIRIAKOU: I worked for him when he was a—an analytic manager. It was before he really hit the big time under George Tenet. But again, I think that it’s impossible for him to not have gotten these briefings, for him to not have been intimately involved in the policy, by virtue of his senior positions, some of the senior-most positions in the CIA. It’s just impossible that he didn’t know what was going on.

    NERMEEN SHAIKH: John Kiriakou, you’ll shortly be going to prison. Do you know exactly when your prison sentence will begin? And how are you preparing for this? You’re the father of five children.

    JOHN KIRIAKOU: I’m the father of five. I don’t know exactly when this will be. It will be sometime in the next four to six weeks. I’ll have to report to a prison somewhere. I don’t know where. It’s, frankly, very hard to prepare. You have to do things like arrange a power of attorney, arrange child care. I mean, there are so many things to do, it’s just overwhelming. My wife, thank God, is very strong and very tough and very supportive. And we are treating this like temporary duty overseas. It was not unusual for me to go overseas for many months at a time, sometimes as long as two years at a time, two-and-a-half years. So we’re treating this like an overseas deployment. I can call my children virtually every day. If I’m close enough, they can come and visit me. And I’m just hoping for the best.

    AMY GOODMAN: How old are your kids, John?

    JOHN KIRIAKOU: I have two sons from a first marriage who are 19 and 16, and then my wife and I have three children: an eight-year-old boy, a six-year-old girl and one-year-old boy.

    AMY GOODMAN: And what do they understand?

    JOHN KIRIAKOU: Well, they know that I’ve been involved in a fight with the FBI for the last year. And I told them, “You know I’ve been fighting the FBI. And unfortunately, I lost. And so, because I lost, my punishment is I’m going to have to go away for a couple of years, and I’m going to try to teach bad guys how to get their high school diplomas. And when I’m all done with that, I’ll come home, and we’ll live as a family, and everything’s going to be OK again.”

    NERMEEN SHAIKH: John Kiriakou, quickly, before we conclude, what advice would you give to whistleblowers now, given what’s happened in your case?

    JOHN KIRIAKOU: I made mistakes in my case. I would say, first, go through the chain of command, which I didn’t do, I should have done. I would say, if you get no satisfaction through your chain of command, go to the congressional oversight committees. But do not remain silent. If you see waste, fraud, abuse or illegality, shout it from the rooftops, whether it’s internally or to Congress.

    AMY GOODMAN: John, we’re going to have to leave it there. Thank you so much for being with us. John Kiriakou spent 14 years at the CIA as an analyst and case officer. He’s going to jail for two-and-a-half years.

    Ex-CIA Agent, Whistleblower John Kiriakou Sentenced to Prison While Torturers He Exposed Walk Free

    Former CIA agent John Kiriakou speaks out just days after he was sentenced to 30 months in prison, becoming the first CIA official to face jail time for any reason relating to the U.S. torture program. Under a plea deal, Kiriakou admitted to a single count of violating the Intelligence Identities Protection Act by revealing the identity of a covert officer to a freelance reporter, who did not publish it. Supporters say Kiriakou is being unfairly targeted for having been the first CIA official to publicly confirm and detail the Bush administration’s use of waterboarding. Kiriakou joins us to discuss his story from Washington, D.C., along with his attorney, Jesselyn Radack, director of National Security & Human Rights at the Government Accountability Project. “This … was not a case about leaking; this was a case about torture. And I believe I’m going to prison because I blew the whistle on torture,” Kiriakou says. “My oath was to the Constitution. … And to me, torture is unconstitutional.” [inlcudes rush transcriptNERMEEN SHAIKH: A retired CIA agent who blew the whistle on the agency’s Bush-era torture program has been sentenced to two-and-a-half years in prison. John Kiriakou becomes the first CIA official to be jailed for any reason relating to the torture program. Under a plea deal, Kiriakou admitted to a single count of violating the Intelligence Identities Protection Act by revealing the identity of a covert officer to a freelance reporter, who did not publish it. Under the plea deal, prosecutors dropped charges brought under the Espionage Act.

    Find this story at 30 January 2013

    In 2007, Kiriakou became the first CIA official to publicly confirm and detail the Bush administration’s use of waterboarding when he spoke to ABC’s Brian Ross.

    JOHN KIRIAKOU: At the time, I felt that waterboarding was something that we needed to do. And as time has passed and as September 11th has—you know, has moved farther and farther back into history, I think I’ve changed my mind, and I think that waterboarding is probably something that we shouldn’t be in the business of doing.

    BRIAN ROSS: Why do you say that now?

    JOHN KIRIAKOU: Because we’re Americans, and we’re better than that.

    NERMEEN SHAIKH: John Kiriakou’s supporters say he has been unfairly targeted in the Obama administration’s crackdown on government whistleblowers. In a statement urging President Obama to commute Kiriakou’s sentence, a group of signatories including attorneys and former CIA officers said, quote, “[Kiriakou] is an anti-torture whistleblower who spoke out against torture because he believed it violated his oath to the Constitution. … Please, Mr. President, do not allow your legacy to be one where only the whistleblower goes to prison.”

    Prosecutor Neil MacBride, the U.S. attorney for the Eastern District of Virginia, defended the government’s handling of the case.

    NEIL MacBRIDE: As the judge just said in court, today’s sentence should be a reminder to every individual who works for the government, who comes into the possession of closely held sensitive information regarding the national defense or the identity of a covert agent, that it is critical that that information remain secure and not spill out into the public domain or be shared with others who don’t have authorized access to it.

    AMY GOODMAN: John Kiriakou joins us now from Washington, D.C. He spent 14 years at the CIA as an analyst and a case officer. In 2002, he led the team that found Abu Zubaydah, a high-ranking member of al-Qaeda. He’s father of five. In 2010, he published a memoir entitled The Reluctant Spy: My Secret Life in the CIA’s War on Terror.

    And we’re joined by one of John Kirakou’s attorneys, Jesselyn Radack. She’s the director of National Security & Human Rights at the Government Accountability Project, a former ethics adviser to the United States Department of Justice.

    We reached out to the U.S. attorney’s office for the Eastern District of Virginia, but they declined our request for an interview.

    John Kiriakou, why are you going to jail? Explain the plea deal you made with the government.

    JOHN KIRIAKOU: Well, thanks, first of all, for having me and giving me the opportunity to explain.

    I’m going to prison, ostensibly, for violating the Intelligence Identities Protection Act of 1982. I believe, and my supporters believe, that this, however, was not a case about leaking; this was a case about torture. And I believe I’m going to prison because I blew the whistle on torture. I’ve been a thorn in the CIA’s side since that interview in 2007, in which I said that waterboarding was torture and that it was official U.S. government policy. And I think, finally, the Justice Department caught up with me.

    NERMEEN SHAIKH: Jesselyn Radack, let me just bring you into the conversation to explain what the Intelligence Identities Protection Act is. Your client, John Kiriakou—it’s been invoked in his case for the first time in 27 years?

    JESSELYN RADACK: That’s correct. In fact, there have only been two convictions under the Intelligence Identities Protection Act, which was enacted to prevent cases like Philip Agee, not things like John Kiriakou. It was to prevent the revealing of covert identities for profit or to aid the enemy. In this case, John confirmed the name of a torturer to a journalist, which makes Neil MacBride’s statement all the more hypocritical, because the biggest leaker of classified information, including sources and methods and undercover identities, has been the U.S. government.

    AMY GOODMAN: John Kiriakou, explain what it is that you were trying to expose. Explain what you were involved with. Talk about Abu Zubaydah, your involvement in the finding of him, and then the course you took, where your conscience took you.

    JOHN KIRIAKOU: Sure. In 2002, I was the chief of counterterrorism operations for the CIA in Pakistan, and my job was to try to locate al-Qaeda fighters or al-Qaeda leaders and capture them, to turn them over to the Justice Department and have them face trial. That was the original—the original idea, not to have them sit in Cuba for the next decade.

    But we caught Abu Zubaydah. He was shot three times by Pakistani police as he was trying to escape from his safe house. And I was the first person to have custody of him, to sit with him. We spoke to each other extensively, I mean, talked about everything from September 11th to poetry that he had been writing, to his family. And then he was moved on to a secret prison after that. Once I got back to headquarters, I heard that he had been subject to harsh techniques, then euphemistically called “enhanced interrogation techniques,” and I was asked by one of the leaders in the CIA’s Counterterrorist Center if I wanted to be trained in the use of these techniques. I told him that I had a moral problem with them, and I did not want to be involved.

    So, fast-forward to 2007. By then, Human Rights Watch and Amnesty International had reported that al-Qaeda prisoners had been tortured, and ABC News called and said that they had information that I had tortured Abu Zubaydah. I said that was absolutely untrue. I was the only person who was kind to Abu Zubaydah, and I had never tortured anybody. So, they asked me to go on their show and defend myself. I did that. And in the course of the interview, I said that not only was the CIA torturing prisoners, but that it was official U.S. government policy. This was not the result of some rogue CIA officer just beating up a prisoner every once in a while; this was official policy that went all the way up to the president of the United States.

    NERMEEN SHAIKH: And so, what happened after that, in 2007, once you gave this interview? Can you explain what happened to you and to your family?

    JOHN KIRIAKOU: Sure. Within 24 hours, the CIA filed what’s called a crimes report against me with the Justice Department, saying that I had revealed classified information, which was the torture program, and asking for an investigation with an eye toward prosecuting me. The Justice Department decided at the time that I had not revealed classified information, that the information was already in the public domain. But immediately, within weeks, I was audited by the IRS. I’ve been audited by the IRS every single year since giving that interview in 2007.

    But a more important bit of fallout from that interview was that every time I would write an op-ed, every time I would give a television interview or give a speech at a university, the CIA would file a crimes report against me, accusing me of leaking additional classified information. Each time, the Justice Department determined that I did not leak any classified information. In fact, I would get those op-eds and those speeches cleared by the CIA’s Publications Review Board in advance.

    Then the CIA started harassing my wife, who at the time was a senior CIA officer, particularly over an op-ed I had written. They accused her of leaking classified information to me for the purpose of writing the op-ed. Well, I said I had gotten the information in the op-ed from two UPI reports and from a South American Ministry of Foreign Affairs website. And they would back off.

    But this sort of became our life. We would be under FBI surveillance. She would be called into the CIA’s Office of Security. I would have trouble getting a security clearance when I went to Capitol Hill. It just became this pattern of harassment.

    AMY GOODMAN: So, John, why didn’t you stop?

    JOHN KIRIAKOU: Because I think that—that torture is something that needs to be discussed. I said this in 2007. This is something that we should—about which we should be having a national debate. And frankly, I have a First Amendment right to free speech. And, you know, writing an op-ed is not against the law. Giving a speech about the Arab Spring or about torture is not against the law. And I felt that—that I didn’t want to be cowed. I didn’t want to be frightened into silence by the CIA.

    NERMEEN SHAIKH: And, John Kiriakou, you said that in these instances that you’ve named, you were actually charged with espionage, is that right? Can you talk about the significance—

    JOHN KIRIAKOU: Yes.

    NERMEEN SHAIKH: —of the Espionage Act?

    JOHN KIRIAKOU: Yes, the government initially charged me with three counts of espionage. I’m—it sounds silly maybe, but I’m still personally offended by these espionage charges, which were dropped, of course. The espionage charge is used as a hammer by the administration to force people into silence. My espionage charge is related to a conversation that I had with a New York Times reporter. A New York Times reporter approached me and said that he was writing a story about a colleague of mine, and would I grant him an interview. I gave him the interview. I said this colleague was a great guy, the unsung hero of the Abu Zubaydah operation, terrific officer. And the reporter said, “Do you know how I can get in touch with him?” And I said, “No, I’ve been out of touch with him for a while, but I think I might have his business card.” So I gave the reporter the business card. Now, mind you, this is a CIA officer who had never, ever been undercover. His business card showed that he was involved as a CIA contractor, and it had his personal email on it and his cellphone number. I gave the reporter the business card and was charged with two counts of espionage. I later gave the same business card to another journalist who was doing an article and was charged with a third count of espionage.

    AMY GOODMAN: What is it that you allege the CIA was doing for all of these years? Explain the torture program that you were trying to expose.

    JOHN KIRIAKOU: Sure. There were—there were something like 10 different techniques that were used in the CIA’s torture program. They went from the benign, you know, where an officer would grab a prisoner by the lapels and give him a shake, all the way up to the really rough things that we’ve heard about, like waterboarding or, what I think is worse, sleep deprivation or the cold cell, where they’ll put a prisoner naked in a cell chilled to 50 or 55 degrees, and then every hour or two throw ice water on him. I actually think those last two are worse than waterboarding.

    But, again, these are techniques that we have condemned other countries for throughout history. The Japanese did this during the Second World War. The Belgians did it in Africa earlier in the century. The Chinese and the Vietnamese did it. This is—these are techniques that we have always said were crimes against humanity. And then it was the—it was though after September 11th everything changed, and we somehow had license to do the same things we had been condemning. I thought that was wrong. You know, Director Petraeus—former Director Petraeus made a statement in October when I agreed to take a plea to make these other charges go away, and he said that my conviction shows that we have to take our oaths seriously. Well, I took my oath seriously. My oath was to the Constitution. On my first day in the CIA, I put my right hand up, and I swore to uphold the Constitution. And to me, torture is unconstitutional, and it’s something that we should not be in the business of doing.

    NERMEEN SHAIKH: John Kiriakou, I want to play for you comments President Obama made four years ago, shortly before he took office, about whether CIA officials involved in torture should be prosecuted. He appeared on the ABC News’ This Week.

    PRESIDENT-ELECT BARACK OBAMA: I don’t believe that anybody is above the law. On the other hand, I also have a belief that we need to look forward as opposed to looking backwards. And part of my job is to make sure that—for example, at the CIA, you’ve got extraordinarily talented people who are working very hard to keep Americans safe. I don’t want them to suddenly feel like they’ve got to spend all their time looking over their shoulders and lawyering.

    GEORGE STEPHANOPOULOS: So no 9/11 Commission with independent subpoena power?

    PRESIDENT-ELECT BARACK OBAMA: You know, we have not made final decisions, but my instinct is for us to focus on how do we make sure that, moving forward, we are doing the right thing.

    NERMEEN SHAIKH: That was President Obama speaking four years ago to ABC. John Kiriakou, your response to what the presient said?

    JOHN KIRIAKOU: I supported the president’s response. I remember that interview, and I thought, “OK, he’s right. There are wonderful, talented, hard-working men and women at the CIA who need to be protected.” But at the same time, it’s one thing to look forward; it’s another thing to look forward just for the torturers. It’s just not fair. It’s not fair to the American people. If we’re going to—if we’re going to make prosecutions or initiate prosecutions, those prosecutions can’t just be against the people who blew the whistle on the torture or who opposed the torture. You know, we haven’t—we haven’t even investigated the torturers, as Jesselyn said. We haven’t initiated any actions against the people who conceived of the torture and implemented the policy, or against the man who destroyed evidence of the torture, or against the attorneys who used specious legal arguments to justify the torture. If we’re going to move forward, let’s move forward, but you can’t target one person or two people who blew the whistle.

    NERMEEN SHAIKH: John Kiriakou, you’ve also spoken about witnessing new Foreign Service officers being confirmed, Foreign Service officers who were previously with the CIA and participated in acts of torture. Could you explain what happened and explain its significance?

    JOHN KIRIAKOU: Yes. When I was a senior investigator on the Senate Foreign Relations Committee, I was approached by a journalist who said that he had evidence that the CIA was misusing its cover agreement with the State Department to place people involved in the torture program under State Department cover so that their names could not be exposed in the press. And if those names were exposed in the press, the people giving the names would be subject to the Intelligence Identities Protection Act. So, again, this was a violation of the CIA-State Department cover agreement. I sent a letter under Senator John Kerry—then-Senator John Kerry’s signature, asking the CIA for clarification. I got a response about six weeks later that was classified top-secret, so I was not permitted to see the response. I did not have a top-secret clearance at the time. And a colleague of mine told me that the letter essentially said, in very strongly worded language, to mind my own business.

    AMY GOODMAN: We’re going to go to break. When we come back, we want to ask you about President Obama’s nominee to become the next head of the CIA, John Brennan, because as you talk about the administration, we’re talking actually about administrations, from the Bush administration to the Obama administration. Our guest is about to go to jail. His name is John Kiriakou. He’s about to serve two-and-a-half years in jail. This will be one of his last interviews before he goes to prison. We’re joined also by Jesselyn Radack, who is one of his attorneys. Stay with us.]

     

     

    CIA whistleblower John Kiriakou given more than two years in prison

    Judge says former intelligence officer who exposed aspects of use of torture should have been jailed for longer

    Former CIA officer John Kiriakou leaves a federal court in Alexandria, Virginia. Photograph: Jacquelyn Martin/AP

    The former CIA officer John Kiriakou was sentenced Friday to more than two years in prison, by a federal judge who rejected arguments that he was acting as a whistleblower when he leaked a covert officer’s name to a reporter. A plea deal required the judge to impose a sentence of two and a half years. US district judge Leonie Brinkema said she would have given Kiriakou much more time if she could.

    Kiriakou’s supporters describe him as a whistleblower who exposed aspects of the CIA’s use of torture against detained terrorists. Prosecutors said Kiriakou was merely seeking to increase his fame and public stature by trading on his insider knowledge. The 48-year-old Arlington resident pleaded guilty last year to violating the Intelligence Identities Protection Act. No one had been convicted under the law in 27 years.

    Kiriakou was an intelligence officer with the CIA from 1990 until 2004. He served overseas and at headquarters in Langley. In 2002, Kiriakou played a key role in the agency’s capture of the al-Qaida terrorist Abu Zubaydah in Pakistan. Abu Zubaydah, who was waterboarded by government interrogators, revealed information that led to the arrest of “dirty bomb” plotter Jose Padilla and exposed Khalid Sheikh Mohamed as the mastermind of the 11 September 2001 terror attacks.

    Accounts conflict, however, over whether the waterboarding was helpful in gleaning intelligence from Zubaydah, who was also interrogated conventionally.

    Kiriakou, who did not participate in the waterboarding, expressed ambivalence in news media interviews about waterboarding, but ultimately declared it was torture. His 2007 interviews about the interrogations of Abu Zubaydah were among the first by a CIA insider confirming reports that several detainees, including Abu Zubaydah, had been waterboarded.

    Associated Press in Alexandria, Virginia
    guardian.co.uk, Friday 25 January 2013 16.00 GMT

    Find this story at 25 January 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    John Kiriakou and the Real Story Behind Obama’s Latest Leak Crackdown

    How a discovery in a Gitmo detainee’s cell led to charges against ex-CIA officer John Kiriakou.

    On Monday, the Justice Department charged former CIA officer and author John Kiriakou [1] with repeatedly “disclosing classified information to journalists, including the name of a covert CIA officer and information revealing the role of another CIA employee in classified activities.” (Read the criminal complaint.)

    Kiriakou began making the media rounds in late 2007, when he went on the record [2] about waterboarding techniques used in the War on Terror, particularly in connection to the torture of Abu Zubaydah in a secret prison in Thailand. (It was later revealed [3] that Kiriakou was not actually present for that interrogation, as he had previously implied.)

    If you’ve been reading Mother Jones, a lot of the content in the criminal complaint against Kiriakou [4] will seem familiar. The main charges stem from a bizarre episode we reported on a [5] couple years ago: In 2008 or early 2009, attorneys for alleged 9/11 conspirators held at Guantanamo Bay obtained—and showed to their clients—photo lineups that included pictures of CIA officers and contractors. The source of the photos was John Sifton [5], a private investigator working for the American Civil Liberties Union’s John Adams Project, an outfit set up to provide civilian defense lawyers to the Gitmo defendants. In some cases, Sifton clandestinely photographed CIA officers who were thought to have been involved in the brutal interrogations of the 9/11 defendants.

    The purpose of presenting the photo lineups to the detainees was to identify the alleged torturers in order to make the case that the detainees’ statements were coerced. As multiple sources told Mother Jones in 2010, the defense lawyers didn’t know which of the individuals in the photo lineups were believed to be CIA officers. The detainees, meanwhile, would have no way of knowing which of the people were CIA employees unless they recognized them from interrogations. The lineups were “double blind,” a fact confirmed in the criminal complaint.

    But there was still the issue of how Sifton identified the people he thought were involved in the interrogations. That’s where Kiriakou comes in: He’s accused of providing the identities of several CIA officers to journalists, one of whom passed information on to a “defense investigator” whose activities match Sifton’s. (The complaint specifically mentions investigators “interviewing” the “defense investigator” and uses the phrase “learned from the defense investigator.”) Here’s the key paragraph of the criminal complaint:

    No law or military commission order expressly prohibited defense counsel from providing their clients with the photographic spreads in question under these circumstances. However, the fact that a defense investigator had learned the classified information, including the information necessary to take and/or assemble these photographs, suggested that the information may have been either deliberately or inadvertently disclosed, without authorization, in a manner that ultimately resulted in the defense team’s possession of the classified information.

    The CIA didn’t take long to find out about Sifton’s work. In the spring of 2009, some of the photos were discovered in the cell of Mustafa Ahmad al Hawsawi, an accused Al Qaeda financier and one of 9/11 mastermind Khalid Sheikh Mohammed’s four co-defendants. The criminal complaint against Kiriakou also indicates that a defense filing in early 2009 contained classified information that the government hadn’t provided to the defense.

    When the CIA found out about the photos, top intelligence officials were furious, believing the defense lawyers had potentially placed the lives of covert officers at risk. The CIA’s then-general counsel John Rizzo demanded an investigation [6]. He later described the incident [6] as “far more serious than Valerie Plame,” referring to the Bush-era leak of an operative’s covert status. Rizzo wasn’t alone in his concerns. “This is an agency that has reasons to be concerned as to whether or not somebody’s got their back,” another high-ranking former intelligence official told Mother Jones [7]. “It’s always operating out there on the edge, not unlawfully, but generally at the farthest reaches of executive prerogative.”

    In response to the CIA’s complaints, the Justice Department launched a probe, but the agency and congressional Republicans were unhappy with the results of the first investigation, which looked likely to clear the Gitmo defense lawyers of wrongdoing. Then the Obama administration called in famed US Attorney Patrick Fitzgerald, who handled the Plame investigation and prosecuted former Illinois governor Rod Blagojevich, to take over the probe.

    Sifton and his lawyer did not respond to requests for comment.

    The charges are just the latest crackdown by the Obama administration on alleged leakers. This is the sixth time during the Obama administration that prosecutors have filed charges pertaining to the unauthorized disclosure of classified national security information to media outlets. (In the previous four decades, the US government has pursued such cases on only three occasions [8].) Under the Espionage Act, the Obama administration has gone after media sources including Stephen Kim [9], an arms expert accused of passing along classified information to a Fox News reporter; NSA whistleblower Thomas Drake (who was profiled in an exhaustive New Yorker story by Jane Mayer [10]), and alleged Wikileaks source Bradley Manning [11], among others.

    By Nick Baumann and Asawin Suebsaeng | Mon Jan. 23, 2012 2:23 PM PST

    Find this story at 23 January 2013

    Copyright ©2013 Mother Jones and the Foundation for National Progress. All Rights Reserved.

    Ex-Officer Is First From C.I.A. to Face Prison for a Leak

    WASHINGTON — Looking back, John C. Kiriakou admits he should have known better. But when the F.B.I. called him a year ago and invited him to stop by and “help us with a case,” he did not hesitate.

    In his years as a C.I.A. operative, after all, Mr. Kiriakou had worked closely with F.B.I. agents overseas. Just months earlier, he had reported to the bureau a recruiting attempt by someone he believed to be an Asian spy.

    “Anything for the F.B.I.,” Mr. Kiriakou replied.

    Only an hour into what began as a relaxed chat with the two agents — the younger one who traded Pittsburgh Steelers talk with him and the senior investigator with the droopy eye — did he begin to realize just who was the target of their investigation.

    Finally, the older agent leaned in close and said, by Mr. Kiriakou’s recollection, “In the interest of full disclosure, I should tell you that right now we’re executing a search warrant at your house and seizing your electronic devices.”

    On Jan. 25, Mr. Kiriakou is scheduled to be sentenced to 30 months in prison as part of a plea deal in which he admitted violating the Intelligence Identities Protection Act by e-mailing the name of a covert C.I.A. officer to a freelance reporter, who did not publish it. The law was passed in 1982, aimed at radical publications that deliberately sought to out undercover agents, exposing their secret work and endangering their lives.

    In more than six decades of fraught interaction between the agency and the news media, John Kiriakou is the first current or former C.I.A. officer to be convicted of disclosing classified information to a reporter.

    Mr. Kiriakou, 48, earned numerous commendations in nearly 15 years at the C.I.A., some of which were spent undercover overseas chasing Al Qaeda and other terrorist groups. He led the team in 2002 that found Abu Zubaydah, a terrorist logistics specialist for Al Qaeda, and other militants whose capture in Pakistan was hailed as a notable victory after the Sept. 11 attacks.

    He got mixed reviews at the agency, which he left in 2004 for a consulting job. Some praised his skills, first as an analyst and then as an overseas operative; others considered him a loose cannon.

    Mr. Kiriakou first stumbled into the public limelight by speaking out about waterboarding on television in 2007, quickly becoming a source for national security journalists, including this reporter, who turned up in Mr. Kiriakou’s indictment last year as Journalist B. When he gave the covert officer’s name to the freelancer, he said, he was simply trying to help a writer find a potential source and had no intention or expectation that the name would ever become public. In fact, it did not surface publicly until long after Mr. Kiriakou was charged.

    He is remorseful, up to a point. “I should never have provided the name,” he said on Friday in the latest of a series of interviews. “I regret doing it, and I never will do it again.”

    At the same time, he argues, with the backing of some former agency colleagues, that the case — one of an unprecedented string of six prosecutions under President Obama for leaking information to the news media — was unfair and ill-advised as public policy.

    His supporters are an unlikely collection of old friends, former spies, left-leaning critics of the government and conservative Christian opponents of torture. Oliver Stone sent a message of encouragement, as did several professors at Liberty University, where Mr. Kiriakou has taught. They view the case as an outrage against a man who risked his life to defend the country.

    Whatever his loquaciousness with journalists, they say, he neither intended to damage national security nor did so. Some see a particular injustice in the impending imprisonment of Mr. Kiriakou, who in his first 2007 appearance on ABC News defended the agency’s resort to desperate measures but also said that he had come to believe that waterboarding was torture and should no longer be used in American interrogations.

    Bruce Riedel, a retired veteran C.I.A. officer who led an Afghan war review for Mr. Obama and turned down an offer to be considered for C.I.A. director in 2009, said Mr. Kiriakou, who worked for him in the 1990s, was “an exceptionally good intelligence officer” who did not deserve to go to prison.

    “To me, the irony of this whole thing is, very simply, that he’s going to be the only C.I.A. officer to go to jail over torture,” even though he publicly denounced torture, Mr. Riedel said. “It’s deeply ironic under the Democratic president who ended torture.”

    John A. Rizzo, a senior C.I.A. lawyer for three decades, said that he did not believe Mr. Kiriakou set out to harm national security or endanger anyone, but that his violation was serious.

    “I think he wanted to be a big shot,” Mr. Rizzo said. “I don’t think he was evil. But it’s not a trivial thing to reveal a name.”

    The leak prosecutions have been lauded on Capitol Hill as a long-overdue response to a rash of dangerous disclosures and have been defended by both Mr. Obama and his attorney general, Eric H. Holder Jr. But their aides say neither man ordered the crackdown, and the cases appear to have resulted less from a conscious policy change than from the proliferation of e-mail, which makes it possible to trace the origin of some disclosures without pressuring journalists to identify confidential sources.

    When Mr. Kiriakou pleaded guilty on Oct. 23 in federal court in Alexandria, Va., David H. Petraeus, then the C.I.A. director, issued a statement praising the prosecution as “an important victory for our agency, for our intelligence community, and for our country.”

    “Oaths do matter,” he went on, “and there are indeed consequences for those who believe they are above the laws that protect our fellow officers and enable American intelligence agencies to operate with the requisite degree of secrecy.”

    Less than three weeks later, e-mails tripped up Mr. Petraeus himself. He resigned after F.B.I. agents carrying out an unrelated investigation discovered, upon examining his private e-mail account, that he had had an extramarital affair.

    Neil H. MacBride, the United States attorney for the Eastern District of Virginia, hailed Mr. Kiriakou’s conviction in a statement: “The government has a vital interest in protecting the identities of those involved in covert operations. Leaks of highly sensitive, closely held and classified information compromise national security and can put individual lives in danger.”

    The leak case is a devastating turn for Mr. Kiriakou, a father of five who considers himself a patriot, a proud Greek-American from Pennsylvania steel country whose grandfather, he recalls, “always talked as if F.D.R. personally admitted him to this country.” Discovering a passion for international affairs, he scrounged scholarships to go to George Washington University, where he was recruited by a professor, a former C.I.A. psychiatrist who spotted talent for the agency.

    After he was charged last January, his wife, though accused of no wrongdoing, resigned under pressure from her C.I.A. job as a top Iran specialist. The family had to go on food stamps for several months before she got a new job outside the government. To make ends meet, they rented out their spacious house in Arlington, Va., and moved to a rented bungalow a third the size with their three young children (he has two older children from his first marriage).

    Their financial woes were complicated by Mr. Kiriakou’s legal fees. He said he had paid his defense lawyers more than $100,000 and still owed them $500,000; the specter of additional, bankrupting legal fees, along with the risk of a far longer prison term that could separate him from his wife and children for a decade or more, prompted him to take the plea offer, he said.

    Despite his distress about the charges and the havoc they have wrought for his family, he sometimes still speaks with reverence of the C.I.A. and its mission.

    But the same qualities that worked well for him in his time as a risk-taking intelligence officer, trained to form a bond with potential recruits, may have been his undoing in his post-C.I.A. role as an intelligence expert sought out by reporters.

    “Your job as a case officer is to recruit spies to steal secrets — plain and simple,” Mr. Kiriakou said. “You have to convince people you are their best friend. That wasn’t hard for me. I’d say half the people I recruited I could be lifelong friends with, even though some were communists, criminals and terrorists. I love people. I love getting to know them. I love hearing their stories and telling them stories.

    “That’s all great if you’re a case officer,” he said. “It’s not so great, it turns out, if you’re a former case officer.”

    Mixed Feelings

    After Mr. Kiriakou first appeared on ABC, talking with Brian Ross in some detail about waterboarding, many Washington reporters sought him out. I was among them. He was the first C.I.A. officer to speak about the procedure, considered a notorious torture method since the Inquisition but declared legal by the Justice Department in secret opinions that were later withdrawn.

    While he had spent hours with Abu Zubaydah after the capture, he had not been present when Abu Zubaydah was waterboarded, a fact he made clear to me and some other interviewers. But based on what he had heard and read at the agency, he told ABC and other news organizations that Abu Zubaydah had stopped resisting after just 30 or 35 seconds of the suffocating procedure and told interrogators all he knew.

    That was grossly inaccurate — the prisoner was waterboarded some 83 times, it turned out. Mr. Kiriakou believes that he and other C.I.A. officers were deliberately misled by other agency officers who knew the truth.

    Mr. Kiriakou, who has given The New York Times permission to describe previously confidential conversations, came across as friendly, courteous, disarmingly candid — and deeply ambivalent about what the C.I.A. called “enhanced interrogation techniques.”

    He spoke about his career: starting as an analyst on the Middle East at headquarters in Virginia; later being stationed in Bahrain; making the unusual switch to the “operations” side of the C.I.A.; and serving stints as a counterterrorism officer under cover, first in Greece and later in Pakistan (he speaks fluent Greek and Arabic).

    When terrorists blew up the Khobar Towers in Saudi Arabia in 1996, killing 19 American servicemen, the blast blew out his apartment windows in Bahrain 16 miles away across the water. Twice overseas, he had close calls with terrorists who were trying to kill Western officials.

    He said he had been offered the chance to be trained in the harsh interrogation methods but turned it down. Even though he had concluded that waterboarding was indeed torture, he felt that the C.I.A.’s critics, inflamed by the new revelation that videotapes of the interrogations had been destroyed, were being unduly harsh in judging actions taken in the hectic months after Sept. 11 when more attacks seemed imminent.

    “I think the second-guessing of 2002 decisions is unfair,” he said in our first conversation. “2002 was a different world than 2007. What I think is fair is having a national debate over whether we should be waterboarding.”

    His feelings about waterboarding were so mixed that some 2007 news reports cast him as a critic of C.I.A. torture, while others portrayed him as a defender of the agency. Some human rights activists even suspected — wrongly, as it turned out — that the intelligence agency was orchestrating his public comments.

    Mr. Kiriakou seemed shellshocked, and perhaps a little intoxicated, by the flood of publicity his remarks on ABC had received and the dozens of interview requests coming his way. We met for lunch a couple of times in Washington and spoke by phone occasionally. He recounted his experiences in Pakistan — the C.I.A. later allowed him to include much of that material in his 2009 memoir, “The Reluctant Spy” — and readily answered questions about agency lore or senior officials with whom he had worked.

    But he occasionally demurred when the subject was too sensitive. I could use information he gave me “on background” — that is, without mentioning him. But we would have to agree explicitly on anything I attributed to him by name, standard ground rules for such relationships.

    In 2008, when I began working on an article about the interrogation of Khalid Shaikh Mohammed, I asked him about an interrogator whose name I had heard: Deuce Martinez. He said that they had worked together to catch Abu Zubaydah, and that he would be a great source on Mr. Mohammed, the architect of the Sept. 11 attacks.

    He was able to dig up the business card Mr. Martinez had given him with contact information at Mitchell Jessen and Associates, the C.I.A. contractor that helped devise the interrogation program and Mr. Martinez’s new employer.

    Mr. Martinez, an analyst by training, was retired and had never served under cover; that is, he had never posed as a diplomat or a businessman while overseas. He had placed his home address, his personal e-mail address, his job as an intelligence officer and other personal details on a public Web site for the use of students at his alma mater. Abu Zubaydah had been captured six years earlier, Mr. Mohammed five years earlier; their stories were far from secret.

    Mr. Martinez never agreed to talk to me. But a few e-mail exchanges with Mr. Kiriakou as I hunted for his former colleague would eventually turn up in Mr. Kiriakou’s indictment; he was charged with revealing to me that Mr. Martinez had participated in the operation to catch Abu Zubaydah, a fact that the government said was classified.

    Tensions Over Secrecy

    Nothing about my exchanges with Mr. Kiriakou was unusual for a reporter covering intelligence agencies, though he was certainly on the candid end of the spectrum of former C.I.A. officers. Current officials are almost always less willing to speak than retirees. And former rank-and-file officers are usually more reluctant to speak than their bosses, who are more confident in walking up to — or occasionally crossing over — the borders protecting classified information.

    Why do officials talk about ostensibly secret programs? Sometimes the motive is self-aggrandizement, or to promote a personal or political agenda. But many officials talk because they feel Americans have a right to know, within limits, what the government is doing with their money and in their name.

    There is wide agreement in the government that too much information is classified, and even senior officials are sometimes uncertain about what is secret.

    In Senate testimony last July, for example, Michael V. Hayden, the C.I.A. director from 2006 to 2009, admitted that he was perplexed by the “dilemma” over what he was or was not permitted to say, in this case about the targeted killing of Qaeda operatives using drones — officially classified but reported in the news media every day and occasionally discussed by Mr. Obama.

    “So much of that is in the public domain that right now this witness, with my experience, I am unclear what of my personal knowledge of this activity I can or cannot discuss publicly,” Mr. Hayden said. “That’s how muddled this has become.”

    The trade-offs and tensions over government secrets in a democracy are nothing new. In 1971, when the Nixon administration went to court to try to stop The New York Times from publishing the Pentagon Papers, a classified history of the Vietnam War, Max Frankel, then the Washington bureau chief for The Times, filed an affidavit on how officials and reporters exchange secrets.

    “Without the use of ‘secrets’ that I shall attempt to explain in this affidavit, there could be no adequate diplomatic, military and political reporting of the kind our people take for granted, either abroad or in Washington, and there could be no mature system of communication between the government and the people,” Mr. Frankel wrote 42 years ago.

    Before Mr. Obama took office, prosecutions for disclosing classified information to the news media had been rare. That was a comforting fact for national security reporters and their sources, but a lamentable one for intelligence officials who complained that leaks damaged intelligence operations, endangered American operatives and their informants and strained relations with allied spy services.

    By most counts, there were only three cases until recently: against Daniel Ellsberg and a colleague for leaking the Pentagon Papers in 1971; against Samuel Loring Morison, a Navy intelligence analyst, for selling classified satellite photographs to Jane’s, the military publisher, in 1985; and against Lawrence Franklin, a Defense Department official, who was charged in 2005 with passing secrets to two officials of a pro-Israel lobbying group, who shared some of them with reporters.

    Thus Mr. Obama has presided over twice as many such cases as all his predecessors combined, though at least two of the six prosecutions since 2009 resulted from investigations begun under President George W. Bush. An outcry over a series of revelations last year — about American cyberattacks on Iran, a double agent who infiltrated the Qaeda branch in Yemen and procedures for targeted killings — prompted Mr. Holder to begin new leak investigations that have not yet produced any charges.

    The resulting chill on officials’ willingness to talk is deplored by journalists and advocates of open government; without leaks, they note, Americans might never have learned about the C.I.A.’s interrogation methods or the National Security Agency’s warrantless wiretapping. But for supporters of greater secrecy, the chill is precisely the goal.

    Revealing a Name

    From court documents and interviews, it is possible to piece together how the case against Mr. Kiriakou took shape. When he first spoke on ABC in 2007, the C.I.A. sent the Justice Department a “crimes report” — a routine step to alert law enforcement officials to an apparent unauthorized disclosure of classified information. At least half a dozen more referrals went to Justice as he continued to grant interviews covering similar ground.

    Shortly after he became a minor media star, Mr. Kiriakou lost his job in business intelligence at Deloitte, the global consulting firm he joined after leaving the C.I.A. He had also begun working with Hollywood filmmakers — visiting Afghanistan, for instance, before advising the producers of “The Kite Runner” that its young male actors should probably be relocated outside the country for their own safety. He was working with a veteran journalist, Michael Ruby, on his memoir and battling the agency’s Publications Review Board, as many C.I.A. authors have, over what he was permitted to write about and what was off limits.

    Mr. Rizzo, then a top C.I.A. lawyer, said he recalled some colleagues being upset that Mr. Kiriakou had begun speaking so openly about the interrogation program. “It was fairly brazen — a former agency officer talking on camera,” Mr. Rizzo said. “He started being quoted all over the place. He was commenting on everything.”

    Of course, Mr. Kiriakou had plenty of company. More and more C.I.A. retirees were writing books, speaking to reporters or appearing on television. Mr. Rizzo himself became the subject of a Justice Department referral after he spoke to a Newsweek reporter in 2011 about drone strikes, and his own memoir, “The Company’s Man,” is scheduled for publication next year.

    Mr. Rizzo said he did not believe that Mr. Kiriakou’s media appearances spurred a serious criminal investigation. “There really wasn’t a campaign against him,” he said.

    Then, in 2009, officials were alarmed to discover that defense lawyers for detainees at Guantánamo Bay, Cuba, had obtained names and photographs of C.I.A. interrogators and other counterterrorism officers, including some who were still under cover. It turned out that the lawyers, working under the name of the John Adams Project, wanted to call the C.I.A. officers as witnesses in future military trials, perhaps to substantiate accounts of torture or harsh treatment.

    But initial fears that Al Qaeda might somehow be able to stalk their previous captors drew widespread coverage. This time there was a crimes report, Mr. Rizzo said, that was taken very seriously, both at the C.I.A. and the Justice Department.

    F.B.I. agents discovered that a human rights advocate hired by the John Adams Project, John Sifton, had compiled a dossier of photographs and names of the C.I.A. officers; that Mr. Sifton had exchanged e-mails with journalists, including Matthew A. Cole, a freelancer then working on a book about a C.I.A. rendition case in Italy that had gone awry; and that Mr. Cole had exchanged e-mails with Mr. Kiriakou. The F.B.I. used search warrants to obtain access to Mr. Kiriakou’s two personal e-mail accounts.

    According to court documents, F.B.I. agents discovered that in August 2008, Mr. Cole — identified as Journalist A in the charging documents — had asked Mr. Kiriakou if he knew the name of a covert officer who had a supervisory role in the rendition program, which involved capturing terrorism suspects and delivering them to prisons in other countries.

    Mr. Kiriakou at first said he did not recall the name, but followed up the next day with an e-mail passing on the name and adding, “It came to me last night,” the documents show. (Mr. Sifton, Mr. Cole and federal prosecutors all declined to comment.)

    In recent interviews, Mr. Kiriakou said he believed that the covert officer, whom he had last seen in 2002, had retired; in fact, the officer was then working overseas. He had no idea that the name would be passed on to the Guantánamo defense lawyers and end up in a government file, as it did, he said.

    When the F.B.I. agents invited Mr. Kiriakou to their Washington office a year ago “to help with a case,” he said, they repeatedly asked him whether he had knowingly disclosed the name of a covert officer. He replied that he had no recollection of having done so; he still insists that was the truth.

    “If I’d known the guy was still under cover,” Mr. Kiriakou said, “I would never have mentioned him.”

    The officer’s name did not become public in the four years after Mr. Kiriakou sent it to Mr. Cole. It appeared on a whistle-blowing Web site for the first time last October; the source was not clear.

    Preparing for Prison

    On a chilly recent afternoon, Mr. Kiriakou, in a Steelers jersey, drove his Honda S.U.V. to pick up his son Max, 8, and his daughter Kate, 6, from school, leaving the 14-month-old Charlie at home with a baby sitter.

    He and his wife had struggled with how to explain to the children that he is going away, probably in mid-February. They settled on telling the children that “Daddy lost a big fight with the F.B.I.” and would have to live elsewhere for a while. Max cried at the news, Mr. Kiriakou said. He cried again after calculating that his birthday would fall on a weekday, so it would be impossible to make the trip to prison to share the celebration with his father.

    The afternoon school pickup has become his routine since he has been out of work. A stint as an investigator for the Senate Foreign Relations Committee ended before he was charged; two hedge funds that had him on retainer to provide advice on international security issues dropped him when the charges were filed.

    Only Liberty University, the conservative Christian institution founded by Jerry Falwell Sr. in Lynchburg, Va., where Mr. Kiriakou was hired by former C.I.A. officers on the faculty to teach intelligence courses, actually increased the work it offered him when he got in trouble.

    “They say torture is un-Christian,” Mr. Kiriakou said, who notes wryly that his fervent supporters now include both the Liberty Christians and an array of left-wing activists.

    Last summer, Mr. Kiriakou was teaching a practical course on surveillance and countersurveillance to a group of Liberty students in Washington and had them trail him on foot on the eastern edge of Georgetown, he said. After several passes, the students excitedly told him that they had detected several cars that were also following him — his usual F.B.I. minders, he figured.

    When Mr. Kiriakou pleaded guilty in October to sharing the covert officer’s name, the government dropped several other charges, including the disclosure to The Times and a claim that he had lied to the C.I.A.’s Publications Review Board, though those violations remain in an official statement of facts accompanying the plea.

    This article has been revised to reflect the following correction:

    Correction: January 5, 2013

    A summary that appeared with an earlier version of this article misspelled the surname of the former C.I.A. operative. He is John C. Kiriakou, not Kiriako.

    January 5, 2013
    By SCOTT SHANE

    Find this story at 5 January 2013

    © 2013 The New York Times Company

    Zero Dark Thirty director given ‘roadmap’ behind U.S. stealth mission to kill Osama bin Laden

    Kathryn Bigelow given classified information by high ranking official
    She was also briefed by CIA and military officials and Navy Seals
    Campaign group said the White House has acted improperly

    The director of an Oscar-nominated film about the killing of Osama bin Laden was given classified information about the operation by United States intelligence chiefs.

    Zero Dark Thirty director Kathryn Bigelow and her screenwriting partner Mark Boal were provided with a complete ‘roadmap’ of how the raid was planned during a 45 minute meeting with Michael Vickers – the country’s highest ranking civilian intelligence official.

    The filmmakers also received briefings from top CIA and military intelligence officers and Navy Seals who carried out Operation Neptune Spear – attacking bin Laden’s compound in Pakistan in May 2011.

    Secrecy: Zero Dark Thirty filmmakers Kathryn Bigelow and Mark Boal were given classified information

    The transcript of the interview, which took place three months after the terrorist leader’s death, has this week been published by the National Security Archive (NSA) at George Washington University in Washington.

    Classified: Intelligence chief Michale Vickers gave information to the filmmakers during an interview

    It follows a freedom of information request by campaign group Judicial Watch. Its president Tom Fitton had said the White House acted improperly by giving ‘politically-connected filmmakers extraordinary and secret access to bin Laden raid information’

    Following the raid, the White House and Pentagon held a series of contradictory briefings and the NSA argues that an authoritative account of the operation has never been published.

    The group accused the Obama administration of sharing the ‘intimate details’ to help the filmmakers release a movie ‘perfectly timed to give a home-stretch boost’ last year’s re-election campaign.

    The NSA said much of the operation in Abbottabad is still ‘shrouded in secrecy’, with many details of the raid having never been released.

    Chris Farrell, of Judicial Watch, told The Independent: ‘Either you admit you gave special excess to your pet film directors, or you make the information available to everyone.’

    A statement on the Judicial Watch website said that the film pushed the Obama narrative, and added: ‘Barack Obama comes off as a hero character.

    ‘We see him morally preening on a news program and hear him described as ‘thoughtful and analytical.’

    Oscar nominated: Navy SEALs prepare to breach a locked door in bin Laden’s compound in Dark Zero Thirty

    Raid: Pakistani security officials stand guard as workers demolish the compound in Abbottabad

    ‘Boal and Bigelow seemed to have gone out of their way (short of producing a two-hour campaign commercial) to project the Obama administration as ‘gutsy’ for ordering the raid.’

    Hunted: Bin Laden was killed by U.S. forces in May 2011

    An investigation into whether Mr Vickers broke any rules by briefing Ms Bigelow and Mr Boal has been launched by the Department of Defense.

    Mr Boal and Ms Bigelow, who spent several years working on the film, have insisted that they went through the proper official channels in the intelligence community and did not have access to any classified information.

    Zero Dark Thirty opened across the U.S. on January 11 and has been nominated for five Oscars including Best Picture, Best Actress for Jessica Chastain and Best Original Screenplay. It was nominated for four Golden Globes, with Chastain winning Best Actress.

    Mr Boal and Ms Bigelow have both won Oscars fro the Hurt Locker. Ms Bigelow has defended her latest film’s torture scene, saying criticism of the practices might be better directed towards government policymakers.

    After bin Laden – who was hunted by the US since the 9/11 terrorist attacks – was killed, the Obama administration said his body was buried at sea off the USS Carl Vinson in accordance with Islamic tradition.

    The raid was completed shortly after 1am local time when he was shot once in the chest and once in the head by a Navy Seal who announced, ‘For God and country Geronimo, Geronimo, Geronimo’, because Geronimo was the code-name given to the al-Qaeda leader.

    By Alex Gore

    PUBLISHED: 17:53 GMT, 19 January 2013 | UPDATED: 09:00 GMT, 20 January 2013

    Find this story at 19 January 2013

    © Associated Newspapers Ltd

    How did Bigelow access America’s secrets about torture and Bin Laden’s assassination for Zero Dark Thirty?

    Oscar contender is triggering growing criticism from US senators that the movie supports ‘waterboarding’

    It has received five Oscar nominations and created a buzz among movie fans around the world.

    But Kathryn Bigelow’s Zero Dark Thirty, which recounts the operation that traced and killed Osama bin Laden, is at the centre of growing controversy over the unprecedented access to classified information granted to the director and her screenwriter colleague, while most of these details remain unavailable to the general pubic.

    Documents collected, collated and published this week by the National Security Archive of George Washington University in Washington show that only a portion of information about Operation Neptune Spear, the codename for the CIA-led, decade-long hunt for Bin Laden, has so far been declassified.

    In contrast, Ms Bigelow and her colleague Mark Boal received briefings from high-ranking CIA and military intelligence officers, Navy SEALs who took part in the operation and other officials. A CIA spokeswoman said at the time, the agency had decided to support the director because “it makes sense to get behind a winning horse. Mark and Kathryn’s movie is going to be the first and the biggest”.

    The attacks of 9/11 on New York and Washington traumatised the US and led to various policy decisions whose ramifications are still being felt. The vow of then US President George Bush to capture the al-Qa’ida leader “dead or alive” led to the US and UK invasion of Afghanistan and a hunt for Bin Laden that concluded in May 2011 when US Special Forces raided a walled compound in the Pakistani town of Abbottabad where he had been hiding.

    In the hours and days after the raid, White House and Pentagon officials briefed the media about aspects of the raid. Yet there were a number of contradictions contained within those briefings, and more than 18 months later many details remain unknown. Photographs of Bin Laden, for instance, supposedly taken after he was shot dead and when his body was buried at sea from aboard the USS Carl Vinson have not been made public, and the Obama administration has refused media requests under the Freedom of Information Act to release them.

    Indeed, the National Security Archive said much of the operation was still “shrouded in secrecy”. It added: “The government’s recalcitrance over releasing information directly to the public about the 21 century’s most important intelligence search and military raid, and its decision instead to grant the film’s producers exclusive and unprecedented access to classified information about the operation, means that for the time being – for bad or good – Hollywood has become the public’s account of record for Operation Neptune Spear.”

    Even before its release, Ms Bigelow’s film had already created controversy because of a scenes showing torture that the film suggests were essential to obtaining information that led the CIA to the garrison town of Abbottabad.

    Such has been the furore that senior US senators Diane Feinstein and John McCain publicly complained the film was supporting the use of techniques such as “waterboarding”. Ms Bigelow has defended her film, recently telling the BBC: “It’s part of the story. To omit it would have been whitewashing history.”

    Yet others say, the issue of the access given to the 61-year-old director is equally controversial. Chris Farrell, of Judicial Watch, a Washington-based non-profit organisation, said it had been involved in extensive litigation with the authorities to obtain withheld documents. He claimed the government was trying to have it both ways. “Either you admit you gave special access to your pet film director, or else you make the information available to everyone,” he said.

    What has added to the perception that Ms Bigelow received special treatment are various moves by the authorities to halt other people releasing information about Operation Neptune Spear. The NSA said last November, seven US special forces soldiers involved in the Abbottabad operation were reprimanded for providing classified material to a video game manufacturer.

    Andrew Buncombe
    Friday, 18 January 2013

    Find this story at 18 January 2013

    © independent.co.uk

     

     

    U.S. Weighs Base for Spy Drones in North Africa

    WASHINGTON — The United States military is preparing to establish a drone base in northwest Africa so that it can increase surveillance missions on the local affiliate of Al Qaeda and other Islamist extremist groups that American and other Western officials say pose a growing menace to the region.

    For now, officials say they envision flying only unarmed surveillance drones from the base, though they have not ruled out conducting missile strikes at some point if the threat worsens.

    The move is an indication of the priority Africa has become in American antiterrorism efforts. The United States military has a limited presence in Africa, with only one permanent base, in the country of Djibouti, more than 3,000 miles from Mali, where French and Malian troops are now battling Qaeda-backed fighters who control the northern part of Mali.

    A new drone base in northwest Africa would join a constellation of small airstrips in recent years on the continent, including in Ethiopia, for surveillance missions flown by drones or turboprop planes designed to look like civilian aircraft.

    If the base is approved, the most likely location for it would be in Niger, a largely desert nation on the eastern border of Mali. The American military’s Africa Command, or Africom, is also discussing options for the base with other countries in the region, including Burkina Faso, officials said.

    The immediate impetus for a drone base in the region is to provide surveillance assistance to the French-led operation in Mali. “This is directly related to the Mali mission, but it could also give Africom a more enduring presence for I.S.R.,” one American military official said Sunday, referring to intelligence, surveillance and reconnaissance.

    A handful of unarmed Predator drones would carry out surveillance missions in the region and fill a desperate need for more detailed information on a range of regional threats, including militants in Mali and the unabated flow of fighters and weapons from Libya. American military commanders and intelligence analysts complain that such information has been sorely lacking.

    The Africa Command’s plan still needs approval from the Pentagon and eventually from the White House, as well as from officials in Niger. American military officials said that they were still working out some details, and that no final decision had been made. But in Niger on Monday, the two countries reached a status-of-forces agreement that clears the way for greater American military involvement in the country and provides legal protection to American troops there, including any who might deploy to a new drone base.

    The plan could face resistance from some in the White House who are wary of committing any additional American forces to a fight against a poorly understood web of extremist groups in North Africa.

    If approved, the base could ultimately have as many as 300 United States military and contractor personnel, but it would probably begin with far fewer people than that, military officials said.

    Some Africa specialists expressed concern that setting up a drone base in Niger or in a neighboring country, even if only to fly surveillance missions, could alienate local people who may associate the distinctive aircraft with deadly attacks in Pakistan, Somalia and Yemen.

    Officials from Niger did not respond to e-mails over the weekend about the plan, but its president, Mahamadou Issoufou, has expressed a willingness to establish what he called in a recent interview “a long-term strategic relationship with the U.S.”

    “What’s happening in northern Mali is a big concern for us because what’s happening in northern Mali can also happen to us,” Mr. Issoufou said in an interview at the presidential palace in Niamey, Niger’s capital, on Jan. 10, the day before French troops swept into Mali to blunt the militant advance.

    Gen. Carter F. Ham, the head of the Africa Command, who visited Niger this month to discuss expanding the country’s security cooperation with the United States, declined to comment on the proposed drone base, saying in an e-mail that the subject was “too operational for me to confirm or deny.”

    Discussions about the drone base come at a time when the French operation in Mali and a militant attack on a remote gas field in the Algerian desert that left at least 37 foreign hostages, including 3 Americans, dead have thrown a spotlight on Al Qaeda’s franchise in the region, Al Qaeda in the Islamic Maghreb, and forced Western governments and their allies in the region to accelerate efforts to combat it.

    Senator Dianne Feinstein, a California Democrat who is chairwoman of the Intelligence Committee, said on CBS’s “Face the Nation” on Sunday that in the wake of Osama bin Laden’s death and the turmoil of the Arab Spring, there was “an effort to establish a beachhead for terrorism, a joining together of terrorist organizations.”

    According to current and former American government officials, as well as classified government cables made public by the group WikiLeaks, the surveillance missions flown by American turboprop planes in northern Mali have had only a limited effect.

    Flown mainly from Ouagadougou, the capital of Burkina Faso, the missions have faced stiff challenges as militant leaders have taken greater precautions in using electronic communications and have taken more care not to disclose delicate information that could be monitored, like their precise locations.

    General Ham said in an interview on his visit to Niger that it had been difficult for American intelligence agencies to collect consistent, reliable intelligence about what was going on in northern Mali, as well as in other largely ungoverned parts of the sub-Saharan region.

    “It’s tough to penetrate,” he said. “It’s tough to get access for platforms that can collect. It’s an extraordinarily tough environment for human intelligence, not just ours but the neighboring countries as well.”

    January 28, 2013
    By ERIC SCHMITT

    Find this story at 28 January 2013

    © 2013 The New York Times Company

    The incredible U.S. military spy drone that’s so powerful it can see what type of phone you’re carrying from 17,500ft

    The ARGUS-IS can view an area of 15 sq/miles in a single image
    Its zoom capability can detect an object as small as 6in on the ground
    Developed by BAE as part of a $18million DARPA project
    System works by stringing together 368 digital camera chips

    A sinister airborne surveillance camera gives the U.S. military the ability to track movements in an entire city like a real-time Google Street View.

    The ARGUS-IS array can be mounted on unmanned drones to capture an area of 15 sq/miles in an incredible 1,800MP – that’s 225 times more sensitive than an iPhone camera.

    From 17,500ft the remarkable surveillance system can capture objects as small as 6in on the ground and allows commanders to track movements across an entire battlefield in real time.

    Scroll down for video

    Beat that, Google: An image taken from 17,500ft by the U.S. military’s ARGUS-IS array, which can capture 1,800MP zoomable video feeds of an entire medium-sized city in real time

    ‘It is important for the public to know that some of these capabilities exist,’ said Yiannis Antoniades, the BAE engineer who designed the system, in a recent PBS broadcast.

    The aerospace and weapons company developed the ARGUS-IS array as part of a $18.5million project funded by the Pentagon’s Defense Advanced Research Projects Agency (Darpa).

    In Greek mythology, Argus Panoptes, guardian of the heifer-nymph Io and son of Arestor, was a primordial giant whose epithet, ‘Panoptes’, ‘all-seeing’, led to his being described with multiple, often one hundred, eyes.

    Like the Titan of myth, the Pentagon’s ARGUS-IS (a backronym standing for Autonomous Real-time Ground Ubiquitous Surveillance-Imaging System) works by stringing together an array of 368 digital camera imaging chips.

    An airborne processor combines the video from these chips to create a single ultra-high definition mosaic video image which updates at up to 15 frames a second.

    All-seeing: This graphic illustrates how the U.S. military’s ARGUS-IS array links together images streamed from hundreds of digital camera sensors to watch over a huge expanse of terrain in real time

    What it looks like: The ARGUS-IS (a backronym standing for Autonomous Real-time Ground Ubiquitous Surveillance-Imaging System) strings together an array of 368 digital camera imaging chips into a single unit

    That tremendous level of detail makes it sensitive enough to not only track people moving around on the ground thousands of feet below, but even to see what they are doing or carrying.

    The ARGUS array sends its live feed to the ground where it connects to a touch-screen command room interface.

    Using this, operators can zoom in to any area within the camera’s field of view, with up to 65 zoom windows open at once.

    Each video window is electronically steerable independent of the others, and can either provide continuous imagery of a fixed area on the ground or be designated to automatically keep a specified target in the window.

    Sinister: The system tracks all moving objects in its field of view, highlighting them with coloured boxes, allowing operators to track movements across an area as and when they happen

    The system automatically tracks any moving object it can see, including both vehicles and individuals on foot, highlighting them with coloured boxes so they can be easily identified.

    It also records everything, storing an approximate million terabytes of data a day – the equivalent of 5,000 hours of high-definition video footage.

    ‘So you can go back and say I’d like to see what happened at this particular location three days, two hours [and] four minutes ago, and it will actually show you what happened as if you were watching it live,’ said Mr Antoniades.

    iPad next? The feed from the ARGUS is transmitted to a touch-screen command and control interface

    Windows: Operators can open a window to zoom in to any area within the camera’s field of view, with up to 65 open and running at once

    Total surveillance: The view of Quantico, Virginia, highlighted in the PBS film

    For the PBS programme reporting the technology, Mr Antoniades showed reporters a feed over the city of Quantico, Virginia, that was recorded in 2009.

    By Damien Gayle

    PUBLISHED: 14:56 GMT, 28 January 2013 | UPDATED: 19:56 GMT, 28 January 2013

    Find this story at 28 January 2013

    © Associated Newspapers Ltd

    Bradley Manning denied chance to make whistleblower defence

    Judge rules that Manning will not be allowed to present evidence about his motives for the leak – a key plank of his defence

    Colonel Denise Lind ruled that general issues of motive were not relevant to the trial stage of the court martial. Photograph: Patrick Semansky/AP

    Bradley Manning, the US soldier accused of being behind the largest leak of state secrets in America’s history, has been denied the chance to make a whistleblower defence in his upcoming court martial in which he faces possible life in military custody with no chance of parole.

    The judge presiding over Manning’s prosecution by the US government for allegedly transmitting confidential material to WikiLeaks ruled in a pre-trial hearing that Manning will largely be barred from presenting evidence about his motives in leaking the documents and videos. In an earlier hearing, Manning’s lead defence lawyer, David Coombs, had argued that his motive was key to proving that he had no intention to harm US interests or to pass information to the enemy.

    The judge, Colonel Denise Lind, ruled that general issues of motive were not relevant to the trial stage of the court martial, and must be held back until Manning either entered a plea or was found guilty, at which point it could be used in mitigation to lessen the sentence. The ruling is a blow to the defence as it will make it harder for the soldier’s legal team to argue he was acting as a whistleblower and not as someone who knowingly damaged US interests at a time of war.

    “This is another effort to attack the whistleblower defence,” said Nathan Fuller, a spokesman for the Bradley Manning support network, after the hearing.

    The judge also blocked the defence from presenting evidence designed to show that WikiLeaks caused little or no damage to US national security. Coombs has devoted considerable time and energy trying to extract from US government agencies their official assessments of the impact of WikiLeaks around the world, only to find that he is now prevented from using any of the information he has obtained.

    The 25-year-old intelligence analyst faces 22 charges relating to the leaking of hundreds of thousands of classified diplomatic cables, war logs from the Afghan and Iraq wars, and videos of US military actions. The most serious charge, “aiding the enemy”, which carries the life sentence, accuses him of arranging for state secrets to be published via WikiLeaks on the internet knowing that al-Qaida would have access to it.

    Ed Pilkington in New York
    guardian.co.uk, Thursday 17 January 2013 18.22 GMT

    Find this story at 17 January 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Did US spies hack French government computers using Facebook?

    A sophisticated computer virus discovered at the center of the French government’s secure computer network was planted there by the United States, according to unnamed sources inside France’s intelligence community. Paris-based magazine L’Express, France’s version of Time magazine, says in its current issue that the alleged American cyberattack took place shortly before last April’s Presidential elections in France. It resulted in the infection of the entire computer system in the Palais de l’Élysée, which is the official residence of the President of France. The French magazine cites unnamed sources inside the French Network and Information Security Agency (ANSSI), which is responsible for cybersecurity throughout France. The sources claim that the snooping virus allowed its handlers to gain access to the computers of most senior French Presidential aides and advisers during the final weeks of the administration of French President Nicolas Sarkozy, including his Chief of Staff, Xavier Musca. The article claims that the virus used a source code nearly identical to that of Flame, a super-sophisticated version of Stuxnet, the virus unleashed a few years ago against the computer infrastructure of the Iranian nuclear energy program. Many cybersecurity analysts believe that the US and Israel were instrumental in designing both Stuxnet and Flame. IntelNews understands that the alleged virus was initially directed at employees of the Palais de l’Élysée through Facebook. The targets were allegedly befriended by fake Facebook profile accounts handled by the team that operated the virus. The targets were then sent phishing emails that contained links to phony copies of the login page for the Palais de l’Élysée intranet website. Though that bogus website the hackers acquired username and password data of several Palais de l’Élysée staffers, which they subsequently used to gain access to the Presidential Palace’s computer system. Assuming that the virus planted on the Palais de l’Élysée intranet was similar to Flame in method and scope, it can be inferred that its handlers were able to spy on conversations taking place at the Palais using the infected computers’ audiovisual peripherals, as well as log keystrokes and acquire screen shots at regular intervals. The collected data was then routed through a host of different servers on five continents before reaching the hackers.

    November 22, 2012 by Joseph Fitsanakis 6 Comments

    By JOSEPH FITSANAKIS | intelNews.org |

    Find this story at 22 November 2012

    Cyberguerre: comment les Américains ont piraté l’Élysée

    EXCLUSIF. En mai, l’équipe de Nicolas Sarkozy a été victime d’une opération d’espionnage informatique hypersophistiquée. Les sources de L’Express concordent : le coup vient de… l’ami américain. Révélations sur une attaque qui s’inscrit dans une bataille planétaire.

    CYBERGUERRE – Les intrus qui se sont introduits dans les réseaux informatiques de l’Elysée en mai dernier ont subtilisé des notes secrètes et des plans stratégiques à partir des ordinateurs de proches conseillers de Nicolas Sarkozy.
    DR

    C’est l’un des hold-up les plus audacieux réalisés contre l’Etat français. En mai dernier, quelques jours avant le second tour de l’élection présidentielle, des pirates ont réussi à s’introduire dans les réseaux informatiques de l’Elysée. Révélée par le quotidien régional Le Télégramme, cette intrusion avait alors été soigneusement étouffée par le Château. Une omerta qui, jusqu’à présent, n’avait pas été brisée. Aucune information n’avait filtré sur la nature des agresseurs, ou même sur le préjudice subi. Pourtant, l’affaire est grave, d’autant qu’elle constituerait une cyberattaque sans précédent entre pays alliés.

    L’Express peut révéler que les intrus ont non seulement réussi à pénétrer au coeur même du pouvoir politique français, mais qu’ils ont pu fouiller les ordinateurs des proches conseillers de Nicolas Sarkozy. Des notes secrètes ont été récupérées sur des disques durs, mais aussi des plans stratégiques. Du vrai travail de pro, digne du dernier James Bond, Skyfall. Et, comme souvent dans ce type d’attaque, une négligence humaine est à l’origine de la catastrophe.
    L’ordinateur du secrétaire général de l’Elysée pillé

    Tout a commencé sur Facebook. Les assaillants ont d’abord identifié, sur le réseau social, le profil de personnes travaillant au palais présidentiel. Se faisant passer pour des amis, ils les ont ensuite invitées, par un message électronique, à se connecter sur l’intranet du Château. Sauf que ce lien menait à une fausse page Web – une réplique de celle de l’Elysée. Les victimes n’y ont vu que du feu ; et lorsque est apparu, à l’écran, un message leur demandant leur identifiant et leur mot de passe, elles les ont donnés en toute bonne foi. Une technique bien connue des hackers, qui leur a permis de récupérer les clefs numériques pour s’inviter en toute quiétude dans le saint des saints.

    Une fois à l’intérieur, les pirates ont installé un logiciel espion qui s’est propagé d’un ordinateur à l’autre. Très élaboré, ce “ver” n’a infecté que quelques machines. Et pas n’importe lesquelles : celles des conseillers les plus influents du gouvernement… et du secrétaire général, Xavier Musca. Nicolas Sarkozy y a, lui, échappé. Et pour cause, il ne possédait pas de PC. Malheureusement pour les assaillants, le code malveillant a laissé des empreintes. “Telles des marionnettes actionnées par des fils invisibles, les machines infectées communiquent avec leur maître pour prendre leurs ordres, décrypte un expert, Olivier Caleff, responsable sécurité du Cert-Devoteam, une société de sécurité informatique. Lorsque l’on essaie de remonter ces fils sur Internet, on arrive souvent sur des serveurs situés à l’étranger.”

    C’est ce travail de fourmi qu’ont mené les enquêteurs français. Le degré de sophistication de l’attaque était tel que les suspects se limitaient, d’emblée, à une poignée de pays. Pour preuve, le cyberpompier de l’Etat, l’Agence nationale de la sécurité des systèmes d’information (Anssi), a mis plusieurs jours pour restaurer le réseau de l’Elysée. Difficile de trouver l’origine de l’offensive. Souvent, les assaillants brouillent les pistes en passant par des pays tiers. Autant de rebonds, sur des serveurs situés sur les cinq continents, qui rendent ce fil d’Ariane très compliqué à suivre, même pour les “cyberdétectives” de l’Etat mobilisés pour l’occasion. Mais, selon les informations recueillies par L’Express auprès de plusieurs sources, leurs conclusions, fondées sur un faisceau de présomptions, convergent vers le plus vieil allié de la France : les Etats-Unis.
    Le virus porte la marque de son auteur

    Le code malveillant utilisé affiche, en effet, les mêmes fonctionnalités qu’un ver informatique extrêmement puissant, baptisé Flame, identifié à la fin du mois de mai par une grande société russe d’antivirus, Kaspersky. “Très perfectionné, il peut collecter les fichiers présents sur une ma-chine, réaliser des captures d’écran et même activer le microphone d’un PC pour enregistrer les conversations, expli-que Vitaly Kamluk, spécialiste du sujet chez cet éditeur. Sa conception a demandé beaucoup d’argent et des moyens humains que seul un grand pays est en mesure de mobiliser.” Ou même deux : selon la presse anglo-saxonne, le ver aurait été créé par une équipe américano-israélienne, car il devait viser initialement des pays du Moyen-Orient (Iran, Egypte). Autre élément à charge : tel un peintre reconnaissable à son trait, un virus porte les marques du savoir-faire de son auteur. Janet Napolitano, secrétaire d’Etat à la Sécurité intérieure de l’administration Obama, n’a ni confirmé ni démenti nos informations.

    Contactés à ce sujet, ni l’Anssi ni l’Elysée n’ont souhaité faire de commentaires. Reste une question. Pourquoi un allié de la France lancerait-il une telle opération ? “Vous pouvez être en très bons termes avec un “pays ami” et vouloir, en même temps, vous assurer de son soutien indéfectible, surtout dans une période de transition politique”, note un proche du dossier, sous le couvert de l’anonymat. Sans compter que l’Elysée joue un rôle clef dans la signature de grands contrats avec des pays étrangers, notamment au Moyen-Orient. “C’était encore plus vrai à l’époque de Nicolas Sarkozy”, rappelle Nicolas Arpagian, directeur scientifique du cycle sécurité numérique à l’Institut national des hautes études de la sécurité et de la justice.

    Un instantané des cyberattaques en cours…

    HoneyMap réalisé par Honeynet Project

    Quitte à être espionné, sans doute vaut-il mieux l’être par un allié… “Nous avons de grands partenaires avec lesquels nous collaborons et entretenons des relations de confiance, et d’autres avec qui nous ne partageons pas les mêmes valeurs”, rappelle le contre-amiral Arnaud Coustillière, responsable du volet militaire de la cyberdéfense française. Il n’empêche, l’attitude de l’administration Obama suscite de nombreuses interrogations.
    Vers des attaques “pires que le 11 Septembre” ?

    Dans une version du livre blanc sur la défense, actuellement en cours de rédaction, des auteurs ont soulevé les ambiguïtés de Washington. “Face à la difficulté d’utiliser les voies de droit, [les Etats-Unis] ont recours de plus en plus à l’action clandestine, ce qui peut poser une question de contrôle démocratique.”

    Ironie du sort, le Congrès américain vient, le 14 novembre, de publier un rapport accablant sur l'”acteur le plus menaçant du cyberespace”, à savoir… la Chine. Leon Panetta, secrétaire d’Etat à la Défense, a même déclaré récemment que, par leur puissance numérique, “certains pays” seraient, d’ores et déjà, capables de provoquer un “cyber-Pearl Harbor” : “Ce serait pire que le 11 Septembre ! Des assaillants pourraient faire dérailler un train de voyageurs ou un convoi de produits chimiques dangereux. Ou, encore, contaminer les systèmes d’eau des grandes villes ou éteindre une grande partie du réseau électrique.” Le tout en se cachant derrière des écrans d’ordinateurs situés à des milliers de kilomètres…
    Dans le monde virtuel, tous les coups sont permis

    Leon Panetta sait de quoi il parle. L’Oncle Sam a déjà utilisé ces moyens. C’était en 2010, lors de l’opération “Jeux olympiques”, lancée conjointement avec Israël contre l’Iran. Leur logiciel Stuxnet aurait endommagé un grand nombre des centrifugeuses utilisées par Téhéran pour enrichir de l’uranium. Spectaculaire, cette opération ne doit pas faire oublier que d’autres nations oeuvrent dans l’ombre. Dans le plus grand secret, de nombreux pays, démocratiques ou non, fourbissent leurs armes numériques. Des forces secrètes se constituent, des mercenaires vendent leurs services aux plus offrants. Sans foi ni loi. La Toile n’est pas un champ de bataille comme les autres. Oubliez les codes de l’honneur, les conventions internationales ou les alliances. Tous les coups sont permis. Et mieux vaut avoir les moyens de se battre. Dans le cyberespace, personne ne vous entendra crier.

    Pour s’en convaincre, il suffit de se rendre au quartier général de l’Otan, à Bruxelles. Tou-tes les nuits, vers 1 heure, c’est le même rituel, explique l’un des responsables européens de la sécurité au sein de l’organisation. “Sur une carte, à l’écran, on voit des dizaines de lumières s’allumer en Chine, explique-t-il. Ce sont les hackers qui, le matin, lancent des attaques lorsqu’ils arrivent au boulot. Et, le soir, elles s’éteignent quand ils rentrent chez eux.” Même constat d’un proche de la NSA, l’agence de renseignement des Etats-Unis : “Parfois, nous enregistrons une baisse sensible des tentatives d’intrusion sur nos sites, témoigne-t-il. Invariablement, cela correspond à des jours fériés en Chine.” Mais l’image d’une “superagence” où des armées de pirates travailleraient en batterie pour ravir les secrets de l’Occident ne reflète pas la réalité. Selon ce même agent, “leur capacité offensive est beaucoup moins centralisée qu’on pourrait l’imaginer. De nombreuses régions ont mis en place leur propre dispositif, qui dépend du bureau politique local. Et il n’est pas rare que ces factions se combattent entre elles.”
    Coût d’une attaque : quelques centaines de milliers d’euros

    Un hacker, qui souhaite rester anonyme, pense, lui aussi, que l’on surestime un peu le “cyberpéril jaune”. “J’ai eu l’occasion de voir travailler les Chinois, ce ne sont pas les plus affûtés, dit-il. Leurs techniques sont assez rudimentaires par rapport à celles des Américains ou des Israéliens…”

    REUTERS/Minoru Iwasaki/Pool

    “Les questions de sécurité alimentaire, d’énergie et de cybersécurité deviennent plus aiguës”
    Hu Jintao, secrétaire général du Parti communiste chinois, novembre 2012.

    A chaque pays sa spécificité. En Russie, le dispositif d’attaque est opaque. De nombreux spécialistes occidentaux du renseignement soupçonnent l’existence d’une relation triangulaire entre l’Etat, la mafia et certaines sociétés de conseil informatique qui seraient le bras armé du Kremlin. “Avez-vous déjà vu, en Russie, un hacker avoir des problèmes avec la police ? questionne Garry Kasparov, ancien champion du monde d’échecs, aujourd’hui l’un des opposants au président Poutine. Non, parce que l’on sait qui se trouve aux manettes, dans l’ombre…”

    Contrairement à ce que l’on pourrait croire, les Européens ne sont pas en reste. La France, c’est une surprise, dispose d’une force de frappe numérique. Mais on trouve aussi, sur l’échiquier mondial, des Etats moins avancés sur le plan technique, tels l’Iran et la Corée du Nord. Nul besoin, en effet, d’investir dans des infrastructures coûteuses. Il suffit d’un ordinateur, d’un accès à Internet et de quelques centaines de milliers d’euros pour monter une attaque. Car sur la Toile, comme dans la vraie guerre, on trouve toutes sortes d’armes sur le marché. Il suffit de frapper aux bonnes portes. Au lieu d’une kalachnikov, on repartira avec un logiciel malveillant (malware, dans le jargon) qui permettra de prendre le contrôle d’un système ennemi. La première motivation : “Faire du business !”

    “C’est un enjeu de domination. En maîtrisant l’information, on contrôle tout”, résume Jonathan Brossard. Ce hacker français renommé intervient aujourd’hui dans des groupes internationaux.

    Son job consiste à s’introduire dans les systèmes informatiques pour en révéler les failles – et trouver des parades. Pour lui, les risques d’un cyberconflit existent, mais ils masquent une autre motivation, bien plus puissante : “Faire du business ! Etre capable de griller un réseau électrique, c’est bien, mais le véritable enjeu, c’est surtout de gagner des parts de marché.” Connaître, dans le détail, la proposition d’un concurrent, lors d’un gros appel d’offres, donne un avantage décisif. Pour l’avoir négligé, certaines sociétés ont péri. Des pirates – chinois semble-t-il – ont pillé les secrets du géant canadien des télécoms Nortel pendant près de dix ans, au point de l’acculer à la faillite. De tels exemples abondent.

    Et la France n’est, malheureusement, pas épargnée. Les grandes entreprises du CAC 40 compteraient même parmi les plus vulnérables d’Europe. Sur ce nouveau champ de bataille invisible, on ne compte pas les morts, mais les points de PIB perdus. Et, derrière, sans doute des emplois par milliers.
    Batailles de virus

    STUXNET
    Découverte : juin 2010.
    Cible : ce logiciel a détruit des milliers de centrifugeuses nucléaires, en Iran.
    Origine supposée : opération “Jeux olympiques”, menée par les Etats-Unis et Israël.

    DUQU
    Découverte : septembre 2011.
    Cible : lié à Stuxnet, ce ver informatique a servi à espionner le programme nucléaire iranien.
    Origine supposée : Etats-Unis et Israël.

    MAHDI
    Découverte : février 2012.
    Cible : capable d’enregistrer les frappes sur un clavier et les photos et textes d’un ordinateur, Mahdi a été retrouvé en Iran, en Afghanistan et en Israël.
    Origine supposée : inconnue.

    WIPER
    Découverte : avril 2012.Cible : ce virus fait disparaître les données des disques durs des ordinateurs infectés. Il a touché des compagnies pétrolières iraniennes.
    Origine supposée : inconnue.

    FLAME
    Découverte : mai 2012.
    Cible : ce logiciel très sophistiqué aurait espionné depuis 2007 plusieurs pays, dont l’Iran, la Syrie, le Soudan, ou encore l’Arabie saoudite.
    Origine supposée : opération des Etats-Unis et d’Israël.

    GAUSS
    Découverte : juin 2012.
    Cible : capable d’espionner les transactions financières et messages électroniques, ce virus s’est répandu au Liban, en Israël et en Palestine.
    Origine supposée : inconnue.

    SHAMOON
    Découverte : août 2012.
    Cible : les ordinateurs des compagnies pétrolières saoudiennes Aramco et RasGas au Qatar ont été attaqués par ce virus.
    Origine revendiquée : groupe de hackers appelé “Glaive tranchant de la justice”, peut-être d’origine iranienne.

    La réaction de l’ambassade des Etats-Unis à Paris

    Nous réfutons catégoriquement les allégations de sources non-identifiées, parues dans un article de l’Express, selon lesquelles le gouvernement des Etats-Unis d’Amérique aurait participé à une cyberattaque contre le gouvernement français. La France est l’un de nos meilleurs alliés. Notre coopération est remarquable dans les domaines du renseignement, du maintien de l’ordre et de la cyberdéfense. Elle n’a jamais été aussi bonne et demeure essentielle pour mener à bien notre lutte commune contre la menace extrémiste.
    Mitchell Moss, porte-parole de l’ambassade des Etats-Unis à Paris

    REUTERS/Larry Downing

    “La cybermenace est l’un des plus sérieux défis auxquels nous soyons confrontés en tant que nation”
    Barack Obama, président des Etats-Unis, mai 2009.

    REUTERS/Neil Hall

    “Nous consacrerons un budget de plus d’un demi-milliard de livres [626 millions d’euros] à la cybersécurité”
    David Cameron, Premier ministre britannique, octobre 2010.

    REUTERS/Thomas Peter

    “Les attaques cybernétiques sont aussi dangereuses que la guerre conventionnelle”
    Angela Merkel, chancelière allemande, avril 2011.

    Par Charles Haquet et Emmanuel Paquette (L’Express) – publié le 20/11/2012 à 15:31

    Find this story at 20 November 2012

    © Groupe Express-Roularta

    Canadian diplomats spied on Cuba for CIA in aftermath of missile crisis: envoy

    In a little-known chapter of the Cold War, Canadian diplomats spied for the U.S. Central Intelligence Agency in Cuba in the aftermath of the 1962 missile crisis – and for years afterward.

    A major part of that story is told in a forthcoming memoir by retired Canadian envoy John Graham. Mr. Graham was one of a series of Canadian diplomats recruited to spy for the CIA in Havana. The missions went on for at least seven years, during the 1960s.

    “We didn’t have a military attaché in the Canadian embassy,” explained Mr. Graham, who worked under the cover of Political Officer. “And to send one at the time might have raised questions. So it was decided to make our purpose less visible.”

    Mr. Graham said he worked as a spy for two years, between 1962 and 1964. His mandate was to visit Soviet bases, identify weapons and electronic equipment and monitor troop movements.

    The espionage missions began after President John Kennedy asked Prime Minister Lester Pearson – at their May, 1963, summit in Hyannis Port, Mass. – whether Canada would abet American intelligence-gathering efforts in Cuba.

    As a result of the crisis, which brought the superpowers to the brink of nuclear war, the Soviets had agreed to withdraw nuclear missiles from Cuban territory, in exchange for Washington’s pledge to remove its own missile batteries from Turkey and Italy.

    To monitor Russian compliance, the United States needed to supplement data gleaned from almost daily U-2 reconnaissance flights. It had few assets on the ground. Its networks of Cuban agents had been progressively rolled up by Castro’s efficient counterintelligence service. And having severed diplomatic relations with Cuba in 1961, it had no embassy of its own through which to infiltrate American spies.

    Soon after the summit meeting, Ottawa sent diplomat George Cowley to Havana.

    Now deceased, Mr. Cowley, who had served in the Canadian embassy in Japan and sold encyclopedias in Africa, spent about two months in Havana in the late spring of 1963.

    He was followed by Mr. Graham, seconded from his post as chargé d’affaires in the Dominican Republic.

    His formal training, he told The Globe and Mail, was minimal – a few days at CIA headquarters in Langley, Va. At the end of it, an agency officer offered him a farewell gift – a sophisticated camera with an assortment of telephoto lenses.

    He declined the present, arguing that if he were ever caught with it, he’d surely be arrested.

    “But how will we know what the Soviet military convoys are carrying?” a CIA officer asked him. “We need precision. Configuration is essential for recognition.”

    “I’ll draw you pictures,” Mr. Graham said. “It was a bit like the character in Graham Greene’s Our Man in Havana, but that’s what I did.”

    In the Greene novel, an inept salesman, recruited to spy for Britain, sends illustrations of vacuum cleaner parts to his handler, calling them drawings of a military installation.

    Mr. Graham’s sketches, however, were the real thing. To get them to Canada, he flew to Mexico City – the only regional air connection – and deposited the drawings at the Canadian embassy. From there, they were dispatched by diplomatic courier to Ottawa. Copies were subsequently sent to the CIA and, Mr. Graham later heard, to the Kennedy White House.

    His written reports, sent by ciphered telegram to the Canadian embassy in Washington and then to Ottawa, contained details of electronic arrays in use at Soviet bases. “That information,” he said, “could tell an expert what weapons systems they had.”

    Although Moscow had removed its nuclear arsenal by the time Mr. Graham arrived, it maintained a significant military presence. Russian soldiers typically dressed in civilian clothes, usually in plaid sport shirts, khaki pants and running shoes.

    To fit in, Mr. Graham adopted the same ensemble – purchased at a Zellers store in Ottawa. Although many missions involved early morning surveillance of naval facilities, he was never followed. He was stopped only once by the police, roaming through a secure section of a communications building. He pretended to be a bumbling tourist and was let go.

    On several occasions, Mr. Graham conducted joint reconnaissance with an agent of another Western country that he declines to identify. “He was brilliant and altogether remarkable. At parties, he composed Monty-Python-like lyrics to pet and lingerie commercials, accompanying himself on the piano.”

    To relieve the stress of their missions, they would stop for seaside picnics on the way home. “Mr. X would pull out two crystal goblets and a Thermos of premixed martinis. I supplied the olives.”

    Canadian officials, he said, went to extraordinary lengths to protect his identity as an agent. He stamped his sketches with the words, “For Canadian Eyes Only, Confidential.” But in Ottawa they were given an additional security designation – “Secret, Ottawa Only, Protect Source,” a classification he had never seen, before or since.

    In 1964, Mr. Graham was promoted within the embassy and replaced in his espionage work by Alan McLaine.

    In fact, he said, Canada’s role as CIA surrogate in Cuba continued for several years, even under the government of Pierre Trudeau, who had developed a personal friendship with Cuban leader Fidel Castro.

    MICHAEL POSNER

    OTTAWA — The Globe and Mail

    Published Monday, Oct. 15 2012, 9:56 PM EDT

    Last updated Tuesday, Oct. 16 2012, 5:02 AM EDT

    Find this story at 15 October 2012

    © Copyright 2013 The Globe and Mail Inc. All Rights Reserved.

    Former U.S. Navy Officer Detained for Attempting to Spy for Russia

    Hoffman, 39, is set to remain in custody until a detention hearing on Tuesday.

    A former U.S. Navy officer has been detained for attempting to hand over secret information on tracking U.S. submarines to Russian intelligence.

    CNN reported Thursday that submarine specialist Robert Patrick Hoffman II was detained Thursday morning in Virginia Beach, Virginia, while trying to pass classified information to CIA operatives posing as Russian agents.

    07 December 2012
    The Moscow Times

    Find this story at 6 December 2012

    © Copyright 2013. The Moscow Times. All rights reserved.

    << oudere artikelen  nieuwere artikelen >>