• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Bradley Manning lawyers accuse prosecutors of misleading judge

    In a motion ahead of Monday’s pre-trial hearing, civilian lawyer says prosecutors are still denying defence access to documents
    Bradley Manning’s lawyers say the prosecution team is keeping important documents from them. Photograph: Cliff Owen/AP

    The US government is deliberately attempting to prevent Bradley Manning, the alleged source of the massive WikiLeaks trove of state secrets, from receiving a fair trial, the soldier’s lawyer alleges in new court documents.

    David Coombs, Manning’s civilian lawyer, has made his strongest accusations yet about the conduct of the military prosecutors. In motions filed with the military court ahead of a pre-trial hearing at Fort Meade, Maryland, on Monday, he goes so far as to accuse the government in essence of lying to the court.

    Coombs charges the prosecutors with making “an outright misrepresentation” to the court over evidence the defence has been trying for months to gain access to through disclosure.

    The dispute relates to an investigation by the Office of the National Counterintelligence Executive, Oncix, into the damage caused by the WikiLeaks disclosures of hundreds of thousands of confidential documents.

    Reports by the Associated Press, Reuters and other news outlets have suggested that official inquiries into the impact of WikiLeaks concluded that the leaks caused some “pockets” of short-term damage around the world, but that generally its impact had been embarrassing rather than harmful.

    Such a finding could prove invaluable to the defence in fighting some of the charges facing Manning or, should he be found guilty, reducing his sentence.

    Yet Coombs says the army prosecutors have consistently kept him, and the court, in the dark, thwarting his legal rights to see the evidence.

    “It was abundantly clear that Oncix had some form of inquiry into the harm from the leaks – but the government switched definitions around arbitrarily so as to avoid disclosing this discovery to the defence.”

    On 21 March, the prosecutors told the court that “Oncix has not produced any interim or final damage assessment” into WikiLeaks.

    Coombs alleges that this statement was inaccurate – and the government knew it to be inaccurate at the time it made it.

    “The defense submits [this] was an outright misrepresentation,” he writes.

    On 20 April, the government told the court that “Oncix does not have any forensic results or investigative files”. Yet a week before that, the prosecutors had handed to the defence documents that clearly showed Oncix had begun to investigate WikiLeaks almost 18 months previously.

    “Oncix was collecting information from various agencies in late 2010 to assess what damage, if any, was occasioned by the leaks. So how could it be that Oncix neither had an investigation nor a damage assessment?” Coombs writes.

    The alleged efforts by the US government to avoid fulfilling its obligations to hand over evidence, Coombs says, has had the effect of rendering it impossible for the defence to prepare for the trial which is scheduled to begin in September.

    Without access to the information, they cannot identify witnesses, develop questions for those witnesses, prepare a cross-examination strategy and so on.

    Find this story at 24 June 2012 

    Ed Pilkington in New York
    guardian.co.uk, Sunday 24 June 2012 14.19 BST
    © 2012 Guardian News and Media Limited or its affiliated companies. All rights reserved.

     

     

     

    Pentagon increasing spy presence overseas

    WASHINGTON — The Pentagon is beefing up its spy service to send several hundred undercover intelligence officers to overseas hot spots to steal secrets on national security threats after a decade of focusing chiefly on the wars in Iraq and Afghanistan.

    The move comes amid concerns that the Defense Intelligence Agency, the Pentagon’s spy service, needs to expand operations beyond the war zones and to work more closely with the CIA, according to a senior Defense official who spoke on condition of anonymity because he was not authorized to speak publicly about the classified program.

    The new Defense Clandestine Service will comprise about 15% of the DIA’s workforce. They will focus on gathering intelligence on terrorist networks, nuclear proliferators and other highly sensitive threats around the world, rather than just gleaning tactical information to assist military commanders on the battlefield, the official said.

    “You have to do global coverage,” the official said.

    Some of the new spies thus are likely to be assigned to targets that now are intelligence priorities, including parts of Africa and the Middle East where Al Qaeda and its affiliates are active, the nuclear and missile programs in North Korea and Iran, and China’s expanding military.

    The initiative, which Defense Secretary Leon E. Panetta approved last Friday, aims to boost the Pentagon’s role in human intelligence collection, and to assign more case officers and analysts around the globe. The CIA has dominated that mission for decades, and the two agencies have long squabbled over their respective roles.

    An internal study by the director of National Intelligence last year concluded that the DIA needed to expand its traditional role and should gather and disseminate more information on global issues. It also found that the DIA did not promote or reward successful case officers, and that many often left for the CIA as a result.

    Find this story at 23 April 2012

    By David S. Cloud

    April 23, 2012, 10:37 a.m.

    Former CIA spy boss made an unhesitating call to destroy interrogation tapes

    The first and only time I met Jose A. Rodriguez Jr., he was still undercover and in charge of the Central Intelligence Agency’s all-powerful operations directorate. The agency had summoned me to its Langley headquarters and his mission was to talk me out of running an article I had just finished reporting about CIA secret prisons — the “black sites” abroad where the agency put al-Qaeda terrorists so they could be interrogated in isolation, beyond the reach and protections of U.S. law.

    The scene I walked into in November 2005 struck me as incongruous. The man sitting in the middle of the navy blue colonial-style sofa looked like a big-city police detective stuffed uncomfortably into a tailored suit. His face was pockmarked, his dark mustache too big to be stylish. He was not one of the polished career bureaucrats who populate the halls of power in Washington.

    In fact, he fit perfectly the description given by my sources: hardworking but not smooth, loyal to the institution and now, probably, beyond his depth. He was as surprised as anyone that he had risen so quickly to the senior ranks after the Sept. 11, 2001, attacks, according to the account of his decades-long spy career in “Hard Measures: How Aggressive CIA Actions After 9/11 Saved American Lives.” The book is due out Monday, after an exclusive interview Sunday night on CBS’s “60 Minutes.” The Washington Post obtained a copy this week.

    Shortly after the 2001 attacks, the CIA set up the secret prisons in Afghanistan, Thailand and several Eastern European countries for the explicit purpose of keeping detainees picked up on the battlefield or in other countries away from the U.S. justice system, which would grant them some protections against, among other things, torture or otherwise harsh treatment. In an effort to force these detainees to give their handlers information about terrorist plots, CIA interrogators subjected some of them to sleep and food deprivation, incessant loud noise and waterboarding.

    By the time we met, those techniques were no longer in use. Rodriguez had not dealt with American reporters, he writes, but then-CIA Director Porter J. Goss had asked him to meet with me “to see if I could convince her that such a story would harm U.S. national security, put some of our allies around the world in a very difficult position, and potentially disrupt a program that was providing intelligence that was producing real results and helping to keep the country safe.”

    What Rodriguez remembers from our conversation, according to his book, is that I brought him a copy of a book I had written about the U.S. military in an effort to butter him up. “That failed to soften my stance on the lack of wisdom of her proceeding with her article as planned,” he wrote, and “I could see I was not winning her over.” I remember bringing the book because I figured he didn’t know one reporter from the next, and I wanted him to know that I did in-depth work and didn’t want to just hear the talking points.

    A blunt explanation

    It became clear immediately that Rodriguez never even got the talking points, which was refreshing and surprising. Right away he began divulging awkward truths that other senior officers had tried to obfuscate in our conversations about the secret prisons: “In many cases they are violating their own laws by helping us,” he offered, according to notes I took at the time.

    Why not bring the detainees to trial?

    “Because they would get lawyered up, and our job, first and foremost, is to obtain information.”

    (Shortly after our conversation, The Post’s senior editors were called to the White House to discuss the article with President George W. Bush and his national security team. Days later, the newspaper published the story, without naming the countries where the prisons were located.)

    Rodriguez may have never felt the need to even reveal himself publicly or to write a book, complete with family photos, giving his version of many of the unconventional — and eventually repudiated — practices that the CIA engaged in after Sept. 11 had it not been for what happened shortly after our conversation.

    Concerned that the location of one of the prisons was about to be revealed, Rodriguez writes that he ordered the facility closed immediately and the detainees moved to a new site. While dismantling the site, the base chief asked Rodriguez if she could throw a pile of old videotapes, made during the early days of terrorist Abu Zubaida’s interrogation and waterboarding, and now a couple of years old, onto a nearby bonfire that was set to destroy papers and other evidence of the agency’s presence.

    Just at that moment, according to his account, a cable from headquarters came in saying: “Hold up on the tapes. We think they should be retained for a little while longer.”

    “Had that message been delayed by even a few minutes,” Rodriguez writes, “my life in the years following would have been considerably easier.”

    Those actions led to a lengthy and still ongoing investigation of the agency that produced no charges. Rodriguez retired in January 2008 and now works in the private sector.

    A tough CIA veteran

    Rodriguez was born in Puerto Rico, the son of two teachers. He was educated at the University of Florida, where he also received a law degree before being recruited by the CIA. He once gained the confidence of a dictator in a Latin American country because of his gutsy horseback riding skills. He worked as the chief of station in several countries he does not name, and was sent to El Salvador during its bloody civil war (which he glosses over completely) and to Panama, where he pitched the idea of recruiting Panamanian strongman Manuel Noriega’s witch doctor and putting him on the CIA payroll to persuade the dictator to retire to Spain. The CIA director at the time wasn’t impressed and instead, in 1989, “the United States followed a more traditional path: a military invasion.”

    On Sept. 11, 2001, he did what legions of CIA officers not at work that day did: He rushed into headquarters, even as people were being evacuated, and pitched in. Rodriguez ended up in the Counterterrorism Center, which quickly went from a backwater posting to the center of the universe at the agency.

    As CIA operations officers and analysts scrambled to figure out more about al-Qaeda and to plan a counterattack, Rodriguez was in the eye of the storm. “Hard Measures” takes readers through a highly sanitized — censored by the CIA, actually — version of events.

    Although many details are left out and most of the outlines of what Rodriguez writes will not come as news to close readers of newspapers, he does not shy away from addressing the most controversial parts of what became the largest covert action program in U.S. history: the secret decisions to capture suspected terrorists on the battlefield or on the streets and make them disappear from the face of the Earth. Using a fleet of airplanes, the CIA bundled its captives into a netherworld no one else had access to, flew them around the world, deposited them in secret underground prisons where it could control their every move and use especially harsh interrogation methods on some of the most senior prisoners.

    Many CIA officers had misgivings about these practices and what they might mean for America’s reputation around the world. Not Rodriguez. He is unabashedly confident that he and the agency did the right thing and saved lives in the process.

    “I am certain, beyond any doubt, that these techniques, approved at the highest levels of the U.S. government, certified by the Department of Justice, and briefed to and supported by bipartisan leadership of congressional intelligence oversight committees, shielded the people of the United States from harm and led to the capture of killing of Usama bin Ladin.”

    Of course, it is impossible to know this for certain, and many people inside and outside government — some of them involved in interrogations — have argued that with better-trained interrogators and more patience, the same information could have been obtained without such harsh methods.

    The most newsworthy part of the book is a chapter in which Rodriguez explains how he came to order the destruction of 92 videotapes of the interrogation of Abu Zubaida.

    The Senate Select Committee on Intelligence has nearly completed a four-year-long review of the CIA’s post-Sept. 11 detention and interrogation practices.

    Shredding the tapes

    Rodriguez writes that he ordered the tapes’ destruction because he got tired of waiting for his superiors to make a decision. They had at least twice given him the go-ahead, then backed off. In the meantime, a senior agency attorney cited “grave national security reasons” for destroying the material and said the tapes presented ‘“grave risk” to the personal safety of our officers” whose identities could be seen on the recordings.

    In late April 2004, another event forced his hand, he writes. Photos of the abuse of prisoners by Army soldiers at the Abu Ghraib prison in Iraq ignited the Arab world and risked being confused with the CIA’s program, which was run very differently.

    “We knew that if the photos of CIA officers conducting authorized EIT [enhanced interrogation techniques] ever got out, the difference between a legal, authorized, necessary, and safe program and the mindless actions of some MPs [military police] would be buried by the impact of the images.

    “The propaganda damage to the image of America would be immense. But the main concern then, and always, was for the safety of my officers.”

    Readers may disagree with much of what Rodriguez writes and with the importance of some of the facts he omits from his book, but the above sentence speaks volumes about why this book is important. In this case, a loyal civil servant — and the decision-makers above him who blessed these programs — were not thinking about the larger, longer-lasting damage to the core values of the United States that disclosure of these secrets might cause. They were thinking about the near term. About efficiency. About the safety of friends and colleagues. In their minds, they were thinking, too, about the safety of the country.

    Find this story at 25 April 2012

    By Dana Priest, Published: April 25

    © The Washington Post Company

    Researcher: CIA, NSA may have infiltrated Microsoft to write malware

    Did spies posing as Microsofties write malware in Redmond? How do you spell ‘phooey’ in C#?

    June 18, 2012, 2:46 PM — A leading security researcher has suggested Microsoft’s core Windows and application development programming teams have been infiltrated by covert programmer/operatives from U.S. intelligence agencies.

    If it were true it would be another exciting twist to the stories of international espionage, sabotage and murder that surround Stuxnet, Duqu and Flame, the most successful cyberwar weapons deployed so far, with the possible exception of Windows itself.

    Nevertheless, according to Mikko Hypponen, chief research officer of antivirus and security software vendor F-Secure, the scenario that would make it simplest for programmers employed by U.S. intelligence agencies to create the Stuxnet, Duqu and Flame viruses and compromise Microsoft protocols to the extent they could disguise downloads to Flame as patches through Windows Update is that Microsoft has been infiltrated by members of the U.S. intelligence community.

    [ FREE DOWNLOAD: 68 great ideas for running a security department ]

    Having programmers, spies and spy-supervisors from the NSA, CIA or other secret government agencies infiltrate Microsoft in order to turn its technology to their own evil uses (rather than Microsoft’s) is the kind of premise that would get any writer thrown out of a movie producer’s office for pitching an idea that would put the audience to sleep halfway through the first act.

    Not only is it unlikely, the “action” most likely to take place on the Microsoft campus would be the kind with lots of tense, acronymically dense debates in beige conference rooms and bland corporate offices.

    The three remarkable bits of malware that attacked Iranian nuclear-fuel development facilities and stole data from its top-secret computer systems – Flame Duqu and Stuxnet – show clear signs of having been built by the same teams of developers, over a long period of time, Hypponen told PC Pro in the U.K.

    Flame used a counterfeit Microsoft security certificates to verify its trustworthiness to Iranian users, primarily because Microsoft is among the most widely recognized and trusted computer companies in the world, Hypponen said.

    Faking credentials from Microsoft would give the malware far more credibility than using certificates from other vendors, as would hiding updates in Windows Update, Hypponen said.

    The damage to Microsoft’s reputation and suspicion from international customers that it is a puppet of the CIA would be enough to keep Microsoft itself from participating in the operation, even if it were asked.

    That doesn’t mean it didn’t happen.

    “It’s plausible that if there is an operation under way and being run by a US intelligence agency it would make perfect sense for them to plant moles inside Microsoft to assist in pulling it off, just as they would in any other undercover operation,” Hypponen told PC Pro. “It’s not certain, but it would be common sense to expect they would do that.”

    The suggestion piqued the imaginations of conspiracy theorists, but doesn’t have a shred of evidence to support it.

    It does have a common-sense appeal, however. Planting operatives inside Microsoft would probably be illegal, would certainly be unethical and could have a long-range disadvantage by making Microsofties look like tools of the CIA rather than simply tools.

    “No-one has broken into Microsoft, but by repurposing the certificate and modifying it with unknown hash collision technologies, and with the power of a supercomputer, they were able to start signing any program they wanted as if it was from Microsoft,” Hypponen said. “If you combine that with the mechanism they were using to spoof MS Update server they had the crown jewels.”

    Hypponen is one of a number of security experts who have said Stuxnet and Duqu have the hallmarks of software written by traditionally minded software engineers accustomed to working in large, well-coordinated teams.

    After studying the code for Duqu, security researchers at Kaspersky Labs said the malware was most similar to the kind of work done by old-school programmers able to write code for more than one platform at a time, do good quality control to make sure the modules were able to install themselves and update in real time, and that the command-and-control components ahd been re-used from previous editions.

    “All the conclusions indicate a rather professional team of developers, which appear to be reusing older code written by top “old school” developers,” according to Kaspersky’s analysis. “Such techniques are normally seen in professional software and almost never in today’s malware. Once again, these indicate that Duqu, just like Stuxnet, is a ‘one of a kind’ piece of malware which stands out like a gem from the large mass of “dumb” malicious program we normally see.”

    Earlier this month the NYT ran a story detailing two years worth of investigations during which a range of U.S. officials, including, eventually, President Obama, confirmed the U.S. had been involved in writing the Stuxnet and Flame malware and siccing them on Iran.

    That’s far from conclusive proof that the NSA has moved its nonexistent offices to Redmond, Wash. It doesn’t rule it out either, however.

    Very few malware writers are able to write such clean code that can install on a variety of hardware systems, assess their new environments and download the modules they need to successfully compromise a new network, Kaspersky researchers said.

    Stuxnet and Flame are able to do all these things and to get their own updates through Windows Update using a faked Windows Update security certificate.

    No other malware writer, hacker or end user has been able to do that before. Knowing it happened this time makes it more apparent that the malware writers know what they are doing and know Microsoft code inside and out.

    That’s still no evidence that Microsoft could be or has been infiltrated by spies from the U.S. or from other countries.

    It does make sense, but so do a lot of conspiracy theories.

    Until there’s some solid indication Flame came from inside Microsoft, not outside, it’s probably safer to write off this string of associative evidence.

    Even in his own blog, Hypponen makes fun of those who make fun of Flame as ineffective and unremarkable, but doesn’t actually suggest moles at Microsoft are to blame.

    Find this story at 18 June 2012

    By Kevin Fogarty

    © 1994 – 2012 ITworld. All rights reserved.

    CIA agreement touted as evidence in ‘black sites’ investigation

    A partially signed agreement between Poland’s intelligence service and CIA provides central evidence in the ongoing investigation into alleged ‘black sites’ in Poland.

    According to a source at the Krakow Prosecutor’s Office that is handling the investigation, the document was prepared in late 2001, early 2002, in the wake of the September 11 attacks on the US.

    The Americans “did not want to leave traces [of evidence]” the source told Polish daily Gazeta Wyborcza, commenting on the fact that the document was only signed by former head of Poland’s Intelligence Agency (ABW), Zbigniew Siemiatkowski.

    When queried about the document, Siemiatkowski stated that if his signature is present, it means that the document is classified, and that he is unable to talk about it. He did not confirm the existence of such an agreement.

    Meanwhile, Adam Bodnar of the Helsinki Foundation – a human rights body that is monitoring the case – told that the paper that lack of an American signature does not invalidate the document as key evidence.

    “The simple fact that the document was prepared attests to the fact that it there was a will [to create the CIA prisons], and that people who were aware of it, also knew about its contents.”

    Accusations and denials

    In 2011, the Council of Europe’s Commissioner for Human Rights, Thomas Hammarberg, made an unequivocal statement on the matter.

    “It is clear that Poland hosted secret CIA prisons between December 2002 and September 2003. We know who was held there and what interrogation methods were used. They can be described as torture.”

    Leszek Miller was prime minister of Poland at that time, at the head of the Democratic Left Alliance (SLD) government.

    He has repeatedly denied knowledge of such a site, which is alleged to have been located in a villa near the Stare Kiejkuty military base in north east Poland.

     

    Find this story at 19 June 2012 

    19.06.2012 10:58

    Copyright © Polskie Radio S.A

    Criminele drugsinfiltrant VS jarenlang actief in Nederland

    ’Inzet burgerinfiltranten in Nederland strikt verboden’

     

    De Amerikaanse drugsbestrijdingsorganisatie DEA heeft een criminele burgerinfiltrant ingezet in Nederland. Het AD heeft de hand weten te leggen op geheime rapporten van de DEA.

     

    De burgerinfiltrant speelde een hoofdrol bij de gecontroleerde doorvoer van een grote hoeveelheid drugs in Europa. Doel was het in de val lokken van drugscriminelen. Op de partij kwamen meerdere Nederlanders af. Infiltrant ‘Mono’ werkte maandenlang vanuit Amsterdam.

     

    De rol van de DEA-infiltrant ligt gevoelig, omdat het een bom kan leggen onder het proces tegen de potentiële kopers die momenteel in Haarlem terechtstaan. De verdachten vermoeden dat de DEA in Nederland buiten haar boekje is gegaan en eisen inzage in de operatie. De Amerikanen weigeren dat.

     

    Justitie claimt dat ze eind 2009 voor het eerst hoorde dat Mono voor de DEA werkte. Een artikel uit de Poolse krant Gazeta Wyborcza zet vraagtekens bij die verklaring. Nederland zou namelijk al op 11 februari 2009 een bemiddelende rol hebben gespeeld tussen de DEA en de Poolse geheime dienst ABW.

     

    Vindt dit verhaal op 16 juni 2012

     

    Bewerkt door: Leonie Francien Sellies

    16-6-12 – 08:23  bron: ANP

    De infiltrant was maandenlang actief in Amsterdam. © ANP.

     

    De Persgroep Digital. Alle rechten voorbehouden.

    Top Secret CIA Documents on Osama bin Laden Declassified

    Washington, D.C., June 19, 2012 – The National Security Archive today is posting over 100 recently released CIA documents relating to September 11, Osama bin Laden, and U.S. counterterrorism operations. The newly-declassified records, which the Archive obtained under the Freedom of Information Act, are referred to in footnotes to the 9/11 Commission Report and present an unprecedented public resource for information about September 11.

    The collection includes rarely released CIA emails, raw intelligence cables, analytical summaries, high-level briefing materials, and comprehensive counterterrorism reports that are usually withheld from the public because of their sensitivity. Today’s posting covers a variety of topics of major public interest, including background to al-Qaeda’s planning for the attacks; the origins of the Predator program now in heavy use over Afghanistan, Pakistan and Iran; al-Qaeda’s relationship with Pakistan; CIA attempts to warn about the impending threat; and the impact of budget constraints on the U.S. government’s hunt for bin Laden.

    Today’s posting is the result of a series of FOIA requests by National Security Archive staff based on a painstaking review of references in the 9/11 Commission Report.
    DOCUMENT HIGHLIGHTS

    The documents released by CIA detail the meticulousness of al-Qaeda’s plot against the United States and CIA attempts to counter the rising terrorist threat. A previously undisclosed raw intelligence report that became the basis for the December 4, 1998, President’s Daily Brief notes that five years before the actual attack, al-Qaeda operatives had successfully evaded security at a New York airport in a test-run for bin Laden’s plan to hijack a U.S. airplane. [1998-12-03]. CIA analytical reports also provide interesting insights into al-Qaeda’s evolving political strategies. “In our view, the hijackers were carefully selected with an eye to their operational and political value. For instance, the large number of Saudi nationals was most likely chosen not only because of the ease with which Saudi nationals could get US visas but also because Bin Ladin could send a message to the Saudi Royal family.” [2003-06-01]

    Reports on early attempts to apprehend bin Laden detail the beginning of the U.S. Predator drone program in Afghanistan and Pakistan. “First Predator mission over Afghanistan [excised] September 7, 2000.” [1] “Twice in the fall of 2000, the Predator observed an individual most likely to be Bin Ladin; however we had no way at the time to react to this information.” [2004-03-19] American UAVs did not have sufficient weapons capabilities at the time the CIA likely spotted bin Laden in 2000 to fire on the suspect using the UAV.

    Al-Qaeda’s ties to Pakistan before September 11 are also noted in several documents. “Usama ((Bin Ladin))’s Islamic Army considered the Pakistan/Afghanistan area one region. Both Pakistan and Afghanistan serve as a regional base and training center for Islamic Army activities supporting Islamic insurgencies in Tajikistan, the Kashmir region and Chechnya. [Excised] The Islamic Army had a camp in Pakistan [Excised] purpose of the camp was to train and recruit new members, mostly from Pakistan.” [1997-07-14] While, “UBL elements in Pakistan reportedly plan to attack POTUS [U.S. President Clinton’s] plane with [excised] missiles if he visits Pakistan.” [2000-02-18]

    Similar to the 9/11 Commission Report, the document collection details repeated CIA warnings of the bin Laden terrorist threat prior to September 11. According to a January 2000 Top Secret briefing to the Director of Central Intelligence, disruption operations against the Millennium plot “bought time… weeks… months… but no more than one year” before al-Qaeda would strike. [2000-01-07] “A UBL attack against U.S. interests could occur at any time or any place. It is unlikely that the CIA will have prior warning about the time or place.” [1999-08-03] By September 2001, CIA counterterrorism officials knew a plot was developing but couldn’t provide policymakers with details. “As of Late August 2001, there were indications that an individual associated with al-Qa’ida was considering mounting terrorist operations in the United States, [Excised]. No further information is currently available in the timing of possible attacks or on the alleged targets in the United States.” [2001-08-24]

    Despite mounting warnings about al-Qaeda, the documents released today illustrate how prior to September 11, CIA counterterrorism units were lacking the funds to aggressively pursue bin Laden. “Budget concerns… CT [counterterrorism] supplemental still at NSC-OMB [National Security Council – Office of Management and Budget] level. Need forward movement on supplemental soonest due to expected early recess due to conventions, campaigning and elections. Due to budgetary constraints… CTC/UBL [Counterterrorism Center/Osama bin Laden Unit] will move from offensive to defensive posture.” [2000-04-05]

    Although the collection is part of a laudable effort by the CIA to provide documents on events related to September 11, many of these materials are heavily redacted, and still only represent one-quarter of the CIA materials cited in the 9/11 Commission Report. Hundreds of cited reports and cables remain classified, including all interrogation materials such as the 47 reports from CIA interrogations of Khalid Sheikh Mohammed from March 24, 2003 – June 15, 2004, which are referenced in detail in the 9/11 Report.

    Highlights of the CIA September 11 Document Collection Include:
    The 1998 Raw Intelligence Report on UBL’s Plans to Hijack an Airplane that Became an Item in the December 4, 1998 President’s Daily Brief [1998-12-03].
    The report details how bin Laden was planning “new operations against the United States (U.S.) targets in the near future. Plans to hijack a U.S. aircraft were proceeding well. Two individuals from the relevant operational team in the U.S. had successfully evaded security checks during a trial run at “New York airport [excised].”
    Internal CIA E-mails on Osama bin Laden
    1998-05-05 – “[Title Excised]” “Planning for the UBL Rendition is Going Very Well,” To: Michael F. Scheuer, From: [Excised], Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Capture Op,” “[Gary] Schroen to Mike.” [Chapter 4, Endnote 22 9/11 Commission Report]
    1998-12-20 – “Re: urgent re ubl,” Note For: Michael F. Scheuer, From: [Excised], Central Intelligence Agency Email. Cited in 9/11 Commission Report as “[Gary] Schroen to Mike” [Chapter 4, Endnotes 117, 119 9/11 Commission Report]
    1998-12-21 – “your note,” Note For: [Excised], From: Michael F. Scheuer, Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Mike to [Gary] Schroen,” [Chapter 4, Endnote 119 9/11 Commission Report]
    1999-05-17 – “your note,” From Michael F. Scheuer, To [Excised], Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Mike to [Gary] Schroen” [Chapter 4, Endnote 174 9/11 Commission Report]
    2001-05-15 – “[Excised] Query [Excised].” Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Dave to John.” [Chapter 8, Endnote 72 9/11 Commission Report]
    2001-05-24 – [Title Excised] “Agee (sic) we need to compare notes,” Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Dave to John.” [Chapter 8, Endnote 64 9/11 Commission Report]
    2001-07-13 – “[Excised] Khalad [Excised],” Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Richard to Alan” [Chapter 8, Endnote 64 9/11 Commission Report]
    2001-08-21 – “Re: Khalid Al-Mihdhar,” Memorandum, Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Mary to John.” [Chapter 8, Endnote 106 9/11 Commission Report]
    Two Definitive CIA Reports on the September 11, 2001 Attacks
    2003-06-01 – “11 September: The Plot and the Plotters,” CTC 2003-40044HC, Central Intelligence Agency Intelligence Report.
    [Chapter 5, Endnotes 42, 60, 61, 64, 70, 105, Chapter 7, Endnotes 45, 52, 60, 83, 86, 92, 94, 95, 96, 97, 105 9/11 Commission Report]
    This document is a comprehensive CIA history of the 9/11 attack. Analysis includes notes on al-Qaeda, the evolution of the plot, terrorist techniques, timelines and detailed hijacker profiles.
    2004-03-19 – “DCI Report: The Rise of UBL and Al-Qa’ida and the Intelligence Community Response,” Draft, Central Intelligence Agency Analytic Report. [Chapter 2, Endnote 67]
    This document is a detailed summary of CIA efforts to apprehend Osama bin Laden from 1989-2004. Highlights include:
    Agency notes on bin Laden’s evolution from “terrorist financier” in the early 1990s to a significant threat to U.S. interests by mid-1990.
    Discussions and debates regarding the use of Predator drones as early as 2000. [2]
    Critiques of FBI information systems as impediments to counterterrorism efforts – “A major, ongoing concern is FBI’s own internal dissemination system. CIA officers still often find it necessary to hand-deliver messages to the intended recipient within the FBI. In additional FBI has not perfected its FI reporting system and headquarters-field communications so dissemination of intelligence outside of FBI is still spotty.” And the report confirms suggestions by the 9/11 Commission Report that “the different organizational culture and goals of the FBI and CIA sometimes get in the way of desired results.” (p. 22)
    A group of Afghan trial leaders worked with the CIA on the UBL issue, but “[Excised] judged to be unlikely to successfully attack a heavily guarded Bin Ladin.” “Masood has to be engaged to help in the attempt to capture Bin Ladin, but with the understanding that he would be his own man, never an agent of surrogate of the US government… Even if he agreed to do so, his chances of success against the Taliban were judged to be less than five percent.” (p. 58)

    Note “DIF” written on multiple pages stands for “Denied in Full”
    A Series of CIA Senior Executive Intelligence Briefs (SEIBS) from June-September 2001 Warning of “Imminent” Al-Qaeda Attacks:
    2001-06-23 – “International: Bin Ladin Attacks May Be Imminent [Excised]” Senior Executive Intelligence Brief. [Chapter 8, Endnote 14, See also p. 257 9/11 Commission Report]
    2001-06-25 – “Terrorism: Bin Ladin and Associates Making Near-Term Threats,” Senior Executive Intelligence Brief. [Chapter 8, Endnotes 12, 14]
    2001-06-30 – “Terrorism: Bin Laden Planning High Profile Attacks [Excised],” Senior Executive Intelligence Brief. [Chapter 8, Endnote 12]
    2001-07-02 – “Terrorism: Planning for Bin Ladin Attacks Continues, Despite Delay [Excised],” Senior Executive Intelligence Brief. [Chapter 8, Endnote 18]
    2001-07-13 – “Terrorism: Bin Ladin Plans Delayed but Not Abandoned [Excised],” Senior Executive Intelligence Brief. [Chapter 8, Endnote 28]
    2001-07-25 – “Terrorism: One Bin Ladin Operation Delayed, Others Ongoing [Excised],” Senior Executive Intelligence Brief. [Chapter 8, Endnote 28]
    2001-08-07 – “Terrorism: Bin Ladin Determined to Strike in the US,” Senior Executive Intelligence Brief. [Chapter 8, Endnote 38. Chapter 11, Endnote 5. Page 342]
    Detailed Reports on Al-Qaeda Organization
    “The spike in the network’s activity stems in part from changes in Bin Ladin’s practices. To avoid implicating himself and his Taliban hosts, Bin Ladin over the past two years has allowed cells in his network, al-Qa’ida, to plan attacks more independently of the central leadership and has tried to gain support for his agenda outside the group. – The network also has benefited from a sharp increase in mujahidin recruitment since the resumption of the conflict in Chechnya in 1999, which exposed a new generation of militants to terrorist techniques and extremist ideology through training at al-Qai’da-run camps in Afghanistan. – Violence between Israelis and the Palestinians, moreover is making Sunni extremists more willing to participate in attacks against US or Israeli interests.” 2001-02-06 – “Sunni Terrorist Threat Growing,” Senior Executive Intelligence Brief, The Central Intelligence Agency. [Chapter 8, Endnote 4 9/11 Commission Report]
    Bin Laden’s Attempts to Acquire Weapons of Mass Destruction
    “Bin Ladin and his associates have experimented by crude means to make and deploy biological agents… Bin Ladin has sought to acquire military-grade biological agents or weapons.” 2001-02-14 –”Afghanistan: Bin Ladin’s Interest in Biological and Radiological Weapons,” Central Intelligence Agency Analytical Report [Chapter 11, Endnote 5. 9/11 Commission Report Page 342]
    A Positive CIA Assessment of CIA Counterterrorism Capabilities in August 2001
    In contrast to the findings of the 9/11 Commission Report and a 2004 CIA Office of Inspector General’s review of its pre-9/11 counterterrorism practices, a report completed in August 2001 by the CIA Inspector General gives very positively reviews to CIA counterterrorism practices, the management of information and interagency cooperation. “CTC fulfills inter-agency responsibilities for the DCI by coordinating national intelligence, providing warning, and promoting the effective use of Intelligence Community resources on terrorism issues. The Center has made progress on problems identified at the time of the last inspection in 1994 – specifically its professional relationship with the Federal Bureau of Investigation.

    Find this story at 19 June 2012

    The Central Intelligence Agency’s 9/11 File

    National Security Archive Electronic Briefing Book No. 381

    Posted – June 19, 2012

    Edited by Barbara Elias-Sanborn with Thanks to Archive Senior Fellow Jeffrey T. Richelson

    For more information contact:
    Barbara Elias-Sanborn – 202/994-7000
    belias@gwu.edu

    Exclusive: Senate probe finds little evidence of effective “torture”

    (Reuters) – A nearly three-year-long investigation by Senate Intelligence Committee Democrats is expected to find there is little evidence the harsh “enhanced interrogation techniques” the CIA used on high-value prisoners produced counter-terrorism breakthroughs.

     

    People familiar with the inquiry said committee investigators, who have been poring over records from the administration of President George W. Bush, believe they do not substantiate claims by some Bush supporters that the harsh interrogations led to counter-terrorism coups.

     

    The backers of such techniques, which include “water-boarding,” sleep deprivation and other practices critics call torture, maintain they have led to the disruption of major terror plots and the capture of al Qaeda leaders.

     

    One official said investigators found “no evidence” such enhanced interrogations played “any significant role” in the years-long intelligence operations which led to the discovery and killing of Osama bin Laden last May by U.S. Navy SEALs.

     

    President Barack Obama and his aides have largely sought to avoid revisiting Bush administration controversies. But the debate over the effectiveness of enhanced interrogations, which human rights advocates condemn as torture, is resurfacing, in part thanks to a new book by a former top CIA official.

     

    In the book, “Hard Measures,” due to be published on Monday, April 30, the former chief of CIA clandestine operations Jose Rodriguez defends the use of interrogation practices including water-boarding, which involves pouring water on a subject’s face, which is covered with a cloth, to simulate drowning.

     

    “We made some al-Qaeda terrorists with American blood on their hands uncomfortable for a few days,” Rodriguez says in an interview with CBS News’ “60 Minutes” that will air on Sunday, April 29. “I am very secure in what we did and am very confident that what we did saved American lives.”

     

    For nearly three years, the Senate intelligence committee’s majority Democrats have been conducting what is described as the first systematic investigation of the effectiveness of such extreme interrogation techniques.

     

    NO SCIENTIFIC ASSESSMENT

     

    The CIA gave the committee access to millions of pages of written records charting daily operations of the interrogation program, including graphic descriptions of how and when controversial techniques were employed.

     

    Sources agreed to discuss the matter on condition of anonymity because the report has not been finalized.

     

    The committee members’ objective is to conduct a methodical assessment of whether enhanced interrogation techniques led to genuine intelligence breakthroughs or whether they produced more false leads than good ones.

     

    U.S.intelligence officials have acknowledged that while the harshest elements of the interrogation program, including water-boarding and other tactics which cause severe physical stress, were in use, the CIA never carried out a scientific assessment of the program’s effectiveness.

     

    The Bush Administration only used water-boarding on three captured suspects. One of them was Khalid Sheikh Mohammed, the mastermind of the September 11, 2001 attacks.

     

    Other coercive techniques included sleep deprivation, making people crouch or stretch in stressful positions and slamming detainees against a flexible wall.

     

    The CIA started backing away from such techniques in 2004. Obama banned them shortly after taking office.

     

    One source cautioned there could still be lengthy delays before any information or conclusions from the Senate committee’s report are made public.

     

    One reason the inquiry has taken so long is that in 2009, committee Republicans withdrew their participation, saying the panel would be unable to interview witnesses to ensure documentary material was reported in appropriate context due to ongoing criminal investigations.

     

    People familiar with the inquiry said it consisted of as much as 2,000 pages in narrative accounts of how the CIA interrogation program worked, including specific case histories in which enhanced interrogation tactics were used.

     

    ‘PROCEDURES’ UNJUSTIFIED: FEINSTEIN

     

    The Intelligence committee has not issued any official statements about what its inquiry has found or when it expects to wrap up. But committee chair Sen. Dianne Feinstein has made relatively strong statements about the lack of evidence that enhanced interrogations played any material role in generating information leading to bin Laden’s killing.

     

    Only days after the commando raid in which bin Laden was killed, Feinstein told journalists: “I happen to know a good deal about how those interrogations were conducted, and, in my view, nothing justifies the kind of procedures that were used.”

     

    Current and formerU.S.officials have said one key source for information about the existence of the al Qaeda “courier” who ultimately ledU.S.intelligence to bin Laden was Khalid Sheikh Mohammed.

     

    KSM, as he was known toU.S.officials, was subjected to water-boarding 183 times, theU.S.government has acknowledged.

     

    Officials said, however, that it was not until sometime after he was water-boarded that KSM told interrogators about the courier’s existence. Therefore a direct link between the physically coercive techniques and critical information is unproven, Bush administration critics say.

     

    Supporters of the CIA program, including former Vice President Dick Cheney, have portrayed it as a necessary, if distasteful, step that may have stopped extremist plots and saved lives.

     

     

     

    Find this story at 27 April 2012

     

    Fri, Apr 27 2012

    By Mark Hosenball

    (Editing by Todd Eastham)

     

    © Thomson Reuters 2011. All rights reserved. Users may download and print extracts of content from this website for their own personal and non-commercial use only. Republication or redistribution of Thomson Reuters content, including by framing or similar means, is expressly prohibited without the prior written consent of Thomson Reuters. Thomson Reuters and its logo are registered trademarks or trademarks of the Thomson Reuters group of companies around the world.

     

    Thomson Reuters journalists are subject to an Editorial Handbook which requires fair presentation and disclosure of relevant interests.

     

    This copy is for your personal, non-commercial use only. To order presentation-ready copies for distribution to colleagues, clients or customers, use the Reprints tool at the top of any article or visit: www.reutersreprints.com.

    U.S. Security Expands Presence at Foreign Airports

    SHANNON, Ireland — An ocean away from the United States, travelers flying out of the international airport here on the west coast of Ireland are confronting one of the newest lines of defense in the war on terrorism: the United States border.

    In a section of this airport carved out for the Department of Homeland Security, passengers are screened for explosives and cleared to enter the United States by American Customs and Border Protection officers before boarding. When they land, the passengers walk straight off the plane into the terminal without going through border checks.

    At other foreign airports, including those in Madrid, Panama City and Tokyo, American officers advise the local authorities. American programs in other cities expedite travel for passengers regarded as low-risk.

    The programs reflect the Obama administration’s ambitious effort to tighten security in the face of repeated attempts by Al Qaeda and other terrorists to blow up planes headed to the United States from foreign airports.

    The thinking is simple: By placing officers in foreign countries and effectively pushing the United States border thousands of miles beyond the country’s shores, Americans have more control over screening and security. And it is far better to sort out who is on a flight before it takes off than after a catastrophe occurs.

    “It’s a really big deal — it would be like us saying you can have foreign law enforcement operating in a U.S. facility with all the privileges given to law enforcement, but we are going to do it on your territory and on our rules,” the secretary of the Department of Homeland Security, Janet Napolitano, said on a flight back to the United States from the Middle East, where she negotiated with leaders in Israel and Jordan about joint airport security programs. “So you flip it around, and you realize it is a big deal for a country to agree to that. It is also an expensive proposition.”

    Airports in 14 countries are participating in the programs, which have been expanded over the last several years and have required substantial concessions from foreign leaders. In many cases they have agreed to allow American officers to be placed in the heart of their airports and to give them the authority to carry weapons, detain passengers and pull them off flights.

    Last December, the government of Abu Dhabi signed a letter of intent to build a terminal where American officers will clear passengers to enter the United States, the most ambitious agreement the United States has struck so far with an Arab country. On her recent trip to Jordan, Ms. Napolitano began negotiations with the ruling family there about similar efforts.

    Representative Peter T. King, the New York Republican who is chairman of the House Committee on Homeland Security, endorsed the overseas security efforts and said he hoped the department would expand them. “A lot of these attempts are coming from the Middle East,” he said, referring to terrorism plots, “and that drives home that we have an immediate problem and that we need to push for these programs there as hard as we can.”

    The Obama administration sped up expansion of the programs, which cost about $115 million a year, after a Qaeda operative tried to detonate explosives hidden in his underwear on a flight from Amsterdam to Detroit on Dec. 25, 2009. The security at foreign airports drew more public attention last month after new reports that intelligence agencies had thwarted another plot by Al Qaeda to detonate an underwear bomb on an American-bound airliner. After that news emerged, Ms. Napolitano said the new measures being put in place in foreign airports for flights to the United States would have stopped a terrorist from boarding a plane with such a bomb.

    But critics of the department on Capitol Hill — particularly two Republican committee chairmen in the House, Darrell Issa of California and John L. Mica of Florida — questioned her claims and said that security in foreign airports is not robust enough.

    Ms. Napolitano and other Obama administration officials praise the programs as essential to help protect the 80 million passengers a year who fly to the United States from 300 foreign airports, and as a boon for travelers, who save time after landing,

    Still, as with many other counterterrorism measures, it is hard to gauge the programs’ success or their impact on Al Qaeda and other terrorists. They have not foiled any major plots so far, and it is hard to imagine terrorists unaware of which airports had a robust American security presence and which were more vulnerable.

    Homeland Security officials acknowledge that the United States cannot control security in every airport in the world. The focus, they said, was on expanding an American presence at airports with a significant number of United States-bound flights.

    The officials said that of the roughly 30 million travelers who passed through foreign airports with American Customs and Border Protection officers over the past two years, about 500 were deemed national security risks and were turned away or pulled aside for further questioning. Over the same period, about 18,000 air travelers were denied admission to the United States for reasons like having a criminal record or lacking a proper visa.

    At Shannon, where American officers have checked passports since 1986, passengers bound for the United States first pass through the Irish government’s airport security and then through three levels of American security: one to check for explosives in shoes and carry-on luggage, then to get clearance to enter the United States, and finally to ensure that checked baggage does not contain contraband.

    The biggest problem for the United States is that it cannot compel foreign governments to strengthen security at their airports. But the United States limits flights from foreign airports that do not meet minimum security standards and screen passengers using procedures modeled after those of the Transportation Security Administration.

    American officers at foreign airports constitute the next level of security, and the “gold standard” is an arrangement like the one at Shannon, with comprehensive preboarding clearance.

    Find this story at 13 June 2012

    June 13, 2012

    By MICHAEL S. SCHMIDT

    © 2012 The New York Times Company

    Contractors run U.S. spying missions in Africa

    ENTEBBE, Uganda — Four small, white passenger planes sit outside a hangar here under a blazing sun, with no exterior markings save for U.S. registration numbers painted on the tails. A few burly men wearing aviator sunglasses and short haircuts poke silently around the wing flaps and landing gear.

    The aircraft are Pilatus PC-12s, turboprops favored by the U.S. Special Operations forces for stealth missions precisely because of their nondescript appearance. There is no hint that they are carrying high-tech sensors and cameras that can film man-size targets from 10 miles away.

    To further disguise the mission, the U.S. military has taken another unusual step: It has largely outsourced the spying operation to private contractors. The contractors supply the aircraft as well as the pilots, mechanics and other personnel to help process electronic intelligence collected from the airspace over Uganda, Congo, South Sudan and the Central African Republic.

    In October, President Obama sent about 100 elite U.S. troops to central Africa to scour the terrain for Joseph Kony, the messianic and brutal leader of a Ugandan rebel group. But American contractors have been secretly searching for Kony from the skies long before that, at least since 2009, under a project code-named Tusker Sand, according to documents and people familiar with the operation.

    The previously unreported practice of hiring private companies to spy on huge expanses of African territory — in this region and in North Africa, where a similar surveillance program is aimed at an al-Qaeda affiliate — has been a cornerstone of the U.S. military’s secret activities on the continent. Unlike uniformed troops, plainclothes contractors are less likely to draw attention.

    But because the arms-length arrangement exists outside traditional channels, there is virtually no public scrutiny or oversight. And if something goes wrong, the U.S. government and its partners acknowledge that the contractors are largely on their own.

    U.S. Africa Command, which oversees military operations on the continent, declined to discuss specific missions or its reasons for outsourcing the gathering of intelligence.

    In response to written questions from The Washington Post, the command stated that contractors would not get special treatment in case of a mishap. Instead, they “would be provided the same assistance that any U.S. citizen would be provided by the U.S. Government should they be in danger.”

    Perils of the job

    There is precedent for the use of contractors in spying operations. The military hired private firms to conduct airborne surveillance in Latin America in the 1990s and early 2000s, with sometimes-disastrous results.

    In 2003, for instance, one American was killed and three others were taken hostage by Colombian insurgents after their plane crashed in the jungle. The contractors, who were working for Northrop Grumman on a Defense Department counter-narcotics program, endured five years of captivity before they were freed in a raid by Colombian police.

    Peter W. Singer, a Brookings Institution senior fellow and an expert on military contracting, said the Pentagon typically turns to the private sector for “deniability,” but he added that “it rarely turns out that way.”

    “When things go bad, you can have two scenarios,” he said. “Either the contractors are left holding the bag, complaining about abandonment, or else some kind of abuse happens and they’re not held accountable because of a mix of unclear legal accountability and a lack of political will to do something about it.”

    Indeed, contractors knowledgeable about the central Africa mission appear to be aware that the downing of one of their planes could have far-reaching implications.

    “From a purely political standpoint it is obvious the fallout of such an incident would be immense, especially if hostile forces reached the crash site first,” Commuter Air Technology, an Oklahoma defense firm, wrote in May 2010 in response to a U.S. Africa Command solicitation to expand operations. “This could turn into a prisoner/hostage situation at worst, or at the least a serious foreign relations incident highly damaging to both AFRICOM and the U.S.”

    The warning was prescient. That summer, a PC-12 surveillance aircraft operated by a New Jersey contractor as part of Tusker Sand was forced to make an emergency landing in Obo, an isolated town in the Central African Republic where Kony’s forces had terrorized the population.

    On board were a handful of Americans working for the firm R-4 Inc., as well as a Ugandan military officer and a Congolese officer.

    The unexpected appearance of two foreign soldiers and some Americans aroused the suspicions of tribal leaders, who had been kept in the dark about Tusker Sand by their national government. They detained the crew for several hours as they debated what to do.

    “We felt like we were going to prison,” said one of the American contractors involved, speaking on the condition of anonymity to discuss a sensitive operation.

    The contractor said that his group contacted State Department and United Nations officials but that they declined to intervene. It was even harder to track down Africa Command officials, whose headquarters are in Stuttgart, Germany.

    “Eventually, we were able to talk our way out of it,” the contractor said. “That’s all we did over there, pay people off and talk our way out of situations.”

    Dwight Turner, vice president of overseas operations for R-4, said he was not personally familiar with the incident. He confirmed that his company had been involved in Tusker Sand but declined to comment further.

    A growing appetite

    When Tusker Sand began in late 2009, it consisted of a single PC-12, operating out of a Ugandan military hangar at Entebbe airport. The hangar also housed a Gulfstream aircraft for the country’s president, Yoweri Museveni.

    According to the contractor who worked for R-4, the presidential palace was so protective of Museveni’s plane that the Americans were required to push their PC-12 out of the hangar by hand, instead of with a tractor, to avoid inadvertent scrapes.

    The U.S. military’s appetite for surveillance quickly grew. On June 11, 2010, the Africa Command participated in an “Industry Day” to drum up interest. More than 50 private contractors were invited to develop proposals to expand Tusker Sand and Creek Sand, the program aimed at al-Qaeda in the Islamic Maghreb, which operates mainly in Mali.

    Unclassified documents prepared for the event show that the military wanted contractors to provide at least a combined 44 personnel for the programs, with double that number if the Africa Command decided to “surge” either one of them. At a minimum, contractors were told that they would have to keep planes flying for 150 hours a month.

    Among the jobs to be outsourced: pilots, sensor operators, intelligence analysts, mechanics and linguists. The expectation was that the personnel would be veterans; most needed to certify that they had passed the military’s survival, resistance and escape training course, because of the possibility of aircrews being downed behind enemy lines.

    Contractors would have to supply the surveillance gear, including electro-optical and infrared sensors that work in the dark, and a laser-emitting sensor that can peer under the jungle canopy. All had to be concealed within the body of the plane with retractable mounting to avoid attracting suspicion.

    Another document stipulated that prospective firms fly “innocuous” aircraft that would “blend into the local operating area.” In a PowerPoint presentation posted on a federal government Web site for contractors, the Africa Command warned firms bidding for the work that African countries would be “uncomfortable” with activities that might look suspicious, adding: “Don’t want covert aircraft, just friendly looking aircraft.”

    In addition to expanding Tusker Sand and Creek Sand, the Africa Command said it wanted to start a drone-based program, dubbed Tusker Wing, to search for members of Kony’s militia, the Lord’s Resistance Army.

    That plan envisioned contractors using blimps equipped with cameras as well as ScanEagles, small and unmanned aircraft that can be launched with a catapult but stay aloft for 22 hours at a time, according to Gene Healey, a contractor who helped prepare a study for the Africa Command.

    Healey said the Africa Command was initially enthusiastic about Tusker Wing but canceled the program, without explanation, before it got off the ground. Africa Command officials declined to comment.

    Nonetheless, the number of manned surveillance flights for Tusker Sand has gradually increased. A new contractor, Sierra Nevada Corp., began operating PC-12 flights out of Entebbe in August.

    Michelle Erlach, a spokeswoman for Sierra Nevada Corp., based in Sparks, Nev., declined to answer questions about Tusker Sand or the firm’s activities in Africa. “I cannot give any details on that,” she said.

    The Africa Command declined to answer questions about the contract for Tusker Sand, saying it was “proprietary in nature.”

    Allies on the Hill

    Tusker Sand could soon receive another boost.

    In March, Sen. James M. Inhofe (R-Okla.), one of Congress’s leading voices on Africa, issued a statement expressing concern that the U.S. military was being hindered in its efforts to track the Lord’s Resistance Army.

    He called on the Obama administration to give the Africa Command “the full availability” of surveillance aircraft and equipment necessary to catch Kony and conduct other counterterrorism missions.

    In an interview a month later, however, Inhofe said Africa Command officials told him that things had improved and that they were no longer being shortchanged. “I have been reassured,” he said. “I think they right now have the assets they need.”

    Asked whether he had any qualms about private contractors operating spy missions on behalf of the U.S. military, Inhofe said he’d “rather not get into that.”

    “They are working with contractors on these things, and I know there are a lot of people involved,” he added. “I’m just not going to elaborate on where they are or what they’re doing.”

    Late last month, however, the Senate Armed Services Committee passed a measure authorizing $50 million for the Defense Department to “enhance and expand” surveillance operations to help Ugandan and other regional militaries search for Kony.

    A congressional staff member said the legislators’ priority was to increase and improve the surveillance operations as quickly as possible, adding that Congress was not necessarily opposed to using private companies for the Kony manhunt.

    “It’s a concern, but when you’re short on resources, it’s what you have to do,” said the staffer, speaking on the condition of anonymity to discuss sensitive operations. “It’s a permissive environment. Nobody’s getting shot at, and we’re just collecting intelligence.”

    Find this story at 15 June 2012

    Staff researcher Julie Tate in Washington contributed to this report.

    By Craig Whitlock, Published: June 15

    © The Washington Post Company

    Prostitutes, drunken behaviour and illegal wiretaps: US reveals accusations against Secret Service

    The US government has revealed details of serious allegations since 2004 against Secret Service agents and officers, including claims of involvement with prostitutes, leaking sensitive information, publishing pornography, sexual assault, illegal wiretaps, improper use of weapons and drunken behavior. It was not immediately clear how many of the accusations were confirmed to be true.

    The heavily censored list — which runs 229 pages — was quietly released today under the US Freedom of Information Act to The Associated Press and other news organizations following the Secret Service prostitution scandal in Colombia. It describes accusations filed against Secret Service employees with the Homeland Security Department’s inspector general. The service protects the president and those close to him.

    In many cases, the government noted that some of the claims were resolved administratively, and others were being formally investigated.

    Basic details of the dozens of complaints were first revealed last month during a Senate hearing about the Colombia scandal, as senators questioned whether the Colombia incident was a sign of a broader culture problem at the storied agency tasked with protecting the president.

    Secret Service Direct Mark Sullivan apologized for the incident during the May hearing, but insisted that it was an isolated case.

    The list of complaints, however, suggested otherwise senators said at the time.

    Secret Service officials did not immediately comment today.

    AP

    Find this story at 15 June 2012

    Alicia A Caldwell
    Friday, 15 June 2012

    © independent.co.uk

    Intelligent kill: The dirty art of secret assassination

    State-sponsored foreign assassinations of military, religious, ideological and political figures are an ugly reality of world history.

    By means of sudden, irregular or secret attack, there is even a common euphemism in international law which bluntly describes the practice: targeted killing.

    According to a UN special report on the subject, targeted killings are “premeditated acts of lethal force employed by states in times of peace or during armed conflict to eliminate specific individuals outside their custody”.

    And it works something like this.

    A state deems a certain individual wanted or a danger to its national security. After ruling out any feasible attempt to bring them to their own jurisdiction, usually because they are based in a third country, it deems itself responsible with silencing them by whatever means necessary.

    The operational dynamics are then conducted under the auspices of one of two possible dimensions.

    Either to eliminate the target under a fog of plausible deniability, in order for the state authorities to wash their hands clean of any discreditable action in a foreign land, and by extension any prosecution should its agents be captured; or to have blatant disregard to the norms of international law by reference to domestic constitutions that empower them to act under the guise of self-defence – in order to protect themselves from imminent threats of attack.

    The use of targeted killing has become quite common in the aftermath of 9/11. U.S. Predator drones strikes against Al Qaeda targets in Pakistan and the Yemen, Israeli airstrikes against Palestinian leaders in the occupied territories and Russian targeting of Chechen separatists in the Caucasus — are just a few recent examples.

    But the covert practice of this art has always been a lot murkier.

    In 1942, formerly secret memos now reveal how the British Special Operations Executive (SOE) secretly trained Czechoslovakian volunteers to assassinate Reinhard Heydrich, one of the most feared men in Nazi Germany, in a daring ambush on his motorcade.

    Alternatively, the main security services of the Third Reich, the RSHA, had in place its own clandestine unit which planned to target Allied soldiers with poisoned coffee, chocolate and cigarettes; as part of a ruthless terrorist campaign.

    During the Cold War, the Soviet Union’s equivalent of the CIA, the KGB, poisoned two of its dissidents abroad, once by firing a tiny Ricin-infested pellet from a specially designed umbrella into the target’s leg; and on another occasion by a spray gun firing a jet of poison gas from a crushed cyanide ampoule.

    But even when the intended targets happen to miraculously survive a surreptitiously planned death, the devil that’s in the detail can be just as intriguing.

    The CIA attempted to kill Cuban dictator Fidel Castro on numerous occasions by utilizing everything from exploding cigars, mafia contractors and femmes fatales — albeit without success.

    On another occasion, the CIA unsuccessfully attempted to kill the Republic of Congo’s first Prime Minister, Patrice Lumumba, using a tube of doctored toothpaste which would have left him dead, apparently of Polio.

    In 2004, Ukrainian opposition leader Victor Yushenko was poisoned with TCDD, the most toxic form of Polychlorinated Dibenzodioxins, otherwise known as Dioxins, by what is largely suspected were pro-Russian individuals within the state’s security apparatus.

    Although many of the shrewd techniques that have been secretly used in the murder of dissidents and enemies abroad have long been acknowledged in the post-cold war era, many practices may still be eluding us by virtue of remaining shrouded in anonymity, even to this day.

    But generally speaking, secret state-sponsored targeted killings are still synonymous with booby-trapped car bombs, sniper hits, exploding cell phones and even small arms fire.

    In recent years, however, the art of these smart assassinations – designed in the most part to make a person’s death look somewhat natural – have now been refined by the most unthinkable of materials.

    And you don’t have to look beyond what happened to Alexander Litvenenko, a former officer in Russia’s internal security force, FSB, and critic of Vladimir Putin’s rule, in London on November 2006.

    After meeting what he ostensibly thought were two former KGB officers for tea in a hotel bar, within hours he was hospitalized with mysterious symptoms including progressively severe hair loss, vomiting and diarrhea for three weeks — before he ultimately succumbed to his horrible death.

    His post-mortem finally furnished us with details. He was poisoned it turns out, with tiny a nuclear substance, the radioactive isotope, Polonium-210. Its acute radiation syndrome that he ingested virtually meant he had no chance of survival.

    The UK authorities were able to piece together trails of the material as left by the culprits, incidentally right back to Russia itself, where almost all the world’s polonium is produced.

    The logic of administering such toxic materials was in fact deliberate. Polonium-210 is something which is normally undetectable; as a rare radioactive isotope it emits alpha particles, not the common gamma radiation that standard radiological equipment would detect in hospitals.

    The accused culprits may have underestimated the determination of the British authorities to uncover the whole plot, but simultaneously the incident also told us something; the Russians were not going to play by the old rules – they were going to rewrite them.

    It would be wrong to assume, however, that biological poisons, chemical agents and nuclear materials are the only things used in smart killings. In fact, the use of materials designed for rudimentary medical procedures have also taken on a new course.

    Israel’s Mossad, long considered the most effective intelligence agency in the world per magnitude, and no stranger to the world of targeted killing in foreign countries, has two shiny examples.

    In September 1997, Mossad agents sprayed Hamas Leader Khaled Meshal with the poison Levofentanyl – a modified version of the widely-used painkiller Fentany – by using a small camera which served as a trajectory. Although the agents were later apprehended, and eventually exchanged the antidote (following lengthy behind-the-scenes negotiations before it was eventually given to the victim), the audacity of the materials they used spoke volumes: it was designed not to leave any visible or tell-tale signs of harm on the target’s body.

    In January 2010, Hamas military commander Mohammad Al Mabhouh was found dead in his Dubai hotel room in what initially appeared to be death by natural causes.

    However, upon thorough investigation, not only were 26 suspects (believed to have emanated from Israel) fingered, but the circumstances surrounding his death also soon transpired.

    Al Mabhouh was injected in his leg with Succinylcholine, a quick-acting, depolarizing paralytic muscle relaxant. It causes almost instant loss of motor skills, but does not induce loss of consciousness or anesthesia. He was then apparently suffocated — ostensibly to quicken the pace of his death.

    In his bestselling book, Gordon Thomas, author of Gideon Spies: The Secret History of the Mossad, gives a chilling and detailed account of how the Mossad uses Biochemists and genetic scientists in order to develop lethal cocktails as bottled agents of death.

    This includes the development of nerve agents, choking agents, blood agents, and blister agents – including Tuban (virtually odorless and invisible when dispensed in aerosol or vapor form), Soman (the last of the Nazi nerve gasses to be discovered which also has a slightly fruity odour and is invincible in vapour format), blister agents (which include chlorine, phosgene and diphosgene, and smell of new-mown grass) and blood agents (including those with a cyanide base).

    The point to extrapolate is clear. States that employ the practice of smart assassination techniques see them as effective strategies that are justified. They don’t need to admit to carrying them out, but we know they are happening.

    An obvious concern raised here is that their almost pathological unwillingness to answer questions about the consequences of resorting to such assassinations – or covert targeted killings – will result in the practice becoming more widespread.

    The arbitrary stretching of legal justifications for such assassinations, premised on what an individual country recognizes as self-defence, indirectly renders them to be bound by no limits — and by extension may serve as encouragement for other nations to follow suit, if they interpret their national security considerations being failed by international treaty and cooperation.

    Just last month, British Police warned two outspoken Rwandan dissidents of threats to their lives by the Rwandan government, which could come in ‘any form’ or by ‘unconventional means’.

    Find this story at 19 June 2012

    By Mohammad I. Aslam
    Tuesday, 19 June 2012 at 3:00 am

    ©independent.co.uk

     

    U.S. expands secret intelligence operations in Africa

    OUAGADOUGOU, Burkina Faso — The U.S. military is expanding its secret intelligence operations across Africa, establishing a network of small air bases to spy on terrorist hideouts from the fringes of the Sahara to jungle terrain along the equator, according to documents and people involved in the project. At the heart of the surveillance operations are small, unarmed turboprop aircraft disguised as private planes. Equipped with hidden sensors that can record full-motion video, track infrared heat patterns, and vacuum up radio and cellphone signals, the planes refuel on isolated airstrips favored by African bush pilots, extending their effective flight range by thousands of miles. About a dozen air bases have been established in Africa since 2007, according to a former senior U.S. commander involved in setting up the network. Most are small operations run out of secluded hangars at African military bases or civilian airports. The nature and extent of the missions, as well as many of the bases being used, have not been previously reported but are partially documented in public Defense Department contracts. The operations have intensified in recent months, part of a growing shadow war against al-Qaeda affiliates and other militant groups. The surveillance is overseen by U.S. Special Operations forces but relies heavily on private military contractors and support from African troops. The surveillance underscores how Special Operations forces, which have played an outsize role in the Obama administration’s national security strategy, are working clandestinely all over the globe, not just in war zones. The lightly equipped commando units train foreign security forces and perform aid missions, but they also include teams dedicated to tracking and killing terrorism suspects. The establishment of the Africa missions also highlights the ways in which Special Operations forces are blurring the lines that govern the secret world of intelligence, moving aggressively into spheres once reserved for the CIA. The CIA has expanded its counterterrorism and intelligence-gathering operations in Africa, but its manpower and resources pale in comparison with those of the military. U.S. officials said the African surveillance operations are necessary to track terrorist groups that have taken root in failed states on the continent and threaten to destabilize neighboring countries. A hub for secret network A key hub of the U.S. spying network can be found in Ouagadougou (WAH-gah-DOO-goo), the flat, sunbaked capital of Burkina Faso, one of the most impoverished countries in Africa. Under a classified surveillance program code-named Creek Sand, dozens of U.S. personnel and contractors have come to Ouagadougou in recent years to establish a small air base on the military side of the international airport. The unarmed U.S. spy planes fly hundreds of miles north to Mali, Mauritania and the Sahara, where they search for fighters from al-Qaeda in the Islamic Maghreb, a regional network that kidnaps Westerners for ransom. The surveillance flights have taken on added importance in the turbulent aftermath of a March coup in Mali, which has enabled al-Qaeda sympathizers to declare an independent Islamist state in the northern half of the country. Elsewhere, commanders have said they are increasingly worried about the spread of Boko Haram, an Islamist group in Nigeria blamed for a rash of bombings there. U.S. forces are orchestrating a regional intervention in Somalia to target al-Shabab, another al-Qaeda affiliate. In Central Africa, about 100 American Special Operations troops are helping to coordinate the hunt for Joseph Kony, the Ugandan leader of a brutal guerrilla group known as the Lord’s Resistance Army. The results of the American surveillance missions are shrouded in secrecy. Although the U.S. military has launched airstrikes and raids in Somalia, commanders said that in other places, they generally limit their involvement to sharing intelligence with allied African forces so they can attack terrorist camps on their own territory. The creeping U.S. military involvement in long-simmering African conflicts, however, carries risks. Some State Department officials have expressed reservations about the militarization of U.S. foreign policy on the continent. They have argued that most terrorist cells in Africa are pursuing local aims, not global ones, and do not present a direct threat to the United States. The potential for creating a popular backlash can be seen across the Red Sea, where an escalating campaign of U.S. drone strikes in Yemen is angering tribesmen and generating sympathy for an al-Qaeda franchise there. In a response to written questions from The Washington Post, the U.S. Africa Command said that it would not comment on “specific operational details.” “We do, however, work closely with our African partners to facilitate access, when required, to conduct missions or operations that support and further our mutual security goals,” the command said. Surveillance and intelligence-gathering operations, it added, are “simply a tool we employ to enable host nation militaries to better understand the threat picture.” Uncovering the details The U.S. military has largely kept details of its spy flights in Africa secret. The Post pieced together descriptions of the surveillance network by examining references to it in unclassified military reports, U.S. government contracting documents and diplomatic cables released by WikiLeaks, the anti-secrecy group. Further details were provided by interviews with American and African officials, as well as military contractors. In addition to Burkina Faso, U.S. surveillance planes have operated periodically out of nearby Mauritania. In Central Africa, the main hub is in Uganda, though there are plans to open a base in South Sudan. In East Africa, U.S. aircraft fly out of bases in Ethiopia, Djibouti, Kenya and the Indian Ocean archipelago of the Seychelles. Army Gen. Carter F. Ham, the head of U.S. Africa Command, which is responsible for military operations on the continent, hinted at the importance and extent of the air bases while testifying before Congress in March. Without divulging locations, he made clear that, in Africa, he wanted to expand “ISR,” the military’s acronym for intelligence, surveillance and reconnaissance. “Without operating locations on the continent, ISR capabilities would be curtailed, potentially endangering U.S. security,” Ham said in a statement submitted to the House Armed Services Committee. “Given the vast geographic space and diversity in threats, the command requires increased ISR assets to adequately address the security challenges on the continent.” Some of the U.S. air bases, including ones in Djibouti, Ethiopia and the Seychelles, fly Predator and Reaper drones, the original and upgraded models, respectively, of the remotely piloted aircraft that the Obama administration has used to kill al-Qaeda leaders in Pakistan and Yemen. “We don’t have remotely piloted aircraft in many places other than East Africa, but we could,” said a senior U.S. military official, who spoke on the condition of anonymity to discuss intelligence matters. “If there was a need to do so and those assets were available, I’m certain we could get the access and the overflight [permission] that is necessary to do that.” Common aircraft Most of the spy flights in Africa, however, take off the old-fashioned way — with pilots in the cockpit. The conventional aircraft hold two big advantages over drones: They are cheaper to operate and far less likely to draw attention because they are so similar to the planes used throughout Africa. The bulk of the U.S. surveillance fleet is composed of single-engine Pilatus PC-12s, small passenger and cargo utility planes manufactured in Switzerland. The aircraft are not equipped with weapons. They often do not bear military markings or government insignia. The Pentagon began acquiring the planes in 2005 to fly commandos into territory where the military wanted to maintain a clandestine presence. The Air Force variant of the aircraft is known as the U-28A. The Air Force Special Operations Command has about 21 of the planes in its inventory. In February, a U-28A crashed as it was returning to Camp Lemonnier in Djibouti, the only permanent U.S. military base in Africa. Four airmen from the Air Force Special Operations Command were killed. It was the first reported fatal incident involving a U-28A since the military began deploying the aircraft six years ago. Air Force officials said that the crash was an accident and that they are investigating the cause. Military officials declined to answer questions about the flight’s mission. Because of its strategic location on the Horn of Africa, Camp Lemonnier is a hub for spy flights in the region. It is about 500 miles from southern Somalia, an area largely controlled by the al-Shabab militia. Lemonnier is even closer — less than 100 miles — to Yemen, where another al-Qaeda franchise has expanded its influence and plotted attacks against the United States. Elsewhere in Africa, the U.S. military is relying on private contractors to provide and operate PC-12 spy planes in the search for Kony, the fugitive leader of the Lord’s Resistance Army, a group known for mutilating victims, committing mass rape and enslaving children as soldiers. Ham, the Africa Command chief, said in his testimony to Congress in March that he was seeking to establish a base for surveillance flights in Nzara, South Sudan. Although that would bolster the hunt for Kony, who is wanted by the International Criminal Court, it would also enable the U.S. military to keep an eye on the worsening conflict between Sudan and South Sudan. The two countries fought a civil war for more than two decades and are on the verge of war again, in part over potentially rich oil deposits valued by foreign investors. Other aviation projects are in the offing. An engineering battalion of Navy Seabees has been assigned to complete a $10 million runway upgrade this summer at the Manda Bay Naval Base, a Kenyan military installation on the Indian Ocean. An Africa Command spokeswoman said the runway extension is necessary so American C-130 troop transport flights can land at night and during bad weather. About 120 U.S. military personnel and contractors are stationed at Manda Bay, which Navy SEALs and other commandos have used as a base from which to conduct raids against Somali pirates and al-Shabab fighters. About 6,000 miles to the west, the Pentagon is spending $8.1 million to upgrade a forward operating base and airstrip in Mauritania, on the western edge of the Sahara. The base is near the border with strife-torn Mali. The Defense Department also set aside $22.6 million in July to buy a Pilatus PC-6 aircraft and another turboprop plane so U.S.-trained Mauritanian security forces can conduct rudimentary surveillance operations, according to documents submitted to Congress. Crowding the embassy The U.S. military began building its presence in Burkina Faso in 2007, when it signed a deal that enabled the Pentagon to establish a Joint Special Operations Air Detachment in Ouagadougou. At the time, the U.S. military said the arrangement would support “medical evacuation and logistics requirements” but provided no other details. By the end of 2009, about 65 U.S. military personnel and contractors were working in Burkina Faso, more than in all but three other African countries, according to a U.S. Embassy cable from Ouagadougou. In the cable, diplomats complained to the State Department that the onslaught of U.S. troops and support staff had “completely overwhelmed” the embassy. In addition to Pilatus PC-12 flights for Creek Sand, the U.S. military personnel in Ouagadougou ran a regional intelligence “fusion cell” code-named Aztec Archer, according to the cable. Burkina Faso, a predominantly Muslim country whose name means “the land of upright men,” does not have a history of radicalism. U.S. military officials saw it as an attractive base because of its strategic location bordering the Sahel, the arid region south of the Sahara where al-Qaeda’s North African affiliate is active. Unlike many other governments in the region, the one in Burkina Faso was relatively stable. The U.S. military operated Creek Sand spy flights from Nouakchott, Mauritania, until 2008, when a military coup forced Washington to suspend relations and end the surveillance, according to former U.S. officials and diplomatic cables. In Ouagadougou, both sides have worked hard to keep the partnership quiet. In a July 2009 meeting, Yero Boly, the defense minister of Burkina Faso, told a U.S. Embassy official that he was pleased with the results. But he confessed he was nervous that the unmarked American planes might draw “undue attention” at the airport in the heart of the capital and suggested that they move to a more secluded hangar. “According to Boly, the present location of the aircraft was in retrospect not an ideal choice in that it put the U.S. aircraft in a section of the airfield that already had too much traffic,” according to a diplomatic cable summarizing the meeting. “He also commented that U.S. personnel were extremely discreet.” U.S. officials raised the possibility of basing the planes about 220 miles to the west, in the city of Bobo Dioulasso, according to the cable. Boly said that the Americans could use that airport on a “short term or emergency basis” but that a U.S. presence there “would likely draw greater attention.” In an interview with The Post, Djibril Bassole, the foreign minister of Burkina Faso, praised security relations between his country and the United States, saying they were crucial to containing al-Qaeda forces in the region. “We need to fight and protect our borders,” he said. “Once they infiltrate your country, it’s very, very difficult to get them out.” Bassole declined, however, to answer questions about the activities of U.S. Special Operations forces in his country. “I cannot provide details, but it has been very, very helpful,” he said. “This cooperation should be very, very discreet. We should not show to al-Qaeda that we are now working with the Americans.” Discretion is not always strictly observed. In interviews last month, residents of Ouagadougou said American service members and contractors stand out, even in plainclothes, and are appreciated for the steady business they bring to bars and a pizzeria in the city center. … Find this story at 14 June 2012 By Craig Whitlock, Thursday, June 14, 4:02 AM © The Washington Post Company

    www.criminology.com/know-your-rights/

    The Criminology.com project was created by Angelina Matson to be an online informational resource for individuals looking to pursue criminology-related education and careers. As a vast and interesting field, we delve into the meat of criminological thought and have also collected information like the job prospects for those with a degree in criminology to what an actual criminology education is composed of. As a fairly new project, those of us behind it are always trying to improve. With that said, please drop us a line on the contact page to give us suggestions for new articles or resources, or have questions answered.

    http://www.criminology.com/know-your-rights/

    ACADEMI — ex-Blackwater — Boosts State Dept Business, Eyes Acquisitions: EXCLUSIVE

    ARLINGTON, VA: How confident is the new management at private security contractor ACADEMI — formerly known as Xe and, also, infamously, as Blackwater — that they’ve turned the company around?

    Last month, apparently without attracting any public attention (until now), they quietly bought another security firm, International Development Solutions, and took over its piece of the State Department’s $10 billion World Protective Services contract, which then-Blackwater got kicked out of years ago.

    And ACADEMI plans on further acquisitions, CEO Ted Wright confirmed in an exclusive interview with AOL Defense.

    The company has spent a year rebuilding and is set to grow again, said Wright, who took over in June 2011. (He was hired by a new ownership team that bought out Blackwater founder Erik Prince the previous December). “The things we said we were going to do a year ago, we’ve kind of done,” said Wright, just back from visiting employees in Afghanistan.

    Since he started, the company has not only a new name but a new management team, a new board of directors — in fact it didn’t even have a board before — and a new corporate headquarters in Arlington, looking across the Potomac River straight at the headquarters of the State Department. Many of the employees doing security work in the field are new, Wright said, and the core of ACADEMI’s business, its training cadre, has turned over almost completely: Only about 10 instructors remain from the old days, compared to 30 new hires, with another 20 on the way.

    “After a year, back office is good, governance is good, and now we’re beginning to grow,” Wright said. “Now we’re going to be acquisitive.”

    Wright downplayed the acquisition of International Development Solutions as a first step, more consolidation than expansion. IDS was not a truly independent company but a joint venture that ACADEMI co-founded, subcontracted for, and already owned 49% percent of. Critics in Congress and the media even called IDS a “shell company” and a “front,” created as a cut-out so the ACADEMI / Xe / Blackwater name would not appear on State Department contracts, though Wright said ACADEMI always did some work directly for State. The main difference is that ACADEMI was a subcontractor on the World Protective Services program, but now it will be a prime contractor working directly for State. (The State Department did not return multiple calls and emails requesting comment; we will update this story when and if they do).

    “The people in the field doing the work [for State], they’re employes of IDS and they’ll become employees of ACADEMI,” said Wright. “That was the reason I was just in Afghanistan, to go to talk to the employees. [For them] there’s no difference at all, zero….The only difference is the administrative functions that were split between us and the other company now are just all us.” In terms of both personnel and revenue, he said, absorbing IDS only grows ACADEMI by “10 or 15 percent.”

    Wright has much bigger targets in mind. “[We’ll] maybe buy companies that give us new capabilities,” he said,” or spread us to a new location like maybe the Pacific or Latin America or Africa.” ACADEMI is already standing up a new training site in North Africa, he said, while its existing site in Afghanistan, called “Camp Integrity,” is “about to double in size,” from under 200 to 300 to 400 people, with an influx of new Special Operations customers Wright declined to talk about in any detail. Last month, the company started a new branch, ACADEMI Consulting Services, aimed at commercial clients — “oil and gas, multi-nationals, high net-worth individuals”: ACADEMI only does about $15 million a year for such non-governmental customers currently, Wright said, but he expects rapid growth. Some day, Wright even hopes to get back into business in Iraq, where the company is currently banned.

    So while the US military is out of Iraq and drawing down, albeit slowly, in Afghanistan, Wright said, that doesn’t mean ACADEMI will shrink. To the contrary: Wright plans to grow. After all, the State Department, other civilian agencies, and the private sector are still in dangerous places, only with fewer US troops deployed to protect them. “We’ve got some very stable customers that have enduring requirements for security in Afghanistan,” said Wright. “Our business is not going going to shrink quickly.” While some private security contractors will ultimately go out of business, he predicted, ACADEMI will be trying to buy them up. “The industry will now consolidate,” he said. “The strong will survive: We intend to be one of those.”

    The company once called Blackwater isn’t going away. But what about the culture that permitted its infamous abuses — mistreatment of Afghan and Iraqi civilians, misappropriation of weapons, drug use, drinking, and the killing of at least 14 innocent Iraqis in 2007 in Baghdad’s Nisour Square?

    Find this story at 8 june 2012

    By Sydney J. Freedberg Jr.

    Published: June 8, 2012

    © Copyright 2012 AOL Inc. All Rights Reserved.

    << oudere artikelen  nieuwere artikelen >>