• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Germany backs away from claims NSA program thwarted five attacks

    German Interior Minister Hans-Peter Friedrich is backing off his earlier assertion that the Obama administration’s NSA monitoring of Internet accounts had prevented five terror attacks in Germany, raising questions about other claims concerning the value of the massive monitoring programs revealed by NSA leaker Edward Snowden.

    Friedrich had made the assertion about the number of attacks that the NSA programs – which scoop up records from cellphone and Internet accounts – had helped to avert after a brief visit to the United States last week. But on Tuesday, he told a German parliamentary panel, “It is relatively difficult to count the number of terror attacks that didn’t occur.” And on Wednesday, he was publically referring to just two foiled attacks, at least one and possibly both of which appeared to have little to do with the NSA’s surveillance programs.

    The questions about the programs’ value in thwarting attacks in Germany come as some members of the U.S. Congress have told Obama officials that the programs exceeded what Congress authorized when it passed laws that the administration is arguing allowed the collection of vast amounts of information on cellphone and Internet email accounts.

    In Germany, the concern is that the NSA is capturing and storing as many as 500 million electronic communications each month, but Germans are getting little if anything back for what is seen as an immoral and illegal invasion of privacy.

    Friedrich spent July 11-12 in the United States for meetings with U.S. officials on the NSA programs that German Chancellor Angela Merkel had requested. The point of the meetings was to gather information that would calm a building German angst over the spy scandal.

    Instead of being reassured, however, opposition politicians and commentators now are talking about the arrogance of the U.S. application of “winner’s power” (a reference to the political authority the United States had here during the Cold War, when Germany was divided between east and west, and West Germany leaned heavily on America for support), and how traditionally strong relations between the two countries have been harmed by the scandal.

    “German-American relations are at risk,” said Hans-Christian Stroebele, a Green Party member of the influential German intelligence oversight committee in the country’s legislature, the Bundestag, which is dominated by Merkel’s Christian Democratic Union. “The longer it takes to uncover the facts after this long silence, the more problematic it becomes. No one even bothers to deny what’s been said. It could be that German or (European Union) courts will have to deal with this.”

    Even as emotions build, NSA plans for expanding a listening station in Germany were revealed this week, raising more questions.

    Stroebele spoke Thursday to McClatchy, addressing Friedrich’s official report, delivered behind closed doors to the Bundestag committee. He said Friedrich received little information from the United States in his quick trip to Washington.

    “We’re lucky to have had Snowden,” Stroebele said. “Without him, this surveillance that is not permissible under international law would have continued for a long time. In Germany, there are prison terms for such spying.”

    Perhaps most troubling was how quickly the government backed down on the claims that the surveillance helped foil terror plots. Gisela Piltz, a Liberal Party member of the Bundestag intelligence committee, said she could not give exact details of what took place in the secret hearing but noted: “There was a clear discrepancy between the previously reported number of foiled terror attacks and the number we talked about.”

    And even those cases raised questions. One of them, commonly known as the Sauerland Cell Plot, involved an alleged conspiracy in 2007 to detonate a series of car bombs in crowded places. Piltz was involved in a Bundestag study of what took place. The goal of the would-be bombers was to surpass the death and injured toll from commuter train attacks in Madrid in 2004, which killed 191 and wounded another 1,800.

    The conspirators, who allegedly included two Germans, had gathered nearly a ton of liquid explosives.

    News reports at the time mentioned an unnamed U.S. intelligence official saying that cellphone calls by the two Germans had been intercepted. But those calls were said to have been made when the Germans were leaving a terror camp in Pakistan – an entirely different scenario from the current monitoring program, which captures data from everyday citizens by casting a worldwide net.

    Piltz said even that participation by U.S. intelligence agencies remains unverified.

    The other case, involving four men with al Qaida connections arrested in Dusseldorf while allegedly preparing to make a shrapnel bomb to detonate at an undecided location, also raised questions about NSA involvement. During the trial, prosecutors said they were alerted to the cell by an informant, after which they studied emails from the four. But such targeted surveillance is not the issue in the NSA programs, one of which, PRISM, reportedly taps into the computers of users of nine Internet companies, including Facebook, Google and Yahoo.

    Defending NSA practices, Friedrich noted that security is a “super fundamental right.” As such it outranks fundamental rights such as privacy. German newspapers were scathing in their assessment, calling Friedrich the “idiot in charge.”

    Piltz said that while terrorism is a real threat, the U.S. monitoring programs have done little to prevent it.

    “Germans are not safer because of U.S. espionage,” Piltz said. “It is true Germany has been lucky not to have suffered a terror attack, but there has to be a balance. We cannot sacrifice freedom for security, and when in doubt I would always opt for freedom.”

    McClatchy special correspondent Claudia Himmelreich in Berlin contributed to this report.

    McClatchy Washington Bureau
    Posted on Thu, Jul. 18, 2013
    By Matthew Schofield | McClatchy Foreign Staff

    last updated: July 18, 2013 05:30:07 PM
    BERLIN — ]

    Find this story at 18 July 2013

    © McClatchy Washington Bureau

    Second Prism program emerges as Friedrich faces committee

    As Germany’s interior minister faced a special select committee, another surveillance program – also called Prism – has come to light. Unlike its more famous global namesake, this Prism is said to be used in Afghanistan.

    German mass-circulation daily Bild first found reference to the Afghanistan Prism program in an order sent out to regional command posts from the NATO headquarters in Kabul.

    The communiqué told ISAF staff to use this Prism database for any data gleaned from monitoring telecommunications or emails, starting on September 15, 2011.

    The German government said it knew nothing about the database, run by the US but accessible to ISAF troops across Afghanistan – including those with Germany’s Bundeswehr – until Wednesday’s report.

    “I can only tell you that this was a NATO/ISAF program, one that was not classified as secret – according to the BND,” Chancellor Merkel’s spokesman Steffen Seibert said. Seibert was referring to a press release from Germany’s equivalent to Washington’s National Security Agency (NSA), the Bundesnachrichtendienst (BND). The BND also said this Prism was “not identical” to the now renowned program revealed by NSA contractor turned whistleblower Edward Snowden in May.
    DW.DE
    Itching to ask: What does Merkel know about NSA surveillance?

    A parliamentary oversight committee in Berlin would like to know how much the German government really knows about NSA spying activities in Germany. Their leverage, however, is limited. (17.07.2013)

    Another ministerial spokesman, Stefan Paris with the defense ministry, said it was quite normal for information like this not to filter back to Berlin unless there was a specific need.

    Friedrich faces closed-door grilling

    Elsewhere in Berlin, Interior Minister Hans-Peter Friedrich completed two days in front of the special committee for internal affairs on Wednesday, facing further questions after his impromptu visit to Washington at the weekend.

    Opposition politicians, who see increasing mileage in the alleged NSA espionage activities, said after the session that Friedrich’s appearance shed little light on proceedings.

    “Everywhere people seem to accept the way the US side is acting with a shrug of the shoulders, while there’s no clarity anywhere,” Social Democrat parliamentarian Michael Hartmann said, adding that he felt the chancellor’s office should be answering questions instead of the interior ministry.

    “My personal impression: Before September 22, nothing is meant to be put on the table here,” Green party politician Wolfgang Wieland said, naming the date of federal elections in Germany.

    Friedrich has so far stressed the NSA’s supposed contribution to stopping five terror plots in Germany, offering data on two of them to date, when discussing the issue. The minister controversially said on Monday that there was a “super-fundamental right” to protecting public safety that trumped even privacy laws.

    British blow to EU data dreams?

    Free Democrat politician Hartfried Wolff, a member of the Bundestag’s interior committee, said on Wednesday that Friedrich had outlined one blow to Chancellor Angela Merkel’s proposed response.

    Merkel said in a key television interview on Sunday that she would be seeking unified EU rules on data protection to allow the bloc to handle the issue better.

    According to Wolff, Friedrich said that the UK was unlikely to support such a move. Since Snowden went public, a UK espionage program called “Tempora” has also come to light.

    Friedrich is a member of the Bavarian sister party of Merkel’s Christian Democrats, the CSU. Bavaria votes in state elections one week before the German ballot.

    msh/rc (AFP, AP, Reuters)
    Date 17.07.2013

    Find this story at 717 July 2013

    © 2013 Deutsche Welle

    Prism in Afghanistan Conflicting Accounts By German Government

    In Germany, the scandal surrounding NSA spying is getting odder by the day. A new Defense Ministry memo suggests a claim made by a mass-circulation newspaper that Germany’s army knew about Prism in 2011 is, in fact, true.

    The scandal in Germany surrounding spying activities by the United States’ National Security Agency took a surprising twist on Thursday. A report by a German mass-circulation daily that described the use of a program called Prism in NATO-occupied Afghanistan has led to the German Defense Ministry contradicting the foreign intelligence agency BND.

    It started on Wednesday when the broadsheet Bild reported that the American intelligence service NSA had deployed the controversial data-collection tool Prism in Afghanistan and that Germany’s armed forces, the Bundeswehr, knew of the program by the autumn of 2011 at the latest.

    German government spokesman Steffen Seibert, speaking on behalf of the BND, was quick to deny the Bild report. He said on Wednesday that the software which had been used in Afghanistan was part of “a NATO/ISAF program and was not the same as the NSA’s Prism program.” Seibert said the programs were “not identical.” According to Seibert’s account, there are two different Prism programs — the much discussed NSA Prism program, which has been used in recent years to intensively monitor German communications, as well as an ISAF program for Afghanistan.

    But the Defense Ministry is now contradicting that characterization. In a two-page memo obtained by several German media outlets, Rüdiger Wolf, a high-ranking ministry official, states that the Prism program used in Afghanistan is a “computer-aided US planning and information analysis tool” used for the coordination of “American intelligence systems,” that is “operated exclusively by US personnel” and is “used Afghanistan-wide by the US side.”

    Prism Accessible Exclusively to Americans

    Wolf describes in detail how the Bundeswehr and NATO have no access to the US program. He adds that while there may be computer terminals at the German base in Mazar-e-Sharif that are equipped to access the program, they can only be used by Americans.

    If members of the Bundeswehr wanted access to information, they had to send a special form to the IJC command center in Kabul, almost entirely controlled by the US Army — that is, if they wanted US data that went beyond the information possessed by NATO intelligence. When they got the data back, “the origin of the information” was “fundamentally unrecognizable” to the Germans.

    It is precisely such procedures that Bild reported on this week, citing a classified September NATO order. In the paper, NATO members, including the German-led Regional Command North in Afghanistan, are called upon to direct requests for the “Prism” system to American personnel — military or civilian (which in this case is a reference to intelligence workers) because NATO has no access to the system. Given that Bild printed a copy of the order in its newspaper, the BND’s portrayal already seemed odd on Wednesday.

    According to Wolf’s own admissions, the Germans don’t know very much about the Prism program in Afghanistan. It is unclear, for example, how Prism is deployed at the US Army-dominated headquarters in Kabul and the ministry doesn’t know the “extent of use.” However, Wolf once more reiterated that all information obtained from intelligence sources served to protect German soldiers — including “insights provided by the US side that could have come from Prism.”

    A Slap in the Face

    The Defense Ministry is also very cautious compared to the BND when it comes to deferentiating the Prism program in Afghanistan from the Prism spying program that was exposed by former NSA contractor Edward Snowden and involves the systematic monitoring of German communications. The information supplied by the US would have pertained only to the situation in Afghanistan. It was “not a data fishing expedition” on German citizens, according to the memo, and in fact had “no proximity” to the NSA surveillance program in Germany and Europe.

    With his cautious formulation, Wolf deliberately avoids saying whether or not the two programs are identical.

    This representation of the facts, which was already made to some extent on Wednesday by Defense Ministry spokesman Stefan Paris, is like a slap in the face for the BND. Shortly after Seibert appeared at the press conference, insiders wondered why the intelligence agency would so unambiguously commit itself to the position that the Prism program in Afghanistan is part of the composite ISAF system. But the BND didn’t pull back on its position, although Paris clearly said that the Prism program in Afghanistan is operated exclusively by Americans.

    Members of the opposition were quick to attack the BND for its assertions. “The Chancellery, acting on behalf of the BND, deliberately lied to the public on Wednesday,” Green Party defense expert Omid Nouripour told SPIEGEL ONLINE. According to Nouripour, Wolf’s description makes it clear that there is no NATO Prism program. The German government, he says, should stop making excuses and finally begin to seriously investigate the spying scandal.

    07/18/2013 09:26 PM

    By Matthias Gebauer

    Find this story at 18 July 2013

    © SPIEGEL ONLINE 2013

    Observant nummer 63, de elektronische nieuwsbrief van Buro Jansen & Janssen

    In deze nieuwsbrief, Observant nummer 63 (de elektronische nieuwsbrief van bjj), aandacht voor de aandacht van inlichtingendiensten voor studenten die protesteerden tegen de bezuinigingen, selectief fouilleren in Maastricht, of de politie discrimineert, Chiquita dat al decennia lang een nauwe band met de Amerikaanse overheid onderhoudt, maar ook met geweld tegen werknemers en vakbonden niet schuwt, een gesprek met de AIVD, Syrië en onze desinteresse, een oude tijdloze publicatie Administratieve Apartheid, Inside British Intelligence en natuurlijk de terugkerende steunaanvraag voor Jansen.

    01 Inhoudsopgave
    02 Ideologische orde: Gaan we protesteren?
    03 Discrimineert de politie?
    04 Preventief fouilleren omdat het mag!/moet?
    05 Chiquita and the Myth of Corporate Social Responsibility
    06 “Hallo, met de AIVD”
    07 Nederlandse strijders in Syrië verdienen een onderscheiding
    08 Inside British intelligence
    09 Administratieve apartheid brochure
    10 Donateurs gezocht

    Living Under Drones: Death, Injury and Trauma to Civilians from US Drone Practices in Pakistan

    This report is the result of nine months of research by the International Human Rights and Conflict Resolution Clinic of Stanford Law School (Stanford Clinic) and the Global Justice Clinic at New York University School of Law (NYU Clinic). Professor James Cavallaro and Clinical Lecturer Stephan Sonnenberg led the Stanford Clinic team; Professor Sarah Knuckey led the NYU Clinic team. Adelina Acuña, Mohammad M. Ali, Anjali Deshmukh, Jennifer Gibson, Jennifer Ingram, Dimitri Phillips, Wendy Salkin, and Omar Shakir were the student research team at Stanford; Christopher Holland was the student researcher from NYU. Supervisors Cavallaro, Sonnenberg, and Knuckey, as well as student researchers Acuña, Ali, Deshmukh, Gibson, Salkin, and Shakir participated in the fact-finding investigations to Pakistan.

    In December 2011, Reprieve, a charity based in the United Kingdom, contacted the Stanford Clinic to ask whether it would be interested in conducting independent investigations into whether, and to what extent, drone strikes in Pakistan conformed to international law and caused harm and/or injury to civilians. The Stanford Clinic agreed to undertake independent fact-finding and analysis on these questions, as well as others related to drone strikes and targeted killings in Pakistan, beginning in December 2011. Later, the NYU Clinic agreed to join the research project and participated in the second research trip to Pakistan, as well as in additional research, writing, and editing of this report.

    In the course of the research, the Stanford and NYU Clinics have exchanged information and logistical support with Reprieve and its partner organization in Pakistan, the Foundation for Fundamental Rights (FFR). The latter organization assisted in contacting many of the potential interviewees, particularly those who reside in North Waziristan, and in the difficult work of arranging interviews. The Stanford and NYU Clinics designed the research project, analyzed information, and drafted and edited the report independently from Reprieve and FFR.

    Cavallaro, Knuckey, and Sonnenberg supervised and directed the preparation of the report, oversaw the writing, and served as the final editors of this publication. Students Acuña, Ali, Deshmukh, Gibson, and Shakir drafted initial sections of the report. Acuña, Ali, Gibson and Shakir synthesized and restructured the initial draft sections. Holland from the NYU Clinic also assisted with research for the report. Firas Abuzeid, Jennifer Ingram, Usman Liaqat, Clara Long, Waqas Mustafeez, Ada Sheng, and Zade Shakir assisted the research team in the review and fact-checking of the final version.

    Abdulrasheed Alabi, Danny Auron, Dr. Rajaie Batniji, Kristen DeRemer, Aisha Ghani, Emi MacLean, Veerle Opgenhaffen, Professor Margaret Satterthwaite, Dr. Saad Shakir, Hina Shamsi, Professor Shirin Sinnar, Professor Allen Weiner, and Nate Wessler reviewed and commented on this report or some part thereof. The Stanford and NYU Clinics would like to thank these scholars and practitioners for volunteering their time and expertise. The opinions and positions articulated in this report are the exclusive responsibility of the research team and not of these external reviewers.

    The Clinics also extend our appreciation to the Brave New Foundation, in particular its president, Robert Greenwald, as well as Josh Busch, Aminta Goyel, Jeff Cole, David Fisher, Joseph Suzuki, and John Amick for preparing a short video to accompany the report.

    The Stanford and NYU Clinics express our sincere thanks to our translators in Islamabad and Peshawar. In particular, we would like to thank Muhammad Abdullah Ather, Rascim Khan Khattak, Muzafar Mohiuddin, Obaid Khan, Adnan Wazir, Usama Khilji, and Amna Bilal.

    A particular debt of gratitude is owed to those who agreed to be interviewed for this report, often at risk to themselves. This includes in particular the Waziris who traveled long distances and faced significant risks to share their accounts of living under drones with our research team.

    Executive Summary and Recommendations

    In the United States, the dominant narrative about the use of drones in Pakistan is of a surgically precise and effective tool that makes the US safer by enabling “targeted killing” of terrorists, with minimal downsides or collateral impacts.[1]

    This narrative is false.

    Following nine months of intensive research—including two investigations in Pakistan, more than 130 interviews with victims, witnesses, and experts, and review of thousands of pages of documentation and media reporting—this report presents evidence of the damaging and counterproductive effects of current US drone strike policies. Based on extensive interviews with Pakistanis living in the regions directly affected, as well as humanitarian and medical workers, this report provides new and firsthand testimony about the negative impacts US policies are having on the civilians living under drones.

    Real threats to US security and to Pakistani civilians exist in the Pakistani border areas now targeted by drones. It is crucial that the US be able to protect itself from terrorist threats, and that the great harm caused by terrorists to Pakistani civilians be addressed. However, in light of significant evidence of harmful impacts to Pakistani civilians and to US interests, current policies to address terrorism through targeted killings and drone strikes must be carefully re-evaluated.

    It is essential that public debate about US policies take the negative effects of current policies into account.

    First, while civilian casualties are rarely acknowledged by the US government, there is significant evidence that US drone strikes have injured and killed civilians. In public statements, the US states that there have been “no” or “single digit” civilian casualties.”[2] It is difficult to obtain data on strike casualties because of US efforts to shield the drone program from democratic accountability, compounded by the obstacles to independent investigation of strikes in North Waziristan. The best currently available public aggregate data on drone strikes are provided by The Bureau of Investigative Journalism (TBIJ), an independent journalist organization. TBIJ reports that from June 2004 through mid-September 2012, available data indicate that drone strikes killed 2,562-3,325 people in Pakistan, of whom 474-881 were civilians, including 176 children.[3] TBIJ reports that these strikes also injured an additional 1,228-1,362 individuals. Where media accounts do report civilian casualties, rarely is any information provided about the victims or the communities they leave behind. This report includes the harrowing narratives of many survivors, witnesses, and family members who provided evidence of civilian injuries and deaths in drone strikes to our research team. It also presents detailed accounts of three separate strikes, for which there is evidence of civilian deaths and injuries, including a March 2011 strike on a meeting of tribal elders that killed some 40 individuals.

    Second, US drone strike policies cause considerable and under-accounted-for harm to the daily lives of ordinary civilians, beyond death and physical injury. Drones hover twenty-four hours a day over communities in northwest Pakistan, striking homes, vehicles, and public spaces without warning. Their presence terrorizes men, women, and children, giving rise to anxiety and psychological trauma among civilian communities. Those living under drones have to face the constant worry that a deadly strike may be fired at any moment, and the knowledge that they are powerless to protect themselves. These fears have affected behavior. The US practice of striking one area multiple times, and evidence that it has killed rescuers, makes both community members and humanitarian workers afraid or unwilling to assist injured victims. Some community members shy away from gathering in groups, including important tribal dispute-resolution bodies, out of fear that they may attract the attention of drone operators. Some parents choose to keep their children home, and children injured or traumatized by strikes have dropped out of school. Waziris told our researchers that the strikes have undermined cultural and religious practices related to burial, and made family members afraid to attend funerals. In addition, families who lost loved ones or their homes in drone strikes now struggle to support themselves.

    Third, publicly available evidence that the strikes have made the US safer overall is ambiguous at best. The strikes have certainly killed alleged combatants and disrupted armed actor networks. However, serious concerns about the efficacy and counter-productive nature of drone strikes have been raised. The number of “high-level” targets killed as a percentage of total casualties is extremely low—estimated at just 2%.[4] Furthermore, evidence suggests that US strikes have facilitated recruitment to violent non-state armed groups, and motivated further violent attacks. As the New York Times has reported, “drones have replaced Guantánamo as the recruiting tool of choice for militants.”[5] Drone strikes have also soured many Pakistanis on cooperation with the US and undermined US-Pakistani relations. One major study shows that 74% of Pakistanis now consider the US an enemy.[6]

    Fourth, current US targeted killings and drone strike practices undermine respect for the rule of law and international legal protections and may set dangerous precedents. This report casts doubt on the legality of strikes on individuals or groups not linked to the terrorist attacks of September 11, 2011, and who do not pose imminent threats to the US. The US government’s failure to ensure basic transparency and accountability in its targeted killing policies, to provide necessary details about its targeted killing program, or adequately to set out the legal factors involved in decisions to strike hinders necessary democratic debate about a key aspect of US foreign and national security policy. US practices may also facilitate recourse to lethal force around the globe by establishing dangerous precedents for other governments. As drone manufacturers and officials successfully reduce export control barriers, and as more countries develop lethal drone technologies, these risks increase.

    In light of these concerns, this report recommends that the US conduct a fundamental re-evaluation of current targeted killing practices, taking into account all available evidence, the concerns of various stakeholders, and the short and long-term costs and benefits. A significant rethinking of current US targeted killing and drone strike policies is long overdue. US policy-makers, and the American public, cannot continue to ignore evidence of the civilian harm and counter-productive impacts of US targeted killings and drone strikes in Pakistan.

    This report also supports and reiterates the calls consistently made by rights groups and others for legality, accountability, and transparency in US drone strike policies:
    The US should fulfill its international obligations with respect to accountability and transparency, and ensure proper democratic debate about key policies. The US should:
    Release the US Department of Justice memoranda outlining the legal basis for US targeted killing in Pakistan;
    Make public critical information concerning US drone strike policies, including as previously and repeatedly requested by various groups and officials:[7] the targeting criteria for so-called “signature” strikes; the mechanisms in place to ensure that targeting complies with international law; which laws are being applied; the nature of investigations into civilian death and injury; and mechanisms in place to track, analyze and publicly recognize civilian casualties;[8]
    Ensure independent investigations into drone strike deaths, consistent with the call made by Ben Emmerson, UN Special Rapporteur on the promotion and protection of human rights and fundamental freedoms while countering terrorism in August 2012;[9]
    In conjunction with robust investigations and, where appropriate, prosecutions, establish compensation programs for civilians harmed by US strikes in Pakistan.
    The US should fulfill its international humanitarian and human rights law obligations with respect to the use of force, including by not using lethal force against individuals who are not members of armed groups with whom the US is in an armed conflict, or otherwise against individuals not posing an imminent threat to life. This includes not double-striking targets as first responders arrive.
    Journalists and media outlets should cease the common practice of referring simply to “militant” deaths, without further explanation. All reporting of government accounts of “militant” deaths should include acknowledgment that the US government counts all adult males killed by strikes as “militants,” absent exonerating evidence. Media accounts relying on anonymous government sources should also highlight the fact of their single-source information and of the past record of false government reports.

    Find this story at September 2012

    Find the report

    © Copyright 2012 Living Under Drones by Stanford Law School

    EU planning to ‘own and operate’ spy drones and an air force

    The European Union is planning to “own and operate” spy drones, surveillance satellites and aircraft as part of a new intelligence and security agency under the control of Baroness Ashton.

    The controversial proposals are a major move towards creating an independent EU military body with its own equipment and operations, and will be strongly opposed by Britain.

    Officials told the Daily Telegraph that the European Commission and Lady Ashton’s European External Action Service want to create military command and communication systems to be used by the EU for internal security and defence purposes. Under the proposals, purchasing plans will be drawn up by autumn.

    The use of the new spy drones and satellites for “internal and external security policies”, which will include police intelligence, the internet, protection of external borders and maritime surveillance, will raise concerns that the EU is creating its own version of the US National Security Agency.

    Senior European officials regard the plan as an urgent response to the recent scandal over American and British communications surveillance by creating EU’s own security and spying agency.

    “The Edward Snowden scandal shows us that Europe needs its own autonomous security capabilities, this proposal is one step further towards European defence integration,” said a senior EU official.

    The proposal said “the commission will work with the EEAS on a joint assessment of dual-use capability needs for EU security and defence policies”.

    It continued: “On the basis of this assessment, it will come up with a proposal for which capability needs, if any, could best be fulfilled by assets directly purchased, owned and operated by the Union.” A commission official confirmed the proposal.

    “Looking at the current gaps, possibilities could be from surveillance Remotely Piloted Aircraft Systems to airlift and command and communication facilities,” said the official.

    There is a already an intense behind-the-scenes battle pitting London against the rest over plans to create an EU military operations headquarters in Brussels.

    Lady Ashton, the European foreign minister, the commission and France – backed by Germany, Italy, Spain and Poland – all support the plans. Both sets of proposals are likely to come to a head at an EU summit fight in December.

    “We would not support any activity that would mean the Commission owning or controlling specific defence research assets or capabilities,” said a British government spokesman.

    Britain has a veto but the group of countries have threatened to use a legal mechanism, created by the Lisbon Treaty, to bypass the British and create a major rift in Nato.

    Geoffrey Van Orden MEP, Conservative European defence and security spokesman, accused the commission of being “obsessed” with promoting the “EU’s military ambitions”.

    “It would be alarming if the EU – opaque, unaccountable, bureaucratic and desperately trying to turn itself into a federal state – were to try and create an intelligence gathering capability of its own. This is something that we need to stop in its tracks before it is too late,” he said.

    Nigel Farage MEP, the leader of Ukip, described the plans for EU spy drones and satellites as “a deeply sinister development”.

    “These are very scary people, and these revelations should give any lover of liberty pause for thought over the ambitions of the EU elite.”

    The Open Europe think tank has warned that the EU “has absolutely no democratic mandate for actively controlling and operating military and security capabilities”.

    “The fact is European countries have different views on defence and this is best served by intergovernmental cooperation, not by European Commission attempts at nation-building,” said Pawel Swidlicki, a research analyst at Open Europe.

    The spy drones and secure command systems would be linked to a £3.5 billion spy satellite project known as Copernicus which will be used to provide “imaging capabilities to support Common Security and Defence Policy missions and operations”. Currently Copernicus is due to be operated by the European Space Agency.

    It is part of the Sentinel system of satellites, which is costing British taxpayers £434 million. Previously known as the Global Monitoring for Environment and Security project, which is due to become operational next year.

    By Bruno Waterfield Last updated: July 26th, 2013

    Find this story at 26 July 2013

    © Copyright of Telegraph Media Group Limited 2013

    US drone strikes guided from outback

    Central Australia’s Pine Gap spy base played a key role in the United States’ controversial drone strikes involving the ”targeted killing” of al-Qaeda and Taliban chiefs, Fairfax Media can reveal.

    Former personnel at the Australian-American base have described the facility’s success in locating and tracking al-Qaeda and Taliban leaders – and other insurgent activity in Afghanistan and Pakistan – as ”outstanding”.

    A Fairfax Media investigation has now confirmed a primary function of the top-secret signals intelligence base near Alice Springs is to track the precise ”geolocation” of radio signals, including those of hand-held radios and mobile phones, in the eastern hemisphere, from the Middle East across Asia to China, North Korea and the Russian far east.

    This information has been used to identify the location of terrorist suspects, which is then fed into the United States drone strike program and other military operations.

    The drone program, which has involved more than 370 attacks in Pakistan since 2004, is reported to have killed between 2500 and 3500 al-Qaeda and Taliban militants, including many top commanders.

    But hundreds of civilians have been also killed, causing anti-American protests in Pakistan, diplomatic tensions between Washington and Islamabad and accusations the ”drone war” has amounted to a program of ”targeted killing” outside a battlefield. This year, the Obama administration acknowledged four American citizens had been killed by strikes in Pakistan and Yemen since 2009.

    ”The [Taliban] know we’re listening but they still have to use radios and phones to conduct their operations; they can’t avoid that,” one former Pine Gap operator said. ”We track them, we combine the signals intelligence with imagery and, once we’ve passed the geolocation [intelligence] on, our job is done. When drones do their job we don’t need to track that target any more.”

    The base’s direct support of US military operations is much greater than admitted by Defence Minister Stephen Smith and previous Australian governments, new disclosures by former Pine Gap personnel and little-noticed public statements by US government officials have shown.

    Australian Defence intelligence sources have confirmed that finding targets is critically dependent on intelligence gathered and processed through the Pine Gap facility, which has seen ”a massive, quantitative and qualitative transformation” over the past decade, and especially the past three years.

    ”The US will never fight another war in the eastern hemisphere without the direct involvement of Pine Gap,” one official said.

    Last week, secret documents leaked by US whistleblower Edward Snowden indicated Pine Gap also contributes to a broad US National Security Agency collection program codenamed ”X-Keyscore”.

    Pine Gap controls a set of geostationary satellites positioned above the Indian Ocean and Indonesia. These orbit the earth at fixed points and are able to locate the origin of radio signals to within 10 metres. Pine Gap processes the data and can provide targeting information to US and allied military units within minutes.

    Former US National Security Agency personnel who served at Pine Gap in the past two years have described their duties in unguarded career summaries and employment records as including ”signals intelligence collection, geolocation … and reporting of high-priority target signals” including ”real time tracking”.

    US Army personnel working at Pine Gap use systems codenamed ”Whami, SSEXTANT, and other geolocation tools” to provide targeting information, warnings about the location of radio-triggered improvised explosive devices, and for combat and non-combat search and rescue missions.

    Pine Gap’s operations often involve sifting through vast quantities of ”noise” to find elusive and infrequent signals. One former US Army signals intelligence analyst describes the ”collection and geolocation of an extremely hard to find target” as a task that included ”manually sifting through hundreds of hours of collection”.

    Last month Mr Smith assured Parliament that Pine Gap operates with the ”full knowledge and concurrence” of the government.

    He provided no details other than to say the facility ”delivers information on intelligence priorities such as terrorism, the proliferation of weapons of mass destruction, and military and weapons developments” and ”contributes to the verification of arms control and disarmament agreements”.

    The government is required by a number of agreements to consult with the US government before the public release of any new information about Pine Gap.

    The federal government maintains a long-standing policy of not commenting on operational intelligence matters.

    Philip Dorling
    Published: July 21, 2013 – 3:00AM

    Find this story at 21 July 2013

    Copyright © 2013 Fairfax Media

    Obama’s secret kill list – the disposition matrix

    The disposition matrix is a complex grid of suspected terrorists to be traced then targeted in drone strikes or captured and interrogated. And the British government appears to be colluding in it

    Barack Obama, chairing the ‘Terror Tuesday’ meetings, agrees the final schedule of names on the disposition matrix. Photograph: Saul Loeb/AFP/Getty Images

    When Bilal Berjawi spoke to his wife for the last time, he had no way of being certain that he was about to die. But he should have had his suspicions.

    A short, dumpy Londoner who was not, in the words of some who knew him, one of the world’s greatest thinkers, Berjawi had been fighting for months in Somalia with al-Shabaab, the Islamist militant group. His wife was 4,400 miles away, at home in west London. In June 2011, Berjawi had almost been killed in a US drone strike on an al-Shabaab camp on the coast. After that he became wary of telephones. But in January last year, when his wife went into labour and was admitted to St Mary’s hospital in Paddington, he decided to risk a quick phone conversation.

    A few hours after the call ended Berjawi was targeted in a fresh drone strike. Perhaps the telephone contact triggered alerts all the way from Camp Lemmonier, the US military’s enormous home-from-home at Djibouti, to the National Security Agency’s headquarters in Maryland. Perhaps a few screens also lit up at GCHQ in Cheltenham? This time the drone attack was successful, from the US perspective, and al-Shabaab issued a terse statement: “The martyr received what he wished for and what he went out for.”

    The following month, Berjawi’s former next-door neighbour, who was also in Somalia, was similarly “martyred”. Like Berjawi, Mohamed Sakr had just turned 27 when he was killed in an air strike.

    Four months later, the FBI in Manhattan announced that a third man from London, a Vietnamese-born convert to Islam, had been charged with a series of terrorism offences, and that if convicted he would face a mandatory 40-year sentence. This man was promptly arrested by Scotland Yard and is now fighting extradition to the US. And a few weeks after that, another of Berjawi’s mates from London was detained after travelling from Somalia to Djibouti, where he was interrogated for months by US intelligence officers before being hooded and put aboard an aircraft. When 23-year-old Mahdi Hashi next saw daylight, he was being led into a courtroom in Brooklyn.

    That these four men had something in common is clear enough: they were all Muslims, all accused of terrorism offences, and all British (or they were British: curiously, all of them unexpectedly lost their British citizenship just as they were about to become unstuck). There is, however, a common theme that is less obvious: it appears that all of them had found their way on to the “disposition matrix”.
    The euphemisms of counter-terrorism

    When contemplating the euphemisms that have slipped into the lexicon since 9/11, the adjective Orwellian is difficult to avoid. But while such terms as extraordinary rendition, targeted killing and enhanced interrogation are universally known, and their true meanings – kidnap, assassination, torture – widely understood, the disposition matrix has not yet gained such traction.

    Since the Obama administration largely shut down the CIA’s rendition programme, choosing instead to dispose of its enemies in drone attacks, those individuals who are being nominated for killing have been discussed at a weekly counter-terrorism meeting at the White House situation room that has become known as Terror Tuesday. Barack Obama, in the chair and wishing to be seen as a restraining influence, agrees the final schedule of names. Once details of these meetings began to emerge it was not long before the media began talking of “kill lists”. More double-speak was required, it seemed, and before long the term disposition matrix was born.

    In truth, the matrix is more than a mere euphemism for a kill list, or even a capture-or-kill list. It is a sophisticated grid, mounted upon a database that is said to have been more than two years in the development, containing biographies of individuals believed to pose a threat to US interests, and their known or suspected locations, as well as a range of options for their disposal.

    It is a grid, however, that both blurs and expands the boundaries that human rights law and the law of war place upon acts of abduction or targeted killing. There have been claims that people’s names have been entered into it with little or no evidence. And it appears that it will be with us for many years to come.

    The background to its creation was the growing realisation in Washington that the drone programme could be creating more enemies than it was destroying. In Pakistan, for example, where the government estimates that more than 400 people have been killed in around 330 drone strikes since 9/11, the US has arguably outstripped even India as the most reviled foreign country. At one point, Admiral Mike Mullen, when chairman of the US joint chiefs of staff, was repo rted to be having furious rows over the issue with his opposite number in Pakistan, General Ashfaq Kayani.
    Admiral Mike Mullen (left), when chairman of the US joint chiefs of staff, was reported to have furious rows over the drone programme with his opposite number in Pakistan, General Ashfaq Kayani (right). Photograph: Javier Diaz/Reuters

    The term entered the public domain following a briefing given to the Washington Post before last year’s presidential election. “We had a disposition problem,” one former counter-terrorism official involved in the development of the Matrix told the Post. Expanding on the nature of that problem, a second administration official added that while “we’re not going to end up in 10 years in a world of everybody holding hands and saying ‘we love America'”, there needed to be a recognition that “we can’t possibly kill everyone who wants to harm us”.

    Drawing upon legal advice that has remained largely secret, senior officials at the US Counter-Terrorism Center designed a grid that incorporated the existing kill lists of the CIA and the US military’s special forces, but which also offered some new rules and restraints.

    Some individuals whose names were entered into the matrix, and who were roaming around Somalia or Yemen, would continue to face drone attack when their whereabouts become known. Others could be targeted and killed by special forces. In a speech in May, Obama suggested that a special court could be given oversight of these targeted killings.

    An unknown number would end up in the so-called black sites that the US still quietly operates in east Africa, or in prisons run by US allies in the Middle East or Central Asia. But for others, who for political reasons could not be summarily dispatched or secretly imprisoned, there would be a secret grand jury investigation, followed in some cases by formal arrest and extradition, and in others by “rendition to justice”: they would be grabbed, interrogated without being read their rights, then flown to the US and put on trial with a publicly funded defence lawyer.

    Orwell once wrote about political language being “designed to make lies sound truthful and murder respectable”. As far as the White House is concerned, however, the term disposition matrix describes a continually evolving blueprint not for murder, but for a defence against a threat that continues to change shape and seek out new havens.

    As the Obama administration’s tactics became more variegated, the British authorities co-operated, of course, but also ensured that the new rules of the game helped to serve their own counter-terrorism objectives.

    Paul Pillar, who served in the CIA for 28 years, including a period as the agency’s senior counter-terrorism analyst, says the British, when grappling with what he describes as a sticky case – “someone who is a violence-prone anti-western jihadi”, for example – would welcome a chance to pass on that case to the US. It would be a matter, as he puts it, of allowing someone else to have their headache.

    “They might think, if it’s going to be a headache for someone, let the Americans have the headache,” says Pillar. “That’s what the United States has done. The US would drop cases if they were going to be sticky, and let someone else take over. We would let the Egyptians or the Jordanians or whoever take over a very sticky one. From the United Kingdom point of view, if it is going to be a headache for anyone: let the Americans have the headache.”

    The four young Londoners – Berjawi, Sakr, Hashi and the Vietnamese-born convert – were certainly considered by MI5 and MI6 to be something of a headache. But could they have been seen so problematic – so sticky – that the US would be encouraged to enter their names into the Matrix?
    The home secretary’s special power

    Berjawi and Sakr were members of a looseknit group of young Muslims who were on nodding terms with each other, having attended the same mosques and schools and having played in the same five-a-side football matches in west London.

    A few members of this group came to be closely scrutinised by MI5 when it emerged that they had links with the men who attempted to carry out a wave of bombings on London’s underground train network on 21 July 2005. Others came to the attention of the authorities as a result of their own conduct. Mohammed Ezzouek, for example, who attended North Westminster community school with Berjawi, was abducted in Kenya and interrogated by British intelligence officers after a trip to Somalia in 2006; another schoolmate, Tariq al-Daour, has recently been released from jail after serving a sentence for inciting terrorism.

    As well as sharing their faith and, according to the UK authorities, jihadist intent, these young men had something else in common: they were all dual nationals. Berjawi was born in Lebanon and moved to London with his parents as an infant. Sakr was born in London, but was deemed to be a British-Egyptian dual national because his parents were born in Egypt. Ezzouek is British-Moroccan, while al-Daour is British-Palestinian.

    This left them vulnerable to a little-known weapon in the government’s counter-terrorism armoury, one that Theresa May has been deploying with increasing frequency since she became home secretary three years ago. Under the terms of a piece of the 2006 Immigration, Asylum and Nationality Act, and a previous piece of legislation dating to 1981, May has the power to deprive dual nationals of their British citizenship if she is “satisfied that deprivation is conducive to the public good”.
    The Home Office is extraordinarily sensitive about its use of the power, but it is known that Theresa May has deprived at least 17 people of their British citizenship. Photograph: Chris Ison/PA

    This power can be applied only to dual nationals, and those who lose their citizenship can appeal. The government appears usually to wait until the individual has left the country before moving to deprive them of their citizenship, however, and appeals are heard at the highly secretive special immigration appeals commission (SIAC), where the government can submit evidence that cannot be seen or challenged by the appellant.

    The Home Office is extraordinarily sensitive about the manner in which this power is being used. It has responded to Freedom of Information Act requests about May’s increased use of this power with delays and appeals; some information requested by the Guardian in June 2011 has still not been handed over. What is known is that at least 17 people have been deprived of their British citizenship at a stroke of May’s pen. In most cases, if not all, the home secretary has taken action on the recommendation of MI5. In each case, a warning notice was sent to the British home of the target, and the deprivation order signed a day or two later.

    One person who lost their British citizenship in this way was Anna Chapman, a Russian spy, but the remainder are thought to all be Muslims. Several of them – including a British-Pakistani father and his three sons – were born in the UK, while most of the others arrived as children. And some have been deprived of their citizenship not because they were assessed to be involved in terrorism or any other criminal activity, but because of their alleged involvement in Islamist extremism.

    Berjawi and Sakr both travelled to Somalia after claiming that they were being harassed by police in the UK, and were then stripped of their British citizenship. Several months later they were killed. The exact nature of any intelligence that the British government may have shared with Washington before their names were apparently entered into the disposition matrix is deeply secret: the UK has consistently refused to either confirm or deny that it shares intelligence in support of drone strikes, arguing that to do so would damage both national security and relations with the US government.

    More than 12 months after Sakr’s death, his father, Gamal, a businessman who settled in London 37 years ago, still cannot talk about his loss without breaking down and weeping. He alleges that one of his two surviving sons has since been harassed by police, and suspects that this boy would also have been stripped of his citizenship had he left the country. “It’s madness,” he cries. “They’re driving these boys to Afghanistan. They’re making everything worse.”

    Last year Gamal and his wife flew to Cairo, formally renounced their Egyptian citizenship, and on their return asked their lawyer to let it be known that their sons were no longer dual nationals. But while he wants his family to remain in Britain, the manner in which his son met his death has shattered his trust in the British government. “It was clearly directed from the UK,” he says. “He wasn’t just killed: he was assassinated.”
    The case of Mahdi Hashi

    Mahdi Hashi was five years old when his family moved to London from Somalia. He returned to the country in 2009, and took up arms for al-Shabaab in its civil war with government forces. A few months earlier he had complained to the Independent that he been under pressure to assist MI5, which he was refusing to do. Hashi was one of a few dozen young British men who have followed the same path: in one internet video clip, an al-Shabaab fighter with a cockney accent can be heard urging fellow Muslims “living in the lands of disbelief” to come and join him. It is thought that the identities of all these men are known to MI5.

    After the deaths of Berjawi and Sakr, Hashi was detained by al-Shabaab, who suspected that he was a British spy, and that he was responsible for bringing the drones down on the heads of his brothers-in-arms. According to his US lawyer, Harry Batchelder, he was released in early June last year. The militants had identified three other men whom they believed were the culprits, executing them shortly afterwards.

    Within a few days of Hashi’s release, May signed an order depriving him of his British citizenship. The warning notice that was sent to his family’s home read: “The reason for this decision is that the Security Service assess that you have been involved in Islamist extremism and present a risk to the national security of the United Kingdom due to your extremist activities.”

    Hashi decided to leave Somalia, and travelled to Djibouti with two other fighters, both Somali-Swedish dual nationals. All three were arrested in a raid on a building, where they had been sleeping on the roof, and were taken to the local intelligence agency headquarters. Hashi says he was interrogated for several weeks by US intelligence officers who refused to identify themselves. These men then handed him over to a team of FBI interrogators, who took a lengthy statement. Hashi was then hooded, put aboard an aircraft, and flown to New York. On arrival he was charged with conspiracy to support a terrorist organisation.
    Mahdi Hashi … arrested and taken to court in the US after having his British citizenship revoked. Photograph: Teri Pengilley

    Hashi has since been quoted in a news report as saying he was tortured while in custody in Djibouti. There is reason to doubt that this happened, however: a number of sources familiar with his defence case say that the journalist who wrote the report may have been misled. And the line of defence that he relied upon while being interrogated – that Somalia’s civil war is no concern of the US or the UK – evaporated overnight when al-Shabaab threatened to launch attacks in Britain.

    When Hashi was led into court in Brooklyn in January, handcuffed and dressed in a grey and orange prison uniform, he was relaxed and smiling. The 23-year-old had been warned that if he failed to co-operate with the US government, he would be likely to spend the rest of his life behind bars. But he appeared unconcerned.

    At no point did the UK government intervene. Indeed, it cannot: he is no longer British.

    When the Home Office was asked whether it knew Hashi was facing detention and forcible removal to the US at the point at which May revoked his citizenship, a spokesperson replied: “We do not routinely comment on individual deprivation cases, nor do we comment on intelligence issues.”

    The Home Office is also refusing to say whether it is aware of other individuals being killed after losing their British citizenship. On one point it is unambiguous, however. “Citizenship,” it said in a statement, “is a privilege, not a right.”
    The case of ‘B2′

    A glimpse of even closer UK-US counter-terrorism co-operation can be seen in the case of the Vietnamese-born convert, who cannot be named for legal reasons. Born in 1983 in the far north of Vietnam, he was a month old when his family travelled by sea to Hong Kong, six when they moved to the UK and settled in London, and 12 when he became a British citizen.

    While studying web design at a college in Greenwich, he converted to Islam. He later came into contact with the banned Islamist group al-Muhajiroun, and was an associate of Richard Dart, a fellow convert who was the subject of a TV documentary entitled My Brother the Islamist, and who was jailed for six years in April after travelling to Pakistan to seek terrorism training. In December 2010, this man told his eight-months-pregnant wife that he was going to Ireland for a few weeks. Instead, he travelled to Yemen and stayed for seven months. MI5 believes he received terrorism training from al-Qaida in the Arabian peninsula and worked on the group’s online magazine, Inspire.

    He denies this. Much of the evidence against him comes from a man called Ahmed Abdulkadir Warsame, a Somali who once lived in the English midlands, and who was “rendered to justice” in much the same way as Hashi after being captured in the Gulf of Aden two years ago. Warsame is now co-operating with the US Justice Department.

    On arrival back at Heathrow airport, the Vietnamese-born man was searched by police and arrested when a live bullet was found in his rucksack. A few months later, while he was free on bail, May signed an order revoking his British citizenship. Detained by immigration officials and facing deportation to Vietnam, he appealed to SIAC, where he was given the cipher B2. He won his case after the Vietnamese ambassador to London gave evidence in which he denied that he was one of their citizens. Depriving him of British citizenship at that point would have rendered him stateless, which would have been unlawful.

    Within minutes of SIAC announcing its decision and granting B2 unconditional bail, he was rearrested while sitting in the cells at the SIAC building. The warrant had been issued by magistrates five weeks earlier, at the request of the US Justice Department. Moments after that, the FBI announced that B2 had been charged with five terrorism offences and faced up to 40 years in jail. He was driven straight from SIAC to Westminster magistrates’ court, where he faced extradition proceedings.

    B2 continues to resist his removal to the US, with his lawyers arguing that he could have been charged in the UK. Indeed, the allegations made by the US authorities, if true, would appear to represent multiple breaches of several UK laws: the Terrorism Act 2000, the Terrorism Act 2006 and the Firearms Act 1968. Asked why B2 was not being prosecuted in the English courts – why, in other words, the Americans were having this particular headache, and not the British – a Crown Prosecution Service spokesperson said: “As this is a live case and the issue of forum may be raised by the defence in court, it would be inappropriate for us to discuss this in advance of the extradition hearing.”
    The rule of ‘imminent threat’

    In the coffee shops of west London, old friends of Berjawi, Sakr, Hashi and B2 are equally reluctant to talk, especially when questioned about the calamities that have befallen the four men. When they do, it is in a slightly furtive way, almost in whispers.

    Ezzouek explains that he never leaves the country any more, fearing he too will be stripped of his British citizenship. Al-Daour is watched closely and says he faces recall to prison whenever he places a foot wrong. Failing even to tell his probation officer that he has bought a car, for example, is enough to see him back behind bars. A number of their associates claim to have learned of the deaths of Berjawi and Sakr from MI5 officers who approached them with the news, and suggested they forget about travelling to Somalia.

    Last February, a 16-page US justice department memo, leaked to NBC News, disclosed something of the legal basis for the drone programme. Its authors asserted that the killing of US citizens is lawful if they pose an “imminent threat” of violent attack against the US, and capture is impossible. The document adopts a broad definition of imminence, saying no evidence of a specific plot is needed, and remains silent on the fate that faces enemies who are – or were – citizens of an allied nation, such as the UK.
    Londoner Bilal Berjawi died in a drone strike. Photograph: Sipa Press/Rex Features

    But if the Obama administration is satisfied that the targeted killing of US citizens is lawful, there is little reason to doubt that young men who have been stripped of their British citizenship, and who take up arms in Somalia or Yemen or elsewhere, will continue to find their way on to the disposition matrix, and continue to be killed by missiles fired from drones hovering high overhead, or rendered to courts in the US.

    And while Obama says he wants to curtail the drone programme, his officials have been briefing journalists that they believe the operations are likely to continue for another decade, at least. Given al-Qaida’s resilience and ability to spread, they say, no clear end is in sight.

    Ian Cobain
    The Guardian, Sunday 14 July 2013 19.00 BST

    Find this story at 14 July 2013

    © 2013 Guardian News and Media Limited or its affiliated companies.

    U.S. military drone surveillance is expanding to hot spots beyond declared combat zones

    A U.S. Air Force MQ-1B Predator drone sits on the flightline at Incirlik… (Courtesy of U.S. Air Force/ )

    The steel-gray U.S. Air Force Predator drone plunged from the sky, shattering on mountainous terrain near the Iraq-Turkey border. For Kurdish guerrillas hiding nearby, it was an unexpected gift from the propaganda gods.

    Fighters from the Kurdistan Workers’ Party, or PKK, filmed the charred wreckage on Sept. 18 and posted a video on YouTube. A narrator bragged unconvincingly that the group had shot down the drone. But for anyone who might doubt that the flying robot was really American, the video zoomed in on mangled parts stamped in English and bearing the label of the manufacturer, San Diego-based General Atomics.

    For a brief moment, the crash drew back the curtain on Operation Nomad Shadow, a secretive U.S. military surveillance program. Since November 2011, the U.S. Air Force has been flying unarmed drones from Incirlik Air Base in Turkey in an attempt to suppress a long-simmering regional conflict. The camera-equipped Predators hover above the rugged border with Iraq and beam high-resolution imagery to the Turkish armed forces, helping them pursue PKK rebels as they slip back and forth across the mountains.

    As the Obama administration dials back the number of drone attacks in Afghanistan, Pakistan and Yemen, the U.S. military is shifting its huge fleet of unmanned aircraft to other hot spots around the world. This next phase of drone warfare is focused more on spying than killing and will extend the Pentagon’s robust surveillance networks far beyond traditional, declared combat zones.

    Over the past decade, the Pentagon has amassed more than 400 Predators, Reapers, Hunters, Gray Eagles and other high-altitude drones that have revolutionized counterterrorism operations. Some of the unmanned aircraft will return home with U.S. troops when they leave Afghanistan. But many of the drones will redeploy to fresh frontiers, where they will spy on a melange of armed groups, drug runners, pirates and other targets that worry U.S. officials.

    Elsewhere in the Middle East, the U.S. Air Force has drone hubs in Qatar and the United Arab Emirates to conduct reconnaissance over the Persian Gulf. Twice since November, Iran has scrambled fighter jets to approach or fire on U.S. Predator drones that edged close to Iranian airspace.

    In Africa, the U.S. Air Force began flying unarmed drones over the Sahara five months ago to track al-Qaeda fighters and rebels in northern Mali. The Pentagon has also set up drone bases in Ethiopia, Djibouti and Seychelles. Even so, the commander of U.S. forces in Africa told Congress in February that he needed a 15-fold increase in surveillance, reconnaissance and intelligence-gathering on the continent.

    In an April speech, Deputy Defense Secretary Ashton B. Carter said the Pentagon is planning for the first time to send Reaper drones — a bigger, faster version of the Predator — to parts of Asia other than Afghanistan. He did not give details. A Defense Department spokeswoman said the military “hasn’t made any final decisions yet” but is “committed to increasing” its surveillance in Asia and the Pacific.

    In South and Central America, U.S. military commanders have long pined for drones to aid counternarcotics operations. “Surveillance drones could really help us out and really take the heat and wear and tear off of some of our manned aviation assets,” Marine Gen. John F. Kelly, chief of the U.S. Southern Command, said in March.

    One possible destination for more U.S. drones is Colombia. Last year, Colombian armed forces killed 32 “high-value narco-terrorists” after the U.S. military helped pinpoint the targets’ whereabouts with manned surveillance aircraft and other equipment, according to Jose A. Ruiz, a Southern Command spokesman.

    The U.S. military has occasionally operated small drones — four-foot-long ScanEagles, which are launched by a catapult — in Colombia. But with larger drones such as Predators and Reapers, U.S. forces could greatly expand the range and duration of their airborne searches for drug smugglers.

    An invitation from Turkey

    In the fall of 2011, four disassembled Predator drones arrived in crates at Incirlik Air Base in southern Anatolia, a joint U.S.-Turkish military installation.

    The drones came from Iraq, where for the previous four years they had been devoted to surveilling that country’s northern mountains. Along with manned U.S. aircraft, the Predators tracked the movements of PKK fighters, sharing video feeds and other intelligence with the Turkish armed forces.

    The Kurdish group has long fought to create an autonomous enclave in Turkey, launching cross-border attacks from its hideouts in northern Iraq. Turkey has responded with airstrikes and artillery attacks but has also sent ground troops into Iraq, further destabilizing an already volatile area. The Turkish and U.S. governments both classify the PKK as a terrorist group.

    Turkey’s leaders had feared that U.S. cooperation against the PKK would wither after the Americans left Iraq. So they invited them to re-base the drones on Turkish soil and continue the spying mission from there.

    Neither side has been eager to publicize the arrangement. The Obama administration has imposed a broad cone of silence on its drone programs worldwide. Pentagon officials declined interview requests about Operation Nomad Shadow.

    The Turkish government has acknowledged the presence of Predators on its territory, but the robotic planes are a sensitive subject. A global survey released Thursday by the Pew Research Center found that 82 percent of Turks disapprove of the Obama administration’s international campaign of drone attacks against extremists.

    Officials with the Turkish Embassy in Washington declined to comment for this report.

    Pilots 6,000 miles away

    The drones occupy a relatively tiny corner of the sprawling base at Incirlik, according to interviews with other officials and public documents that shed light on Nomad Shadow.

    The operation is staffed by about three dozen personnel from the U.S. Air Force’s 414th Expeditionary Reconnaissance Squadron and private contractor Battlespace Flight Services.

    The drones, which began flying in November 2011, are sheltered in an unobtrusive hangar converted from an abandoned “hush house,” a jet-engine testing facility outfitted with noise suppression equipment.

    “It was tight, but we could fit four aircraft inside the hangar and close the doors,” said a former Air Force official involved in Nomad Shadow who spoke on the condition of anonymity because of the sensitivity of the operation.

    For most of their time aloft, the remote-control Predators are flown via satellite link by pilots and sensor operators stationed about 6,000 miles away, at Whiteman Air Force Base in Missouri.

    While in Turkish airspace, the drones cannot spy and must turn off their high-tech cameras and sensors, according to rules set by the Turkish government. It takes the sluggish Predators, with a maximum air speed of 135 mph, about five hours to reach the Iraqi border.

    The Iraqi government permits the overflights. Once in Iraq, the Predators usually fly a rectangular route known as “the box” for up to 12 hours each mission as they beam video and other intelligence to Missouri.

    U.S. analysts view and evaluate the footage before transmitting it to a joint U.S.-Turkish intelligence “fusion cell” in Ankara, the capital. There’s usually a built-in delay of at least 15 to 20 minutes. That would give a drone enough time to leave the vicinity if Turkish authorities decided to launch artillery rounds or airstrikes against detected PKK targets, the former Air Force official said.

    From the outset, some U.S. officials have worried about the potential for botched incidents.

    In December 2011, Turkish jets bombed a caravan of suspected PKK fighters crossing from Iraq into Turkey, killing 34 people. The victims were smugglers, however, not terrorists — a blunder that ignited protests across Turkey.

    The Wall Street Journal reported last year that American drone operators had alerted the Turkish military after a Predator spotted the suspicious caravan. Rather than ask for a closer look, Turkish officials waved off the drone and launched the attack soon after, the paper said. Turkey’s leaders denied the report, saying they decided to attack based on their own intelligence.

    The incident exacerbated simmering frustrations among officials in Ankara and Washington.

    The Turkish government has long pressed the Obama administration to devote more flight hours to the operation and to sell Turkey a fleet of armed Reaper drones. But U.S. officials and lawmakers have resisted both requests.

    The Pentagon has expressed concern that the Turkish military wants the fruits of the drone surveillance but has been unwilling to consult with Americans on the best ways to exploit it. “There have been a lot of U.S. attempts to help the Turks get better at fusing the intelligence with an operation,” said a former U.S. defense official who spoke on the condition of anonymity to give a candid assessment.

    At the same time, the former U.S. official called Nomad Shadow an overall success. The constant stream of surveillance footage has prevented PKK attacks, he said, and has enabled the Turkish military to carry out more-limited, precise counterterrorism operations instead of sending large numbers of troops into northern Iraq.

    “It’s been extremely effective in preventing cross-border operations by the Turks,” the former official said.

    Clues in the crash report

    On Sept. 17, 2012, Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, visited Ankara to see Gen. Necdet Özel, chief of the general staff of the Turkish armed forces.

    As other Turkish officials had done in previous talks, Özel pressed Dempsey for more help against the PKK, including more drone flights, according to Turkish media accounts of the meeting.

    The next day, in a fit of unlucky timing, a Predator on a routine patrol experienced a sudden and complete loss of power. Drone operators at Whiteman Air Force Base could not communicate with or control the aircraft.

    The drone nose-dived, dropping 11,000 feet in about four minutes before crashing into an uninhabited region, according to a U.S. Air Force accident investigation report obtained by The Washington Post under the Freedom of Information Act.

    Before releasing the report, the Air Force redacted all geographic references to the location of the crash or where the drone was based. But parts of the report contain clues that make clear that the drone was on a Nomad Shadow mission in northern Iraq.

    Transcripts of interviews with the drone’s ground crew mention that they were deployed to Incirlik with the 414th Expeditionary Reconnaissance Squadron. Another document identified the lost aircraft as NOMAD 01.

    But the strongest evidence can be found in an appendix to the report with photographs of the accident site.

    The images are outtakes from the propaganda video that the PKK posted on YouTube the day after the crash. The photos show several damaged Predator pieces. U.S. military censors carefully blocked out the faces of guerrillas posing with the wreckage.

    By Craig Whitlock,July 20, 2013

    Find this story at 20 July 2013

    © 2013 The Washington Post

    Lockerbie bomber release linked to arms deal, according to secret letter

    The release of the Lockerbie bomber was linked by the Government to a £400 million arms-export deal to Libya, according to secret correspondence obtained by The Sunday Telegraph.

    An email sent by the then British ambassador in Tripoli details how a prisoner transfer agreement would be signed once Libya “fulfils its promise” to buy an air defence system.

    The disclosure is embarrassing for members of the then Labour government, which always insisted that Abdelbaset al-Megrahi’s release was not linked to commercial deals.

    The email, which contained a briefing on the UK’s relations with Colonel Muammar Gaddafi’s regime, was sent on June 8 2008 by Sir Vincent Fean, the then UK ambassador, to Tony Blair’s private office, ahead of a visit soon after he stepped down as prime minister.

    Mr Blair flew to Tripoli to meet Gaddafi on June 10, in a private jet provided by the dictator, one of at least six visits Mr Blair made to Libya after quitting Downing Street.

    The briefing, which runs to 1,300 words, contains revealing details about how keen Britain was to do deals with Gaddafi. It also suggests that:
    Related Articles
    Blair helped Gaddafi in £1bn legal row 04 Aug 2013
    Convicted Lockerbie bomber Megrahi dies in Libya 20 May 2012
    Libya minister says Lockerbie case is ‘closed’ 28 Feb 2013
    Libya: Tony Blair and Gaddafi’s secret meetings 17 Sep 2011
    ‘If Megrahi is sent to Scotland, he will die’ 28 Aug 2011
    Lockerbie bomber al-Megrahi maintains innocence 30 Aug 2011

    • the UK made it a key objective for Libya to invest its £80  billion sovereign wealth fund through the City of London

    • the UK was privately critical of then President George Bush for “shooting the US in the foot” by continuing to put a block on Libyan assets in America, in the process scuppering business deals

    • the Department for International Development was eager to use another Libyan fund worth £130 million to pay for schemes in Sierra Leone and other poverty-stricken countries.

    The release of Megrahi in August 2009 caused a huge furore, with the Government insisting he had been released on compassionate grounds because he was suffering from terminal cancer, and that the decision was taken solely by the Scottish government.

    Megrahi had been convicted in 2001 of the murder of 270 people when PanAm flight 103 from London to New York blew up over Lockerbie in Scotland in 1988. It remains Britain’s single worst terrorist atrocity.

    Libya had been putting pressure on the UK to release Megrahi and in May 2007, just before he left Downing Street, Mr Blair travelled to Sirte to meet Gaddafi and Al-Baghdadi Ali al-Mahmoudi, Libya’s then prime minister.

    At that meeting, according to Sir Vincent’s email, Mr Blair and Mr Baghdadi agreed that Libya would buy the missile defence system from MBDA, a weapons manufacturer part-owned by BAE Systems. The pair also signed a memorandum of understanding (MoU) for a prisoner transfer agreement (PTA), which the Libyans believed would pave the way for Megrahi’s release.

    The British government initially intended the agreement to explicitly exclude Megrahi. However, ministers relented under pressure from Libya.

    In December 2007, Jack Straw, then justice secretary, told his Scottish counterpart that he had been unable to secure an exclusion, but said any application to transfer Megrahi under the agreement would still have to be signed off by Scottish ministers.

    With Mr Blair returning in June 2008 — as a guest of Gaddafi on his private jet — the government appears to have used the chance to press its case for the arms deal to be sealed. At the time, Britain was on the brink of an economic and banking crisis, and Libya, through the Libyan Investment Authority, had billions of pounds in reserves.

    Sir Vincent gave Mr Blair’s office a briefing on the state of relations with Libya. The email suggests that Mr Blair was being used as a conduit.

    Sir Vincent wrote: “There is one bilateral issue which I hope TB [Tony Blair] can raise, as a legacy issue. On 29 May 07 in Sirte, he and Libya’s PM agreed that Libya would buy an air defence system (Jernas) from the UK (MBDA). One year on, MBDA are now back in Tripoli (since 8 June) aiming to agree and sign the contract now — worth £400 million, and up to 2,000 jobs in the UK.

    “Saif [Gaddafi’s son] says they are to come back to conclude; but there is opposition within the Libyan armed forces, from those in the Russian defence equipment camp. We think we have Col Q’s [Gaddafi’s] goodwill for this contract: it would be very helpful if he expressed it more clearly. This issue can also be raised with Libya’s PM, and the Planning Minister. It was PM Baghdadi who told the media on 29 May 07 that Libya would buy British.

    “Linked (by Libya) is the issue of the 4 bilateral Justice agreements about which TB signed an MoU with Baghdadi on 29 May. The MoU says they will be negotiated within the year: they have been. They are all ready for signature in London as soon as Libya fulfils its promise on Jernas.”

    The PTA was signed in November 2008 by Bill Rammell, a foreign office minister.

    Megrahi was diagnosed with prostate cancer and released in August 2009 on compassionate grounds when he was given three months to live. He died in May 2012.

    The Libyans never signed the arms deal, MBDA said yesterday. “MBDA operates, at all times, strictly within the limits of clearly defined export licensing regimes issued by the relevant Government authorities,” a spokesman said.

    “All MBDA’s dealings with Libya were purely commercial and in accordance with the EU directive at the time.”

    The disclosure of the email, which was obtained by The Sunday Telegraph as a result of a Freedom of Information request, angered the relatives of victims of the bombing.

    Pam Dix, whose brother Peter died at Lockerbie, said: “It appears from this email that the British government was making a clear correlation between arms dealing with Libya and the signing of the prisoner transfer agreement.

    “We were told Megrahi’s release was a matter strictly for the Scottish government but this shows the dirty dealing that was going on behind the scenes.”

    Lord Mandelson, who was business secretary when Megrahi was released, said he was unaware of any possible links between commercial deals and negotiations over a release.

    He said: “Based on the information that I was given at the time, I made clear the government’s position. I was not aware of the correspondence covered in this FOI request.”

    Jack Straw, who negotiated the PTA, said no deals were done over Megrahi, and it was always a decision for the Scottish government.

    The email from Sir Vincent also informed Mr Blair on the latest stage of Megrahi’s bid for release, and urged him to fend off any demands that he be sent back. By 2008, Megrahi was appealing against his conviction for mass murder.

    “Col Q may very well raise Megrahi,” wrote Sir Vincent, “Saif [Gaddafi’s son] raised the case … last week. It is now before the Scottish Appeal Court and sub-judice.

    “While the appeal is current, no request to invoke the PTA can be made in that case. Were the appeal to fail and a request for Megrahi’s return to Libya were to be made subsequently, it would be for Scottish ministers to decide on any such request — not a question for HMG [Her Majesty’s Government].”

    A spokesman for Mr Blair said that the prisoner transfer agreements did not relate to Megrahi. The email, he added, did not show “that the UK government was trying to link the defence deal and Megrahi”.

    He said: “Actually it shows the opposite — that any linkage was from the Libyan side.

    “As far as we’re aware there was no linkage on the UK side. What the email in fact shows is that, consistent with what we have always said, it was made clear to the then Libyan leader that the release of Megarahi was a matter for Scotland and was not a matter for Her Majesty’s Government.

    “As we’ve said before, the subjects of the conversations during Mr Blair’s occasional visits was [sic] primarily Africa, as Libya was for a time head of the African Union; but also the Middle East and how Libya should reform and open up.

    “Of course the Libyans, as they always did, raised Megrahi. Mr Blair explained, as he always did, in office and out of it, that it was not a decision for the UK government but for the Scottish Executive [formerly the name for the Scottish government].”

    By Robert Mendick, and Edward Malnick
    9:03PM BST 27 Jul 2013

    Find this story at 27 July 2013

    © Copyright of Telegraph Media Group Limited 2013

    “Just Sign Here” Unfair Trials Based on Confessions to the Police in Morocco

    Morocco/Western Sahara: Dubious Confessions, Tainted Trials
    No Fair Trials Until Courts Reject Statements Obtained by Torture, Abuse
    June 21, 2013
    What Morocco Should Do
    Hold police accountable when they are found to torture or ill-treat detainees to obtain confessions
    Ensure that no statements obtained through violence and coercion are allowed as evidence in court
    What Other Governments and Institutions that Provide Assistance to Morocco Should Do
    Offer training and education to judges and forensic doctors in Morocco in investigating and evaluating claims of torture and ill-treatment

    Men convicted and imprisoned by Moroccan courts after unfair trials that relied on their contested police statements

    (Rabat) –Morocco’s courts are convicting defendants based on confessions they claim were obtained through torture or falsified by police, Human Rights Watch said in a report released today. The country’s judicial reform agenda needs to include stronger safeguards to ensure that courts discard as evidence any statement made to the police under torture or ill-treatment.

    The 100-page report, “‘Just Sign Here’: Unfair Trials Based on Confessions to the Police in Morocco,” examined five trials between 2009 and 2013 of a total of 77 people – including protesters seeking reform, Western Sahara activists, and persons accused of plotting terrorism. Human Rights Watch found that in the cases examined, judges failed to investigate seriously contentions by defendants that their confessions were obtained through illegal means and then used as the main, if not the sole, basis for conviction. This failure by the courts effectively encourages the police to use torture, ill-treatment, and falsification to obtain statements, Human Rights Watch said.

    “Once the Moroccan police have your statement in hand, you are not at the start of an even-handed process to reach the truth,” said Sarah Leah Whitson, Middle East and North Africa director of Human Rights Watch. “You are on an express train to a guilty verdict.”

    Moroccan law criminalizes torture and prohibits courts from using statements when obtained under “violence or coercion.” Yet, in the five trials Human Rights Watch examined, the courts did not diligently examine defendants’ claims of police abuse before admitting confessions as the main incriminating evidence. The courts convicted 76 of the 77 defendants, 38 of whom remain in prison.

    Human Rights Watch observed trials, examined court documents, interviewed defendants and defense lawyers, and included in the report extensive information received from the Moroccan authorities.

    Several defendants described to Human Rights Watch being beaten, kicked, slapped, and threatened by the police during their interrogation, and being forced to sign statements they were not allowed to read and that they later repudiated in court. Others who were able to read and sign their statements said that authorities later doctored them to implicate them in crimes.

    Moroccan law provides the right to contact a lawyer while in police custody, but in the vast majority of cases Human Rights Watch examined, defendants had no access to a lawyer before or during their interrogation, or when the police presented them with their statement to sign.

    When the defendants later told the investigating or trial judge about physical abuse, the judges opened no inquiry and sometimes dismissed the allegations, saying that they observed no marks on the defendant’s body or that the person should have made the allegations earlier. In the one case where the prosecutor ordered a medical examination of the defendants, all the evidence suggested that the examination was superficial and well below what international standards require.

    Moroccan judges should scrutinize police statements more aggressively when defendants repudiate them, and summon all pertinent witnesses, including, where relevant, the police agents who prepared the incriminating statements. Closer scrutiny of police statements would also signal to police that they must collect evidence through lawful means that exclude torture, Human Rights Watch said.

    In August 2009, King Mohammed VI announced a major effort to overhaul the judiciary. The 2011 constitution contains a number of articles that are stated as intending to strengthen judicial independence and defendants’ rights and to ban torture and arbitrary detention. Since 2012, a High Commission of National Dialogue on Reforming the Judiciary has been tasked by the king with drafting a charter on judicial reform, scheduled to be released in the coming weeks.

    “It is not always easy to determine the truth when a defendant claims that the police coerced him to sign a false confession,” Whitson said. “But only when judges show the will, skill, and courage to do so – and to discard confessions that are suspect – can we say that judicial reform is really under way.”

    Human Rights Watch examined the convictions of 25 Sahrawis in February 2013 for attacking security forces who were dismantling a social protest camp in Gdeim Izik, Western Sahara; 6 members of the February 20 social protest movement in September 2012 in connection with a demonstration in Casablanca; 2 union activists and 8 youths in June 2011 in connection with a demonstration in Bouarfa; an outspoken boxer in September 2010 on dubious fraud charges; and 35 men in July 2009 for being part of an alleged terrorist conspiracy known as the “Belliraj” affair.

    The boxer, Zakaria Moumni, described how the police presented his statement to him after beating him severely during three days of incommunicado detention:

    They put documents in front of me, but they were covering the top part of the page. I said I wanted to read what I was signing. They said, “Just sign here, you’ll get your stuff back and be free to go.” When I insisted on reading it, they put the blindfold back on, stepped on my feet, and threatened to send me back to where I had come from… At that point, I signed many things without knowing what they were.

    The police then brought Moumni to court, where he was tried the same day on dubious charges of fraud. Moumni later told Human Rights Watch that he showed the judge bruises and cuts on his shins, explaining that his interrogators had struck him with iron rods. The judge did not respond to this, Moumni said. Sentenced to three years in prison, Moumni discovered only later that the documents he had signed before the police included a detailed confession and a waiver of his right to a lawyer at trial.

    The Moroccan authorities should take the following steps to ensure fairer trials and combat torture and ill-treatment:
    Ensure that anyone placed in pre-arraignment detention is informed immediately of the right to a lawyer, including the right to be visited promptly by a lawyer;
    Ensure that the court gives defendants a thorough opportunity to read their police statement and challenge any alleged inaccuracies, and to raise at any point in the investigation and the trial any ill-treatment or torture in police custody;
    Ensure that courts examine all torture allegations by defendants and, when they are credible, discard as evidence any statements made under torture, as required by Moroccan law, and refer the alleged torture, a criminal offense, to the prosecuting authorities;
    Revise article 290 of the Code of Penal Procedure, which gives statements prepared by police inherent credibility in cases involving offenses that incur prison sentences under five years. This law places the burden of proof on the defendant to show that the statement prepared by the police is false; the law should be revised to treat a police statement the same as all other evidence, with no inference about its credibility.

    Moroccan authorities should in addition free the 21 defendants in the Gdeim Izik case and the 17 defendants in the Belliraj case currently in prison, or grant them a new and fair trial. For the Gdeim Izik defendants, any retrials should take place before a civilian court rather than in the military court that first convicted them. If they are retried, the courts should examine the defendants’ allegations of torture regardless of whether physical traces of possible torture are visible, and ensure that no statement obtained through violence or coercion is admitted into evidence.

    June 21, 2013

    Find this story at 21 June 2013

    Download the full report

    © 2013 Human Rights Watch

    NSA and GCHQ – too close for comfort

    It makes sense for the US and UK to co-operate and share, but payments between the two agencies must mean influence

    ‘One budget report states GCHQ (right) will spend money according to NSA and UK government requirements – in that order.’ Photographs: EPA/NSA; Barry Batchelor/PA

    The intelligence files leaked by the whistleblower Edward Snowden have highlighted two major issues that are specific to Britain. Neither have been welcomed by the government or our security agencies, and most of the political classes are trying to ignore them too. The first involves tactics.

    Thanks to Snowden, we have found out about techniques that have given GCHQ the capability to suck up vast amounts of people’s personal data from the cables that carry the internet in and out of the country.

    The programme, called Tempora, is unquestionably ingenious, but it is underpinned by laws that are outdated and poorly worded.

    Even the most sympathetic of scrutinising bodies – the parliamentary intelligence and security committee (ISC) – has put a question mark over this legislative framework.

    The second issue involves British strategic thinking. The files seen by the Guardian are explicit about the importance of the UK’s relationship with the US, and the desire for GCHQ to be as tightly bound as possible to its US counterpart, the National Security Agency. They will doubtless be welcomed by anyone who believes that the need for a “special relationship” with Washington – which has underpinned UK foreign policy since the second world war – is pre-eminent.

    But in the light of these latest revelations, it is also right to assess the price we are paying for this relationship, and the compromises that come with it.

    Without Snowden, we would not have known that the NSA pays GCHQ tens of millions of pounds a year.

    These are the payments we actually know about – there may be others, because so many of our intelligence projects and programmes are historic and interlinked.

    Yet none of the bodies that have notional responsibility for overseeing the money flowing into and out of GCHQ – the National Audit Office (NAO), the public accounts committee, the ISC – have ever mentioned these sums.

    The NAO and the public accounts committee almost certainly didn’t know about them. It is worth dwelling on this. The US government is paying money to support Britain’s most important intelligence-gathering service. Would this be regarded as normal, or acceptable, in any other institution, such as the police or the military, both of whom work closely with the US?

    And what does the US expect to get from this investment? Quite a bit, seems to be the answer. The influence the NSA has over GCHQ seems considerable. Whether this is down to the money, or the pressure a senior partner in a relationship can bring to bear, is not entirely clear.

    Common sense suggests it’s a mixture of the two. What is clear is this: the Snowden files are littered with remarks from GCHQ senior and middle managers worrying about the NSA “ask” and whether the British agency is doing enough to meet it.

    One budget report states GCHQ will spend money according to NSA and UK government requirements – in that order. Does GCHQ feel compromised by this? If it does, it seems the imperative of keeping close to the Americans is overriding. That appears to be the view of the Cabinet Office too.

    Asked about the NSA payments, the American demands and the concerns that the UK might be vulnerable to being pushed about, the Cabinet Office said: “In a 60-year close alliance it is entirely unsurprising that there are joint projects in which resources and expertise are pooled, but the benefits flow in both directions.”

    It may be entirely unsurprising in Whitehall that our subservience has been institutionalised in this way, but everyone else is entitled to ask whether that makes it healthy or right.

    People are also entitled to ponder whether the price of keeping the Americans so close might involve undertaking some of their “dirty work” – developing intelligence-gathering techniques that are beyond the US legislative and judicial framework, but can be accommodated within ours.

    Critics of the ISC argue it is simply too under-resourced and uncritical to give plausible answers to such questions; and the pronouncements of ministers who sign hundreds of warrants every year are hardly reassuring.

    It would be naive to think that the US and the UK could work – or would want to work – in isolation of each other when its government-class shares many of the same perspectives on the world.

    There are many advantages to sharing intelligence. But sovereignty and independence are important too. The NSA and GCHQ seem deeply enmeshed and interlinked, but the line between the agencies needs to be drawn more clearly.

    Follow Nick Hopkins by emailBeta

    Nick Hopkins
    theguardian.com, Thursday 1 August 2013 16.04 BST

    Find this story at 1 August 2013

    © 2013 Guardian News and Media Limited or its affiliated companies.

    Exclusive: NSA pays £100m in secret funding for GCHQ

    • Secret payments revealed in leaks by Edward Snowden
    • GCHQ expected to ‘pull its weight’ for Americans
    • Weaker regulation of British spies ‘a selling point’ for NSA

    The NSA paid £15.5m towards redevelopments at GCHQ’s site in Bude, north Cornwall, which intercepts communications from the transatlantic cables that carry internet traffic. Photograph: Kieran Doherty/Reuters

    The US government has paid at least £100m to the UK spy agency GCHQ over the last three years to secure access to and influence over Britain’s intelligence gathering programmes.

    The top secret payments are set out in documents which make clear that the Americans expect a return on the investment, and that GCHQ has to work hard to meet their demands. “GCHQ must pull its weight and be seen to pull its weight,” a GCHQ strategy briefing said.

    The funding underlines the closeness of the relationship between GCHQ and its US equivalent, the National Security Agency. But it will raise fears about the hold Washington has over the UK’s biggest and most important intelligence agency, and whether Britain’s dependency on the NSA has become too great.

    In one revealing document from 2010, GCHQ acknowledged that the US had “raised a number of issues with regards to meeting NSA’s minimum expectations”. It said GCHQ “still remains short of the full NSA ask”.

    Ministers have denied that GCHQ does the NSA’s “dirty work”, but in the documents GCHQ describes Britain’s surveillance laws and regulatory regime as a “selling point” for the Americans.

    The papers are the latest to emerge from the cache leaked by the American whistleblower Edward Snowden, the former NSA contractor who has railed at the reach of the US and UK intelligence agencies.

    Snowden warned about the relationship between the NSA and GCHQ, saying the organisations have been jointly responsible for developing techniques that allow the mass harvesting and analysis of internet traffic. “It’s not just a US problem,” he said. “They are worse than the US.”

    As well as the payments, the documents seen by the Guardian reveal:

    • GCHQ is pouring money into efforts to gather personal information from mobile phones and apps, and has said it wants to be able to “exploit any phone, anywhere, any time”.

    • Some GCHQ staff working on one sensitive programme expressed concern about “the morality and ethics of their operational work, particularly given the level of deception involved”.

    • The amount of personal data available to GCHQ from internet and mobile traffic has increased by 7,000% in the past five years – but 60% of all Britain’s refined intelligence still appears to come from the NSA.

    • GCHQ blames China and Russia for the vast majority of cyber-attacks against the UK and is now working with the NSA to provide the British and US militaries with a cyberwarfare capability.

    The details of the NSA payments, and the influence the US has over Britain, are set out in GCHQ’s annual “investment portfolios”. The papers show that the NSA gave GCHQ £22.9m in 2009. The following year the NSA’s contribution increased to £39.9m, which included £4m to support GCHQ’s work for Nato forces in Afghanistan, and £17.2m for the agency’s Mastering the Internet project, which gathers and stores vast amounts of “raw” information ready for analysis.

    The NSA also paid £15.5m towards redevelopments at GCHQ’s sister site in Bude, north Cornwall, which intercepts communications from the transatlantic cables that carry internet traffic. “Securing external NSA funding for Bude has protected (GCHQ’s core) budget,” the paper said.

    In 2011/12 the NSA paid another £34.7m to GCHQ.

    The papers show the NSA pays half the costs of one of the UK’s main eavesdropping capabilities in Cyprus. In turn, GCHQ has to take the American view into account when deciding what to prioritise.

    A document setting out GCHQ’s spending plans for 2010/11 stated: “The portfolio will spend money supplied by the NSA and UK government departments against agreed requirements.”

    Other documents say the agency must ensure there has been “an appropriate level of contribution … from the NSA perspective”.

    The leaked papers reveal that the UK’s biggest fear is that “US perceptions of the … partnership diminish, leading to loss of access, and/or reduction in investment … to the UK”.

    When GCHQ does supply the US with valuable intelligence, the agency boasts about it. In one review, GCHQ boasted that it had supplied “unique contributions” to the NSA during its investigation of the American citizen responsible for an attempted car bomb attack in Times Square, New York City, in 2010.

    No other detail is provided – but it raises the possibility that GCHQ might have been spying on an American living in the US. The NSA is prohibited from doing this by US law.

    Asked about the payments, a Cabinet Office spokesman said: “In a 60-year alliance it is entirely unsurprising that there are joint projects in which resources and expertise are pooled, but the benefits flow in both directions.”

    A senior security source in Whitehall added: “The fact is there is a close intelligence relationship between the UK and US and a number of other countries including Australia and Canada. There’s no automaticity, not everything is shared. A sentient human being takes decisions.”

    Although the sums represent only a small percentage of the agencies’ budgets, the money has been an important source of income for GCHQ. The cash came during a period of cost-cutting at the agency that led to staff numbers being slashed from 6,485 in 2009 to 6,132 last year.

    GCHQ seems desperate to please its American benefactor and the NSA does not hold back when it fails to get what it wants. On one project, GCHQ feared if it failed to deliver it would “diminish NSA’s confidence in GCHQ’s ability to meet minimum NSA requirements”. Another document warned: “The NSA ask is not static and retaining ‘equability’ will remain a challenge for the near future.”

    In November 2011, a senior GCHQ manager working in Cyprus bemoaned the lack of staff devoted to one eavesdropping programme, saying: “This is not sustainable if numbers reduce further and reflects badly on our commitments to the NSA.”

    The overriding necessity to keep on the right side of the US was revealed in a UK government paper that set out the views of GCHQ in the wake of the 2010 strategic defence and security review. The document was called: “GCHQ’s international alliances and partnerships: helping to maintain Britain’s standing and influence in the world.” It said: “Our key partnership is with the US. We need to keep this relationship healthy. The relationship remains strong but is not sentimental. GCHQ must pull its weight and be seen to pull its weight.”

    Astonishingly, the document admitted that 60% of the UK’s high-value intelligence “is based on either NSA end-product or derived from NSA collection”. End product means official reports that are distillations of the best raw intelligence.

    Another pitch to keep the US happy involves reminding Washington that the UK is less regulated than the US. The British agency described this as one of its key “selling points”. This was made explicit two years ago when GCHQ set out its priorities for the coming years.

    “We both accept and accommodate NSA’s different way of working,” the document said. “We are less constrained by NSA’s concerns about compliance.”

    GCHQ said that by 2013 it hoped to have “exploited to the full our unique selling points of geography, partnerships [and] the UK’s legal regime”.

    However, there are indications from within GCHQ that senior staff are not at ease with the rate and pace of change. The head of one of its programmes warned the agency was now receiving so much new intelligence that its “mission management … is no longer fit for purpose”.

    In June, the government announced that the “single intelligence account” fund that pays for GCHQ, MI5 and MI6 would be increased by 3.4% in 2015/16. This comes after three years in which the SIA has been cut from £1.92bn to £1.88bn. The agencies have also been told to make £220m savings on existing programmes.

    The parliamentary intelligence and security committee (ISC) has questioned whether the agencies were making the claimed savings and said their budgets should be more rigorously scrutinised to ensure efficiencies were “independently verifiable and/or sustainable”.

    The Snowden documents show GCHQ has become increasingly reliant on money from “external” sources. In 2006 it received the vast majority of its funding directly from Whitehall, with only £14m from “external” funding. In 2010 that rose to £118m and by 2011/12 it had reached £151m. Most of this comes from the Home Office.

    Follow Julian Borger by emailBeta
    Nick Hopkins and Julian Borger
    The Guardian, Thursday 1 August 2013 16.04 BST

    Find this story at 1 August 2013

    © 2013 Guardian News and Media Limited or its affiliated companies.

    Other Agencies Clamor for Data N.S.A. Compiles

    WASHINGTON — The National Security Agency’s dominant role as the nation’s spy warehouse has spurred frequent tensions and turf fights with other federal intelligence agencies that want to use its surveillance tools for their own investigations, officials say.

    Agencies working to curb drug trafficking, cyberattacks, money laundering, counterfeiting and even copyright infringement complain that their attempts to exploit the security agency’s vast resources have often been turned down because their own investigations are not considered a high enough priority, current and former government officials say.

    Intelligence officials say they have been careful to limit the use of the security agency’s troves of data and eavesdropping spyware for fear they could be misused in ways that violate Americans’ privacy rights.

    The recent disclosures of agency activities by its former contractor Edward J. Snowden have led to widespread criticism that its surveillance operations go too far and have prompted lawmakers in Washington to talk of reining them in. But out of public view, the intelligence community has been agitated in recent years for the opposite reason: frustrated officials outside the security agency say the spy tools are not used widely enough.

    “It’s a very common complaint about N.S.A.,” said Timothy H. Edgar, a former senior intelligence official at the White House and at the office of the director of national intelligence. “They collect all this information, but it’s difficult for the other agencies to get access to what they want.”

    “The other agencies feel they should be bigger players,” said Mr. Edgar, who heard many of the disputes before leaving government this year to become a visiting fellow at Brown University. “They view the N.S.A. — incorrectly, I think — as this big pot of data that they could go get if they were just able to pry it out of them.”

    Smaller intelligence units within the Drug Enforcement Administration, the Secret Service, the Pentagon and the Department of Homeland Security have sometimes been given access to the security agency’s surveillance tools for particular cases, intelligence officials say.

    But more often, their requests have been rejected because the links to terrorism or foreign intelligence, usually required by law or policy, are considered tenuous. Officials at some agencies see another motive — protecting the security agency’s turf — and have grown resentful over what they see as a second-tier status that has undermined their own investigations into security matters.

    At the drug agency, for example, officials complained that they were blocked from using the security agency’s surveillance tools for several drug-trafficking cases in Latin America, which they said might be connected to financing terrorist groups in the Middle East and elsewhere.

    At the Homeland Security Department, officials have repeatedly sought to use the security agency’s Internet and telephone databases and other resources to trace cyberattacks on American targets that are believed to have stemmed from China, Russia and Eastern Europe, according to officials. They have often been rebuffed.

    Officials at the other agencies, speaking only on the condition of anonymity because they were not authorized to discuss the tensions, say the National Security Agency’s reluctance to allow access to data has been particularly frustrating because of post-Sept. 11 measures that were intended to encourage information-sharing among federal agencies.

    In fact, a change made in 2008 in the executive order governing intelligence was intended to make it easier for the security agency to share surveillance information with other agencies if it was considered “relevant” to their own investigations. It has often been left to the national intelligence director’s office to referee the frequent disputes over how and when the security agency’s spy tools can be used. The director’s office declined to comment for this article.

    Typically, the agencies request that the N.S.A. target individuals or groups for surveillance, search its databases for information about them, or share raw intelligence, rather than edited summaries, with them. If those under scrutiny are Americans, approval from the secret Foreign Intelligence Surveillance Court is required.

    The security agency, whose mission is to spy overseas, and the F.B.I., its main partner in surveillance operations, dominate the process as the Justice Department’s main “customers” in seeking warrants from the intelligence court, with nearly 1,800 approved by the court last year.

    In a statement, the security agency said that it “works closely with all intelligence community partners, and embeds liaison officers and other personnel at those agencies for the express purpose of ensuring N.S.A. is meeting their requirements and providing support to their missions.”

    The security agency’s spy tools are attractive to other agencies for many reasons. Unlike traditional, narrowly tailored search warrants, those granted by the intelligence court often allow searches through records and data that are vast in scope. The standard of evidence needed to acquire them may be lower than in other courts, and the government may not be required to disclose for years, if ever, that someone was the focus of secret surveillance operations.

    Decisions on using the security agency’s powers rest on many complicated variables, including a link to terrorism or “foreign intelligence,” the type of surveillance or data collection that is being conducted, the involvement of American targets, and the priority of the issue.

    “Every agency wants to think that their mission has to be the highest priority,” said a former senior White House intelligence official involved in recent turf issues.

    Other intelligence shops usually have quick access to N.S.A. tools and data on pressing matters of national security, like investigating a terrorism threat, planning battlefield operations or providing security for a presidential trip, officials say. But the conflicts arise during longer-term investigations with unclear foreign connections.

    In pressing for greater access, a number of smaller agencies maintain that their cases involve legitimate national security threats and could be helped significantly by the N.S.A.’s ability to trace e-mails and Internet activity or other tools.

    Drug agency officials, for instance, have sought a higher place for global drug trafficking on the intelligence community’s classified list of surveillance priorities, according to two officials.

    Dawn Dearden, a drug agency spokeswoman, said it was comfortable allowing the N.S.A. and the F.B.I. to take the lead in seeking surveillance warrants. “We don’t have the authority, and we don’t want it, and that comes from the top down,” she said.

    But privately, intelligence officials at the drug agency and elsewhere have complained that they feel shut out of the process by the N.S.A. and the F.B.I. from start to finish, with little input on what groups are targeted with surveillance and only sporadic access to the classified material that is ultimately collected.

    Sometimes, security agency and bureau officials accuse the smaller agencies of exaggerating links to national security threats in their own cases when pushing for access to the security agency’s surveillance capabilities. Officials from the other agencies say that if a link to national security is considered legitimate, the F.B.I. will at times simply take over the case itself and work it with the N.S.A.

    In one such case, the bureau took control of a Secret Service investigation after a hacker was linked to a foreign government, one law enforcement official said. Similarly, the bureau became more interested in investigating smuggled cigarettes as a means of financing terrorist groups after the case was developed by the Bureau of Alcohol, Tobacco, Firearms and Explosives.

    Mr. Edgar said officials in the national intelligence director’s office occasionally allow other agencies a role in identifying surveillance targets and seeing the results when it is relevant to their own inquiries. But more often, he acknowledged, the office has come down on the side of keeping the process held to an “exclusive club” at the N.S.A., the F.B.I. and the Justice Department, with help from the Central Intelligence Agency on foreign issues.

    Officials in the national intelligence director’s office worry about opening the surveillance too widely beyond the security agency and the F.B.I. for fear of abuse, Mr. Edgar said. The two intelligence giants have been “burned” by past wiretapping controversies and know the political consequences if they venture too far afield, he added.

    “I would have been very uncomfortable if we had let these other agencies get access to the raw N.S.A. data,” he said.

    As furious as the public criticism of the security agency’s programs has been in the two months since Mr. Snowden’s disclosures, “it could have been much, much worse, if we had let these other agencies loose and we had real abuses,” Mr. Edgar said. “That was the nightmare scenario we were worried about, and that hasn’t happened.”

    Eric Schmitt contributed reporting.

    August 3, 2013
    By ERIC LICHTBLAU and MICHAEL S. SCHMIDT

    Find this story at 3 August 2013

    © 2013 The New York Times Company

    For Western Allies, a Long History of Swapping Intelligence

    BERLIN — When Edward J. Snowden disclosed the extent of the United States data mining operations in Germany, monitoring as many as 60 million of the country’s telephone and Internet connections in one day and bugging its embassy, politicians here, like others in Europe, were by turns appalled and indignant. But like the French before them, this week they found themselves backpedaling.

    In an interview released this week Mr. Snowden said that Germany’s intelligence services are “in bed” with the National Security Agency, “the same as with most other Western countries.” The assertion has added to fresh scrutiny in the European news media of Berlin and other European governments that may have benefited from the enormous American snooping program known as Prism, or conducted wide-ranging surveillance operations of their own.

    The outrage of European leaders notwithstanding, intelligence experts and historians say the most recent disclosures reflect the complicated nature of the relationship between the intelligence services of the United States and its allies, which have long quietly swapped information on each others’ citizens.

    “The other services don’t ask us where our information is from and we don’t ask them,” Mr. Snowden said in the interview, conducted by the documentary filmmaker Laura Poitras and Jacob Appelbaum, a computer security researcher, and published this week in the German magazine Der Spiegel. “This way they can protect their political leaders from backlash, if it should become public how massively the private spheres of people around the globe are being violated.”

    Britain, which has the closest intelligence relationship with the United States of any European country, has been implicated in several of the data operations described by Mr. Snowden, including claims that Britain’s agencies had access to the Prism computer network, which monitors data from a range of American Internet companies. Such sharing would have allowed British intelligence agencies to sidestep British legal restrictions on electronic snooping. Prime Minister David Cameron has insisted that its intelligence services operate within the law.

    Another allegation, reported by The Guardian newspaper, is that the Government Communications Headquarters, the British surveillance center, tapped fiber-optic cables carrying international telephone and Internet traffic, then shared the information with the N.S.A. This program, known as Tempora, involved attaching intercept probes to trans-Atlantic cables when they land on British shores from North America, the report said.

    President François Hollande of France was among the first European leaders to express outrage at the revelations of American spying, and especially at accusations that the Americans had spied on French diplomatic posts in Washington and New York.

    There is no evidence to date that French intelligence services were granted access to information from the N.S.A., Le Monde reported last week, however, that France’s external intelligence agency maintains a broad telecommunications data collection system of its own, amassing metadata on most, if not all, telephone calls, e-mails and Internet activity coming in and out of France.

    Mr. Hollande and other officials have been notably less vocal regarding the claims advanced by Le Monde, which authorities in France have neither confirmed nor denied.

    Given their bad experiences with domestic spying, first under the Nazis and then the former the East German secret police, Germans are touchy when it comes to issues of personal privacy and protection of their personal data. Guarantees ensuring the privacy of mail and all forms of long-distance communications are enshrined in Article 10 of their Constitution.

    When the extent of the American spying in Germany came to light the chancellor’s spokesman, Steffen Seibert, decried such behavior as “unacceptable,” insisting that, “We are no longer in the cold war.”

    But experts say ties between the intelligence services remain rooted in agreements stemming from that era, when West Germany depended on the United States to protect it from the former Soviet Union and its allies in the East.

    “Of course the German government is very deeply entwined with the American intelligence services,” said Josef Foschepoth, a German historian from Freiburg University. Mr. Foschepoth spent several years combing through Germany’s federal archives, including formerly classified documents from the 1950s and 1960s, in an effort to uncover the roots of the trans-Atlantic cooperation.

    In 1965, Germany’s foreign intelligence service, known by the initials BND, was created. Three years later, the West Germans signed a cooperation agreement effectively binding the Germans to an intensive exchange of information that continues up to the present day, despite changes to the agreements.

    The attacks on Sept. 11, 2001, in the United States saw a fresh commitment by the Germans to cooperate with the Americans in the global war against terror. Using technology developed by the Americans and used by the N.S.A., the BND monitors networks from the Middle East, filtering the information before sending it to Washington, said Erich Schmidt-Eenboom, an expert on secret services who runs the Research Institute for Peace Politics in Bavaria.

    In exchange, Washington shares intelligence with Germany that authorities here say has been essential to preventing terror attacks similar to those in Madrid or London. It is a matter of pride among German authorities that they have been able to swoop in and detain suspects, preventing several plots from being carried out.

    By focusing the current public debate in Germany on the issue of personal data, experts say Chancellor Angela Merkel is able to steer clear of the stickier questions about Germany’s own surveillance programs and a long history of intelligence sharing with the United States, which still makes many Germans deeply uncomfortable, more than two decades after the end of the cold war.

    “Every postwar German government, at some point, has been confronted with this problem,” Mr. Foschepoth said of the surveillance scandal. “The way that the chancellor is handling it shows that she knows very well, she is very well informed and she wants the issue to fade away.”

    Reporting contributed by Stephen Castle from London, Scott Sayare from Paris and Eric Schmitt from Washington.

    July 9, 2013
    By MELISSA EDDY

    Find this story at 9 July 2013

    © 2013 The New York Times Company

    << oudere artikelen  nieuwere artikelen >>