• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Manning plea statement: Americans had a right to know ‘true cost of war’

    After admitting guilt in 10 of 22 charges, soldier reveals how he came to share classified documents with WikiLeaks and talks of ‘bloodlust’ of US helicopter crew
    • Glenn Greenwald: Bradley Manning – the face of heroism

    Manning’s statement recounted how he had first become aware of WikiLeaks in 2009. Photograph: Jim Watson/AFP/Getty Images

    Bradley Manning, the soldier accused of the biggest unauthorised disclosure of state secrets in US history, has pleaded guilty to being the source of the leak, telling a military court that he passed the information to a whistleblowing website because he believed the American people had a right to know the “true costs of war”.

    At a pre-trial hearing on a Maryland military base, Manning, 25, who faces spending the rest of his life in military custody, read out a 35-page statement in which he gave an impassioned account of his motives for transmitting classified documents and videos he had obtained while working as an intelligence analyst outside Baghdad.

    Sitting at the defence bench in a hushed courtroom, Manning said he was sickened by the apparent “bloodlust” of a helicopter crew involved in an attack on a group in Baghdad that turned out to include Reuters correspondents and children.

    He believed the Afghan and Iraq war logs published by the WikiLeaks website, initially in association with a consortium of international media organisations that included the Guardian, were “among the more significant documents of our time revealing the true costs of war”. The decision to pass the classified information to a public website was motivated, he told the court, by his depression about the state of military conflict in which the US was mired.

    Manning said: “We were obsessed with capturing and killing human targets on lists and ignoring goals and missions. I believed if the public, particularly the American public, could see this it could spark a debate on the military and our foreign policy in general [that] might cause society to reconsider the need to engage in counter-terrorism while ignoring the human situation of the people we engaged with every day.”

    Reading on mobile? See the investigative film produced by the Guardian here

    In a highly unusual move for a defendant in such a serious criminal prosecution, Manning pleaded guilty to 10 lesser charges out of his own volition – not as part of a plea bargain with the prosecution. He admitted to having possessed and willfully communicated to an unauthorised person – probably Julian Assange – all the main elements of the WikiLeaks disclosure.

    That covered the so-called “Collateral Murder” video of an Apache helicopter attack in Iraq; some US diplomatic cables including one of the early WikiLeaks publications the Reykjavik cable; portions of the Iraq and Afghanistan war logs; some of the files on detainees in Guantánamo; and two intelligence memos.

    The charges to which the soldier pleaded guilty carry a two-year maximum sentence each, committing Manning to a possible upper limit of 20 years in military prison.

    But the plea does not avoid a long and complex trial for the soldier, that is currently scheduled to begin on 3 June. Manning pleaded not guilty to 12 counts which relate to the major offences of which he is accused by the US government.

    Specifically, he denied he had been involved in “aiding the enemy” – the idea that he knowingly gave help to al-Qaida and caused secret intelligence to be published on the internet, aware that by doing so it would become available to the enemy.

    As he read his statement, Manning was flanked by his civilian lawyer, David Coombs, on one side and two military defence lawyers on the other. Wearing full uniform, the soldier read out the document at high speed, occasionally stumbling over the words and at other points laughing at his own comments.

    He recounted how he had first become aware of WikiLeaks in 2009. He was particularly impressed by its release in November that year of more than 500,000 text messages sent on the day of the 9/11 terrorist attacks.

    He had originally copied the war logs as a good housekeeping measure to have quick access to the information. But the more he read into the data, he said, the more he was concerned about what it was uncovering.

    He decided to take a copy of the data on a memory stick when he went back from Iraq to the US on leave in January 2010. There, having failed to interest the Washington Post and the New York Times in the stash of information, he turned to WikiLeaks.

    On his return to Iraq, he encountered a video that showed an Apache helicopter attack from 2007 in which a group of people in Baghdad came under US fire. The group was later found to have included civilians, children and two Reuters correspondents who died.

    Manning said he was “troubled” by the resistance of the military authorities to releasing the video to Reuters, and a claim from on high that it might not still exist. When he looked through the video on a secure military database he was also troubled by the attitude of the aerial weapons team in the Apache – “the bloodlust they seemed to have, they seemed not to value human life”.

    The soldier related that in the video a man who has been hit by the US forces is seen crawling injured through the dust, at which point one of the helicopter crew is heard wishing the man would pick up a weapon so that they could kill him. “For me that was like a child torturing an ant with a magnifying glass.”

    After he had uploaded the video to WikiLeaks, which then posted it as the now notorious “Collateral Murder” video, Manning said he was approached by a senior WikiLeaks figure codenamed “Ox”. He assumed the individual was probably Julian Assange, and gave him his own codename – Nathaniel Frank – after the author of a book he had recently read.

    Of the largest portion of the WikiLeaks disclosures – the 250,000 US diplomatic cables – Manning said he was convinced the documents from embassies around the world would embarrass but not damage the US. “I thought these cables were a prime example of the need for more diplomacy. In many ways they were a collection of cliques and gossip,” he said.

    After reading his statement, Manning entered into several hours of questions from the trial judge, Colonel Denise Lind, who has the duty of ensuring that the accused made his guilty plea voluntarily and in full knowledge of its implications. Lind found Manning made his plea without coercion and in knowledge of its impact, and accepted it.

    In the course of the questioning, Lind tried to get to the bottom of an apparent contradiction in Manning’s comments. In his statement, he expressed strong moral reasons for his actions that suggested he was justified in leaking confidential information for the greater good.

    Ed Pilkington at Fort Meade, Maryland
    The Guardian, Thursday 28 February 2013 22.21 GMT

    Find this story at 28 February 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Pfc. Bradley E. Manning’s Statement for the Providence Inquiry

    For more information on the lack of public and press access to United States v. Pfc. Manning, visit the Center for Constitutional Rights, which filed a petition requesting the Army Court of Criminal Appeals (ACCA) “to order the Judge to grant the public and press access to the government’s motion papers, the court’s own orders, and transcripts of proceedings, none of which have been made public to date.”

    The statement below was read by Private First Class Bradley E. Manning at the providence inquiry for his formal plea of guilty to one specification under Article 92 with a substituted time frame for the offense, and nine specifications for lesser included offenses under Article 134. He pled not guilty to 12 other specifications. This transcript was taken by journalist Alexa O’Brien at the Article 39(a) session of United States v. Pfc. Bradley Manning on February 28, 2013 at Fort Meade, MD, USA.

    UPDATE

    Judge Lind: Pfc. Manning you may read your statement.

    Pfc. Bradley Manning: Yes, your Honor. I wrote this statement in the confinement facility. Start now. The following facts are provided in support of the providence inquiry for my court martial, United States v. Pfc. Bradley E. Manning.

    Personal Facts.

    I am a twenty-five year old Private First Class in the United States Army currently assigned to Headquarters and Headquarters Company, HHC, US Army Garrison (USAG), Joint Base Myer, Henderson Hall, Fort Meyer, Virginia.

    My [exodus?] assignment I was assigned to HHC, 2nd Brigade Combat Team, 10th Mountain Division at Fort Drum, NY. My primary military occupational specialty or MOS is 35 Foxtrot intelligence analyst. I entered active duty status on 2 October 2007. I enlisted with the hope of obtaining both real world experience and earning benefits under the GI Bill for college opportunities.

    Facts regarding my position as an intelligence analyst.

    In order to enlist in the Army I took the Standard Armed Services Aptitude Battery or [ASVAB?]. My score on this battery was high enough for me to qualify for any enlisted MOS position. My recruiter informed me that I should select an MOS that complimented my interests outside the military. In response, I told him that I was interested in geopolitical matters and information technology. He suggested that I consider becoming an intelligence analyst.

    After researching the intelligence analyst position, I agreed that this would be a good fit for me. In particular, I enjoyed the fact that an analyst could use information derived from a variety of sources to create work products that informed the command of its available choices for determining the best course of action or COA’s. Although the MOS required working knowledge of computers, it primarily required me to consider how raw information can be combined with other available intelligence sources in order to create products that assisted the command in its situational awareness or SA.

    I accessed that my natural interest in geopolitical affairs and my computer skills would make me an excellent intelligence analyst. After enlisting I reported to the Fort Meade military entrance processing station on 1 October 2007. I then traveled to and reported at Fort Leonard Wood, Missouri on 2 October 2007 to begin basic combat training or BCT.

    Once at Fort Leonard Wood I quickly realized that I was neither physically nor mentally prepared for the requirements of basic training. My BCT experience lasted six months instead of the normal ten weeks. Due to medical issues, I was placed on a hold status. A physical examination indicated that I sustained injuries to my right soldier and left foot.

    Due to those injuries I was unable to continue ‘basic’. During medical hold, I was informed that I may be out processed from the Army, however, I resisted being chaptered out because I felt that I could overcome my medical issues and continue to serve. On 2[8 or 20?] January 2008, I returned to basic combat training. This time I was better prepared and I completed training on 2 April 2008.

    I then reported for the MOS specific Advanced Individual Training or AIT on 7 April 2008. AIT was an enjoyable experience for me. Unlike basic training where I felt different from the other soldiers, I fit in and did well. I preferred the mental challenges of reviewing a large amount of information from various sources and trying to create useful or actionable products. I especially enjoyed the practice of analysis through the use of computer applications and methods that I was familiar with.

    I graduated from AIT on 16 August 2008 and reported to my first duty station, Fort Drum, NY on 28 August 2008. As an analyst, Significant Activities or SigActs were a frequent source of information for me to use in creating work products. I started working extensively with SigActs early after my arrival at Fort Drum. My computer background allowed me to use the tools of organic to the Distributed Common Ground System-Army or D6-A computers to create polished work products for the 2nd Brigade Combat Team chain of command.

    The non-commissioned officer in charge, or NCOIC, of the S2 section, then Master Sergeant David P. Adkins recognized my skills and potential and tasked me to work on a tool abandoned by a previously assigned analyst, the incident tracker. The incident tracker was viewed as a back up to the Combined Information Data Network Exchange or CIDNE and as a unit, historical reference to work with.

    In the months preceding my upcoming deployment, I worked on creating a new version of the incident tracker and used SigActs to populate it. The SigActs I used were from Afghanistan, because at the time our unit was scheduled to deploy to the Logar and Wardak Provinces of Afghanistan. Later my unit was reassigned to deploy to Eastern Baghdad, Iraq. At that point, I removed the Afghanistan SigActs and switched to Iraq SigActs.

    As and analyst I viewed the SigActs as historical data. I believed this view is shared by other all-source analysts as well. SigActs give a first look impression of a specific or isolated event. This event can be an improvised explosive device attack or IED, small arms fire engagement or SAF, engagement with a hostile force, or any other event a specific unit documented and recorded in real time.

    In my perspective the information contained within a single SigAct or group of SigActs is not very sensitive. The events encapsulated within most SigActs involve either enemy engagements or causalities. Most of this information is publicly reported by the public affairs office or PAO, embedded media pools, or host nation (HN) media.

    As I started working with SigActs I felt they were similar to a daily journal or log that a person may keep. They capture what happens on a particular day in time. They are created immediately after the event, and are potentially updated over a period of hours until final version is published on the Combined Information Data Network Exchange. Each unit has its own Standard Operating Procedure or SOP for reporting and recording SigActs. The SOP may differ between reporting in a particular deployment and reporting in garrison.

    In garrison, a SigAct normally involves personnel issues such as driving under the influence or DUI incidents or an automobile accident involving the death or serious injury of a soldier. The reports starts at the company level and goes up to the battalion, brigade, and even up to the division level.

    In deployed environment a unit may observe or participate in an event and a platoon leader or platoon sergeant may report the event as a SigAct to the company headquarters and through the radio transmission operator or RTO. The commander or RTO will then forward the report to the battalion battle captain or battle non-commissioned officer or NCO. Once the battalion battle captain or battle NCO receives the report they will either (1) notify the battalion operations officer or S3; (2) conduct an action, such as launching a quick reaction force; or (3) record the event and report– and further report it up the chain of command to the brigade.

    The reporting of each event is done by radio or over the Secret Internet Protocol Router Network or SIPRNet, normally by an assigned soldier, usually junior enlisted E-4 and below. Once the SigAct is recorded, the SigAct is further sent up the chain of command. At each level, additional information can either be added or corrected as needed. Normally within 24 to 48 hours, the updating and reporting or a particular SigAct is complete. Eventually all reports and SigActs go through the chain of command from brigade to division and division to corps. At corps level the SigAct is finalized and [missed word].

    The CIDNE system contains a database that is used by thousands of Department of Defense– DoD personnel– including soldiers, civilians, and contractors support. It was the United States Central Command or CENTCOM reporting tool for operational reporting in Iraq and Afghanistan. Two separate but similar databases were maintained for each theater– CIDNE-I for Iraq and CIDNE-A for Afghanistan. Each database encompasses over a hundred types of reports and other historical information for access. They contain millions of vetted and finalized directories including operational intelligence reporting.

    CIDNE was created to collect and analyze battle-space data to provide daily operational and Intelligence Community (IC) reporting relevant to a commander’s daily decision making process. The CIDNE-I and CIDNE-A databases contain reporting and analysis fields for multiple disciplines including Human Intelligence or HUMINT reports, Psychological Operations or PSYOP reports, Engagement reports, Counter Improvised Explosive Device or CIED reports, SigAct reports, Targeting reports, Social and Cultural reports, Civil Affairs reports, and Human Terrain reporting.

    As an intelligence analyst, I had unlimited access to the CIDNE-I and CIDNE-A databases and the information contained within them. Although each table within the database is important, I primarily dealt with HUMINT reports, SigAct reports, and Counter IED reports, because these reports were used to create a work product I was required to published as an analyst.

    In working on an assignment I looked anywhere and everywhere for information. As an all-source analyst, this was something that was expected. The D6-A systems had databases built in, and I utilized them on a daily basis. This simply was– the search tools available on the D6-A systems on SIPRNet such as Query Tree and the DoD and Intellink search engines.

    Primarily, I utilized the CIDNE database using the historical and HUMINT reporting to conduct my analysis and provide a back up for my work product. I did statistical analysis on historical data including SigActs to back up analysis that were based on HUMINT reporting and produce charts, graphs, and tables. I also created maps and charts to conduct predictive analysis based on statistical trends. The SigAct reporting provided a reference point for what occurred and provided myself and other analysts with the information to conclude possible outcome.

    Although SigAct reporting is sensitive at the time of their creation, their sensitivity normally dissipates within 48 to 72 hours as the information is either publicly released or the unit involved is no longer in the area and not in danger.

    It is my understanding that the SigAct reports remain classified only because they are maintained within CIDNE– because it is only accessible on SIPRnet. Everything on CIDNE-I and CIDNE-A to include SigAct reporting was treated as classified information.

    Facts regarding the storage of SigAct Reports.

    As part of my training at Fort Drum, I was instructed to ensure that I create back ups of my work product. The need to create back ups was particularly acute given the relative instability and reliability of the computer systems we used in the field during deployment. These computer systems included both organic and theater provided equipment (TPE) D6-A machines.

    The organic D6-A machines we brought with us into the field on our deployment were Dell [missed word] laptops and the TPE D6-A machines were Alienware brand laptops. The [M90?] D6-A laptops were the preferred machine to use as they were slightly faster and had fewer problems with dust and temperature than the theater provided Alienware laptops. I used several D6-A machines during the deployment due to various technical problems with the laptops.

    With these issues several analysts lost information, but I never lost information due to the multiple backups I created. I attempted to backup as much relevant information as possible. I would save the information so that I or another analyst could quickly access it whenever a machine crashed, SIPRnet connectivity was down, or I forgot where the data was stored.

    When backing up information I would do one or all of the following things based on my training:

    [(1)] Physical back up. I tried to keep physical back up copies of information on paper so that the information could be grabbed quickly. Also, it was easier to brief from hard copies of research and HUMINT reports.

    (2) Local drive back up. I tried to sort out information I deemed relevant and keep complete copies of the information on each of the computers I used in the Temporary Sensitive Compartmented Information Facility or T-SCIF, including my primary and secondary D6-A machines. This was stored under my user profile on the desktop.

    [(3)] Shared drive backup. Each analyst had access to a ‘T’ drive– what we called ‘T’ drive shared across the SIPRnet. It allowed others to access information that was stored on it. S6 operated the ‘T’ drive.

    [(4)] Compact disk rewritable or CD-RW back up. For larger datasets I saved the information onto a re-writable disk, labeled the disks, and stored them in the conference room of the T-SCIF. This redundancy permitted us the ability to not worry about information loss. If the system crashed, I could easily pull the information from a my secondary computer, the ‘T’ drive, or one of the CD-RWs.

    If another analyst wanted to access my data, but I was unavailable she could find my published products directory on the ‘T’ drive or on the CD-RWs. I sorted all of my products or research by date, time, and group; and updated the information on each of the storage methods to ensure that the latest information was available to them.

    During the deployment I had several of the D6-A machines crash on me. Whenever one of the a computer crashed, I usually lost information but the redundancy method ensured my ability to quickly restore old backup data and add my current information to the machine when it was repaired or replaced.

    I stored the backup CD-RW with larger datasets in the conference room of the T-SCIF or next to my workstation. I marked the CD-RWs based on the classification level and its content. Unclassified CD-RWs were only labeled with the content type and not marked with classification markings. Early on in the deployment, I only saved and stored the SigActs that were within or near our operational environment.

    Later I thought it would be easier to just to save all of the SigActs onto a CD-RW. The process would not take very long to complete and so I downloaded the SigActs from CIDNE-I onto a CD-RW. After finishing with CIDNE-I, I did the same with CIDNE-A. By retrieving the CIDNE-I and CIDNE-A SigActs I was able to retrieve the information whenever I needed it, and not rely upon the unreliable and slow SIPRnet connectivity needed to pull. Instead, I could just find the CD-RW and open up a pre-loaded spreadsheet.

    This process began in late December 2009 and continued through early January 2010. I could quickly export one month of the SigAct data at a time and download in the background as I did other tasks.

    The process took approximately a week for each table. After downloading the SigAct tables, I periodically updated them, by pulling only the most recent SigActs and simply copying them and pasting them into the database saved on the CD-RW. I never hid the fact that I had downloaded copies of both the SigAct tables from CIDNE-I and CIDNE-A. They were stored on appropriately labeled and marked CD-RWs, stored in the open.

    I viewed the saved copies of the CIDNE-I and CIDNE-A SigAct tables as being for both for my use and the use of anyone within the S2 section during the SIPRnet connectivity issues.

    In addition to the SigAct tables, I had a large repository of HUMINT reports and Counter IED reports downloaded from CIDNE-I. These contained reports that were relevant to the area in and around our operational environment in Eastern Baghdad and the Diyala Province of Iraq.

    In order to compress the data to fit onto a CD-RW, I used a compression algorithm called ‘bzip2’. The program used to compress the data is called ‘WinRAR’. WinRAR is an application that is free, and can be easily downloaded from the internet via the Non-Secure Internet Relay Protocol Network or NIPRnet. I downloaded WinRAR on NIPRnet and transferred it to the D6-A machine user profile desktop using a CD-RW. I did not try to hide the fact that I was downloading WinRAR onto my SIPRnet D6-A machine or computer.

    With the assistance of the bzip2 compression algorithm using the WinRAR program, I was able to fit all of the SigActs onto a single CD-RW and relevant HUMINT and Counter IED reports onto a separate CD-RW.

    Facts regarding my knowledge of the WikiLeaks Organization or WLO.

    I first became vaguely aware of the WLO during my AIT at Fort Huachuca, Arizona, although I did not fully pay attention until the WLO released purported Short Messaging System or SMS messages from 11 September 2001 on 25 November 2009. At that time references to the release and the WLO website showed up in my daily Google news open source search for information related to US foreign policy.

    The stories were about how WLO published about approximately 500,000 messages. I then reviewed the messages myself and realized that the posted messages were very likely real given the sheer volume and detail of the content.

    After this, I began conducting research on WLO. I conducted searches on both NIPRnet and SIPRnet on WLO beginning in late November 2009 and early December 2009. At this time I also began to routinely monitor the WLO website. In response to one of my searches in December 2009, I found the United States Army Counter Intelligence Center or USACIC report on the WikiLeaks organization. After reviewing the report, I believed that this report was possibly the one that my AIT referenced in early 2008.

    I may or may not have saved the report on my D6-A workstation. I know I reviewed the document on other occasions throughout early 2010, and saved it on both my primary and secondary laptops. After reviewing the report, I continued doing research on WLO. However, based upon my open-source collection, I discovered information that contradicted the 2008 USACIC report including information that indicated that similar to other press agencies, WLO seemed to be dedicated to exposing illegal activities and corruption.

    WLO received numerous award and recognition for its reporting activities. Also, in reviewing the WLO website, I found information regarding US military SOPs for Camp Delta at Guantanamo Bay, Cuba and information on the then outdated rules of engagement for ROE in Iraq for cross-border pursuits of former members of Saddam Hussein [missed word] government.

    After seeing the information available on the WLO website, I continued following it and collecting open source information from it. During this time period, I followed several organizations and groups including wire press agencies such as the Associated Press and Reuters and private intelligence agencies including Strategic Forecasting or Stratfor. This practice was something I was trained to do during AIT, and was something that good analysts were expected to do.

    During the searches of WLO, I found several pieces of information that I found useful in my work product– in my work as an analyst, specifically I recall WLO publishing documents related to weapons trafficking between two nations that affected my OP. I integrated this information into one or more of my work products.

    In addition to visiting the WLO website, I began following WLO using Instant Relay Chat or IRC Client called ‘XChat’ sometime in early January 2010.

    IRC is a protocol for real time internet communications by messaging and conferencing, colloquially referred to as chat rooms or chats. The IRC chat rooms are designed for group communication discussion forums. Each IRC chat room is called a channel– similar to a television where you can tune in or follow a channel– so long as it is open and does not require an invite.

    Once you joining a specific IRC conversation, other users in the conversation can see that you have joined the room. On the Internet there are millions of different IRC channels across several services. Channel topics span a range of topics covering all kinds of interests and hobbies. The primary reason for following WLO on IRC was curiosity– particularly in regards to how and why they obtained the SMS messages referenced above. I believed that collecting information on the WLO would assist me in this goal.

    Initially I simply observed the IRC conversations. I wanted to know how the organization was structured, and how they obtained their data. The conversations I viewed were usually technical in nature but sometimes switched to a lively debate on issues the particular individual may have felt strongly about.

    Over a period of time I became more involved in these discussions especially when conversations turned to geopolitical events and information technology topics, such as networking and encryption methods. Based on these observations, I would describe the WL organization as almost academic in nature. In addition to the WLO conversations, I participated in numerous other IRC channels across at least three different networks. The other IRC channels I participated in normally dealt with technical topics including with Linux and Berkley Secure Distribution BSD operating systems or OS’s, networking, encryption algorithms and techniques, and other more political topics, such as politics and [missed word].

    I normally engaged in multiple IRC conversations simultaneously– mostly publicly, but often privately. The XChat client enabled me to manage these multiple conversations across different channels and servers. The screen for XChat was often busy, but its screens enabled me to see when something was interesting. I would then select the conversation and either observe or participate.

    I really enjoyed the IRC conversations pertaining to and involving the WLO, however, at some point in late February or early March of 2010, the WLO IRC channel was no longer accessible. Instead, regular participants of this channel switched to using the Jabber server. Jabber is another internet communication [missed word] similar but more sophisticated than IRC.

    The IRC and Jabber conversations, allowed me to feel connected to others even when alone. They helped me pass the time and keep motivated throughout the deployment.

    Facts regarding the unauthorized storage and disclosure of the SigActs.

    As indicated above I created copies of the CIDNE-I and CIDNE-A SigAct tables as part of the process of backing up information. At the time I did so, I did not intend to use this information for any purpose other than for back up. However, I later decided to release this information publicly. At that time, I believe and still believe that these tables are two of the most significant documents of our time.

    On 8 January 2010, I collected the CD-RW I stored in the conference room of the T-SCIF and placed it into the cargo pocket of my ACU or Army Combat Uniform. At the end of my shift, I took the CD-RW out of the T-SCIF and brought it to my Containerized Housing Unit of CHU. I copied the data onto my personal laptop. Later at the beginning of my shift, I returned the CD-RW back to the conference room of the T-SCIF. At the time I saved the SigActs to my laptop, I planned to take them with me on mid-tour leave and decide what to do with them.

    At some point prior to my mid-tour leave, I transferred the information from my computer to a Secure Digital memory card from for my digital camera. The SD card for the camera also worked on my computer and allowed me to store the SigAct tables in a secure manner for transport.

    I began mid-tour leave on 23 January 2010, flying from Atlanta, Georgia to Reagan National Airport in Virginia. I arrived at the home of my aunt, Debra M. Van Alstyne, in Potomac, Maryland and quickly got into contact with my then boyfriend, Tyler R. Watkins. Tyler, then a student at Brandeis University in Waltham, Massachusetts, and I made plans for me to visit him [the] Boston, Massachusetts area.

    I was excited to see Tyler and planned on talking to Tyler about where our relationship was going and about my time in Iraq. However, when I arrived in the Boston area Tyler and I seemed to become distant. He did not seem very excited about my return from Iraq. I tried talking to him about our relationship but he refused to make any plans.

    I also tried to raising the topic of releasing the CIDNE-I and CIDNE-A SigAct tables to the public. I asked Tyler hypothetical questions about what he would do if he had documents that he thought the public needed access to. Tyler really didn’t really have a specific answer for me. He tried to answer the questions and be supportive, but seemed confused by the question in this and its context.

    I then tried to be more specific, but he asked too many questions. Rather than try to explain my dilemma, I decided to just to drop the conversation. After a few days in Waltham, I began to feel really bad feeling that I was over staying my welcome, and I returned to Maryland. I spent the remainder of my time on leave in the Washington, DC area.

    During this time a blizzard bombarded the mid-atlantic, and I spent a significant period of time essentially stuck in my aunt’s house in Maryland. I began to think about what I knew and the information I still had in my possession. For me, the SigActs represented the on the ground reality of both the conflicts in Iraq and Afghanistan.

    I felt that we were risking so much for people that seemed unwilling to cooperate with us, leading to frustration and anger on both sides. I began to become depressed with the situation that we found ourselves increasingly mired in year after year. The SigActs documented this in great detail and provide a context of what we were seeing on the ground.

    In attempting to conduct counter-terrorism or CT and counter-insurgency COIN operations we became obsessed with capturing and killing human targets on lists and not being suspicious of and avoiding cooperation with our Host Nation partners, and ignoring the second and third order effects of accomplishing short-term goals and missions. I believe that if the general public, especially the American public, had access to the information contained within the CIDNE-I and CIDNE-A tables this could spark a domestic debate on the role of the military and our foreign policy in general as well as it related to Iraq and Afghanistan.

    I also believed the detailed analysis of the data over a long period of time by different sectors of society might cause society to reevaluate the need or even the desire to even to engage in counterterrorism and counterinsurgency operations that ignore the complex dynamics of the people living in the effected environment everyday.

    At my aunt’s house I debated what I should do with the SigActs– in particular whether I should hold on to them– or expose them through a press agency. At this point I decided that it made sense to try to expose the SigAct tables to an American newspaper. I first called my local newspaper, The Washington Post, and spoke with a woman saying that she was a reporter. I asked her if The Washington Post would be interested in receiving information that would have enormous value to the American public.

    Although we spoke for about five minutes concerning the general nature of what I possessed, I do not believe she took me seriously. She informed me that The Washington Post would possibly be interested, but that such decisions were made only after seeing the information I was referring to and after consideration by the senior editors.

    I then decided to contact the largest and most popular newspaper, The New York Times. I called the public editor number on The New York Times website. The phone rang and was answered by a machine. I went through the menu to the section for news tips. I was routed to an answering machine. I left a message stating I had access to information about Iraq and Afghanistan that I believed was very important. However, despite leaving my Skype phone number and personal email address, I never received a reply from The New York Times.

    I also briefly considered dropping into the office for the Political Commentary blog, Politico, however the weather conditions during my leave hampered my efforts to travel. After these failed efforts I had ultimately decided to submit the materials to the WLO. I was not sure if the WLO would actually publish these the SigAct tables [missed a few words]. I was also concerned that they might not be noticed by the American media. However, based upon what I read about the WLO through my research described above, this seemed to be the best medium for publishing this information to the world within my reach.

    At my aunt’s house I joined in on an IRC conversation and stated I had information that needed to be shared with the world. I wrote that the information would help document the true cost of the wars in Iraq and Afghanistan. One of the individuals in the IRC asked me to describe the information. However, before I could describe the information another individual pointed me to the link for the WLO website’s online submission system. After ending my IRC connection, I considered my options one more time. Ultimately, I felt that the right thing to do was to release the SigActs.

    On 3 February 2010, I visited the WLO website on my computer and clicked on the submit documents link. Next I found the submit your information online link and elected to submit the SigActs via the onion router or TOR anonymizing network by a special link. TOR is a system intended to provide anonymity online. The software routes internet traffic through a network of servers and other TOR clients in order to conceal the user’s location and identity.

    I was familiar with TOR and had it previously installed on a computer to anonymously monitor the social media websites of militia groups operating within central Iraq. I followed the prompts and attached the compressed data files of CIDNE-I and CIDNE-A SigActs. I attached a text file I drafted while preparing to provide the documents to The Washington Post. It provided rough guidelines saying ‘It’s already been sanitized of any source identifying information. You might need to sit on this information– perhaps 90 to 100 days to figure out how best to release such a large amount of data and to protect its source. This is possibly one of the more significant documents of our time removing the fog of war and revealing the true nature of twenty-first century asymmetric warfare. Have a good day.’

    After sending this, I left the SD card in a camera case at my aunt’s house in the event I needed it again in the future. I returned from mid-tour leave on 11 February 2010. Although the information had not yet been publicly published by the WLO, I felt this sense of relief by them having it. I felt I had accomplished something that allowed me to have a clear conscience based upon what I had seen and read about and knew were happening in both Iraq and Afghanistan everyday.

    Facts regarding the unauthorized storage and disclosure of 10 Reykjavik 13.

    I first became aware of the diplomatic cables during my training period in AIT. I later learned about the Department of State or DoS Net-centric Diplomacy NCD portal from the 2/10 Brigade Combat Team S2, Captain Steven Lim. Captain Lim sent a section wide email to the other analysts and officers in late December 2009 containing the SIPRnet link to the portal along with the instructions to look at the cables contained within them and to incorporate them into our work product.

    Shortly after this I also noticed the diplomatic cables were being reported to in products from the corps level US Forces Iraq or USF-I. Based upon Captain Lim’s direction to become familiar with its contents, I read virtually every published cable concerning Iraq.

    I also began scanning the database and reading other random cables that piqued my curiosity. It was around this time– in early to mid-January of 2010, that I began searching the database for information on Iceland. I became interested in Iceland due to the IRC conversations I viewed in the WLO channel discussing an issue called Icesave. At this time I was not very familiar with the topic, but it seemed to be a big issue for those participating in the conversation. This is when I decided to investigate and conduct a few searches on Iceland and find out more.

    At the time, I did not find anything discussing the Icesave issue either directly or indirectly. I then conducted an open source search for Icesave. I then learned that Iceland was involved in a dispute with the United Kingdom and the Netherlands concerning the financial collapse of one or more of Iceland’s banks. According to open source reporting much of the public controversy involved the United Kingdom’s use of anti-terrorism legislation against Iceland in order to freeze Icelandic access assets for payment of the guarantees for UK depositors that lost money.

    Shortly after returning from mid-tour leave, I returned to the Net Centric Diplomacy portal to search for information on Iceland and Icesave as the topic had not abated on the WLO IRC channel. To my surprise, on 14 February 2010, I found the cable 10 Reykjavik 13, which referenced the Icesave issue directly.

    The cable published on 13 January 2010 was just over two pages in length. I read the cable and quickly concluded that Iceland was essentially being bullied diplomatically by two larger European powers. It appeared to me that Iceland was out viable options and was coming to the US for assistance. Despite the quiet request for assistance, it did not appear that we were going to do anything.

    From my perspective it appeared that we were not getting involved due to the lack of long term geopolitical benefit to do so. After digesting the contents of 10 Reykjavik 13 I debated on whether this was something I should send to the WLO. At this point the WLO had not published or acknowledged receipt of the CIDNE-I and CIDNE-A SigAct tables. Despite not knowing that if the SigActs were a priority for the WLO, I decided the cable was something that would be important and I felt that I would I might be able to right a wrong by having them publish this document. I burned the information onto a CD-RW on 15 February 2010, took it to my CHU, and saved it onto my personal laptop.

    I navigated to the WLO website via a TOR connection like before and uploaded the document via the secure form. Amazingly, when WLO published 10 Reykjavik 13 within hours, proving that the form worked and that they must have received the SigAct tables.

    Facts regarding the unauthorized storage and disclosure of the 12 July 2007 aerial weapons team or AW team video.

    During the mid-February 2010 time frame the 2nd Brigade Combat Team, 10th Mountain Division targeting analyst , then Specialist Jihrleah W. Showman and others discussed a video that Ms. Showman had found on the ‘T’ drive.

    The video depicted several individuals being engaged by an aerial weapons team. At first I did not consider the video very special, as I have viewed countless other war porn type videos depicting combat. However, the recording of audio comments by the aerial weapons team crew and the second engagement in the video of an unarmed bongo truck troubled me.

    As Showman and a few other analysts and officers in the T-SCIF commented on the video and debated whether the crew violated the rules of engagement or ROE in the second engagement, I shied away from this debate, instead conducting some research on the event. I wanted to learn what happened and whether there was any background to the events of the day that the event occurred, 12 July 2007.

    Using Google I searched for the event by its date by its and general location. I found several news accounts involving two Reuters employees who were killed during the aerial weapon team engagement. Another story explained that Reuters had requested for a copy of the video under the Freedom of Information Act or FOIA. Reuters wanted to view the video in order to be able to understand what had happened and to improve their safety practices in combat zones. A spokesperson for Reuters was quoted saying that the video might help avoid the reoccurrence of the tragedy and believed there was a compelling need for the immediate release of the video.

    Despite the submission of the FOIA request, the news account explained that CENTCOM replied to Reuters stating that they could not give a time frame for considering a FOIA request and that the video might no longer exist. Another story I found written a year later said that even though Reuters was still pursuing their request, they still did not receive a formal response or written determination in accordance with FOIA.

    The fact neither CENTCOM or Multi National Forces Iraq or MNF-I would not voluntarily release the video troubled me further. It was clear to me that the event happened because the aerial weapons team mistakenly identified Reuters employees as a potential threat and that the people in the bongo truck were merely attempting to assist the wounded. The people in the van were not a threat but merely ‘good samaritans’. The most alarming aspect of the video to me, however, was the seemly delightful bloodlust they appeared to have.

    They dehumanized the individuals they were engaging and seemed to not value human life by referring to them as quote “dead bastards” unquote and congratulating each other on the ability to kill in large numbers. At one point in the video there is an individual on the ground attempting to crawl to safety. The individual is seriously wounded. Instead of calling for medical attention to the location, one of the aerial weapons team crew members verbally asks for the wounded person to pick up a weapon so that he can have a reason to engage. For me, this seems similar to a child torturing ants with a magnifying glass.

    While saddened by the aerial weapons team crew’s lack of concern about human life, I was disturbed by the response of the discovery of injured children at the scene. In the video, you can see that the bongo truck driving up to assist the wounded individual. In response the aerial weapons team crew– as soon as the individuals are a threat, they repeatedly request for authorization to fire on the bongo truck and once granted they engage the vehicle at least six times.

    Shortly after the second engagement, a mechanized infantry unit arrives at the scene. Within minutes, the aerial weapons team crew learns that children were in the van and despite the injuries the crew exhibits no remorse. Instead, they downplay the significance of their actions, saying quote “Well, it’s their fault for bringing their kid’s into a battle” unquote.

    The aerial weapons team crew members sound like they lack sympathy for the children or the parents. Later in a particularly disturbing manner, the aerial weapons team crew verbalizes enjoyment at the sight of one of the ground vehicles driving over a body– or one of the bodies. As I continued my research, I found an article discussing the book, The Good Soldiers, written by Washington Post writer David Finkel.

    In Mr. Finkel book, he writes about the aerial weapons team attack. As, I read an online excerpt in Google Books, I followed Mr. Finkel’s account of the event belonging to the video. I quickly realize that Mr. Finkel was quoting, I feel in verbatim, the audio communications of the aerial weapons team crew.

    It is clear to me that Mr. Finkel obtained access and a copy of the video during his tenure as an embedded journalist. I was aghast at Mr. Finkel’s portrayal of the incident. Reading his account, one would believe the engagement was somehow justified as ‘payback’ for an earlier attack that lead to the death of a soldier. Mr. Finkel ends his account of the engagement by discussing how a soldier finds an individual still alive from the attack. He writes that the soldier finds him and sees him gesture with his two forefingers together, a common method in the Middle East to communicate that they are friendly. However, instead of assisting him, the soldier makes an obscene gesture extending his middle finger.

    The individual apparently dies shortly thereafter. Reading this, I can only think of how this person was simply trying to help others, and then he quickly finds he needs help as well. To make matter worse, in the last moments of his life, he continues to express his friendly gesture– his friendly intent– only to find himself receiving this well known gesture of unfriendliness. For me it’s all a big mess, and I am left wondering what these things mean, and how it all fits together , and it burdens me emotionally.

    I saved a copy of the video on my workstation. I searched for and found the rules of engagement, the rules of engagement annexes, and a flow chart from the 2007 time period– as well as an unclassified Rules of Engagement smart card from 2006. On 15 February 2010 I burned these documents onto a CD-RW, the same time I burned the 10 Reykjavik 13 cable onto a CD-RW. At the time, I placed the video and rules for of engagement information onto my personal laptop in my CHU. I planned to keep this information there until I redeployed in Summer of 2010. I planned on providing this to the Reuters office in London to assist them in preventing events such as this in the future.

    However, after the WLO published 10 Reykjavik 13 I altered my plans. I decided to provide the video and the rules of engagement to them so that Reuters would have this information before I re-deployed from Iraq. On about 21 February 2010, I as described above, I used the WLO submission form and uploaded the documents. The WLO released the video on 5 April 2010. After the release, I was concern about the impact of the video and how it would be received by the general public.

    I hoped that the public would be as alarmed as me about the conduct of the aerial weapons team crew members. I wanted the American public to know that not everyone in Iraq and Afghanistan are targets that needed to be neutralized, but rather people who were struggling to live in the pressure cooker environment of what we call asymmetric warfare. After the release I was encouraged by the response in the media and general public, who observed the aerial weapons team video. As I hoped, others were just as troubled– if not more troubled that me by what they saw.

    At this time, I began seeing reports claiming that the Department of Defense and CENTCOM could not confirm the authenticity of the video. Additionally, one of my supervisors, Captain Casey Fulton, stated her belief that the video was not authentic. In her response, I decided to ensure that the authenticity of the video would not be questioned in the future. On 25 February 2010, I emailed Captain Fulton a link to the video that was on our ‘T’ drive, and a copy of the video published by WLO that was collected by the Open Source Center, so she could compare them herself.

    Around this time frame, I burned a second CD-RW containing the aerial weapons team video. In order to made it appear authentic, I placed a classification sticker and wrote Reuters FOIA REQ on its face. I placed the CD-RW in one of my personal CD cases containing a set of ‘Starting Out in Arabic’ CD’s. I planned on mailing out the CD-RW to Reuters after our I re-deployed , so they could have a copy that was unquestionably authentic.

    Almost immediately after submitting the aerial weapons team video and the rules of engagement documents I notified the individuals in the WLO IRC to expect an important submission. I received a response from an individual going by the handle of ‘ox’ ‘office’– at first our conversations were general in nature, but over time as our conversations progressed, I accessed assessed this individual to be an important part of the WLO.

    Due to the strict adherence of anonymity by the WLO, we never exchanged identifying information. However, I believe the individual was likely Mr. Julian Assange [he pronounced it with three syllables], Mr. Daniel Schmidt, or a proxy representative of Mr. Assange and Schmidt.

    As the communications transferred from IRC to the Jabber client, I gave ‘ox’ ‘office’ and later ‘pressassociation’ the name of Nathaniel Frank in my address book, after the author of a book I read in 2009.

    After a period of time, I developed what I felt was a friendly relationship with Nathaniel. Our mutual interest in information technology and politics made our conversations enjoyable. We engaged in conversation often. Sometimes as long as an hour or more. I often looked forward to my conversations with Nathaniel after work.

    The anonymity that was provided by TOR and the Jabber client and the WLO’s policy allowed me to feel I could just be myself, free of the concerns of social labeling and perceptions that are often placed upon me in real life. In real life, I lacked a closed friendship with the people I worked with in my section, the S2 section.

    In my section, the S2 section and supported battalions and the 2nd Brigade Combat Team as a whole. For instance, I lacked close ties with my roommate to his discomfort regarding my perceived sexual orientation. Over the next few months, I stayed in frequent contact with Nathaniel. We conversed on nearly a daily basis and I felt that we were developing a friendship.

    Conversations covered many topics and I enjoyed the ability to talk about pretty much everything anything, and not just the publications that the WLO was working on. In retrospect I realize that that these dynamics were artificial and were valued more by myself than Nathaniel. For me these conversations represented an opportunity to escape from the immense pressures and anxiety that I experienced and built up through out the deployment. It seems that as I tried harder to fit in at work, the more I seemed to alienate my peers and lose the respect, trust, and support I needed.

    Facts regarding the unauthorized storage and disclosure of documents related to the detainments by the Iraqi Federal Police or FP, and the Detainee Assessment Briefs, and the USACIC United States Army Counter Intelligence Center report.

    On 27 February 2010, a report was received from a subordinate battalion. The report described an event in which the Federal Police or FP detained 15 individuals for printing anti-Iraqi literature. On 2 March 2010, I received instructions from an S3 section officer in the 2nd Brigade Combat Team, 10th Mountain Division Tactical Operation Center or TOC to investigate the matter, and figure out who these quote ‘bad guys’ unquote were and how significant this event was for the Federal Police.

    Over the course of my research I found that none of the individuals had previous ties to anti-Iraqi actions or suspected terrorist militia groups. A few hours later, I received several photos from the scene– from the subordinate battalion. They were accidentally sent to an officer on a different team on than the S2 section and she forwarded them to me.

    These photos included picture of the individuals, pallets of unprinted paper and seized copies of the final printed material or the printed document; and a high resolution photo of the printed material itself. I printed up one [missed word] copy of a high resolution photo– I laminated it for ease of use and transfer. I then walked to the TOC and delivered the laminated copy to our category two interpreter.

    She reviewed the information and about a half an hour later delivered a rough written transcript in English to the S2 section. I read the transcript and followed up with her, asking her for her take on the content. She said it was easy for her to transcribe verbatim, since I blew up the photograph and laminated it. She said the general nature of the document was benign. The documentation, as I had sensed as well, was merely a scholarly critique of the then current Iraqi Prime Minister Nouri al-Maliki.

    It detailed corruption within the cabinet of al-Maliki’s government and the financial impact of his corruption on the Iraqi people. After discovering this discrepancy between the Federal Police’s report and the interpreter’s transcript, I forwarded this discovery to the top OIC and the battle NCOIC. The top OIC and the overhearing battle captain informed me that they didn’t need or want to know this information anymore. They told me to quote “drop it” unquote and to just assist them and the Federal Police in finding out, where more of these print shops creating quote “anti-Iraqi literature” unquote.

    I couldn’t believe what I heard and I returned to the T-SCIF and complained to the other analysts and my section NCOIC about what happened. Some were sympathetic, but no one wanted to do anything about it.

    I am the type of person who likes to know how things work. And, as an analyst, this means I always want to figure out the truth. Unlike other analysts in my section or other sections within the 2nd Brigade Combat Team, I was not satisfied with just scratching the surface and producing canned or cookie cutter assessments. I wanted to know why something was the way it was, and what we could to correct or mitigate a situation.

    I knew that if I continued to assist the Baghdad Federal Police in identifying the political opponents of Prime Minister al-Maliki, those people would be arrested and in the custody of the Special Unit of the Baghdad Federal Police and very likely tortured and not seen again for a very long time– if ever.

    Instead of assisting the Special Unit of the Baghdad Federal Police, I decided to take the information and expose it to the WLO, in the hope that before the upcoming 7 March 2010 election, they could generate some immediate press on the issue and prevent this unit of the Federal Police from continuing to crack down on political opponents of al-Maliki.

    On 4 March 2010, I burned the report, the photos, the high resolution copy of the pamphlet, and the interpreter’s hand written transcript onto a CD-RW. I took the CD-RW to my CHU and copied the data onto my personal computer. Unlike the times before, instead of uploading the information through the WLO website’s submission form. I made a Secure File Transfer Protocol or SFTP connection to a file drop box operated by the WLO.

    The drop box contained a folder that allowed me to upload directly into it. Saving files into this directory, allowed anyone with log in access to the server to view and download them. After uploading these files to the WLO, on 5 March 2010, I notified Nathaniel over Jabber. Although sympathetic, he said that the WLO needed more information to confirm the event in order for it to be published or to gain interest in the international media.

    I attempted to provide the specifics, but to my disappointment, the WLO website chose not to publish this information. At the same time, I began sifting through information from the US Southern Command or SOUTHCOM and Joint Task Force Guantanamo, Cuba or JTF-GTMO. The thought occurred to me– although unlikely, that I wouldn’t be surprised if the individuals detainees detained by the Federal Police might be turned over back into US custody– and ending up in the custody of Joint Task Force Guantanamo.

    As I digested through the information on Joint Task Force Guantanamo, I quickly found the Detainee Assessment Briefs or DABs. I previously came across the documents before in 2009 but did not think much about them. However, this time I was more curious in during this search and I found them again.

    The DABs were written in standard DoD memorandum format and addressed the commander US SOUTHCOM. Each memorandum gave basic and background information about a specific detainee held at some point by Joint Task Force Guantanamo. I have always been interested on the issue of the moral efficacy of our actions surrounding Joint Task Force Guantanamo. On the one hand, I have always understood the need to detain and interrogate individuals who might wish to harm the United States and our allies, however, I felt that’s what we were trying to do at Joint Task Force Guantanamo.

    However, the more I became educated on the topic, it seemed that we found ourselves holding an increasing number of individuals indefinitely that we believed or knew to be innocent, low level foot soldiers that did not have useful intelligence and would be released if they were still held in theater.

    I also recall that in early 2009 the, then newly elected president, Barack Obama, stated that he would close Joint Task Force Guantanamo, and that the facility compromised our standing over all, and diminished our quote ‘moral authority’ unquote.

    After familiarizing myself with the Detainee Assessment Briefs, I agree. Reading through the Detainee Assessment Briefs, I noticed that they were not analytical products, instead they contained summaries of tear line versions of interim intelligence reports that were old or unclassified. None of the DABs contained the names of sources or quotes from tactical interrogation reports or TIR’s. Since the DABs were being sent to the US SOUTHCOM commander, I assessed that they were intended to provide a very general background information on each of the detainees and not a detailed assessment.

    In addition to the manner in which the DAB’s were written, I recognized that they were at least several years old, and discussed detainees that were already released from Joint Task Force Guantanamo. Based on this, I determined that the DABs were not very important from either an intelligence or a national security standpoint. On 7 March 2010, during my Jabber conversation with Nathaniel, I asked him if he thought the DABs were of any use to anyone.

    Nathaniel indicated, although he did not believe that they were of political significance, he did believe that they could be used to merge into the general historical account of what occurred at Joint Task Force Guantanamo. He also thought that the DAB’s might be helpful to the legal counsel of those currently and previously held at JTF-GTMO.

    After this discussion, I decided to download the data DABs. I used an application called Wget to download the DABs. I downloaded Wget off of the NIPRnet laptop in the T-SCIF, like other programs. I saved that onto a CD-RW, and placed the executable in my ‘My Documents’ directory on of my user profile, on the D6-A SIPRnet workstation.

    On 7 March 2010, I took the list of links for the Detainee Assessment Briefs, and Wget downloaded them sequentially. I burned the data onto a CD-RW, and took it into my CHU, and copied them to my personal computer. On 8 March 2010, I combined the Detainee Assessment Briefs with the United States Army Counterintelligence Center report on the WLO, into a compressed [missed word] IP or zip file. Zip files contain multiple files which are compressed to reduce their size.

    After creating the zip file, I uploaded the file onto their cloud drop box via Secure File Transfer Protocol. Once these were uploaded, I notified Nathaniel that the information was in the ‘x’ directory, which had been designated for my own use. Earlier that day, I downloaded the USACIC report on WLO.

    As discussed about above, I previously reviewed the report on numerous occasions and although I saved the document onto the work station before, I could not locate it. After I found the document again, I downloaded it to my work station, and saved it onto the same CD-RW as the Detainee Assessment Briefs described above.

    Although my access included a great deal of information, I decided I had nothing else to send to WLO after sending the Detainee Assessment Briefs and the USACIC report. Up to this point I had sent them the following: the CIDNE-I and CIDNE-A SigActs tables; the Reykjavik 13 Department of State Cable; the 12 July 2007 aerial weapons team video and the 2006-2007 rules of engagement documents; the SigAct report and supporting documents concerning the 15 individuals detained by the Baghdad Federal Police; the USSOUTHCOM and Joint Task Force Guantanamo Detainee Assessment Briefs; a USACIC report on the WikiLeaks organization website.

    Over the next few weeks I did not send any additional information to the WLO. I continued to converse with Nathaniel over the Jabber client and in the WLO IRC channel. Although I stopped sending documents to WLO, no one associated with the WLO pressured me into giving more information. The decisions that I made to send documents and information to the WLO and the website were my own decisions, and I take full responsibility for my actions.

    Facts regarding the unauthorized storage and disclosure of other Government documents.

    One 22 March 2010, I downloaded two documents. I found these documents over the course of my normal duties as an analyst. Based on my training and the guidance of my superiors, I look at as much information as possible.

    Doing so provided me with the ability to make connections that others might miss. On several occasions during the month of March, I accessed information from a government entity. I read several documents from a section within this government entity. The content of two of these documents upset me greatly. I had difficulty believing what this section was doing.

    On 22 March 2010, I downloaded the two documents that I found troubling. I compressed them into a zip file named blah.zip and burned them onto a CD-RW. I took the CD-RW to my CHU and saved the file to my personal computer.

    I uploaded the information to the WLO website using the designated prompts.

    Facts regarding the unauthorized storage and disclosure of the Net Centric Diplomacy Department of State cables.

    In late March of 2010, I received a warning over Jabber from Nathaniel, that the WLO website would be publishing the aerial weapons team video. He indicated that the WLO would be very busy and the frequency and intensity of our Jabber conversations decrease significantly. During this time, I had nothing but work to distract me.

    I read more of the diplomatic cables published on the Department of State Net Centric Diplomacy server. With my insatiable curiosity and interest in geopolitics I became fascinated with them. I read not only the cables on Iraq, but also about countries and events that I found interesting.

    The more I read, the more I was fascinated with by the way that we dealt with other nations and organizations. I also began to think that the documented backdoor deals and seemingly criminal activity that didn’t seem characteristic of the de facto leader of the free world.

    Up to this point, during the deployment, I had issues I struggled with and difficulty at work. Of the documents release, the cables were the only one I was not absolutely certain couldn’t harm the United States. I conducted research on the cables published on the Net Centric Diplomacy, as well as how Department of State cables worked in general.

    In particular, I wanted to know how each cable was published on SIRPnet via the Net Centric Diplomacy. As part of my open source research, I found a document published by the Department of State on its official website.

    The document provided guidance on caption markings for individual cables and handling instructions for their distribution. I quickly learned the caption markings clearly detailed the sensitivity level of the Department of State cables. For example, NODIS or No Distribution was used for messages at the highest sensitivity and were only distributed to the authorized recipients.

    The SIPDIS or SIPRnet distribution caption was applied only to recording of other information messages that were deemed appropriate for a release for a wide number of individuals. According to the Department of State guidance for a cable to have the SIPDIS [missed word] caption, it could not include other captions that were intended to limit distribution.

    The SIPDIS caption was only for information that could only be shared with anyone with access to SIPRnet. I was aware that thousands of military personnel, DoD, Department of State, and other civilian agencies had easy access to the tables. The fact that the SIPDIS caption was only for wide distribution made sense to me, given that the vast majority of the Net Centric Diplomacy Cables were not classified.

    The more I read the cables, the more I came to the conclusion that this was the type of information that– that this type of information should become public. I once read a and used a quote on open diplomacy written after the First World War and how the world would be a better place if states would avoid making secret pacts and deals with and against each other.

    I thought these cables were a prime example of a need for a more open diplomacy. Given all of the Department of State cables information that I read, the fact that most of the cables were unclassified, and that all the cables have a SIPDIS caption, I believe that the public release of these cables would not damage the United States; however, I did believe that the cables might be embarrassing, since they represented very honest opinions and statements behind the backs of other nations and organizations.

    In many ways these cables are a catalogue of cliques and gossip. I believed exposing this information might make some within the Department of State and other government entities unhappy. On 22 March 2010, I began downloading a copy of the SIPDIS cables using the program Wget, described above.

    I used instances of the Wget application to download the Net Centric Diplomacy cables in the background. As I worked on my daily tasks, the Net Centric Diplomacy cables were downloaded from 28 March 2010 to 9 April 2010. After downloading the cables, I saved them onto a CD-RW.

    These cables went from the earliest dates in Net Centric Diplomacy to 28 February 2010. I took the CD-RW to my CHU on 10 April 2010. I sorted the cables on my personal computer, compressed them using the bzip2 compression algorithm described above, and uploaded them to the WLO via designated drop box described above.

    On 3 May 2010, I used Wget to download and update of the cables for the months of March 2010 and April 2010 and saved the information onto a zip file and burned it to a CD-RW. I then took the CD-RW to my CHU and saved those to my computer. I later found that the file was corrupted during the transfer. Although I intended to re-save another copy of these cables, I was removed from the T-SCIF on 8 May 2010 after an altercation.

    Facts regarding the unauthorized storage and disclosure of Garani, Farah Province Afghanistan 15-6 Investigation and Videos.

    [NB Pfc. Manning plead ‘not guilty’ to the Specification 11, Charge II for the Garani Video as charged by the government, which alleged as November charge date. Read more here.]

    In late March 2010, I discovered a US CENTCOM directly on a 2009 airstrike in Afghanistan. I was searching CENTCOM for information I could use as an analyst. As described above, this was something that myself and other analysts and officers did on a frequent basis. As I reviewed the documents I recalled the incident and what happened. The airstrike occurred in the Garani village in the Farah Province, Northwestern Afghanistan. It received worldwide press coverage during the time as it was reported that up to 100 to 150 Afghan civilians– mostly women and children– were accidentally killed during the airstrike.

    After going through the report and the [missed word] annexes, I began to review the incident as being similar to the 12 July 2007 aerial weapons team engagements in Iraq. However, this event was noticeably different in that it involved a significantly higher number of individuals, larger aircraft and much heavier munitions. Also, the conclusions of the report are even more disturbing than those of the July 2007 incident.

    I did not see anything in the 15-6 report or its annexes that gave away sensitive information. Rather, the investigation and its conclusions helped explain how this incident occurred, and were– what those involved should have done, and how to avoid an event like this from occurring again.

    After investigating the report and its annexes, I downloaded the 15-6 investigation, PowerPoint presentations, and several other supporting documents to my D6-A workstation. I also downloaded three zip files containing the videos of the incident. I burned this information onto a CD-RW and transferred it to the personal computer in my CHU. I did later that day or the next day– I uploaded the information to the WLO website this time using a new version of the WLO website submission form.

    Unlike other times using the submission form above, I did not activate the TOR anonymizer. Your Honor, this concludes my statement and facts for this providence inquiry.

    __________

    UPDATE: On March 2, 2013, I went through each line of the rush transcript published here on March 1 to check it for accuracy and inadvertent typos or misspellings.

    Since multiple news outlets have printed the rush transcript that was originally published here; every single amendment made during this review– including non-substantive typos– are noted with a strike-through and/or highlighted.

    When I first published the rush transcript of Manning’s statement, I had noted under “Facts regarding the unauthorized storage and disclosure of the 12 July 2007 aerial weapons team or AW team video” that the handle of the individual who Manning said he interacted with was ‘office’ and not ‘ox’.

    When Guardian journalist, Ed Pilkington, approached me to ask for permission to publish the rush transcript on the guardian.co.uk, we had a quick conversation concerning the fact that both he and a Wired journalist had noted the handle was ‘ox’ and not ‘office’.

    Because of the overriding need to publish Manning’s statement as soon as possible, and my being back in Court at Fort Meade during our exchange after having worked through the night to get a rush transcript completed and published, I quickly deferred to consensus and amended ‘office’ to ‘ox’.

    After reviewing my rush transcript line-by-line, however, I stand by my original notation of the handle as ‘office’, and not ‘ox’. I have amended the transcript above to reflect that determination.
    Categories: Bradley Manning, WikiLeaks

    By Alexa O’Brien on February 28, 2013 11:59 AM |

    Find this story at 28 February 2013

    Bradley Manning Gets No Love From The New York Times

    Last week, in a Grisham-like courtroom scene, Bradley Manning—the Army private charged with leaking hundreds of thousands of classified war logs and State Department cables to WikiLeaks—testified publicly for the first time since his arrest in May of 2010. For more than five hours, Manning described the two months he spent in a “cage” inside a dark tent in Kuwait and the nine months that followed in 23-hours-a-day solitary confinement on a Marine Corps Brig in Quantico, Virginia. In one theatrical moment, Manning got up from the stand and paced inside a 6 by 8 tape outline on the courtroom floor to demonstrate the size of his prison cell. In another, he donned the suicide smock he had to wear.

    Manning’s testimony was the climax of a week of pre-trial hearings about his experience at Quantico, which, his lawyer argued, was illegal and grounds for dropping the charges against him. The details about Manning’s captors revealed in the hearings—they called his underwear, which they removed at night so he wouldn’t hang himself by the waistband, “panties”; penned a poem about his presumed suicidal tendencies inspired by Dr. Seuss’s Green Eggs and Ham (“I can wear them in a box / I can wear them with a fox / I can wear them in the day / I can wear them so I say / But I can’t wear them at night / My comments gave the staff a fright”); and ignored a psychiatrist’s recommendations for fewer restrictions—made dispatches read more like a scene from The Lives of Others than a court proceeding in the United States.

    There was, however, a notable absence in the courtroom: The New York Times. The paper did not cover the hearings, picking up only one dispatch from the Associated Press. This is odd, especially considering the Times benefited as much as anyone from the material that Manning leaked. After partnering with WikiLeaks to release the cables in July 2010, the Times continued to rely on the documents Manning leaked to Assange in its reporting. In April 2011, an analysis in The Atlantic Wire showed that 54, or nearly half, of the newspaper’s 115 issues so far that year, had contained stories that “relied on WikiLeaks documents as sources.”

    “It’s really crazy,” says Michael Ratner, a human rights lawyer from the Center for Constitutional Rights who has been defending Julian Assange. “[T]he key leaker in U.S. history in the last decade, and they don’t cover his treatment? He’s the one whose materials they used and they don’t cover it? I don’t get it. [T]hey had to make a decision not to do it.”

    The Times has covered Manning’s trial to some degree–in early November, the paper published a story about Manning’s plans to plead guilty to some charges and the Times’ editorialized against Manning’s poor treatment at Quantico back in March of 2011. But last week’s hearing, with Manning’s direct testimony, seemed especially newsworthy–outlets including CNN, The Washington Post, The New Yorker, and New York Magazine covered it. The Guardian, another newspaper that collaborated with Wikileaks and the Times, sent veteran reporter Ed Pilkington, the chief reporter for Guardian U.S. and a former national and international editor for the paper. Pilkington called his decision to cover the hearings in depth “pure news judgement,” when we spoke.

    Like thorough, unbiased reporting that challenges your way of thinking? Subscribe to The New Republic for $3.99/month.

    The Times has always had a rocky relationship with WikiLeaks, Manning, and other leakers of state secrets. After publishing the cables, Bill Keller, the Times executive editor at the time, wrote an 8,000-word New York Times Magazine story in which he compared Julian Assange to a “bag lady.” “We regarded Assange throughout as a source, not as a partner or collaborator,” he wrote. The Guardian, on the other hand, sought “partnership between a mainstream newspaper and WikiLeaks: a new model of cooperation aimed at publishing the world’s biggest leak,” as Yochai Benkler described it in the Harvard Civil-Rights Civil-Liberties Law Review. (My emails to Times executive editor Jill Abramson, Washington bureau chief David Leonhardt, and Keller, were not answered.)

    The Times’ attitude towards Assange and Manning is, at least, consistent with its treatment of leakers in the past. Even though the Times had to defend itself in court for publishing the Pentagon Papers, Daniel Ellberg told me over the phone that the paper’s lawyers refused to offer him even the smalles amount of help with his criminal case (which was eventually dismissed). In Ellsberg’s telling, A.M. Rosenthal, then the editor-in-chief of the Times, told him there was no policy at the paper regarding prosecutions of sources: Ellsberg was, after all, the first person ever prosecuted for leaking classified government documents to the press.

    “Editors and reporters have a good deal of ambivalence towards their sources, especially in the national security field,” Ellsberg told me. “They all thought I had broken the law, and a lot of them may have thought I was a traitor even though they used the material.” When Assange expressed his shock to Ellsberg over a critical profile the Times published about him, Ellsberg told him “don’t take it personally, they didn’t treat me any better.”

    DECEMBER 5, 2012
    BY ELIZA GRAY

    Find this story at 5 December 2013

    COPYRIGHT 2013 © THE NEW REPUBLIC

    Alexander Litvinenko coroner to hold closed hearing on evidence

    A coroner is to hold a private hearing to decide if an inquest into the death of former Russian spy Alexander Litvinenko should hear secret evidence from the intelligence services.

    Lawyers for the dissident’s widow, Marina, will be excluded from the special session.

    27 February 2013

    Find this 27 February 2013

    © 2012 Evening Standard Limited

    Litvinenko Lawyer Accuses U.K., Russia of Cover-Up

    LONDON — A lawyer for the family of former Russian spy Alexander Litvinenko accused the British and Russian governments Tuesday of trying to stymie a long-delayed inquest into his poisoning death.

    Litvinenko, a Russian intelligence agent turned Kremlin critic, died in London in November 2006 after drinking tea laced with the rare radioactive isotope polonium-210.

    The allegations of a cover-up came at a London court hearing where British media organizations challenged a government bid to hold parts of the inquest in secret for security reasons. In Britain, inquests are held to determine the facts whenever someone dies violently, unexpectedly or in disputed circumstances.

    Ben Emmerson, the lawyer for Litvinenko’s widow Marina, said the government’s quest for secrecy was delaying proceedings and suggested that foreign policy — namely trade relations — could be at the heart of the matter.

    “We know nothing about why these applications are being made, and we are dancing in the dark,” he told coroner Robert Owen. “This is beginning to look like you’re being steamrollered by two states acting in collaboration with each other.”

    Lawyers for Litvinenko’s family say that at the time of his death he was working for the British intelligence services, and Britain accuses two Russians of the killing. Moscow authorities have refused to extradite them for trial.

    British government lawyer Neil Sheldon said “the disclosure of the material in question would pose a real risk to the public interest.”

    Emmerson, who said the inquest is “shaping up to be a stain on British justice,” called the government’s arguments for secrecy absurd.

    Alex Bailin, the lawyer representing prominent British media organizations, insisted that at the very least the government must clarify what issues are at stake and what harm they could cause.

    Failing to do so, he said, “would have the very serious effect of undermining the public’s confidence in this inquest.”

    26 February 2013 | Issue 5077
    The Associated Press

    Find this story at 26 February 2013

     

    © Copyright 1992-2013. The Moscow Times

    Foreign Office bid to guard secrets at Alexander Litvinenko inquest

    The public may be excluded from part of a pre-inquest hearing into the death of former Russian spy Alexander Litvinenko.

    A coroner was today considering an application from the government to keep some information secret at the forthcoming inquest.

    Mr Litvinenko died at a London hospital in November 2006, three weeks after drinking tea which had been poisoned with the radioactive isotope polonium-210.

    26 February 2013

    Find this story at 26 February 2013

    © 2012 Evening Standard Limited

    Litvinenko inquest: newspapers launch challenge over withholding of evidence

    Media groups including Guardian will challenge government over attempt to conceal sensitive documents

    Alexander Litvinenko pictured shortly before his death in 2006. Photograph: Natasja Weitsz/Getty Images

    Media groups will on Tuesday challenge what they describe as a “deeply troubling” attempt by the government to withhold evidence from the inquest into the murder of Alexander Litvinenko.

    The Guardian, the BBC, the Financial Times and other newspapers are challenging a submission by the foreign secretary, William Hague, to conceal sensitive documents. Hague argues the material could harm “national security”, as well as the UK’s “international relations”.

    The government has refused to say what evidence it wants to hide. But it is likely to deal with revelations made at a hearing in December that at the time of his poisoning in November 2006 Litvinenko was actively working for the British secret services.

    Litvinenko was also a “paid agent” of the Spanish security services. MI6 encouraged him to supply information to the Spanish about Russian mafia activities, and alleged links between top organised criminals and the Kremlin, the hearing was told.

    Litvinenko travelled to Spain in 2006 and met his MI6 handler, “Martin”, shortly before his fateful encounter with Andrei Lugovoi and Dmitry Kovtun, the two men accused of killing him. The inquest – scheduled to begin in May – will hear claims that the pair were part of a “Russian state” plot to murder Litvinenko using radioactive polonium.

    The fact that Litvinenko – a former Russian spy – was working for MI6 raises embarrassing questions as to whether British intelligence should have done more to protect him. Litvinenko had a dedicated phone to contact “Martin” and received regular payments to his bank account from MI6 and Madrid, it emerged in December.

    In making their submission to the coroner, Sir Robert Owen, on Tuesday, the media groups will seek to argue that Hague’s attempt to withhold evidence could undermine public confidence in the inquest. Currently the media – as well as Litvinenko’s widow, Marina, and son, Anatoly, – are “completely in the dark” over what material the FCO seeks to exclude.

    The media groups will seek to persuade the coroner that the government has also failed to explain what “harm” the release of the information might cause. Nor has it properly considered “lesser measures”, such as redaction, which would allow some disclosure of sensitive documents, or the possibility of closed sessions.

    Alex Bailin QC, the lawyer acting for the Guardian, will argue that “the public and media are faced with a situation where a public inquest into a death … may have large amounts of highly relevant evidence excluded from consideration by the inquest. Such a prospect is deeply troubling.”

    There are grave public concerns that allegations of “state-sponsored assassination” on the streets of London require “maximum openness”. Additionally, the inquest is likely to be the only judicial forum where evidence will be heard, since the Kremlin has refused to extradite Lugovoi and Kovtun.

    Speaking on Monday, Litvinenko’s friend Alex Goldfarb said the foreign secretary appeared unwilling to offend Russia’s “vindictive” president. Goldfarb told the Guardian: “I recognise that Mr Hague has a well-founded interest not to rock the boat with [Vladimir] Putin. He’s afraid. He’s afraid Putin will not vote the way he wants in the UN or squeeze Britain’s interests.”

    He added: “The inquest is a balance between the interests of international relations and justice. The bottom line is how far do you compromise with your own justice and decency, and the benefits from doing business with arrogant, murderous and dictatorial foreign states?”

    Goldfarb said forensic evidence and reports from Scotland Yard had already been disclosed to interested parties. But he said he was worried the government wanted to keep secret highly sensitive documents showing links between Russian mobsters in Spain and “Putin’s inner circle”. “That’s what Sasha [Litvinenko] was up to,” Goldfarb said.

    An FCO spokesperson said: “The government has made an application to the court for public interest immunity in line with its duty to protect national security and the coroner is responsible for deciding that application based on the overall public interest.”

    Owen is due to hear submissions from the media at a hearing in the Royal Courts of Justice on Tuesday. He has previously indicated that he wants the inquest to be as open and broad as possible.

    What’s this?
    More from the Guardian
    Microsoft fined €561m for ‘browser choice’ error 06 Mar 2013
    30 best iPhone and iPad apps this week 08 Mar 2013
    Saudi seven face crucifixion and firing squad for armed robbery 05 Mar 2013
    Woman dies in Barnet after possible road rage attack 05 Mar 2013
    Two-year-old at risk of becoming a victim of forced marriage 05 Mar 2013
    ‘Bradford Batman’ unmasks himself 05 Mar 2013
    Related information
    Law
    Media
    Politics
    William Hague ·
    UK news
    World news
    Alexander Litvinenko · Russia ·

    Steve Bell on government plans to restrict ‘health tourism’ – cartoon

    4 Mar 2013

    The government is examining ways to remove incentives for eastern Europeans to come to Britain when EU restrictions are lifted

    4 Mar 2013

    Libyan politician offers to settle UK lawsuit for £3 and an apology

    3 Mar 2013

    Assad: UK is ‘famously unconstructive’ towards Syria – video

    27 Feb 2013

    Alexander Litvinenko’s widow: ‘I trust the coroner’ – video

    UK files on murdered spy Litvinenko must stay secret, rules coroner

    27 Feb 2013

    Media and widow of Russian excluded from pre-inquest hearing in London on William Hague’s request to withhold evidence

    Luke Harding
    guardian.co.uk, Monday 25 February 2013 14.27 GMT

    Find this story at 25 February 2013

     

     
    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Police spies: in bed with a fictional character

    Mark Jenner lived with a woman under a fake name. Now she has testified to MPs about the ‘betrayal and humiliation’ she felt

    Mark Jenner, the undercover officer in the Metropolitan police’s special demonstration squad, who went by the name of Mark Cassidy for six years – then disappeared.

    He was a burly, funny scouser called Mark Cassidy. His girlfriend – a secondary school teacher he shared a flat with for four years – believed they were almost “man and wife”. Then, in 2000, as the couple were discussing plans for the future, Cassidy suddenly vanished, never to be seen again.

    An investigation by the Guardian has established that his real name is Mark Jenner. He was an undercover police officer in the Metropolitan police’s special demonstration squad (SDS), one of two units that specialised in infiltrating protest groups.

    His girlfriend, whose story can be told for the first time as her evidence to a parliamentary inquiry is made public, said living with a police spy has had an “enormous impact” on her life.

    “It has impacted seriously on my ability to trust, and that has impacted on my current relationship and other subsequent relationships,” she said, adopting the pseudonym Alison. “It has also distorted my perceptions of love and my perceptions of sex.”

    Alison is one of four women to testify to the House of Commons home affairs select committee last month.

    Another woman said she had been psychologically traumatised after discovering that the father of her child, who she thought had disappeared, was Bob Lambert, a police spy who vanished from her life in the late 1980s.

    A third woman, speaking publicly for the first time about her six-year relationship with Mark Kennedy, a police officer who infiltrated environmental protest groups, said: “You could … imagine that your phone might be tapped or that somebody might look at your emails, but to know that there was somebody in your bed for six years, that somebody was involved in your family life to such a degree, that was an absolute shock.”

    Their moving testimony led the committee to declare that undercover operations have had a “terrible impact” on the lives of innocent women.

    The MPs are so troubled about the treatment of the women – as well as the “ghoulish” practice in which undercover police adopted the identities of dead children – that they have called for an urgent clean-up of the laws governing covert surveillance operations.

    Jenner infiltrated leftwing political groups from 1994 to 2000, pretending to be a joiner interested in radical politics. For much of his deployment, he was under the command of Lambert, who was by then promoted to head of operations of the SDS.

    While posing as Cassidy, he could be coarse but also irreverent and funny. The undercover officer saw himself as something of a poet. A touch over 6ft, he had a broad neck, large shoulders and exuded a tough, working-class quality.

    By the spring of 1995, Jenner began a relationship with Alison and soon moved into her flat. “We lived together as what I would describe as man and wife,” she said. “He was completely integrated into my life for five years.”

    Jenner met her relatives, who trusted him as her long-term partner. He accompanied Alison to her mother’s second wedding. “He is in my mother’s wedding photograph,” she said. Family videos of her nephew’s and niece’s birthdays show Jenner teasing his girlfriend fondly. Others record him telling her late grandmother about his fictionalised family background.

    Alison, a peaceful campaigner involved in leftwing political causes, believes she inadvertently provided the man she knew as Mark Cassidy with “an excellent cover story”, helping persuade other activists he was a genuine person.

    “People trusted me, people knew that I was who I said I was, and people believed, therefore, that he must be who he said he was because he was welcomed into my family,” she said.

    It was not unusual for undercover operatives working for the SDS or its sister squad, the national public order unit, to have sexual relationships with women they were spying on. Of the 11 undercover police officers publicly identified, nine had intimate sexual relations with activists. Most were long-term, meaningful relationships with women who believed they were in a loving partnership.

    Usually these spies were told to spend at least one or two days a week off-duty, when they would change clothes and return to their real lives. However, Jenner, who had a wife, appears to have lived more or less permanently with Alison, rarely leaving their shared flat in London.

    It was an arrangement that caused personal problems for the Jenners. At one stage, he is known to have attended counselling to repair his relationship with his wife. Bizarrely, at about the same time, he was also consulting a second relationship counsellor with Alison.

    “I met him when I was 29,” she said. “It was the time when I wanted to have children, and for the last 18 months of our relationship he went to relationship counselling with me about the fact that I wanted children and he did not.”

    Jenner disentangled himself from the deployment in 2000, disappearing suddenly from Alison’s flat after months pretending to suffer from depression.

    The police spy left her a note which read: “We want different things. I can’t cope … When I said I loved you, I meant it, but I can’t do it.” He claimed he was going to Germany to look for work.

    It was all standard procedure for the SDS. Some operatives ended their deployments by pretending to have a breakdown and vanishing, supposedly to go abroad, sending a few letters to their girlfriends with foreign postmarks.

    Alison was left heartbroken and paranoid, feeling that she was losing her mind. She spent more than a decade investigating Jenner’s background, hiring a private detective to try to track him down. She had no idea he was actually working a few miles away at Scotland Yard, where he is understood to still work as a police officer today.

    The strongest clue to Jenner’s real identity came from an incident she recalled from years earlier when he was still living with her. “I discovered he made an error with a credit card about a year and a half into our relationship,” she said. “It was in the name Jenner and I asked him what it was and he told me he bought it off a man in a pub and he had never used it. He asked me to promise to never tell anyone.”

    The Metropolitan police refused to comment on whether Jenner was a police spy. “We are not prepared to confirm or deny the deployment of individuals on specific operations,” it said.

    Alison told MPs that the “betrayal and humiliation” she suffered was beyond normal. “This is not about just a lying boyfriend or a boyfriend who has cheated on you,” she said. “It is about a fictional character who was created by the state and funded by taxpayers’ money. The experience has left me with many, many unanswered questions, and one of those that comes back is: how much of the relationship was real?”

    Paul Lewis and Rob Evans
    The Guardian, Friday 1 March 2013

    Find this story at 1 March 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Police spy Mark Kennedy may have misled parliament over relationships

    Inquiry hears claims of 10 or more women having sexual relations with undercover officer who infiltrated eco-activists

    Mark Kennedy’s evidence saying he had sexual relationships with two people is disputed by women taking legal action against the police. Photograph: Philipp Ebeling

    Mark Kennedy, the police spy who infiltrated the environmental movement, appears to have misled parliament over the number of sexual relationships he had with women while he was working undercover.

    Kennedy told a parliamentary inquiry that he had only two relationships during the seven years he spied on environmental groups.

    However, at least four women had come forward to say that he slept with them when he was a police spy.

    Friends who knew Kennedy when he was living as an eco-activist in Nottingham have identified more than 10 women with whom he slept.

    Kennedy was the only undercover police officer to give evidence to the inquiry conducted by the home affairs select committee.

    He testified in private, but transcripts of his evidence released on Thursday reveal that he claimed he had sexual relationships with “two individuals”.

    But three women who say they are Kennedy’s former lovers are part of an 11-strong group taking legal action against police chiefs for damages.

    A fourth, named Anna, previously told the Guardian she felt “violated” by her sexual relationship with Kennedy, which lasted several months.

    Rob Evans and Paul Lewis
    The Guardian, Friday 1 March 2013

    Find this story at 1 March 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Home Affairs Committee – Thirteenth Report Undercover Policing: Interim Report

    Here you can browse the report which was ordered by the House of Commons to be printed 26 February 2013.

    Find this story at 1 March 2013

    Contents

    Terms of Reference

    Introduction

    The legal framework governing undercover policing

    Responsibility for undercover policing

    The use of dead infants’ identities

    Operation Herne

    Conclusion

    Conclusions and recommendations

    Formal Minutes

    Witnesses

    List of printed written evidence

    List of Reports from the Committee during the current Parliament

    Oral and Written Evidence

    5 February 2013 i

    5 February 2013 ii

    5 February 2013 iii

    5 February 2013 iv

    Written Evidence

    Anatomy of a betrayal: the undercover officer accused of deceiving two women, fathering a child, then vanishing

    The story of Bob Lambert reveals just how far police may have gone to infiltrate political groups

    The grave of Mark Robinson and his parents in Branksome cemetery in Poole, Dorset. Bob Lambert adopted the boy’s identity, abbreviating his second name to Bob. Photograph: Roger Tooth for the Guardian

    The words inscribed on the grave say Mark Robinson “fell asleep” on 19 October, 1959. He was a seven-year-old boy who died of a congenital heart defect, the only child to Joan and William Robinson. They died in 2009 and are buried in the same grave, listed on the headstone as “Mummy” and “Daddy”.

    It is perhaps some solace that Mark’s parents never lived long enough to discover how the identity of their son may have been quietly resurrected by undercover police without their knowledge. The controversial tactic – in which covert officers spying on protesters adopted the identities of dead children – stopped less than a decade ago. More than 100 children’s identities may have been used.

    Last week the home secretary, Theresa May, announced that a chief constable from Derbyshire would take over an inquiry into undercover policing of protest, after revelations by the Guardian into the use of stolen identities.

    Despite an internal investigation that has cost £1.25m, senior officers seem genuinely baffled at the activities of two apparently rogue units that have been monitoring political campaigners since 1968.

    The story of the officer who appears to have used the identity of Mark Robinson, adopting it as his own, reveals much of what has gone wrong with police infiltration of political groups. Bob Lambert, who posed as an animal rights campaigner in the 1980s, not only adopted the identity of a dead child. He was also accused in parliament of carrying out an arson attack on a Debenhams department store and deceiving two women into having long-term sexual relationships with him.

    One of them has now revealed how Lambert fathered a child with her before vanishing from their lives when his deployment came to an end in 1989. She only discovered he was an undercover police officer eight months ago – more than 20 years after he disappeared from the lives of mother and child, claiming to be on the run.

    Using the pseudonym Charlotte, she said in a statement to the home affairs select committee: “There can be no excuses for what he did: for the betrayal, the manipulation and the lies … I loved him so much, but now have to accept that he never existed.”

    Gravestone

    The story of how Bob Lambert became Bob Robinson begins on the outskirts of Poole, Dorset, in 1983. For almost 25 years, a sculpture of the boy stood guard above the grave in Branksome cemetery. “Safe in the arms of Jesus,” the engraving said.

    Lambert would have come across the boy’s paperwork in St Catherine’s House, the national register of births, deaths and marriages. It was a rite of passage for all spies working in the Special Demonstration Squad (SDS), a unit dedicated to spying on protesters. For ease of use, SDS officers looked to adopt the identities of dead children who shared their name and approximate date of birth. They called it “the Jackal Run”, after its fictional depiction in Frederick Forsyth’s novel The Day of the Jackal.

    Mark Robinson was the ideal match. He was born in Plumstead, south-east London, on 28 February, 1952 – just 16 days before Lambert’s date of birth. His second name was Robert, which the spy could abbreviate to Bob. He died of acute congestive cardiac failure after being born with a malformed heart. Other SDS officers are known to have chosen children who died of leukaemia or were killed in road accidents.

    Undercover police did not merely adopt the names of dead children, but revived entire identities, researching their family backgrounds and secretly visiting the homes they were brought up in.

    When the spy made his debut in London as a long-haired anti-capitalist, he introduced himself as Bob Robinson and said he was born in Plumstead. He had fake identity documents, including a driving licence in the name of Mark Robinson. Recently, he is understood to have said his full undercover alias was Mark Robert Robinson. The date of birth he gave is still in a diary entry of one close friend: it was the same date as that of the dead child.
    Bob Lambert, aka Bob Robinson Photograph: guardian.co.uk

    Double life

    It was the start of a surreal double life. For most of the week he lived as Robinson, a gardener and active member of the environmental group London Greenpeace. For one or two days a week, he returned to the more conventional life with his wife and children in Hertfordshire. SDS insiders say Lambert was revered as one of the best operatives in the field. He helped jail two activists from the Animal Liberation Front who were convicted of planting incendiary devices in branches of Debenhams in protest at the sale of fur in July1987.

    Lambert’s relationship with Charlotte, then 22, helped bolster his undercover credibility. When they met in 1984, Lambert was her first serious relationship, and 12 years her senior.

    “He got involved in animal rights and made himself a useful member of the group by ferrying us around in his van,” she said. “He was always around, wherever I turned he was there trying to make himself useful, trying to get my attention. I believed at the time that he shared my beliefs and principles. In fact, he would tease me for not being committed enough.”

    Around Christmas that year, Charlotte became pregnant. “Bob seemed excited by the news and he was caring and supportive throughout the pregnancy,” she said. “Bob was there by my side through the 14 hours of labour in the autumn of 1985 when our son was born. He seemed to be besotted with the baby. I didn’t realise then that he was already married with two other children.”

    Two years later, Lambert’s deployment came to an end. He told friends police were on his tail and he needed to flee to Spain. “He promised he would never abandon his son and said that as soon as it was safe I could bring our baby to Spain to see him,” Charlotte said. Instead, the man she knew as Bob Robinson disappeared forever.

    She was left to bring up their son as a single parent. It was an impoverished life, made worse because there was no way she could receive child maintenance payments. “At that time I blamed myself a lot for the break-up and for the fact that my son had lost his father,” she said.

    When Charlotte’s son became older, the pair tried to track down Bob Robinson, who they presumed was still living in Spain. They could not have known he was working just a few miles away.

    In the mid-1990s, Lambert was promoted to head of operations at the SDS, giving him overarching responsibility for a fleet of other spies. Just like their boss, they adopted the identities of dead children before going undercover to cultivate long-term and intimate relationships with women. That was the unit’s tradecraft and Lambert, with his experience in the field, was its respected spymaster. “I chatted to Bob about everything.” said Pete Black, an SDS officer who infiltrated anti-racist groups under Lambert. “You used to go in with any sort of problems, and if he could not work out how to get you out of the shit, then you were fucked.”

    After his senior role in the SDS, Lambert rose through the ranks of special branch and, in the aftermath of 9/11, founded the Muslim Contact Unit, which sought to foster partnerships between police and the Islamic community.

    Intimate relationships

    He was awarded an MBE for services to policing and retired to start a fresh career in academia, with posts at St Andrews and Exeter universities.

    ‘It was my Bob’

    In 2011, Lambert’s past returned to haunt him. That year Mark Kennedy, another police spy, was revealed to have spent seven years infiltrating eco activists. He had several intimate relationships with women, including one that lasted six years. Kennedy worked for the National Public Order Intelligence Unit, another squad dedicated to monitoring protesters and the second, according to the Metropolitan police, believed to have used the identities of dead children.

    Amid the outcry over Kennedy’s deployment, there was a renewed push among activists to unmask police infiltrators. It was some of Lambert’s old friends in London Greenpeace who eventually made the connection, comparing YouTube videos of Lambert speeches with grainy photographs of Bob Robinson in the 1980s.

    Lambert was giving a talk in a London auditorium when members of the audience – veterans from London Greenpeace – confronted him about his undercover past. He left the stage and walked out of a side door. Outside, he was stony-faced as he was chased down the street by a handful of ageing campaigners. He jumped into a taxi and melted into the afternoon traffic.

    It was only the start of a cascade of claims to tarnish the senior officer’s reputation. In June last year, the Green MP Caroline Lucas used a parliamentary speech to allege that Lambert planted one of three incendiary devices in branches of Debenhams. No one was hurt in the attack on the Harrow store, in north-west London, which caused £340,000 worth of damage. Pointing to evidence that suggested Lambert planted the device, the MP asked: “Has another undercover police officer crossed the line into acting as an agent provocateur?”

    Rob Evans and Paul Lewis
    The Guardian, Thursday 21 February 2013 18.00 GMT

    Find this story at 21 February 2013
    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Inside the Terror Factory; Award-winning journalist Trevor Aaronson digs deep into the FBI’s massive efforts to create fake terrorist plots.

    Editor’s note: This story is adapted from The Terror Factory [1], Trevor Aaronson’s new book documenting how the Federal Bureau of Investigation has built a vast network of informants to infiltrate Muslim communities and, in some cases, cultivate phony terrorist plots. The book grew from Aaronson’s award-winning [2] Mother Jones cover story “The Informants [3]” and his research in the Investigative Reporting Program at the University of California-Berkeley.

    Quazi Mohammad Nafis was a 21-year-old student living in Queens, New York, when the US government helped turn him into a terrorist.

    His transformation began on July 5, when Nafis, a Bangladeshi citizen who’d come to the United States on a student visa that January, shared aspirations with a man he believed he could trust. Nafis told this man in a phone call that he wanted to wage jihad in the United States, that he enjoyed reading Al Qaeda propaganda, and that he admired “Sheikh O,” or Osama bin Laden. Who this confidant was and how Nafis came to meet him remain unclear; what we know from public documents is that the man told Nafis he could introduce him to an Al Qaeda operative.

    Our Yearlong Investigation Into the Program to Spy on America’s Muslim Communities [3]
    How the Bureau Enlists Foreign Regimes to Detain and Interrogate US Citizens [4]
    When Did Lefty Darling Brandon Darby Turn Government Informant? [5]
    Charts from Our Terror Trial Database [6]
    Watch an FBI Surveillance Video [7]
    Documents: FBI Spies and Suspects, in Their Own Words [8]
    It was a hot, sunny day in Central Park on July 24 when Nafis met with Kareem, who said he was with Al Qaeda. Nafis, who had a slight build, mop of black hair, and a feebly grown beard, told Kareem that he was “ready for action.”

    “What I really mean is that I don’t want something that’s, like, small,” Nafis said. “I just want something big. Something very big. Very, very, very, very big, that will shake the whole country.”

    Nafis said he wanted to bomb the New York Stock Exchange, and with help from his new Al Qaeda contact, he surveilled the iconic building at 11 Wall Street. “We are going to need a lot of TNT or dynamite,” Nafis told Kareem. But Nafis didn’t have any explosives, and, as court records indicate, he didn’t know anyone who could sell him explosives, let alone have the money to purchase such materials. His father, a banker in Bangladesh, had spent his entire life savings to send Nafis to the United States after his son, who was described to journalists as dim by people who knew him in his native country, had flunked out of North South University in Bangladesh.

    Kareem suggested they rent a storage facility to stash the material they’d need for a car bomb. He said he’d put up the money for it, and get the materials. Nafis dutifully agreed, and suggested a new target: the Federal Reserve Bank of New York. Nafis later met Kareem at a storage facility, where Nafis poured the materials Kareem had brought into trash bins, believing he was creating a 1,000-pound car bomb that could level a city block.

    In truth, the stuff was inert. And Kareem was an undercover FBI agent, tipped off by the man who Nafis had believed was a confidant—an FBI informant. The FBI had secretly provided everything Nafis needed for his attack: not only the storage facility and supposed explosives, but also the detonator and the van that Nafis believed would deliver the bomb.

    On the morning of October 17, Nafis and Kareem drove the van to Lower Manhattan and parked it in front of the Federal Reserve Bank on Liberty Street. Then they walked to a nearby hotel room, where Nafis dialed on his cellphone the number he believed would trigger the bomb, but nothing happened. He dialed again, and again. The only result was Nafis’ apprehension by federal agents.

    “The defendant thought he was striking a blow to the American economy,” US Attorney Loretta E. Lynch said in a statement after the arrest. “At every turn, he was wrong, and his extensive efforts to strike at the heart of the nation’s financial system were foiled by effective law enforcement. We will use all of the tools at our disposal to stop any such attack before it can occur.”
    How many of these would-be terrorists would have acted were it not for an FBI agent provocateur helping them? Is it possible that the FBI is creating the very enemy we fear?

    Federal officials say they are protecting Americans with these operations—but from whom? Real terrorists, or dupes like Nafis, who appear unlikely to have the capacity for terrorism were it not for FBI agents providing the opportunity and means?

    Nafis is one of more than 150 men since 9/11 who have been caught in FBI terrorism stings, some of whom have received 25 years or more in prison. In these cases, the FBI uses one of its more than 15,000 registered informants—many of them criminals, others trying to stay in the country following immigration violations—to identify potential terrorists. It then provides the means necessary for these would-be terrorists to move forward with a plot—in some cases even planting specific ideas for attacks. The FBI now spends $3 billion on counterterrorism annually, the largest portion of its budget. Our nation’s top law enforcement agency, traditionally focused on investigating crimes after they occur, now operates more as an intelligence organization that tries to preempt crimes before they occur. But how many of these would-be terrorists would have acted were it not for an FBI agent provocateur helping them? Is it possible that the FBI is creating the very enemy we fear?

    Those are the questions I set out to explore beginning in 2010. With the help of a research assistant, I built a database of more than 500 terrorism prosecutions since 9/11 [9], looking closely and critically at every terrorism case brought into federal courts during the past decade. We pored through thousands of pages of court records, and found that nearly half of all terrorism cases since 9/11 involved informants, many of them paid as much as $100,000 per assignment by the FBI. At the time of the story’s publication in Mother Jones in August 2011, 49 defendants had participated in plots led by an FBI agent provocateur, and that number has continued to rise since.

    Historically, media coverage of these operations—begun under George W. Bush and continuing apace under Barack Obama—was mostly uncritical. With their aggressive tactics essentially unknown to the public, the FBI and Justice Department controlled the narrative: another dangerous terrorist apprehended by vigilant federal agents!

    But in late 2011, the conversation began to shift. A couple of months after my story in Mother Jones and following the announcement of a far-fetched sting in which a Massachusetts man believed he’d been poised to destroy the US Capitol building using grenade-laden, remote-controlled airplanes, TPM Muckraker published a story headlined: “The Five Most Bizarre Terror Plots Hatched Under the FBI’s Watch [10].” Author David K. Shipler, in an April 2012 New York Times editorial [11], questioned the legitimacy of terrorism stings involving people who appeared to have no wherewithal to commit acts of terror: “Some threats are real, others less so. In terrorism, it’s not easy to tell the difference.” Stories in other major news outlets followed suit, and by October 2012, a post in Foreign Policy was asking: “How many idiot jihadis can the FBI fool? [12]”

    Which brings us back to Nafis. “The case appears to be the latest to fit a model in which, in the process of flushing out people they believe present a risk of terrorism, federal law enforcement officials have played the role of enabler,” reported the New York Times, after the Justice Department announced Nafis’ arrest. “Though these operations have almost always held up in court, they have come under increasing criticism from those who believe that many of the subjects, even some who openly espoused violence, would have been unable to execute such plots without substantial assistance from the government.”

    In the years since the attacks of September 11, 2001, the federal law enforcement profile of a terrorist has changed dramatically. The men responsible for downing the World Trade Center were disciplined and patient; they were also living and training in the United States with money from an Al Qaeda cell led by Kuwaiti-born Khalid Sheikh Mohammad. In the days and weeks following 9/11, federal officials anxiously awaited a second wave of attacks, which would be launched, they believed at the time, by several sleeper cells around the country.
    Anwar al-Awlaki, a US-born, high-ranking Al Qaeda official became something of the terrorist group’s Dear Abby. Have a question about Islam? Ask Anwar!

    But the feared second wave never crashed ashore. Instead, the United States and allied nations invaded Afghanistan, Al Qaeda’s home base, and forced Osama bin Laden and his deputies into hiding. Bruised and hunted, Al Qaeda no longer had the capability to train terrorists and send them to the United States.

    In response, Al Qaeda’s leaders moved to what FBI officials describe as a “franchise model.” If you can’t run Al Qaeda as a hierarchal, centrally organized outfit, the theory went, run it as a franchise. In other words, export ideas—not terrorists. Al Qaeda and its affiliated organizations went online, setting up websites and forums dedicated to instilling their beliefs in disenfranchised Muslims already living in Western nations. A slickly designed magazine, appropriately titled Inspire, quickly followed. Article headlines included “I Am Proud to Be a Traitor to America,” and “Why Did I Choose Al-Qaeda?”

    Anwar al-Awlaki, the American-born, high-ranking Al Qaeda official who was killed in a US drone strike in Yemen on September 30, 2011, became something of the terrorist group’s Dear Abby. Have a question about Islam? Ask Anwar! Muslim men in nations throughout the Western world would email him questions, and Awlaki would reply dutifully, and in English, encouraging many of his electronic pen pals to violent action. Awlaki also kept a blog and a Facebook page, and regularly posted recruitment videos to YouTube. He said in one video:

    I specifically invite the youth to either fight in the West or join their brothers in the fronts of jihad: Afghanistan, Iraq, and Somalia. I invite them to join us in our new front, Yemen, the base from which the great jihad of the Arabian Peninsula will begin, the base from which the greatest army of Islam will march forth.

    Al Qaeda’s move to a franchise model met with some success. US Army Major Nadal Hassan, for example, corresponded with Awlaki before he killed 13 people and wounded 29 others in the Fort Hood shootings in 2009. Antonio Martinez, a Baltimore man and recent convert to Islam who was sentenced to 25 years in prison for trying to bomb a military recruiting office, sent Awlaki messages and watched Al Qaeda propaganda videos online before getting wrapped up in an FBI sting operation.

    The FBI has a term for Nafis, Martinez, and other alleged terrorists like them: lone wolf. Officials at the Bureau now believe that the next terrorist attack will likely come from a lone wolf, and this belief is at the core of a federal law enforcement policy known variously as preemption, prevention, and disruption. FBI counterterrorism agents want to catch terrorists before they act, and to accomplish this, federal law enforcement officials have in the decade since 9/11 created the largest domestic spying network ever to exist in the United States.

    In fact, the FBI today has 10 times as many informants as it did in the 1960s, when former FBI Director J. Edgar Hoover made the Bureau infamous for inserting spies into organizations as varied as Reverend Dr. Martin Luther King’s and the Ku Klux Klan. Modern FBI informants aren’t burrowing into political groups, however; they are focused on identifying today the terrorist of tomorrow. US government officials acknowledge that while terrorist threats do exist from domestic organizations, such as white supremacist groups and the sovereign citizen movement, they believe the greatest threat comes from within American Muslim communities.

    The FBI’s vast army of spies, located today in every community in the United States with enough Muslims to support a mosque, has one primary function: identify the next lone wolf, likely to be a single male age 16 to 35, according to the Bureau. Informants and their FBI handlers are on the lookout for young Muslims who espouse radical beliefs, are vocal about their disapproval of American foreign policy, or have expressed sympathy for international terrorist groups. If they find anyone who meets the criteria, they move him to the next stage: the sting operation.
    The terrorism sting operations are an evolution of an FBI tactic that has long captured the imaginations of Hollywood filmmakers: undercover drug busts.

    On a cold February morning in 2011, I met with Peter Ahearn, a retired FBI special agent who directed the Western New York Joint Terrorism Task Force, in a coffee shop outside Washington, DC, to talk about how the FBI runs its sting operations. Ahearn was in the bureau’s vanguard as it transformed into a counterterrorism organization in the wake of 9/11. An average-built man with a small dimple on his chin and close-cropped brown hair receding in the front, Ahearn oversaw one of the earliest post-9/11 terrorism investigations, involving the so-called Lackawanna Six—a group of six Yemeni American men living outside Buffalo, New York, who attended a training camp in Afghanistan and were convicted of providing material support to Al Qaeda. “If you’re doing a sting right, you’re offering the target multiple chances to back out,” Ahearn told me. “Real people don’t say, ‘Yeah, let’s go bomb that place.’ Real people call the cops.”

    Indeed, while terrorism sting operations are a new practice for the bureau, they are an evolution of an FBI tactic that has for decades captured the imaginations of Hollywood filmmakers. In 1982, as the illegal drug trade overwhelmed local police resources nationwide and funded an increase in violent crime, President Ronald Reagan’s first attorney general, William French Smith, gave the FBI jurisdiction over federal drug crimes, which previously had been the exclusive domain of the US Drug Enforcement Administration. Eager to show up their DEA rivals, FBI agents began aggressively sending undercover agents into America’s cities. This was relatively new territory for the FBI, which during Hoover’s 37-year stewardship had mandated that agents wear a suit and tie at all times, federal law enforcement badge easily accessible from the coat pocket. But an increasingly powerful Mafia and the bloody drug war forced the FBI to begin enforcing federal laws from the street level. In searching for drug crimes, FBI agents hunted sellers as well as buyers, and soon learned one of the best strategies was to become part of the action.

    At its most cliché, the Hollywood version of this scene is set in a Miami high-rise apartment, its floor-to-ceiling windows overlooking the cresting waves of the Atlantic Ocean. There’s a man seated at the dining table; he’s longhaired, with a scruffy face, and he has a briefcase next to him. Hidden on the other side of the room is a grainy black-and-white camera recording the entire scene. The apartment’s door swings open and two men saunter in, the camera recording their every move and word. The two men hand over bundles of cash, and the scruffy man then hands over the briefcase. But instead of finding pounds of cocaine inside it, the two guests are shocked to find the briefcase is empty—and then FBI agents rush in, guns drawn for the takedown.

    Federal law enforcement officials call this type of sting operation a “no-dope bust,” and its the direct predecessor to today’s terrorism sting. Instead of empty briefcases, the FBI today uses inert bombs and disabled assault rifles (and now that counterterrorism is the bureau’s top priority, the investigation of major drug crimes has largely fallen back to the DEA). While the assumptions behind both types of stings are similar, there is a fundamental flaw as applied to terrorism stings. In drug stings, federal law enforcement officials assume that any buyer caught in a sting would have been able to buy or sell drugs elsewhere had they not fallen into the FBI trap. The numbers support this assumption. In 2010, the most recent year for which data is available, the DEA seized 29,179 kilograms, or 64,328 pounds, of cocaine in the United States.

    In terrorism stings, however, federal law enforcement officials assume that any would-be terrorists caught would have been able to acquire the means elsewhere to carry out their violent plans had they not been ensnared by the FBI. The problem with this assumption is that no data exists to support it—and in fact what data is available often suggests the opposite.

    Few of the more than 150 defendants indicted and convicted this way since 9/11 had any connection to terrorists, evidence showed, and those that did have connections, however tangential, lacked the capacity to launch attacks on their own. Of the more that 150 defendants, an FBI informant not only led one of every three terrorist plots, but also provided all the necessary weapons, money, and transportation.
    The informant goaded them on the whole time, encouraging the pair with lines like: “We will teach these bastards a good lesson.” For his work on the case, he received $100,000 from the FBI.

    The FBI’s logic to support the use of terrorism stings goes something like this: By catching a lone wolf before he strikes, federal law enforcement can take him off the streets before he meets a real terrorist who can provide him with weapons and munitions. However, to this day, no example exists of a lone wolf, by himself unable to launch an attack, becoming operational through meeting an actual terrorist in the United States. In the terrorism sting operations since 9/11, the would-be terrorists are usually uneducated, unsophisticated, and economically desperate—not the attributes for someone likely to plan and launch a sophisticated, violent attack without significant help.

    This isn’t to say there have not been deadly and potentially deadly terrorist attacks and threats in the United States since 9/11. Hesham Mohamed Hadayet, an Egyptian, opened fire on the El-Al ticket counter at Los Angeles International Airport on July 4, 2002, killing two and wounding four. Afghan American Najibullah Zazi, who trained with Al Qaeda in Pakistan in 2008, came close to attacking the New York City subway system in September 2009, with a plan to place backpack bombs on crowded trains coming to and from Grand Central and Times Square stations. Faisal Shahzad, who trained with terrorists in the tribal regions of Pakistan, attempted but failed to detonate a crude car bomb in Times Square on May 1, 2010. While all three were dangerous lone wolves, none fit the profile of would-be terrorists targeted today in FBI terrorism sting operations. Unlike those caught in FBI stings, these three terrorists had international connections and the ability to carry out attacks on their own, however unsuccessful those attacks might have been for Zazi and Shahzad.

    By contrast, consider another New York City terrorism conspiracy—the so-called Herald Square bomb plot. Shahawar Matin Siraj, a 22-year-old Pakistani American, struck up a friendship with a seemingly elderly and knowledgeable Islamic scholar named Dawadi at his uncle’s Islamic Books and Tapes shop in Brooklyn. Dawadi was an FBI informant, Osama Eldawoody, who was put on the government payroll in September 2003 to stoke Siraj’s extremist inclinations. Siraj asked if Eldawoody could help him build a nuclear weapon and volunteered that he and a friend, James Elshafay, wanted to detonate a car bomb on one of New York’s bridges. “He’s a terrorist. He wants to harm the country and the people of the country. That’s what I thought immediately,” Eldawoody said in court testimony.

    Siraj introduced Dawadi to Elshafay, who had drawn schematics of police stations and bridges on napkins with the hopes of plotting a terrorist attack. Elshafay’s crude drawings prompted Siraj to hatch a new plan that involved the three men, Dawadi’s supposed international connections, and an attack on New York’s Herald Square subway station. The two young men discussed how they’d grown to hate the United States for invading Iraq and torturing prisoners. In Eldawoody’s car, the three of them talked about carrying 20- to 30-pound backpack bombs into the Herald Square subway station and leaving them on the train platform. Their conversations were recorded from a secret camera in the car’s dashboard. From April to August 2004, the men considered targets, surveilled the subway, checked security, and drew diagrams of the station. The informant goaded them on the whole time, encouraging the pair with lines like: “We will teach these bastards a good lesson.” For his work on the case, Eldawoody received $100,000 from the FBI.

    The evidence from the sting was enough to win convictions, and Siraj was sentenced to 30 years in prison and Elshafay 5 years. But it was also clear from the trial that Siraj was a dimwitted social recluse—a mother’s boy with little capacity to steal a car on his own, let alone bomb a subway station as part of a spectacular terrorist attack. In fact, Siraj was recorded during the sting operation as saying: “Everyone thinks I’m stupid.”
    During Obama’s first term in office, the Justice Department prosecuted more than 75 targets of terrorism stings.

    The question underlying the Herald Square case can be asked in dozens of other similar sting operations: Could the defendants have become terrorists had they never met the FBI informant? The answer haunts Martin Stolar, the lawyer who represented Siraj at trial and fully expected to win an acquittal through an entrapment defense. “The problem with the cases we’re talking about is that defendants would not have done anything if not kicked in the ass by government agents,” Stolar said. “They’re creating crimes to solve crimes so they can claim a victory in the war on terror.”

    Source URL: http://www.motherjones.com/politics/2013/01/terror-factory-fbi-trevor-aaronson-book

    Links:
    [1] http://www.amazon.com/The-Terror-Factory-Manufactured-Terrorism/dp/1935439618/ref=sr_1_1?ie=UTF8&qid=1354811860&sr=8-1&keywords=The+Terror+Factory
    [2] http://www.motherjones.com/mojo/2012/05/fbi-informants-data-journalism-award
    [3] http://www.motherjones.com/politics/2011/08/fbi-terrorist-informants
    [4] http://www.motherjones.com/politics/2011/08/proxy-detention-gulet-mohamed
    [5] http://www.motherjones.com/politics/2011/08/brandon-darby-anarchist-fbi-terrorism
    [6] http://www.motherjones.com/politics/2011/08/terror-trials-numbers
    [7] http://www.motherjones.com/politics/2011/08/fbi-surveillance-video-sting
    [8] http://www.motherjones.com/politics/2011/08/fbi-sting-greatest-hits
    [9] http://www.motherjones.com/fbi-terrorist
    [10] http://tpmmuckraker.talkingpointsmemo.com/2011/10/the_five_most_bizarre_terror_plots_hatched_under_the_fbis_watch.php
    [11] http://www.nytimes.com/2012/04/29/opinion/sunday/terrorist-plots-helped-along-by-the-fbi.html?_r=2&pagewanted=all
    [12] http://blog.foreignpolicy.com/posts/2012/10/17/how_many_idiot_jihadists_can_the_fbi_fool
    [13] http://theterrorfactory.com/documents/HolderSpeechDec2010.pdf

    By Trevor Aaronson | Fri Jan. 11, 2013 3:01 AM PST

    Find this story at 11 January 2013

    Copyright ©2013 Mother Jones and the Foundation for National Progress

    The Informants; Another alleged terrorist was just busted by the FBI. But is the bureau preventing plots—or leading them?

    James Cromitie [1] was a man of bluster and bigotry. He made up wild stories about his supposed exploits, like the one about firing gas bombs into police precincts using a flare gun, and he ranted about Jews. “The worst brother in the whole Islamic world is better than 10 billion Yahudi,” he once said [2].

    A 45-year-old Walmart stocker who’d adopted the name Abdul Rahman after converting to Islam during a prison stint for selling cocaine, Cromitie had lots of worries—convincing his wife he wasn’t sleeping around, keeping up with the rent, finding a decent job despite his felony record. But he dreamed of making his mark. He confided as much in a middle-aged Pakistani he knew as Maqsood.

    “I’m gonna run into something real big [3],” he’d say. “I just feel it, I’m telling you. I feel it.”

    Our Yearlong Investigation Into the Program to Spy on America’s Muslim Communities [4]
    How the Bureau Enlists Foreign Regimes to Detain and Interrogate US Citizens [5]
    When Did Lefty Darling Brandon Darby Turn Government Informant? [6]
    Charts from Our Terror Trial Database [7]
    Watch an FBI Surveillance Video [8]
    Documents: FBI Spies and Suspects, in Their Own Words [9]

    Maqsood and Cromitie had met at a mosque in Newburgh, a struggling former Air Force town about an hour north of New York City. They struck up a friendship, talking for hours about the world’s problems and how the Jews were to blame.

    It was all talk until November 2008, when Maqsood pressed his new friend.

    “Do you think you are a better recruiter or a better action man?” Maqsood asked [10].

    “I’m both,” Cromitie bragged.

    “My people would be very happy to know that, brother. Honestly.”

    “Who’s your people?” Cromitie asked.

    “Jaish-e-Mohammad.”
    Crunch the Numbers
    We analyzed the prosecutions of 508 alleged domestic terrorists. View them by affiliation or state, or play with the full data set.

    Maqsood said he was an agent for the Pakistani terror group, tasked with assembling a team to wage jihad in the United States. He asked Cromitie what he would attack if he had the means. A bridge, Cromitie said.

    “But bridges are too hard to be hit,” Maqsood pleaded, “because they’re made of steel.”

    “Of course they’re made of steel,” Cromitie replied. “But the same way they can be put up, they can be brought down.”

    Maqsood coaxed Cromitie toward a more realistic plan. The Mumbai attacks were all over the news, and he pointed out how those gunmen targeted hotels, cafés, and a Jewish community center.

    “With your intelligence, I know you can manipulate someone,” Cromitie told his friend. “But not me, because I’m intelligent.” The pair settled on a plot to bomb synagogues in the Bronx, and then fire Stinger missiles at airplanes taking off from Stewart International Airport in the southern Hudson Valley. Maqsood would provide all the explosives and weapons, even the vehicles. “We have two missiles, okay?” he offered [11]. “Two Stingers, rocket missiles.”

    Maqsood was an undercover operative; that much was true. But not for Jaish-e-Mohammad. His real name was Shahed Hussain [12], and he was a paid informant for the Federal Bureau of Investigation.

    Ever since 9/11, counterterrorism has been the FBI’s No. 1 priority, consuming the lion’s share of its budget—$3.3 billion, compared to $2.6 billion for organized crime—and much of the attention of field agents and a massive, nationwide network of informants. After years of emphasizing informant recruiting as a key task for its agents, the bureau now maintains a roster of 15,000 spies—many of them tasked, as Hussain was, with infiltrating Muslim communities in the United States. In addition, for every informant officially listed in the bureau’s records, there are as many as three unofficial ones, according to one former high-level FBI official, known in bureau parlance as “hip pockets.”
    The bureau now maintains a roster of 15,000 spies, some paid as much as $100,000 per case, many of them tasked with infiltrating Muslim communities in the United States.

    The informants could be doctors, clerks, imams. Some might not even consider themselves informants. But the FBI regularly taps all of them as part of a domestic intelligence apparatus whose only historical peer might be COINTELPRO [13], the program the bureau ran from the ’50s to the ’70s to discredit and marginalize organizations ranging from the Ku Klux Klan to civil-rights and protest groups.

    Throughout the FBI’s history, informant numbers have been closely guarded secrets. Periodically, however, the bureau has released those figures. A Senate oversight committee in 1975 found the FBI had 1,500 informant [14]s [14]. In 1980, officials disclosed there were 2,800 [15]. Six years later, following the FBI’s push into drugs and organized crime, the number of bureau informants ballooned to 6,000, the Los Angeles Times reported [15] in 1986. And according to the FBI, the number grew significantly after 9/11. In its fiscal year 2008 budget authorization request [16], the FBI disclosed that it it had been been working under a November 2004 presidential directive demanding an increase [17] in “human source development and management,” and that it needed $12.7 million [18] for a program to keep tabs on its spy network and create software to track and manage informants.

    The bureau’s strategy has changed significantly from the days when officials feared another coordinated, internationally financed attack from an Al Qaeda sleeper cell. Today, counterterrorism experts believe groups like Al Qaeda, battered by the war in Afghanistan and the efforts of the global intelligence community, have shifted to a franchise model, using the internet to encourage sympathizers to carry out attacks in their name. The main domestic threat, as the FBI sees it, is a lone wolf.

    The bureau’s answer has been a strategy known variously as “preemption,” “prevention,” and “disruption”—identifying and neutralizing potential lone wolves before they move toward action. To that end, FBI agents and informants target not just active jihadists, but tens of thousands of law-abiding people, seeking to identify those disgruntled few who might participate in a plot given the means and the opportunity. And then, in case after case, the government provides the plot, the means, and the opportunity.

    Here’s how it works: Informants report to their handlers on people who have, say, made statements sympathizing with terrorists. Those names are then cross-referenced with existing intelligence data, such as immigration and criminal records. FBI agents may then assign an undercover operative to approach the target by posing as a radical. Sometimes the operative will propose a plot, provide explosives, even lead the target in a fake oath to Al Qaeda. Once enough incriminating information has been gathered, there’s an arrest—and a press conference [19] announcing another foiled plot.

    If this sounds vaguely familiar, it’s because such sting operations are a fixture in the headlines. Remember the Washington Metro [20] bombing plot? The New York subway [21] plot? The guys who planned to blow up the Sears Tower [22]? The teenager seeking to bomb a Portland Christmas tree [23] lighting? Each of those plots, and dozens more across the nation, was led by an FBI asset.

    Over the past year, Mother Jones and the Investigative Reporting Program at the University of California-Berkeley have examined prosecutions of 508 defendants in terrorism-related cases, as defined by the Department of Justice. Our investigation found:
    Nearly half the prosecutions involved the use of informants, many of them incentivized by money (operatives can be paid as much as $100,000 per assignment) or the need to work off criminal or immigration violations. (For more on the details of those 508 cases, see our charts page [24] and searchable database [25].)
    Sting operations resulted in prosecutions against 158 defendants. Of that total, 49 defendants participated in plots led by an agent provocateur—an FBI operative instigating terrorist action.
    With three exceptions, all of the high-profile domestic terror plots of the last decade were actually FBI stings. (The exceptions are Najibullah Zazi, who came close to bombing [26] the New York City subway system in September 2009; Hesham Mohamed Hadayet [27], an Egyptian who opened fire on the El-Al ticket counter at the Los Angeles airport; and failed Times Square bomber Faisal Shahzad [28].)
    In many sting cases, key encounters between the informant and the target were not recorded—making it hard for defendants claiming entrapment to prove their case.
    Terrorism-related charges are so difficult to beat in court, even when the evidence is thin, that defendants often don’t risk a trial.

    “The problem with the cases we’re talking about is that defendants would not have done anything if not kicked in the ass by government agents,” says Martin Stolar, a lawyer who represented a man caught in a 2004 sting involving New York’s Herald Square [21] subway station. “They’re creating crimes to solve crimes so they can claim a victory in the war on terror.” In the FBI’s defense, supporters argue that the bureau will only pursue a case when the target clearly is willing to participate in violent action. “If you’re doing a sting right, you’re offering the target multiple chances to back out,” says Peter Ahearn, a retired FBI special agent who directed the Western New York Joint Terrorism Task Force and oversaw the investigation of the Lackawanna Six [29], an alleged terror cell near Buffalo, New York. “Real people don’t say, ‘Yeah, let’s go bomb that place.’ Real people call the cops.”
    Terms
    of
    Entrapment
    A guide to counterterrorism jargon.

    1001: Known as the “Al Capone,” Title 18, Section 1001 [30] of the federal criminal code covers the crime of lying to federal agents. Just as the government prosecuted Capone for tax violations [31], it has frequently used 1001 against terrorism defendants [32] whose crimes or affiliations it couldn’t prove in court.
    Agent provocateur: An informant or undercover operative who incites a target to take unlawful action [33]; the phrase originally described strikebreakers trying to provoke violence [34].

    Assessment: The term for a 72-hour investigation [35]—which may include surveillance—that FBI agents can launch without having a predicate [36] (see below).

    COINTELPRO [13]: From 1956 to 1971, the FBI’s Counter Intelligence Program attempted to infiltrate and sometimes harass domestic political groups [37], from the Ku Klux Klan to the National Lawyers Guild and the Southern Christian Leadership Conference [38].

    DIOG: The Domestic Investigations and Operations Guide [36], a 258-page FBI manual for undercover operations and the use of informants. Recently revised to allow agents to look for information—including going through someone’s trash—about a person who is not formally being investigated [39], sometimes to flip them as an informant.

    Domain Management: An FBI data-mining and analysis program [36] used to map US communities along ethnic and religious lines.

    Hip pocket: An unregistered informant who provides information [40] and tips to FBI agents but whose information is not used in court.

    Joint Terrorism Task Force: A partnership among federal and local law enforcement agencies [41]; through it, for example, FBI agents can join forces with immigration agents [42] to put the squeeze on someone to become an informant.

    Material support: Providing help to a designated foreign terrorist organization. This can include money, lodging, training, documents, weapons, and personnel [43]—including oneself, and including joining a terrorist cell dreamed up by the FBI [44].

    Operator: Someone who wants to be a terrorist; in the FBI’s view, sympathizers become operators [45].

    Predicate: Information clearly suggesting that an individual is involved in unlawful activity; it’s required for the FBI to start an investigation [36].

    Even so, Ahearn concedes that the uptick in successful terrorism stings might not be evidence of a growing threat so much as a greater focus by the FBI. “If you concentrate more people on a problem,” Ahearn says, “you’ll find more problems.” Today, the FBI follows up on literally every single call, email, or other terrorism-related tip it receives for fear of missing a clue.

    And the emphasis is unlikely to shift anytime soon. Sting operations have “proven to be an essential law enforcement tool in uncovering and preventing potential terror attacks,” said Attorney General Eric Holder in a December 2010 speech [46] to Muslim lawyers and civil rights activists. President Obama’s Department of Justice has announced sting-related prosecutions at an even faster clip than the Bush administration, with 44 new cases since January 2009. With the war on terror an open-ended and nebulous conflict, the FBI doesn’t have an exit strategy.

    Located deep in a wooded area on a Marine Corps base west of Interstate 95—a setting familiar from Silence of the Lambs—is the sandstone fortress of the FBI Academy in Quantico, Virginia. This building, erected under J. Edgar Hoover, is where to this day every FBI special agent is trained.

    J. Stephen Tidwell graduated from the academy in 1981 and over the years rose to executive assistant director, one of the 10 highest positions in the FBI; in 2008, he coauthored the Domestic Investigations and Operations Guide, or DIOG [47] (PDF), the manual for what agents and informants can and cannot do.

    A former Texas cop, Tidwell is a barrel-chested man with close-cropped salt-and-pepper hair. He’s led some of the FBI’s highest-profile investigations, including the DC sniper case and the probe of the 9/11 attack on the Pentagon.

    On a cloudy spring afternoon, Tidwell, dressed in khakis and a blue sweater, drove me in his black Ford F-350 through Hogan’s Alley [48]—a 10-acre Potemkin village with houses, bars, stores, and a hotel. Agents learning the craft role-play stings, busts, and bank robberies here, and inside jokes and pop-culture references litter the place (which itself gets its name from a 19th-century comic strip). At one end of the town is the Biograph Theater, named for the Chicago movie house where FBI agents gunned down John Dillinger [49] in 1934. (“See,” Tidwell says. “The FBI has a sense of humor.”)

    Inside the academy, a more somber tone prevails. Plaques everywhere honor agents who have been killed on the job. Tidwell takes me to one that commemorates John O’Neill, who became chief of the bureau’s then-tiny counterterrorism section in 1995. For years before retiring from the FBI, O’Neill warned [50] of Al Qaeda’s increasing threat, to no avail. In late August 2001, he left the bureau to take a job as head of security for the World Trade Center, where he died 19 days later at the hands of the enemy he’d told the FBI it should fear. The agents he had trained would end up reshaping the bureau’s counterterrorism operations.

    Before 9/11, FBI agents considered chasing terrorists an undesirable career path, and their training did not distinguish between Islamic terror tactics and those employed by groups like the Irish Republican Army. “A bombing case is a bombing case,” Dale Watson, who was the FBI’s counterterrorism chief on 9/11, said in a December 2004 deposition. The FBI also did not train agents in Arabic or require most of them to learn about radical Islam. “I don’t necessarily think you have to know everything about the Ku Klux Klan to investigate a church bombing,” Watson said. The FBI had only one Arabic speaker [51] in New York City and fewer than 10 nationwide.

    But shortly after 9/11, President George W. Bush called FBI Director Robert Mueller to Camp David. His message: never again. And so Mueller committed to turn the FBI into a counterintelligence organization rivaling Britain’s MI5 in its capacity for surveillance and clandestine activity. Federal law enforcement went from a focus on fighting crime to preventing crime; instead of accountants and lawyers cracking crime syndicates, the bureau would focus on Jack Bauer-style operators disrupting terror groups.

    To help run the counterterrorism section, Mueller drafted Arthur Cummings, a former Navy SEAL who’d investigated the first World Trade Center bombing. Cummings pressed agents to focus not only on their immediate target, but also on the extended web of people linked to the target. “We’re looking for the sympathizer who wants to become an operator, and we want to catch them when they step over that line to operator,” Cummings says. “Sometimes, that step takes 10 years. Other times, it takes 10 minutes.” The FBI’s goal is to create a hostile environment for terrorist recruiters and operators—by raising the risk of even the smallest step toward violent action. It’s a form of deterrence, an adaptation of the “broken windows” theory used to fight urban crime. Advocates insist it has been effective, noting that there hasn’t been a successful large-scale attack against the United States since 9/11. But what can’t be answered—as many former and current FBI agents acknowledge—is how many of the bureau’s targets would have taken the step over the line at all, were it not for an informant.

    So how did the FBI build its informant network? It began by asking where US Muslims lived. Four years after 9/11, the bureau brought in a CIA expert on intelligence-gathering methods named Phil Mudd [52]. His tool of choice was a data-mining system using commercially available information, as well as government data such as immigration records, to pinpoint the demographics of specific ethnic and religious communities—say, Iranians in Beverly Hills or Pakistanis in the DC suburbs.

    The FBI officially denies that the program, known as Domain Management, works this way—its purpose, the bureau says, is simply to help allocate resources according to threats. But FBI agents told me that with counterterrorism as the bureau’s top priority, agents often look for those threats in Muslim communities—and Domain Management allows them to quickly understand those communities’ makeup. One high-ranking former FBI official jokingly referred to it as “Battlefield Management.”

    Some FBI veterans criticized the program as unproductive and intrusive—one told Mudd during a high-level meeting that he’d pushed the bureau to “the dark side.” That tension has its roots in the stark difference between the FBI and the CIA: While the latter is free to operate internationally without regard to constitutional rights, the FBI must respect those rights in domestic investigations, and Mudd’s critics saw the idea of targeting Americans based on their ethnicity and religion as a step too far.

    Nonetheless, Domain Management quickly became the foundation for the FBI’s counterterrorism dragnet. Using the demographic data, field agents were directed to target specific communities to recruit informants. Some agents were assigned to the task full time. And across the bureau, agents’ annual performance evaluations are now based in part on their recruiting efforts.

    People cooperate with law enforcement for fairly simple reasons: ego, patriotism, money, or coercion. The FBI’s recruitment has relied heavily on the latter. One tried-and-true method is to flip someone facing criminal charges. But since 9/11 the FBI has also relied heavily on Immigration and Customs Enforcement [42], with which it has worked closely as part of increased interagency coordination. A typical scenario will play out like this: An FBI agent trying to get someone to cooperate will look for evidence that the person has immigration troubles. If they do, he can ask ICE to begin or expedite deportation proceedings. If the immigrant then chooses to cooperate, the FBI will tell the court that he is a valuable asset, averting deportation.
    A well-muscled 49-year-old with a shaved scalp, Craig Monteilh has been a versatile snitch: He’s pretended to be a white supremacist, a Russian hit man, a Sicilian drug trafficker, and a French-Syrian Muslim.

    Sometimes, the target of this kind of push is the one person in a mosque who will know everyone’s business—the imam. Two Islamic religious leaders, Foad Farahi [53] in Miami and Sheikh Tarek Saleh in New York City, are currently fighting deportation proceedings that, they claim, began after they refused to become FBI assets. The Muslim American Society Immigrant Justice Center has filed similar complaints on behalf of seven other Muslims with the Department of Homeland Security.

    Once someone has signed on as an informant, the first assignment is often a fishing expedition. Informants have said in court testimony that FBI handlers have tasked them with infiltrating mosques without a specific target or “predicate”—the term of art for the reason why someone is investigated. They were, they say, directed to surveil law-abiding Americans with no indication of criminal intent.

    “The FBI is now telling agents they can go into houses of worship without probable cause,” says Farhana Khera, executive director of the San Francisco-based civil rights group Muslim Advocates. “That raises serious constitutional issues.”

    Tidwell himself will soon have to defend these practices in court—he’s among those named in a class-action lawsuit [54] (PDF) over an informant’s allegation that the FBI used him to spy on a number of mosques in Southern California.

    That informant, Craig Monteilh, is a convicted felon who made his money ripping off cocaine dealers before becoming an asset for the Drug Enforcement Administration and later the FBI. A well-muscled 49-year-old with a shaved scalp, Monteilh has been a particularly versatile snitch: He’s pretended to be a white supremacist, a Russian hit man, and a Sicilian drug trafficker. He says when the FBI sent him into mosques (posing as a French-Syrian Muslim), he was told to act as a decoy for any radicals who might seek to convert him—and to look for information to help flip congregants as informants, such as immigration status, extramarital relationships, criminal activities, and drug use. “Blackmail is the ultimate goal,” Monteilh says.

    Officially, the FBI denies it blackmails informants. “We are prohibited from using threats or coercion,” says Kathleen Wright, an FBI spokeswoman. (She acknowledges that the bureau has prevented helpful informants from being deported.)

    FBI veterans say reality is different from the official line. “We could go to a source and say, ‘We know you’re having an affair. If you work with us, we won’t tell your wife,'” says a former top FBI counterterrorism official. “Would we actually call the wife if the source doesn’t cooperate? Not always. You do get into ethics here—is this the right thing to do?—but legally this isn’t a question. If you obtained the information legally, then you can use it however you want.”

    But eventually, Monteilh’s operation imploded in spectacular fashion. In December 2007, police in Irvine, California, charged him with bilking two women out of $157,000 as part of an alleged human growth hormone scam. Monteilh has maintained it was actually part of an FBI investigation, and that agents instructed him to plead guilty to a grand-theft charge and serve eight months so as not to blow his cover. The FBI would “clean up” the charge later, Monteilh says he was told. That didn’t happen, and Monteilh has alleged in court filings that the government put him in danger by letting fellow inmates know that he was an informant. (FBI agents told me the bureau wouldn’t advise an informant to plead guilty to a state criminal charge; instead, agents would work with local prosecutors to delay or dismiss the charge.)

    The class-action suit, filed by the ACLU, alleges that Tidwell, then the bureau’s Los Angeles-based assistant director, signed off on Monteilh’s operation. And Tidwell says he’s eager to defend the bureau in court. “There is not the blanket suspicion of the Muslim community that they think there is,” Tidwell says. “We’re just looking for the bad guys. Anything the FBI does is going to be interpreted as monitoring Muslims. I would tell [critics]: ‘Do you really think I have the time and money to monitor all the mosques and Arab American organizations? We don’t. And I don’t want to.'”

    Shady informants, of course, are as old as the FBI; one saying in the bureau is, “To catch the devil, you have to go to hell.” Another is, “The only problem worse than having an informant is not having an informant.” Back in the ’80s, the FBI made a cottage industry of drug stings—a source of countless Hollywood plots, often involving briefcases full of cocaine and Miami as the backdrop.

    It’s perhaps fitting, then, that one of the earliest known terrorism stings also unfolded in Miami, though it wasn’t launched by the FBI. Instead the protagonist was a Canadian bodyguard and, as a Fort Lauderdale, Florida, newspaper put it in 2002 [55], “a 340-pound man with a fondness for firearms and strippers.” He subscribed to Soldier of Fortune [56] and hung around a police supply store on a desolate stretch of Hollywood Boulevard, north of Miami.

    Howard Gilbert aspired to be a CIA agent but lacked pertinent experience. So to pad his résumé, he hatched a plan to infiltrate a mosque in the suburb of Pembroke Pines by posing as a Muslim convert named Saif Allah [57]. He told congregants that he was a former Marine and a security expert, and one night in late 2000, he gave a speech about the plight of Palestinians.

    “That was truly the night that launched me into the terrorist umbrella of South Florida,” Gilbert would later brag [58] to the South Florida Sun-Sentinel.

    Nineteen-year-old congregant Imran Mandhai, stirred by the oration, approached Gilbert and asked if he could provide him weapons and training. Gilbert, who had been providing information to the FBI, contacted his handlers and asked for more money to work on the case. (He later claimed that the bureau had paid him $6,000.) But he ultimately couldn’t deliver—the target had sensed something fishy about his new friend.

    The bureau also brought in Elie Assaad [59], a seasoned informant originally from Lebanon. He told Mandhai that he was an associate of Osama bin Laden tasked with establishing a training camp in the United States. Gilbert suggested attacking electrical substations in South Florida, and Assaad offered to provide a weapon. FBI agents then arrested Mandhai; he pleaded guilty in federal court and was sentenced to nearly 14 years in prison. It was a model of what would become the bureau’s primary counterterrorism M.O.—identifying a target, offering a plot, and then pouncing.

    “These guys were homeless types,” one former FBI official says about the alleged Sears Tower plotters. “And yes, we did show a picture where somebody was taking the oath to Al Qaeda. So what?” Illustration: Jeffrey Smith
    Gilbert himself didn’t get to bask in his glory; he never worked for the FBI again and died in 2004. Assaad, for his part, ran into some trouble when his pregnant wife called 911. She said Assaad had beaten and choked her to the point that she became afraid [60] for her unborn baby; he was arrested, but in the end his wife refused to press charges.

    The jail stint didn’t keep Assaad from working for the FBI on what would turn out to be perhaps the most high-profile terrorism bust of the post-9/11 era. In 2005, the bureau got a tip [61] from an informant about a group of alleged terrorists in Miami’s Liberty City neighborhood. The targets were seven men [62]—some African American, others Haitian—who called themselves the “Seas of David” [63] and ascribed to religious beliefs that blended Judaism, Christianity, and Islam. The men were martial-arts enthusiasts who operated out of a dilapidated warehouse, where they also taught classes for local kids. The Seas of David’s leader was Narseal Batiste [64], the son of a Louisiana preacher, father of four, and a former Guardian Angel.

    In response to the informant’s tip, the FBI had him wear a wire during meetings with the men, but he wasn’t able to engage them in conversations about terrorist plots. So he introduced the group to Assaad, now playing an Al Qaeda operative. At the informant’s request, Batiste took photographs of the FBI office in North Miami Beach and was caught on tape discussing a notion to bomb the Sears Tower in Chicago. Assaad led Batiste, and later the other men, in swearing an oath to Al Qaeda, though the ceremony (recorded and entered into evidence at trial) bore a certain “Who’s on First?” flavor:

    “God’s pledge is upon me, and so is his compact,” Assaad said as he and Batiste sat in his car. “Repeat after me.”

    “Okay. Allah’s pledge is upon you.”

    “No, you have to repeat exactly. God’s pledge is upon me, and so is his compact. You have to repeat.”
    Ultimately, the undercover recordings suggest that Batiste was mostly trying to shake down his “terrorist” friend.

    “Well, I can’t say Allah?” Batiste asked.

    “Yeah, but this is an English version because Allah, you can say whatever you want, but—”

    “Okay. Of course.”

    “Okay.”

    “Allah’s pledge is upon me. And so is his compact,” Batiste said, adding: “That means his angels, right?”

    “Uh, huh. To commit myself,” Assaad continued.

    “To commit myself.”

    “Brother.”

    “Brother,” Batiste repeated.

    “Uh. That’s, uh, what’s your, uh, what’s your name, brother?”

    “Ah, Brother Naz.”

    “Okay. To commit myself,” the informant repeated.

    “To commit myself.”

    “Brother.”

    “Brother.”

    “You’re not—you have to say your name!” Assaad cried.

    “Naz. Naz.”

    “Uh. To commit myself. I am Brother Naz. You can say, ‘To commit myself.'”

    “To commit myself, Brother Naz.”

    Things went smoothly until Assaad got to a reference to being “protective of the secrecy of the oath and to the directive of Al Qaeda.”

    Here Batiste stopped. “And to…what is the directive of?”

    “Directive of Al Qaeda,” the informant answered.

    “So now let me ask you this part here. That means that Al Qaeda will be over us?”

    “No, no, no, no, no,” Assaad said. “It’s an alliance.”

    “Oh. Well…” Batiste said, sounding resigned.

    “It’s an alliance, but it’s like a commitment, by, uh, like, we respect your rules. You respect our rules,” Assaad explained.

    “Uh, huh,” Batiste mumbled.

    “And to the directive of Al Qaeda,” Assaad said, waiting for Batiste to repeat.

    “Okay, can I say an alliance?” Batiste asked. “And to the alliance of Al Qaeda?”

    “Of the alliance, of the directive—” Assaad said, catching himself. “You know what you can say? And to the directive and the alliance of Al Qaeda.”

    “Okay, directive and alliance of Al Qaeda,” Batiste said.

    “Okay,” the informant said. “Now officially you have commitment and we have alliance between each other. And welcome, Brother Naz, to Al Qaeda.”

    Or not. Ultimately, the undercover recordings made by Assaad suggest that Batiste, who had a failing drywall business and had trouble making the rent for the warehouse, was mostly trying to shake down his “terrorist” friend. After first asking the informant for $50,000, Batiste is recorded in conversation after conversation asking how soon he’ll have the cash.

    “Let me ask you a question,” he says in one exchange. “Once I give you an account number, how long do you think it’s gonna take to get me something in?”

    “So you is scratching my back, [I’m] scratching your back—we’re like this,” Assaad dodged.

    “Right,” Batiste said.
    “When we put forth a case like that to suggest to the American public that we’re protecting them, we’re not protecting them. The agents back in the bullpen, they know it’s not true.”

    The money never materialized. Neither did any specific terrorist plot. Nevertheless, federal prosecutors charged (PDF [65]) Batiste and his cohorts—whom the media dubbed the Liberty City Seven—with conspiracy to support terrorism, destroy buildings, and levy war against the US government. Perhaps the key piece of evidence was the video of Assaad’s Al Qaeda “oath.” Assaad was reportedly paid [66] $85,000 for his work on the case; the other informant got $21,000.

    James J. Wedick, a former FBI agent, was hired to review the Liberty City case as a consultant for the defense. In his opinion, the informant simply picked low-hanging fruit. “These guys couldn’t find their way down the end of the street,” Wedick says. “They were homeless types. And, yes, we did show a picture where somebody was taking the oath to Al Qaeda. So what? They didn’t care. They only cared about the money. When we put forth a case like that to suggest to the American public that we’re protecting them, we’re not protecting them. The agents back in the bullpen, they know it’s not true.”

    Indeed, the Department of Justice had a difficult time winning convictions in the Liberty City case. In three separate trials, juries deadlocked [67] on most of the charges, eventually acquitting one of the defendants (charges against another were dropped) and convicting five of crimes that landed them in prison for between 7 to 13 years. When it was all over, Assaad told ABC News’ Brian Ross [59] that he had a special sense for terrorists: “God gave me a certain gift.”

    But he didn’t have a gift for sensing trouble. After the Liberty City case, Assaad moved on to Texas and founded a low-rent modeling agency [68]. In March, when police tried to pull him over, he led them in a chase through El Paso [69] (with his female passenger jumping out at one point), hit a cop with his car, and ended up rolling his SUV on the freeway. Reached by phone, Assaad declined to comment. He’s saving his story, he says, for a book he’s pitching to publishers.

    Not all of the more than 500 terrorism prosecutions [25] reviewed in this investigation are so action-movie ready. But many do have an element of mystery. For example, though recorded conversations are often a key element of prosecutions, in many sting cases the FBI didn’t record large portions of the investigation, particularly during initial encounters or at key junctures during the sting. When those conversations come up in court, the FBI and prosecutors will instead rely on the account of an informant with a performance bonus on the line.

    Mohamed Osman Mohamud [70] was an 18-year old wannabe rapper when an FBI agent asked if he’d like to “help the brothers.” Eventually the FBI gave him a fake car bomb and a phone to blow it up during a Christmas tree lighting. Illustration: Jeffrey Smith
    One of the most egregious examples of a missing recording involves a convoluted tale that begins in the early morning hours of November 1, 2009, with a date-rape allegation on the campus of Oregon State University. Following a Halloween party, 18-year-old Mohamed Osman Mohamud [71], a Somali-born US citizen, went home with another student. The next morning, the woman reported to police that she believed she had been drugged.

    Campus police brought Mohamud in for questioning and a polygraph test; FBI agents, who for reasons that have not been disclosed had been keeping an eye on the teen for about a month, were also there [72]. Mohamud claimed that the sex was consensual, and a drug test given to his accuser eventually came back negative.

    During the interrogation, OSU police asked Mohamud if a search of his laptop would indicate that he’d researched date-rape drugs. He said it wouldn’t and gave them permission to examine his hard drive. Police copied its entire contents and turned the data over to the FBI—which discovered, it later alleged in court documents, that Mohamud had emailed someone in northwest Pakistan talking about jihad.

    Soon after his run-in with police, Mohamud began to receive emails from “Bill Smith,” a self-described terrorist who encouraged him to “help the brothers.” “Bill,” an FBI agent, arranged for Mohamud to meet one of his associates in a Portland hotel room. There, Mohamud told the agents that he’d been thinking of jihad since age 15. When asked what he might want to attack, Mohamud suggested the city’s Christmas tree lighting ceremony [73]. The agents set Mohamud up with a van that he thought was filled with explosives. On November 26, 2010, Mohamud and one of the agents drove the van to Portland’s Pioneer Square, and Mohamud dialed [74] the phone to trigger the explosion. Nothing. He dialed again. Suddenly FBI agents appeared and dragged him away as he kicked and yelled, “Allahu akbar!” Prosecutors charged him with attempting to use a weapon of mass destruction; his trial is pending.
    The FBI’s defenders say the bureau must flush out terrorist sympathizers before they act. “What would you do?” asks one. “Wait for him to figure it out himself?”

    The Portland case has been held up as an example of how FBI stings can make a terrorist where there might have been only an angry loser. “This is a kid who, it can be reasonably inferred, barely had the capacity to put his shoes on in the morning,” Wedick says.

    But Tidwell, the retired FBI official, says Mohamud was exactly the kind of person the FBI needs to flush out. “That kid was pretty specific about what he wanted to do,” he says. “What would you do in response? Wait for him to figure it out himself? If you’ll notice, most of these folks [targeted in stings] plead guilty. They don’t say, ‘I’ve been entrapped,’ or, ‘I was immature.'” That’s true—though it’s also true that defendants and their attorneys know that the odds of succeeding at trial are vanishingly small. Nearly two-thirds of all terrorism prosecutions since 9/11 have ended in guilty pleas, and experts hypothesize that it’s difficult for such defendants to get a fair trial. “The plots people are accused of being part of—attacking subway systems or trying to bomb a building—are so frightening that they can overwhelm a jury,” notes David Cole, a Georgetown University law professor who has studied these types of cases.

    But the Mohamud story wasn’t quite over—it would end up changing the course of another case on the opposite side of the country. In Maryland, rookie FBI agent Keith Bender had been working a sting against 21-year-old Antonio Martinez [75], a recent convert to Islam who’d posted inflammatory comments on Facebook [76] (“The sword is cummin the reign of oppression is about 2 cease inshallah”). An FBI informant had befriended Martinez and, in recorded conversations, they talked about attacking a military recruiting station.

    Just as the sting was building to its climax, Martinez saw news reports about the Mohamud case, and how there was an undercover operative involved. He worried: Was he, too, being lured into a sting? He called his supposed terrorist contact: “I’m not falling for no BS,” he told him [76].

    Faced with the risk of losing the target, the informant—whose name is not revealed in court records—met with Martinez and pulled him back into the plot. But while the informant had recorded numerous previous meetings with Martinez, no recording [77] was made for this key conversation; in affidavits, the FBI blamed a technical glitch. Two weeks later, on December 8, 2010, Martinez parked what he thought was a car bomb in front of a recruitment center and was arrested when he tried to detonate [78] it.

    Frances Townsend, who served as homeland security adviser to President George W. Bush, concedes that missing recordings in terrorism stings seem suspicious. But, she says, it’s more common than you might think: “I can’t tell you how many times I had FBI agents in front of me and I yelled, ‘You have hundreds of hours of recordings, but you didn’t record this meeting.’ Sometimes, I admit, they might not record something intentionally”—for fear, she says, that the target will notice. “But more often than not, it’s a technical issue.”

    Wedick, the former FBI agent, is less forgiving. “With the technology the FBI now has access to—these small devices that no one would ever suspect are recorders or transmitters—there’s no excuse not to tape interactions between the informant and the target,” he says. “So why in many of these terrorism stings are meetings not recorded? Because it’s convenient for the FBI not to record.”

    So what really happens as an informant works his target, sometimes over a period of years, and eases him over the line? For the answer to that, consider once more the case of James Cromitie [1], the Walmart stocker with a hatred of Jews. Cromitie was the ringleader in the much-publicized Bronx synagogue bombing plot that went to trial last year [79]. But a closer look at the record reveals that while Cromitie was no one’s idea of a nice guy, whatever leadership existed in the plot emanated from his sharply dressed, smooth-talking friend Maqsood, a.k.a. FBI informant Shahed Hussain.

    A Pakistani refugee who claimed to be friends with Benazir Bhutto and had a soft spot for fancy cars, Hussain was by then one of the FBI’s more successful counterterrorism informants. (See our timeline of Hussain’s career as an informant [12].) He’d originally come to the bureau’s attention when he was busted in a DMV scam [80] that charged test takers $300 to $500 for a license. Having “worked off” those charges, he’d transitioned from indentured informant to paid snitch, earning as much as $100,000 per assignment.
    At trial, informant Hussain admitted that he created the “impression” that his target would make big money by bombing synagogues in the Bronx.

    Hussain was assigned to visit a mosque in Newburgh, where he would start conversations with strangers about jihad [81]. “I was finding people who would be harmful, and radicals, and identify them for the FBI,” Hussain said during Cromitie’s trial. Most of the mosque’s congregants were poor, and Hussain, who posed as a wealthy businessman and always arrived in one of his four luxury cars [82]—a Hummer, a Mercedes, two different BMWs—made plenty of friends. But after more than a year working the local Muslim community, he had not identified a single actual target [83].

    Then, one day in June 2008, Cromitie approached Hussain in the parking lot outside the mosque. The two became friends, and Hussain clearly had Cromitie’s number. “Allah didn’t bring you here to work for Walmart,” he told him [84] at one point.

    Cromitie, who once claimed he could “con the corn from the cob,” had a history of mental instability. He told a psychiatrist that he saw and heard things that weren’t there and had twice tried to commit suicide [85]. He told tall tales, most of them entirely untrue—like the one about how his brother stole $126 million worth of stuff from Tiffany.

    Exactly what Hussain and Cromitie talked about in the first four months of their relationship isn’t known, because the FBI did not record [86] those conversations. Based on later conversations, it’s clear that Hussain cultivated Cromitie assiduously. He took the target, all expenses paid [87] by the FBI, to an Islamic conference in Philadelphia to meet Imam Siraj Wahhaj, a prominent African-American Muslim leader. He helped pay Cromitie’s rent [88]. He offered to buy him a barbershop [89]. Finally, he asked Cromitie to recruit others [90] and help him bomb synagogues.

    On April 7, 2009, at 2:45 p.m., Cromitie and Hussain sat on a couch inside an FBI cover house on Shipp Street in Newburgh. A hidden camera [91] was trained on the living room.

    “I don’t want anyone to get hurt,” Cromitie told the informant [92].

    “Who? I—”

    “Think about it before you speak,” Cromitie interrupted.

    “If there is American soldiers, I don’t care,” Hussain said, trying a fresh angle.

    “Hold up,” Cromitie agreed. “If it’s American soldiers, I don’t even care.”

    “If it’s kids, I care,” Hussain said. “If it’s women, I care.”

    “I care. That’s what I’m worried about. And I’m going to tell you, I don’t care if it’s a whole synagogue of men.”

    “Yep.”

    “I would take ’em down, I don’t even care. ‘Cause I know they are the ones.”

    “We have the equipment to do it.”

    “See, see, I’m not worried about nothing. Ya know? What I’m worried about is my safety,” Cromitie said.

    “Oh, yeah, safety comes first.”

    “I want to get in and I want to get out.”

    “Trust me,” Hussain assured.

    At Cromitie’s trial, Hussain would admit that he created the—in his word—”impression” that Cromitie would make a lot of money by bombing synagogues.

    “I can make you $250,000, but you don’t want it, brother,” he once told [93] Cromitie when the target seemed hesitant. “What can I tell you?” (Asked about the exchange in court, Hussain said that “$250,000” was simply a code word for the bombing plot—a code word, he admitted, that only he knew.)

    But whether for ideology or money, Cromitie did recruit three others, and they did take photographs of Stewart International Airport in Newburgh as well as of synagogues in the Bronx. On May 20, 2009, Hussain drove Cromitie [94] to the Bronx, where Cromitie put what he believed were bombs [95] inside cars he thought had been parked by Hussain’s coconspirators. Once all the dummy bombs were placed, Cromitie headed back to the getaway car [96]—Hussain was in the driver’s seat—and then a SWAT team surrounded the car.

    Source URL: http://www.motherjones.com/politics/2011/08/fbi-terrorist-informants

    Links:
    [1] http://motherjones.com/node/127157
    [2] https://www.documentcloud.org/documents/230124-cromite-uc-transcripts-1.html#document/p21/a30101
    [3] https://www.documentcloud.org/documents/230124-cromite-uc-transcripts-1.html#document/p97/a30100
    [4] http://www.motherjones.com/politics/2011/08/fbi-terrorist-informants
    [5] http://www.motherjones.com/politics/2011/08/proxy-detention-gulet-mohamed
    [6] http://www.motherjones.com/politics/2011/08/brandon-darby-anarchist-fbi-terrorism
    [7] http://www.motherjones.com/politics/2011/08/terror-trials-numbers
    [8] http://www.motherjones.com/politics/2011/08/fbi-surveillance-video-sting
    [9] http://www.motherjones.com/politics/2011/08/fbi-sting-greatest-hits
    [10] https://www.documentcloud.org/documents/230124-cromite-uc-transcripts-1.html#document/p121/a30102
    [11] https://www.documentcloud.org/documents/230139-cromite-uc-transcripts-2.html#document/p109/a12
    [12] http://motherjones.com/politics/2011/08/shahed-hussain-fbi-informant
    [13] http://vault.fbi.gov/cointel-pro
    [14] http://www.justice.gov/oig/special/0509/chapter2.htm
    [15] http://articles.latimes.com/1986-06-15/news/mn-11287_1_fbi-informant
    [16] https://www.documentcloud.org/documents/238034-33-fbi-se-2.html
    [17] https://www.documentcloud.org/documents/238034-33-fbi-se-2.html#document/p38/a30817
    [18] https://www.documentcloud.org/documents/238034-33-fbi-se-2.html#document/p36/a30818
    [19] http://abclocal.go.com/wabc/story?section=news/local&id=6824533
    [20] http://www.cbsnews.com/stories/2010/10/27/national/main6996775.shtml
    [21] http://articles.cnn.com/2004-08-28/us/ny.bombplot_1_subway-station-shahawar-matin-siraj-herald-square-station?_s=PM:US
    [22] http://www.washingtonpost.com/wp-dyn/content/article/2008/04/16/AR2008041603607.html
    [23] http://www.csmonitor.com/USA/Justice/2010/1129/FBI-alleged-Christmas-tree-bomber-thought-9-11-was-awesome
    [24] http://motherjones.com/politics/2011/08/terror-trials-numbers
    [25] http://motherjones.com/fbi-terrorist
    [26] http://www.justice.gov/opa/pr/2010/April/10-ag-473.html
    [27] http://abcnews.go.com/US/story?id=91485&page=1
    [28] http://motherjones.com/fbi-terrorist/faisal-shahzad-times-square-car-bomb
    [29] http://motherjones.com/politics/2003/03/living-age-fire
    [30] http://www.law.cornell.edu/uscode/html/uscode18/usc_sec_18_00001001—-000-.html
    [31] https://www.documentcloud.org/documents/231565-taxing-terrorism-from-al-capone-to-al-qaida.html
    [32] http://www.justice.gov/archive/ag/speeches/2001/agcrisisremarks10_25.htm
    [33] https://www.documentcloud.org/documents/231567-farhana-khera.html
    [34] http://www.etymonline.com/index.php?term=provocateur
    [35] http://www.justice.gov/oig/reports/FBI/a0902/app5.htm
    [36] http://vault.fbi.gov/FBI%20Domestic%20Investigations%20and%20Operations%20Guide%20%28DIOG%29
    [37] http://books.google.com/books?id=DFlIcxsGUEIC&lpg=PA52&ots=X8vwNY-3f9&dq=cointelpro%20naacp&pg=PP1#v=onepage&q&f=false
    [38] https://www.documentcloud.org/documents/231566-cointelpro.html
    [39] https://www.documentcloud.org/documents/231572-fbi-compliance-with-attorny-generals-guidelines.html
    [40] http://www.justice.gov/oig/special/0509/chapter3.htm
    [41] http://www.justice.gov/jttf/
    [42] http://www.ice.gov/jttf/
    [43] http://www.law.cornell.edu/uscode/18/usc_sec_18_00002339—A000-.html
    [44] https://www.documentcloud.org/documents/231575-ahmedindictment.html
    [45] http://motherjones.com/politics/2011/08/fbi-terrorist-informants
    [46] http://www.justice.gov/iso/opa/ag/speeches/2010/ag-speech-1012101.html
    [47] http://graphics8.nytimes.com/packages/images/nytint/docs/the-new-operations-manual-from-the-f-b-i/original.pdf?scp=1&sq=FBI%20Domestic%20Investigations%20and%20Operations%20Guidelines%20%28DOG%29&st=cse
    [48] http://www.fbi.gov/about-us/training/hogans-alley
    [49] http://www.fbi.gov/news/stories/2004/july/dillinger_072304
    [50] http://www.newyorker.com/archive/2002/01/14/020114fa_fact_wright?currentPage=1
    [51] http://www.slate.com/id/2146654/
    [52] http://www.nytimes.com/2006/10/10/us/10fbi.html
    [53] http://www.miaminewtimes.com/2009-10-08/news/unholy-war-fbi-tries-to-deport-north-miami-beach-imam-foad-farahi-for-refusing-to-be-an-informant/
    [54] http://www.aclu-sc.org/downloads/40/585704.pdf
    [55] http://articles.sun-sentinel.com/2002-06-12/news/0206120212_1_fbi-informant-imran-mandhai
    [56] http://www.sofmag.com/
    [57] http://courtlistener.com/ca11/oNa/usa-v-imran-mandhai/
    [58] http://articles.sun-sentinel.com/2002-06-12/news/0206120212_1_fbi-informant-imran-mandhai/2
    [59] http://abcnews.go.com/video/playerIndex?id=8544160
    [60] https://www.documentcloud.org/documents/230973-assaadarrestreport.html#document/p2/a30249
    [61] http://www.washingtonpost.com/wp-dyn/content/article/2006/09/01/AR2006090101764_pf.html
    [62] http://www.justice.gov/opa/pr/2006/June/06_ag_386.html
    [63] http://www.economist.com/node/7117914?story_id=7117914
    [64] http://motherjones.com/node/126247
    [65] http://www.investigativeproject.org/documents/case_docs/742.pdf
    [66] https://www.documentcloud.org/documents/230978-asaadpaid.html#document/p2/a30293
    [67] http://articles.sfgate.com/2008-04-17/news/17147416_1_mistrial-elie-assad-defense-lawyers
    [68] http://www.fbmonitor.com/monitor/2010/10october/102810/community/102810_community5.html
    [69] http://www.elpasotimes.com/ci_17526478
    [70] http://motherjones.com/fbi-terrorist/mohamed-osman-mohamud
    [71] http://motherjones.com/node/127152
    [72] https://www.documentcloud.org/documents/230979-mohamudnon-fisa.html#document/p3/a30274
    [73] https://www.documentcloud.org/documents/229270-mohamud-complaint.html#document/p5/a30261
    [74] https://www.documentcloud.org/documents/229270-mohamud-complaint.html#document/p36/a30263
    [75] http://motherjones.com/node/127147
    [76] https://www.documentcloud.org/documents/229269-martinez-complaint.html#document/p4/a30266
    [77] https://www.documentcloud.org/documents/229269-martinez-complaint.html#document/p14/a30267
    [78] https://www.documentcloud.org/documents/229269-martinez-complaint.html#document/p19/a30269
    [79] http://www.nytimes.com/2010/08/25/nyregion/25plot.html?ref=jamescromitie
    [80] https://www.documentcloud.org/documents/231512-1-complaint.html
    [81] https://www.documentcloud.org/documents/230984-9-16-10.html#document/p55/a30796
    [82] https://www.documentcloud.org/documents/230984-9-16-10.html#document/p56/a12
    [83] https://www.documentcloud.org/documents/230991-9-23-10.html#document/p89/a30459
    [84] https://www.documentcloud.org/documents/230124-cromite-uc-transcripts-1.html#document/p72/a30278
    [85] https://www.documentcloud.org/documents/230987-cromitie-parole-hearing-transcript.html#document/p8/a30460
    [86] https://www.documentcloud.org/documents/230989-9-22-10.html#document/p101/a12
    [87] https://www.documentcloud.org/documents/230992-9-20-10.html#document/p70/a12
    [88] https://www.documentcloud.org/documents/230993-9-8-10-shahed-included.html#document/p22/a30462
    [89] https://www.documentcloud.org/documents/230990-9-21-10.html#document/p69/a30280
    [90] https://www.documentcloud.org/documents/230990-9-21-10.html#document/p68/a30281
    [91] http://video.nytimes.com/video/2010/10/18/nyregion/1248069169871/bomb-plot-defendant-expresses-doubts.html?scp=2&sq=Cromitie&st=cse
    [92] https://www.documentcloud.org/documents/230139-cromite-uc-transcripts-2.html#document/p74/a30272
    [93] https://www.documentcloud.org/documents/230986-hussaincromitietelephonetranscript.html#document/p3/a30273
    [94] https://www.documentcloud.org/documents/230999-9-15-10-shahed-included-redirect.html#document/p17/a12
    [95] https://www.documentcloud.org/documents/230999-9-15-10-shahed-included-redirect.html#document/p22/a13
    [96] https://www.documentcloud.org/documents/230999-9-15-10-shahed-included-redirect.html#document/p23/a30465
    [97] http://www.bloomberg.com/news/2011-06-29/new-york-city-synagogue-bomb-plotters-are-sentenced-to-25-years-in-prison.html
    [98] https://www.documentcloud.org/documents/230985-8-25-10-fuller.html#document/p179/a30282
    [99] http://journalism.berkeley.edu/program/investigative/
    [100] http://motherjones.com/authors/trevor-aaronson
    [101] http://fij.org/
    [102] http://motherjones.com/authors/lauren-ellis
    [103] http://motherjones.com/authors/hamed-aleaziz

    By Trevor Aaronson | Fri Jul. 29, 2011 2:44 PM PDT

    Find this story at Septembet/October 2011

    Copyright ©2013 Mother Jones and the Foundation for National Progress

    Most Terrorist Plots in the US Aren’t Invented by Al Qaeda — They’re Manufactured by the FBI

    The following is an excerpt from The Terror Factory: Inside the FBI’s Manufactured War on Terrorism [3] by Trevor Aaronson (Ig Publishing, 2012).

    Antonio Martinez was a punk. The twenty-two-year-old from Baltimore was chunky, with a wide nose and jet-black hair pulled back close to his scalp and tied into long braids that hung past his shoulders. He preferred to be called Muhammad Hussain, the name he gave himself following his conversion to Islam. But his mother still called him Tony, and she couldn’t understand her son’s burning desire to be the Maryland Mujahideen.

    As a young man, Martinez had been angry and lost. He’d dropped out of Laurel High School, in Prince George’s County, Maryland, and spent his teens as a small-time thief in the Washington, D.C., suburbs. By the age of sixteen, he’d been charged with armed robbery. In February 2008, at the age of eighteen, he tried to steal a car. Catholic University doctoral student Daniel Tobin was looking out of the window of his apartment one day when he saw a man driving off in his car. Tobin gave chase, running between apartment buildings and finally catching up to the stolen vehicle. He opened the passenger-side door and got in. Martinez, in the driver’s seat, dashed out and ran away on foot. Jumping behind the wheel, Tobin followed the would-be car thief. “You may as well give up running,” he yelled at Martinez. Martinez was apprehended and charged with grand theft of a motor vehicle—he had stolen the vehicle using an extra set of car keys which had gone missing when someone had broken into Tobin’s apartment earlier. However, prosecutors dropped the charges against Martinez after Tobin failed to appear in court.

    Despite the close call, Martinez’s petty crimes continued. One month after the car theft, he and a friend approached a cashier at a Safeway grocery store, acting as if they wanted to buy potato chips. When the cashier opened the register, Martinez and his friend grabbed as much money as they could and ran out of the store. The cashier and store manager chased after them, and later identified the pair to police. Martinez pleaded guilty to theft of one hundred dollars and received a ninety-day suspended sentence, plus six months of probation.

    Searching for greater meaning in his life, Martinez was baptized and became a Christian when he was twenty-one years old, but he didn’t stick with the religion. “He said he tried the Christian thing. He just really didn’t understand it,” said Alisha Legrand, a former girlfriend. Martinez chose Islam instead. On his Facebook page, Martinez wrote that he was “just a yung brotha from the wrong side of the tracks who embraced Islam.” But for reasons that have never been clear to his family and friends, Martinez drifted toward a violent, extremist brand of Islam. When the FBI discovered him, Martinez was an angry extremist mouthing off on Facebook about violence, with misspelled posts such as, “The sword is cummin the reign of oppression is about 2 cease inshallah.” Based on the Facebook postings alone, an FBI agent gave an informant the “green light” to get to know Martinez and determine if he had a propensity for violence. In other words, to see if he was dangerous.

    The government was setting the trap.

    On the evening of December 2, 2010, Martinez was in another Muslim’s car as they drove through Baltimore. A hidden device recorded their conversation. His mother had called, and Martinez had just finished talking to her on his cell phone. He was aggravated. “She wants me to be like everybody else, being in school, working,” he told his friend. “For me, it’s different. I have this zeal for deen and she doesn’t understand that.” Martinez’s mother didn’t know that her son had just left a meeting with a purported Afghan-born terrorist who had agreed to provide him with a car bomb. But she wasn’t the only one in the dark that night. Martinez himself didn’t know his new terrorist friend was an undercover agent with the Federal Bureau of Investigation and that the man driving the car—a man he’d met only a few weeks earlier—was a paid informant for federal law enforcement.

    Five days later, Martinez met again with the man he believed to be a terrorist. The informant was there, too. They were all, Martinez believed, brothers in arms and in Islam. In a parking lot near the Armed Forces Career Center on Baltimore National Pike, Martinez, the informant, and the undercover FBI agent piled into an SUV, where the undercover agent showed Martinez the device that would detonate the car bomb and how to use it. He then unveiled to the twenty-two-year-old the bomb in the back of the SUV and demonstrated what he’d need to do to activate it. “I’m ready, man,” Martinez said. “It ain’t like you seein’ it on the news. You gonna be there. You gonna hear the bomb go off. You gonna be, uh, shooting, gettin’ shot at. It’s gonna be real. … I’m excited, man.”

    That night, Martinez, who had little experience behind the wheel of a car, needed to practice driving the SUV around the empty parking lot. Once he felt comfortable doing what most teenagers can do easily, Martinez and his associates devised a plan: Martinez would park the bomb-on-wheels in the parking lot outside the military recruiting center. One of his associates would then pick him up, and they’d drive together to a vantage point where Martinez could detonate the bomb and delight in the resulting chaos and carnage.

    The next morning, the three men put their plan into action. Martinez hopped into the SUV and activated the bomb, as he’d been instructed, and then drove to the military recruiting station. He parked right in front. The informant, trailing in another car, picked up Martinez and drove him to the vantage point, just as planned. Everything was falling into place, and Martinez was about to launch his first attack in what he hoped would be for him a lifetime of jihad against the only nation he had ever known.

    Looking out at the military recruiting station, Martinez lifted the detonation device and triggered the bomb. Smiling, he watched expectantly. Nothing happened. Suddenly, FBI agents rushed in and arrested the man they’d later identify in court records as “Antonio Martinez a/k/a Muhammad Hussain.” Federal prosecutors in Maryland charged Martinez with attempted murder of federal officers and attempted use of a weapon of mass destruction. He faced at least thirty-five years in prison if convicted at trial.

    “This is not Tony,” a woman identifying herself as Martinez’s mother told a reporter after the arrest. “I think he was brainwashed with that Islam crap.” Joseph Balter, a federal public defender, told the court during a detention hearing that FBI agents had entrapped Martinez, whom he referred to by his chosen name. The terrorist plot was, Balter said, “the creation of the government—a creation which was implanted into Mr. Hussain’s mind.” He added: “There was nothing provided which showed that Mr. Hussain had any ability whatsoever to carry out any kind of plan.”

    Despite Balter’s claims, a little more than a year after his indictment, Martinez chose not to challenge the government’s charges in court. On January 26, 2012, Martinez dropped his entrapment defense and pleaded guilty to attempted use of a weapon of mass destruction under a deal that will require him to serve twenty-five years in prison—more years than he’s been alive. Neither Martinez nor Balter would comment on the reasons they chose a plea agreement, though in a sentencing hearing, Balter told the judge he believed the entire case could have been avoided had the FBI counseled, rather than encouraged, Martinez.

    The U.S. Department of Justice touted the conviction as another example of the government keeping citizens safe from terrorists. “We are catching dangerous suspects before they strike, and we are investigating them in a way that maximizes the liberty and security of law-abiding citizens,” U.S. attorney for the District of Maryland Rod J. Rosenstein said in a statement announcing Martinez’s plea agreement. “That is what the American people expect of the Justice Department, and that is what we aim to deliver.”

    Indeed, that is exactly what the Justice Department and the Federal Bureau of Investigation have been delivering throughout the decade since the attacks of September 11, 2001. But whether it’s what the American people expect is questionable, because most Americans today have no idea that since 9/11, one single organization has been responsible for hatching and financing more terrorist plots in the United States than any other. That organization isn’t Al Qaeda, the terrorist network founded by Osama bin Laden and responsible for the spectacular 2001 attacks on New York’s World Trade Center and the Pentagon in Washington, D.C. And it isn’t Lashkar-e-Taiba, Jaish-e-Mohammed, Al-Shabaab, Hamas, Palestinian Islamic Jihad, or any of the other more than forty U.S.-designated foreign terrorist organizations. No, the organization responsible for more terrorist plots over the last decade than any other is the FBI. Through elaborate and expensive sting operations involving informants and undercover agents posing as terrorists, the FBI has arrested and the Justice Department has prosecuted dozens of men government officials say posed direct—but by no means immediate or credible—threats to the United States.

    Just as in the Martinez case, in terrorism sting after terrorism sting, FBI and DOJ officials have hosted high-profile press conferences to announce yet another foiled terrorist plot. But what isn’t publicized during these press conferences is the fact that government-described terrorists such as Antonio Martinez were able to carry forward with their potentially lethal plots only because FBI informants and agents provided them with all of the means—in most cases delivering weapons and equipment, in some cases even paying for rent and doling out a little spending money to keep targets on the hook. In cities around the country where terrorism sting operations have occurred—among them New York City, Albany, Chicago, Miami, Baltimore, Portland, Tampa, Houston, and Dallas—a central question exists: Is the FBI catching terrorists or creating them?

    In the years since the attacks of September 11, 2001, the federal law enforcement profile of a terrorist has changed dramatically. The men responsible for downing the World Trade Center were disciplined and patient; they were also living and training in the United States with money from an Al Qaeda cell led by Kuwaiti-born Khalid Sheikh Mohammad. In the days and weeks following 9/11, federal officials anxiously awaited a second wave of attacks, which would be launched, they believed at the time, by several sleeper cells around the country. But the feared second wave never crashed ashore. Instead, the United States and allied nations invaded Afghanistan, Al Qaeda’s home base, and forced Osama bin Laden and his deputies into hiding. Bruised and hunted, Al Qaeda no longer had the capability to train terrorists and send them to the United States.

    In response, Al Qaeda’s leaders moved to what FBI officials describe as a “franchise model.” If you can’t run Al Qaeda as a hierarchal, centrally organized outfit, the theory went, run it as a franchise. In other words, export ideas—not terrorists. Al Qaeda and its affiliated organizations went online, setting up websites and forums dedicated to instilling their beliefs in disenfranchised Muslims already living in Western nations. A slickly designed magazine, appropriately titled Inspire, quickly followed. Article headlines included “I Am Proud to Be a Traitor to America,”9 and “Why Did I Choose Al-Qaeda?” Anwar al-Awlaki, the American-born, high-ranking Al Qaeda official who was killed in a U.S. drone strike in Yemen on September 30, 2011, became something of the terrorist organization’s Dear Abby. Have a question about Islam? Ask Anwar! Muslim men in nations throughout the Western world would email him questions, and al-Awlaki would reply dutifully, and in English, encouraging many of his electronic pen pals to violent action. Al-Awlaki also kept a blog and a Facebook page, and regularly posted recruitment videos to YouTube. He said in one video:

    I specifically invite the youth to either fight in the West or join their brothers in the fronts of jihad: Afghanistan, Iraq, and Somalia.

    I invite them to join us in our new front, Yemen, the base from which the great jihad of the Arabian Peninsula will begin, the base from which the greatest army of Islam will march forth.

    Al Qaeda’s move to a franchise model met with some success. U.S. army major Nadal Hassan, for example, corresponded with al-Awlaki before he killed thirteen people and wounded twenty-nine others in the Fort Hood, Texas, shootings in 2009. Antonio Martinez and other American-born men, many of them recent converts to Islam, also sent al-Awlaki messages or watched Al Qaeda propaganda videos online before moving forward in alleged terrorist plots.

    The FBI has a term for Martinez and other alleged terrorists like him: lone wolf. Officials at the Bureau now believe that the next terrorist attack will likely come from a lone wolf, and this belief is at the core of a federal law enforcement policy known variously as preemption, prevention, and disruption. FBI counterterrorism agents want to catch terrorists before they act, and to accomplish this, federal law enforcement officials have in the decade since 9/11 created the largest domestic spying network ever to exist in the United States. In fact, the FBI today has ten times as many informants as it did in the 1960s, when former FBI director J. Edgar Hoover made the Bureau infamous for inserting spies into organizations as varied as Reverend Dr. Martin Luther King Jr.’s and the Ku Klux Klan. Modern FBI informants aren’t burrowing into political groups, however; they are focused on terrorism, on identifying today the terrorist of tomorrow, and U.S. government officials acknowledge that while terrorist threats do exist from domestic organizations, such as white supremacist groups and the sovereign citizen movement, they believe the greatest threat comes from within U.S. Muslim communities due, in large part, to the aftereffects of the shock and awe Al Qaeda delivered on September 11, 2001.

    The FBI’s vast army of spies, located in every community in the United States with enough Muslims to support a mosque, has one primary function: to identify the next lone wolf. According to the Bureau, a lone wolf is likely to be a single male age sixteen to thirty-five. Therefore, informants and their FBI handlers are on the lookout for young Muslims who espouse radical beliefs, are vocal about their disapproval of U.S. foreign policy, or have expressed sympathy for international terrorist groups. If they find anyone who meets the criteria, they move him to the next stage: the sting, in which an FBI informant, posing as a terrorist, offers to help facilitate a terrorist attack for the target.

    On a cold February morning in 2011, I met with Peter Ahearn, a retired FBI special agent who directed the Western New York Joint Terrorism Task Force, in a coffee shop outside Washington, D.C., to talk about how the FBI runs its operations. Ahearn was among the Bureau’s vanguard as it transformed into a counterterrorism organization in the wake of 9/11. An average-built man with a small dimple on his chin and close-cropped brown hair receding in the front, Ahearn oversaw one of the earliest post-9/11 terrorism investigations, involving the so-called Lackawanna Six—a group of six Yemeni-American men living outside Buffalo, New York, who attended a training camp in Afghanistan and were convicted of providing material support to Al Qaeda. “If you’re doing a sting right, you’re offering the target multiple chances to back out,” Ahearn told me. “Real people don’t say, ‘Yeah, let’s go bomb that place.’ Real people call the cops.”

    Indeed, while terrorism sting operations are a new practice for the Bureau, they are an evolution of an FBI tactic that has for decades captured the imaginations of Hollywood filmmakers. In 1982, as the illegal drug trade overwhelmed local police resources nationwide and contributed to an increase in violent crime, President Ronald Reagan’s first attorney general, William French Smith, gave the FBI jurisdiction over federal drug crimes, which previously had been the exclusive domain of the U.S. Drug Enforcement Administration. Eager to show up their DEA rivals, FBI agents began aggressively sending undercover agents into America’s cities. This was relatively new territory for the FBI, which, during Hoover’s thirty-seven-year stewardship, had mandated that agents wear a suit and tie at all times, federal law enforcement badge easily accessible from the coat pocket. But an increasingly powerful Mafia and the bloody drug war compelled the FBI to begin enforcing federal laws from the street level. In searching for drug crimes, FBI agents hunted sellers as well as buyers, and soon learned one of the best strategies was to become part of the action.

    Most people have no doubt seen drug sting operations as portrayed in countless movies and television shows. At its most cliché, the scene is set in a Miami high-rise apartment, its floor-to-ceiling windows overlooking the cresting waves of the Atlantic Ocean. There’s a man seated at the dining table; he’s longhaired, with a scruffy face, and he has a briefcase next to him. But that’s not all. Hidden on the other side of the room is a camera making a grainy black-and-white recording of the entire scene. The apartment’s door swings open and two men saunter in, the camera recording their every move and word. Everyone sits down at the table. The two men hand over bundles of cash. The scruffy man then hands over the briefcase. The two guests of course expect to find cocaine inside. Instead, the briefcase is empty, and as soon as they open it to find the drugs missing, FBI agents rush in, guns drawn for the takedown. Federal law enforcement officials call this type of sting operation a “no-dope bust,” and it has been an effective tool for decades. It’s also the direct predecessor to today’s terrorism sting. Instead of empty briefcases, the FBI today uses inert bombs and disabled assault rifles, and now that counter-terrorism is the Bureau’s top priority, the investigation of major drug crimes has largely fallen back to the DEA. Just as no-dope busts resulted in the arrest and prosecution of those in the drug trade in the twentieth century, terrorism sting operations are resulting in the arrest and prosecution of would-be terrorists in this century.

    While the assumptions behind drug stings and terrorism stings are similar, there is a fundamental flaw in the assumption underpinning the latter. In drug stings, federal law enforcement officials assume that any buyer caught in a sting would have been able to buy or sell drugs elsewhere had that buyer not fallen into the FBI trap. The numbers support this assumption. In 2010, the most recent year for which data is available, the DEA seized 29,179 kilograms, or 64,328 pounds, of cocaine in the United States. Likewise, in terrorism stings, federal law enforcement officials assume that any would-be terrorists caught in a sting would have been able to acquire the means elsewhere to carry out their violent plans had they not been ensnared by the FBI. The problem with this assumption is that no data exists to support it, and what data is available suggests would-be Islamic terrorists caught in FBI terrorism stings never could have obtained the capability to carry out their planned violent acts were it not for the FBI’s assistance.

    In the ten years following 9/11, the FBI and the Justice Department indicted and convicted more than 150 people following sting operations involving alleged connections to international terrorism. Few of these defendants had any connection to terrorists, evidence showed, and those who did have connections, however tangential, never had the capacity to launch attacks on their own. In fact, of the more than 150 terrorism sting operation defendants, an FBI informant not only led one of every three terrorist plots, but also provided all the necessary weapons, money, and transportation.

    The FBI’s logic to support the use of terrorism stings goes something like this: By catching a lone wolf before he strikes, federal law enforcement can take him off the streets before he meets a real terrorist who can provide him with weapons and munitions. However, to this day, no example exists of a lone wolf, by himself unable to launch an attack, becoming operational through meeting an actual terrorist in the United States. In addition, in the dozens of terrorism sting operations since 9/11, the would-be terrorists are usually uneducated, unsophisticated, and economically desperate—not the attributes of someone likely to plan and launch a sophisticated, violent attack without significant help.

    Reprinted from The Terrorr Factory: Inside the FBI’s Manufactured War on Terrorism [3] — Copyright © 2012 by Trevor Aaronson. Reprinted with permission of Ig Publishing, Brooklyn, NY.

    February 15, 2013 |

    Find this story at 15 February 2013

    The Many Scandals Of The Prisoner X Affair

    There is a joke among spies that the worst curse you can bestow on a colleague is, “I hope to read about you in the newspapers one day.” In the tragic case of Ben Zygier, the curse wasn’t a joke, and he had to die for it to become a reality. Needless to say, the gallows humor that is a hallmark of my former profession has lost much of its luster.

    This file photo taken on February 14, 2013 shows Australian newspapers leading their front pages in Australia with the story of Ben Zygier. (William West / AFP / Getty Images)

    In a piece in these pages entitled “What Prisoner X Scandal? (/articles/2013/02/20/what-prisoner-x-scandal.html) “, Professor Gil Troy argues that Zygier was the author of his own demise—both figuratively and literally—and that his treatment at the hands of the state was decidedly unscandalous and in accordance with all the norms associated with a liberal democracy.

    I would strongly disagree with Troy, and go so far as to say that what is unfolding in this case is more than just one scandal but a culmination of many. I also take strong issue with Troy’s observations about Zygier’s state of mind and motives for committing suicide.

    I know what it was like to walk in Zygier’s shoes (and he in mine, since I preceded him by a decade). I served in the Mossad for 13 years and the first 7 of those as a member of the same covert operations unit that Zygier belonged to. For a short while, we would have even been in the field at the same time (albeit in different units) at that stage of my career. Like Zygier, I grew up in the Anglosphere, with all the inherent cultural differences separating me from native-born Israelis. In my case however, I wasn’t even born Jewish and my family had settled in Canada long before Confederation (Troy—an expert on the War of 1812—may be interested to know that I am a direct descendant of Laura Secord). All the psychobabble of divided loyalties and identity crisis were never a part of the equation for me, nor any of my colleagues. We got on with the business of being at the sharp-end of Mossad operations because we knew what we were doing was important and engendered universal values that apply to any Western democracy. I do not see any evidence that Zygier was any less dedicated to this ideal.

    I find the circumstances of Zygier’s incarceration in solitary confinement—ostensibly as a means to “protect him and others” for reasons of national security—scandalous. Zygier was tucked away by the state after a bout of closed-door legal proceedings. The two main criteria a prosecutor must consider when assessing a case is whether the prosecution is in the public interest and whether it has a good chance of being successful. It is clear that this case was not in the public interest and bears all the worst elements of legal expediency excused by national security interests. Zygier did not present any danger to the public and could have been summarily dismissed, placed under house arrest, and the matter dealt with internally. This was an exceptional case requiring an exceptional solution and I see little in the way of critical thinking on behalf of those who decided to remand him in solitary for an indeterminate time.

    The management of Zygier’s cover by his Mossad commanders is no less scandalous. Zygier was placed in an untenable situation that was prone to his being compromised when the decision was made to dispatch him to Australia on several occasions to alter his name and passport. These decisions were all made on the heels of a very public scandal that put Australian Jewry and their travel documents under the spotlight in 2004. The other scandal is the churlish and clearly vindictive behaviour of the Australian Security Intelligence Organization (ASIO), who decided to leak Zygier’s name and details to a journalist presumably with a view to embarrassing its ally into “good behavior.” There are flaps and deconfliction issues all the time between allied intelligence services, and they are worked out behind closed doors. The Mossad has on more than one occasion been the aggrieved party in these cases and solved the issue with the offending service out of the public domain. These scandals both large and small have caused serious damage to the Mossad’s operational capability, the Jewish community in Australia, and more importantly, Zygier’s family.

    I also take issue with Troy’s assertion that Zygier lacked the mental toughness for the job. Living and working in hostile locales for long periods under cover is, with all due respect, very different from the globe-trotting escapades of an academic with dual citizenship. Building cover is a long and painstaking process that involves more than remembering not to use a Hebrew word here and there. Hollywood notwithstanding, cover is an operative’s first, last, and only line of defense against a visit to the “fingernail factory” and an unpleasant death. To suggest that Zygier did not possess the mental scaffolding necessary to cope with the stresses of his job is wholly without merit.

    by Michael Ross (/contributors/michael-ross.html) | February 21, 2013 5:00 PM EST

    Find this story at 21 February 2013
    © 2013 The Newsweek/Daily Beast Company LLC

    << oudere artikelen  nieuwere artikelen >>