• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Who bugged the Turkish prime minister? And other questions

    The rumors started to hit the political corridor as soon as Prime Minister Tayyip Erdoğan’s Security Chief Zeki Bulut was removed from office on Sept. 7, 2012.

    He was actually appointed as the police chief of the Western Anatolian town of Denizli. On paper it was a promotion, but in fact it was a clear demotion according to tendencies in the Turkish bureaucratic system; you’d expect a bigger city after protecting the prime minister for years. A few days later it was understood that he was not alone. Most of the 200-strong team of bodyguards including four police commissars and five squad leaders were moved elsewhere; some papers had claimed that the entire police team and some civilian officers in the Prime Ministry building were replaced.

    The rumors were about a number of bugs found in Erdoğan’s office by the electronic sweeping teams of the National Intelligence Organization (MİT). It was not possible to make that a proper news story since it was not possible to obtain even a tiny bit of information from any official source, until Erdoğan himself said on Dec. 21 in an NTV interview that he was also eavesdropped on, possibly by the remnants of a “deeper state” in Turkey. “A deeper state exists almost in every country,” he claimed. “We try a lot but unfortunately it is not possible to eradicate the deeper state”; that was in reference to the ongoing court cases of Ergenekon, Balyoz and OdaTV in which many army officers, academics, journalists and writers, lawyers and police chiefs are being tried for conspiring to overthrow the government.

    Journalist Ahmet Şık, who was under arrest from one of those cases up until a few months ago claimed in an article in Birgün newspaper on Dec. 26 that the unveiling by Erdoğan exposed a rift within the ranks of the ruling Justice and Development Party (AK Parti) between the core and the followers of the U.S.-resident Islamic theologian Fethullah Gülen. According to this claim, the policemen removed from being the close guard of Erdoğan were sympathizers of the Gülen group, which has been serving the government dearly since the beginning of the Ergenekon, Balyoz and OdaTV probes. Prime Ministry sources deny the claims that the replacement of the bodyguards has anything to do with the bugs in the office.

    Or should we say offices? Because according to the stories appearing in Hürriyet, Milliyet and Star newspapers on Dec. 26, the bugs were found in the last weeks of December 2011 in both the Prime Ministry building and the private office of Erdoğan in his apartment home in Ankara. That was when he returned from his more than 20-day stay in Istanbul following an intestinal operation there. The fact brings another factor into the equation. On Feb. 7, 2012 the Istanbul prosecutors who were working on the coup claim cases attempted to interrogate Hakan Fidan, the head of Turkish intelligence, MİT, together with two former officers, which made Erdoğan furious. A number of prosecutors and police officers who had been claimed by Turkish media to be close to the Gülen group were removed from their offices to less relevant positions and Erdoğan forced a law change from Parliament to make the prime minister’s permission obligatory to open an investigation into MİT officers. One has to recall that soon after Fidan had taken his office in May 2011, an illegally recorded tape was leaked to the media about the (failed) secret talks between the government and the outlawed Kurdistan Workers’ Party (PKK) in which Fidan had taken part.

    December/27/2012

    Find this story at 27 December 2012

    © http://www.hurriyetdailynews.com

    Speculations mount over PM’s wiretapping

    Fingers continue to be pointed as speculation grows in Ankara over who is responsible for wiretapping the prime minister

    Speculations have been mounting over perpetrators of the eavesdropping of Prime Minister Recep Tayyip Erdoğan after he made public Dec. 21 that wiretapping devices were found in his home-office.

    Erdoğan then suggested it was actors within the deep state behind the wiretapping, but fell short of further elaborating on who the deep-state members were exactly. Days later on Dec. 25 Erdoğan offered to close the “bugs issue,” but noted one more bug had been found at his residence.
    Deep state refers to a term extensively used in Turkey to describe clandestine collaboration between high-level state security forces and criminal organizations.

    Some critics pointed to the Fethullah Gülen movement for eavesdropping on the premier, recalling conflict between the government and the Gülen movement that surfaced when National Intelligence Organization (MİT) chief Hakan Fidan was called to testify as part of the Kurdistan Communities Union (KCK) probe.

    The Gülen movement is an influential moderate-Islamist movement led by Fethullah Gülen, who now resides in the United States. The movement has been accused by critics of manipulating Turkey’s judicial and security apparatus. The Gülen movement has generally lent support to the ruling Justice and Development Party (AKP) since its foundation in 2001.

    However, an apparent conflict between the ruling party and the movement surfaced earlier this year when a specially-authorized prosecutor in Istanbul called MİT head Fidan to testify about secret talks with the PKK on Feb. 7.

    A special law was hastily adopted to prevent Fidan from testifying. In June, Erdoğan accused the specially-authorized courts of “going too far.” “He was instructed by me. If you want to take someone [to prosecute], then take me,” Erdoğan had said.

    In July, specially-authorized courts were abolished despite objection from newspapers close to the Gülen movement.

    Journalist Ahmet Şık underlined in daily BirGün Dec. 25 that Erdoğan’s doubts of being wiretapped were not new as he held doubts since February when Fidan was called to testify by prosecutors at a time when he was in the hospital.

    Two separate bugging devices were found at Erdoğan’s office in his house. These devices are currently being examined by the MİT, according to reports.

    Suspicions that Erdoğan was being wiretapped were voiced by the opposition when Erdoğan’s security chief and all of his bodyguards were changed in September. After Erdoğan’s office at Parliament was renovated from top to bottom in October, main opposition Republican People’s Party (CHP) deputy chair Gürsel Tekin issued a Parliamentary question to Erdoğan on Dec. 3. “The renovation of the prime minister’s office coincides with the replacement of his bodyguards. This move raises suspicion whether the prime minister was eavesdropped on,” Tekin said.

    Nationalist Movement Party (MHP) secretary-general İsmet Büyükataman, for his part, asked yesterday if the MİT knew who secretly listened to Erdoğan. “Does the MİT know who eavesdropped on Erdoğan? Have they taken the necessary precautions? Is the Republic of Turkey so helpless that it is unable to find who put those bugs in the prime minister’s office?” Büyükataman said in a statement.

    December/27/201 ANKARA – Hürriyet Daily News

    Find this story at 27 December 2012

    © http://www.hurriyetdailynews.com

    Mysterious clandestine group behind Turkish wiretap case

    Early last January, two concealed audio surveillance devices were found at the Ankara headquarters of Turkey’s Republican People’s Party (CHP). Officials and supporters of the center-left party, which is currently Turkey’s main opposition political force, were shocked by the discovery, and an investigation was launched to uncover the culprits. In a surprising move, Turkish police raided late last week the home of a prominent union official, and discovered documents that are said to directly link the CHP wiretaps with Ergenekon, a shadowy ultranationalist network with strong links to the Turkish armed forces. The documents were reportedly discovered at the home of Mustafa Özbek, chairperson of the Türk Metal workers’ union, who is already in prison awaiting trial on criminal conspiracy charges. They appear to disclose that the Ergenekon group set up a clandestine network of safe houses in Turkish capital Ankara, as well as in the occupied Turkish Republic of Northern Cyprus, for the sole purpose of wiretapping the communications of targeted individuals and organizations. The safe houses were reportedly equipped with wiretapping systems purchased in Israel, some of which were portable and were thus moved to various cities and towns in Turkey, in accordance with Ergenekon mission directives. Ergenekon is a clandestine ultra-nationalist organization with secularist and anti-Western objectives. Its membership, which is reportedly drawn primarily from Turkey’s military and security establishments, is involved in both criminal and political activities aiming to preserve the political power of Turkey’s armed forces, while subverting the rise of Islamism and keeping Turkey out of the European Union. The existence of this mysterious organization was revealed in 2001 by Tuncay Güney, an operative of Turkey’s National Intelligence Organization (MİT), who was arrested for petty fraud. Rumors about the group resurfaced in 2007, when police in Istanbul’s Ümraniye neighborhood discovered a safe house containing dozens of hand grenades. The discovery sparked a broad juridical investigation into Ergenekon’s activities, which has so far revealed that the shadow network has carried out several targeted assassinations aimed at toppling Turkey’s pro-Islamic government “by creating chaos and mayhem”. Among those individuals listed as targets in Ergenekon’s recent wiretap conspiracy are officials and maintenance staff at CHP’s headquarters, as well as several leftist politicians and union officials.

    March 10, 2009 by intelNews
    Tuncay Güney
    By IAN ALLEN | intelNews.org |

    Find this story at 10 March 2009

    Bradley Manning denied chance to make whistleblower defence

    Judge rules that Manning will not be allowed to present evidence about his motives for the leak – a key plank of his defence

    Colonel Denise Lind ruled that general issues of motive were not relevant to the trial stage of the court martial. Photograph: Patrick Semansky/AP

    Bradley Manning, the US soldier accused of being behind the largest leak of state secrets in America’s history, has been denied the chance to make a whistleblower defence in his upcoming court martial in which he faces possible life in military custody with no chance of parole.

    The judge presiding over Manning’s prosecution by the US government for allegedly transmitting confidential material to WikiLeaks ruled in a pre-trial hearing that Manning will largely be barred from presenting evidence about his motives in leaking the documents and videos. In an earlier hearing, Manning’s lead defence lawyer, David Coombs, had argued that his motive was key to proving that he had no intention to harm US interests or to pass information to the enemy.

    The judge, Colonel Denise Lind, ruled that general issues of motive were not relevant to the trial stage of the court martial, and must be held back until Manning either entered a plea or was found guilty, at which point it could be used in mitigation to lessen the sentence. The ruling is a blow to the defence as it will make it harder for the soldier’s legal team to argue he was acting as a whistleblower and not as someone who knowingly damaged US interests at a time of war.

    “This is another effort to attack the whistleblower defence,” said Nathan Fuller, a spokesman for the Bradley Manning support network, after the hearing.

    The judge also blocked the defence from presenting evidence designed to show that WikiLeaks caused little or no damage to US national security. Coombs has devoted considerable time and energy trying to extract from US government agencies their official assessments of the impact of WikiLeaks around the world, only to find that he is now prevented from using any of the information he has obtained.

    The 25-year-old intelligence analyst faces 22 charges relating to the leaking of hundreds of thousands of classified diplomatic cables, war logs from the Afghan and Iraq wars, and videos of US military actions. The most serious charge, “aiding the enemy”, which carries the life sentence, accuses him of arranging for state secrets to be published via WikiLeaks on the internet knowing that al-Qaida would have access to it.

    Ed Pilkington in New York
    guardian.co.uk, Thursday 17 January 2013 18.22 GMT

    Find this story at 17 January 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    UN official calls on British government to investigate undercover police scandal

    Maina Kiai says he is ‘deeply concerned’ about use of officers such as Mark Kennedy to infiltrate non-violent groups

    Mark Kennedy, an undercover police officer who infiltrated a group of environmental protesters. Photograph: Philipp Ebeling

    A senior United Nations official has called on the British government to launch a judge-led public inquiry into the “shocking” case of Mark Kennedy and other undercover police officers who have been infiltrating protest groups.

    Maina Kiai, a UN special rapporteur, said the scandal involving undercover police cultivating intimate sexual relationships with political activists over long periods of time had been as damaging as the phone-hacking controversy that prompted the Leveson inquiry.

    He said he was “deeply concerned” about the UK’s use of undercover police officers in non-violent groups exercising their democratic rights to protest.

    “The case of Mark Kennedy and other undercover officers is shocking as the groups in question were not engaged in criminal activities,” Kiai told a central London news conference. “The duration of this infiltration, and the resultant trauma and suspicion it has caused, are unacceptable in a democracy.

    “It is a clear violation of basic rights protected under the Human Rights Act, and more generally under international law, such as the right to privacy.”

    He added: “This is not a James-Bond-type movie issue. I think it is unacceptable that the state can pay somebody who will use women, and be part of their lives and then just devastate them and leave them. That’s unbelievable.”

    Kiai is the latest senior figure to call for a full investigation into the controversy since the Guardian began revealing details of the spy operation two years ago. The undercover policing controversy will be raised in parliament next month during a special hearing hosted by the home affairs select committee.

    Undercover police have been living double lives for several years among protest groups, sometimes even residing with female activists and spending weeks abroad with them on holiday. At the end of their deployment, the police spies vanish without a trace.

    The surveillance operation, which has continued to plant long-term spies in protest groups despite recent controversies, comes under the remit of an initiative to combat what police call domestic extremism. Many of the targets of the operation have turned out to be law-abiding anti-capitalist campaigners or protesters against global warming.

    In at least three cases, relationships between police and the women they were spying on have resulted in the birth of children.

    The UN rapporteur’s preliminary report follows a 10-day fact-finding mission to London, Belfast and Edinburgh. Kiai met campaigners, senior police, civil servants and the home secretary, Theresa May. He said she told him a full inquiry into undercover policing was “not something on the agenda”.

    However, Kiai, who has responsibility in the UN for the rights to freedom of peaceful assembly, said he believed the case of Kennedy and others had left a “trail of victims and survivors in its wake” who deserved answers.

    Eleven women and one man are bringing a high court legal action for the emotional trauma suffered as a result of “deeply personal” relationships they formed with men who turned out to be police officers.

    A judge ruled last week that some of their claims should be heard by the Investigatory Powers Tribunal, an obscure body that usually deals with complaints against MI5 and MI6.

    Mr Justice Tugendhat cited the fictional case of James Bond to argue that when parliament introduced legislation allowing covert police to have personal relationships with targets, they must have assumed they may have sexual encounters.

    Rejecting the idea that it could be a “James Bond movie issue”, Kiai said: “I therefore call on the authorities to undertake a judge-led public inquiry into the Mark Kennedy matter, and other related cases, with a view to giving voice to victims, especially women, who were deliberately deceived by their own government, and paving the way for reparations.”

    The government has so far resisted calls for a judge-led inquiry, instead choosing to back a host of other separate reviews into the conduct of Kennedy and related issues.

    Paul Lewis and Rob Evans
    The Guardian, Wednesday 23 January 2013 16.49 GMT

    Find this story at 23 January 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Women who had relationships with police spies win partial legal victory

    Judge rules half of the women’s cases can be heard in open court but half must be first heard by secret tribunal

    The judge said that claims against two police officers – Mark Kennedy (pictured above) and a second spy who posed as Mark Jacobs – should first be heard by the Investigatory Powers Tribunal. Photograph: Philipp Ebeling

    Ten women who say they were deceived into having sexual relationships with undercover police officers have won only a partial victory in their fight to have their case heard in the high court.

    Mr Justice Tugendhat said the lawsuit alleged “the gravest interference” with the fundamental rights of women who had long-term relationships with police officers sent to spy on their political groups. The judge rejected an attempt by the Metropolitan police to have the whole case struck out of the court.

    However, in a mixed ruling, the judge said that half the cases in the legal action should first be heard by a secretive tribunal that usually deals with complaints against MI5.

    The case relates to a joint lawsuit brought by 10 women and one man who claim they suffered emotional trauma after forming “deeply personal” relationships with the police spies.

    In his ruling, Tugendhat acknowledged that the allegations made by the women were “very serious”. He added that the case appeared to be unprecedented. “No action against the police alleging sexual abuse of the kind in question in these actions has been brought before the courts in the past, so far as I have been made aware.”

    The judge drew a comparison with James Bond, the fictional member of the intelligence service who “used relationships with women to obtain information, or access to persons or property”.

    Although Ian Fleming, the writer of the Bond series, did not dwell on “psychological harm he might have done to the women concerned”, the judge said fictional accounts such as these point to how “intelligence and police services have for many years deployed both men and women officers to form personal relationships of an intimate sexual nature”.

    Lawyers for the Met had attempted to have all 11 cases struck out of the court, arguing they constituted an abuse of process and should instead by heard by the Investigatory Powers Tribunal (IPT), a little-known complaints body.

    However, they achieved only a partial victory.

    In his ruling, the judge said that claims against two police officers – Mark Kennedy and a second spy who posed as Mark Jacobs – should first be heard by the IPT. Both of these officers were deployed after 2000, and some of the claims allege their activities constituted a breach of the Human Rights Act, which came into force in October that year.

    However, the judge said that other claims for damages under common law, including torts of misfeasance in public office, deceit, assault and negligence, should be heard by the high court.

    He temporarily stayed high court proceedings pending the conclusion of cases at the IPT. The special tribunal was introduced in 2000 to examine complaints from the public about unjustified state surveillance within what it calls “a necessary ring of secrecy”. Complainants do not see the evidence put forward by the state and have no automatic right to an oral hearing. Neither can they appeal its decision.

    Lawyers for the some of the women described the decision to send half of the cases to the tribunal as an “outrage”.

    Harriet Wistrich, of Birnberg Peirce, said: “We brought this case because we want to see an end to sexual and psychological abuse of campaigners for social justice and others by undercover police officers. We are outraged that the high court has allowed the police to use the IPT to preserve the secrecy of their abusive and manipulative operations in order to prevent public scrutiny and challenge.”

    Rob Evans and Paul Lewis
    guardian.co.uk, Thursday 17 January 2013 14.01 GMT

    Find this story at 17 January 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Did US spies hack French government computers using Facebook?

    A sophisticated computer virus discovered at the center of the French government’s secure computer network was planted there by the United States, according to unnamed sources inside France’s intelligence community. Paris-based magazine L’Express, France’s version of Time magazine, says in its current issue that the alleged American cyberattack took place shortly before last April’s Presidential elections in France. It resulted in the infection of the entire computer system in the Palais de l’Élysée, which is the official residence of the President of France. The French magazine cites unnamed sources inside the French Network and Information Security Agency (ANSSI), which is responsible for cybersecurity throughout France. The sources claim that the snooping virus allowed its handlers to gain access to the computers of most senior French Presidential aides and advisers during the final weeks of the administration of French President Nicolas Sarkozy, including his Chief of Staff, Xavier Musca. The article claims that the virus used a source code nearly identical to that of Flame, a super-sophisticated version of Stuxnet, the virus unleashed a few years ago against the computer infrastructure of the Iranian nuclear energy program. Many cybersecurity analysts believe that the US and Israel were instrumental in designing both Stuxnet and Flame. IntelNews understands that the alleged virus was initially directed at employees of the Palais de l’Élysée through Facebook. The targets were allegedly befriended by fake Facebook profile accounts handled by the team that operated the virus. The targets were then sent phishing emails that contained links to phony copies of the login page for the Palais de l’Élysée intranet website. Though that bogus website the hackers acquired username and password data of several Palais de l’Élysée staffers, which they subsequently used to gain access to the Presidential Palace’s computer system. Assuming that the virus planted on the Palais de l’Élysée intranet was similar to Flame in method and scope, it can be inferred that its handlers were able to spy on conversations taking place at the Palais using the infected computers’ audiovisual peripherals, as well as log keystrokes and acquire screen shots at regular intervals. The collected data was then routed through a host of different servers on five continents before reaching the hackers.

    November 22, 2012 by Joseph Fitsanakis 6 Comments

    By JOSEPH FITSANAKIS | intelNews.org |

    Find this story at 22 November 2012

    Cyberguerre: comment les Américains ont piraté l’Élysée

    EXCLUSIF. En mai, l’équipe de Nicolas Sarkozy a été victime d’une opération d’espionnage informatique hypersophistiquée. Les sources de L’Express concordent : le coup vient de… l’ami américain. Révélations sur une attaque qui s’inscrit dans une bataille planétaire.

    CYBERGUERRE – Les intrus qui se sont introduits dans les réseaux informatiques de l’Elysée en mai dernier ont subtilisé des notes secrètes et des plans stratégiques à partir des ordinateurs de proches conseillers de Nicolas Sarkozy.
    DR

    C’est l’un des hold-up les plus audacieux réalisés contre l’Etat français. En mai dernier, quelques jours avant le second tour de l’élection présidentielle, des pirates ont réussi à s’introduire dans les réseaux informatiques de l’Elysée. Révélée par le quotidien régional Le Télégramme, cette intrusion avait alors été soigneusement étouffée par le Château. Une omerta qui, jusqu’à présent, n’avait pas été brisée. Aucune information n’avait filtré sur la nature des agresseurs, ou même sur le préjudice subi. Pourtant, l’affaire est grave, d’autant qu’elle constituerait une cyberattaque sans précédent entre pays alliés.

    L’Express peut révéler que les intrus ont non seulement réussi à pénétrer au coeur même du pouvoir politique français, mais qu’ils ont pu fouiller les ordinateurs des proches conseillers de Nicolas Sarkozy. Des notes secrètes ont été récupérées sur des disques durs, mais aussi des plans stratégiques. Du vrai travail de pro, digne du dernier James Bond, Skyfall. Et, comme souvent dans ce type d’attaque, une négligence humaine est à l’origine de la catastrophe.
    L’ordinateur du secrétaire général de l’Elysée pillé

    Tout a commencé sur Facebook. Les assaillants ont d’abord identifié, sur le réseau social, le profil de personnes travaillant au palais présidentiel. Se faisant passer pour des amis, ils les ont ensuite invitées, par un message électronique, à se connecter sur l’intranet du Château. Sauf que ce lien menait à une fausse page Web – une réplique de celle de l’Elysée. Les victimes n’y ont vu que du feu ; et lorsque est apparu, à l’écran, un message leur demandant leur identifiant et leur mot de passe, elles les ont donnés en toute bonne foi. Une technique bien connue des hackers, qui leur a permis de récupérer les clefs numériques pour s’inviter en toute quiétude dans le saint des saints.

    Une fois à l’intérieur, les pirates ont installé un logiciel espion qui s’est propagé d’un ordinateur à l’autre. Très élaboré, ce “ver” n’a infecté que quelques machines. Et pas n’importe lesquelles : celles des conseillers les plus influents du gouvernement… et du secrétaire général, Xavier Musca. Nicolas Sarkozy y a, lui, échappé. Et pour cause, il ne possédait pas de PC. Malheureusement pour les assaillants, le code malveillant a laissé des empreintes. “Telles des marionnettes actionnées par des fils invisibles, les machines infectées communiquent avec leur maître pour prendre leurs ordres, décrypte un expert, Olivier Caleff, responsable sécurité du Cert-Devoteam, une société de sécurité informatique. Lorsque l’on essaie de remonter ces fils sur Internet, on arrive souvent sur des serveurs situés à l’étranger.”

    C’est ce travail de fourmi qu’ont mené les enquêteurs français. Le degré de sophistication de l’attaque était tel que les suspects se limitaient, d’emblée, à une poignée de pays. Pour preuve, le cyberpompier de l’Etat, l’Agence nationale de la sécurité des systèmes d’information (Anssi), a mis plusieurs jours pour restaurer le réseau de l’Elysée. Difficile de trouver l’origine de l’offensive. Souvent, les assaillants brouillent les pistes en passant par des pays tiers. Autant de rebonds, sur des serveurs situés sur les cinq continents, qui rendent ce fil d’Ariane très compliqué à suivre, même pour les “cyberdétectives” de l’Etat mobilisés pour l’occasion. Mais, selon les informations recueillies par L’Express auprès de plusieurs sources, leurs conclusions, fondées sur un faisceau de présomptions, convergent vers le plus vieil allié de la France : les Etats-Unis.
    Le virus porte la marque de son auteur

    Le code malveillant utilisé affiche, en effet, les mêmes fonctionnalités qu’un ver informatique extrêmement puissant, baptisé Flame, identifié à la fin du mois de mai par une grande société russe d’antivirus, Kaspersky. “Très perfectionné, il peut collecter les fichiers présents sur une ma-chine, réaliser des captures d’écran et même activer le microphone d’un PC pour enregistrer les conversations, expli-que Vitaly Kamluk, spécialiste du sujet chez cet éditeur. Sa conception a demandé beaucoup d’argent et des moyens humains que seul un grand pays est en mesure de mobiliser.” Ou même deux : selon la presse anglo-saxonne, le ver aurait été créé par une équipe américano-israélienne, car il devait viser initialement des pays du Moyen-Orient (Iran, Egypte). Autre élément à charge : tel un peintre reconnaissable à son trait, un virus porte les marques du savoir-faire de son auteur. Janet Napolitano, secrétaire d’Etat à la Sécurité intérieure de l’administration Obama, n’a ni confirmé ni démenti nos informations.

    Contactés à ce sujet, ni l’Anssi ni l’Elysée n’ont souhaité faire de commentaires. Reste une question. Pourquoi un allié de la France lancerait-il une telle opération ? “Vous pouvez être en très bons termes avec un “pays ami” et vouloir, en même temps, vous assurer de son soutien indéfectible, surtout dans une période de transition politique”, note un proche du dossier, sous le couvert de l’anonymat. Sans compter que l’Elysée joue un rôle clef dans la signature de grands contrats avec des pays étrangers, notamment au Moyen-Orient. “C’était encore plus vrai à l’époque de Nicolas Sarkozy”, rappelle Nicolas Arpagian, directeur scientifique du cycle sécurité numérique à l’Institut national des hautes études de la sécurité et de la justice.

    Un instantané des cyberattaques en cours…

    HoneyMap réalisé par Honeynet Project

    Quitte à être espionné, sans doute vaut-il mieux l’être par un allié… “Nous avons de grands partenaires avec lesquels nous collaborons et entretenons des relations de confiance, et d’autres avec qui nous ne partageons pas les mêmes valeurs”, rappelle le contre-amiral Arnaud Coustillière, responsable du volet militaire de la cyberdéfense française. Il n’empêche, l’attitude de l’administration Obama suscite de nombreuses interrogations.
    Vers des attaques “pires que le 11 Septembre” ?

    Dans une version du livre blanc sur la défense, actuellement en cours de rédaction, des auteurs ont soulevé les ambiguïtés de Washington. “Face à la difficulté d’utiliser les voies de droit, [les Etats-Unis] ont recours de plus en plus à l’action clandestine, ce qui peut poser une question de contrôle démocratique.”

    Ironie du sort, le Congrès américain vient, le 14 novembre, de publier un rapport accablant sur l'”acteur le plus menaçant du cyberespace”, à savoir… la Chine. Leon Panetta, secrétaire d’Etat à la Défense, a même déclaré récemment que, par leur puissance numérique, “certains pays” seraient, d’ores et déjà, capables de provoquer un “cyber-Pearl Harbor” : “Ce serait pire que le 11 Septembre ! Des assaillants pourraient faire dérailler un train de voyageurs ou un convoi de produits chimiques dangereux. Ou, encore, contaminer les systèmes d’eau des grandes villes ou éteindre une grande partie du réseau électrique.” Le tout en se cachant derrière des écrans d’ordinateurs situés à des milliers de kilomètres…
    Dans le monde virtuel, tous les coups sont permis

    Leon Panetta sait de quoi il parle. L’Oncle Sam a déjà utilisé ces moyens. C’était en 2010, lors de l’opération “Jeux olympiques”, lancée conjointement avec Israël contre l’Iran. Leur logiciel Stuxnet aurait endommagé un grand nombre des centrifugeuses utilisées par Téhéran pour enrichir de l’uranium. Spectaculaire, cette opération ne doit pas faire oublier que d’autres nations oeuvrent dans l’ombre. Dans le plus grand secret, de nombreux pays, démocratiques ou non, fourbissent leurs armes numériques. Des forces secrètes se constituent, des mercenaires vendent leurs services aux plus offrants. Sans foi ni loi. La Toile n’est pas un champ de bataille comme les autres. Oubliez les codes de l’honneur, les conventions internationales ou les alliances. Tous les coups sont permis. Et mieux vaut avoir les moyens de se battre. Dans le cyberespace, personne ne vous entendra crier.

    Pour s’en convaincre, il suffit de se rendre au quartier général de l’Otan, à Bruxelles. Tou-tes les nuits, vers 1 heure, c’est le même rituel, explique l’un des responsables européens de la sécurité au sein de l’organisation. “Sur une carte, à l’écran, on voit des dizaines de lumières s’allumer en Chine, explique-t-il. Ce sont les hackers qui, le matin, lancent des attaques lorsqu’ils arrivent au boulot. Et, le soir, elles s’éteignent quand ils rentrent chez eux.” Même constat d’un proche de la NSA, l’agence de renseignement des Etats-Unis : “Parfois, nous enregistrons une baisse sensible des tentatives d’intrusion sur nos sites, témoigne-t-il. Invariablement, cela correspond à des jours fériés en Chine.” Mais l’image d’une “superagence” où des armées de pirates travailleraient en batterie pour ravir les secrets de l’Occident ne reflète pas la réalité. Selon ce même agent, “leur capacité offensive est beaucoup moins centralisée qu’on pourrait l’imaginer. De nombreuses régions ont mis en place leur propre dispositif, qui dépend du bureau politique local. Et il n’est pas rare que ces factions se combattent entre elles.”
    Coût d’une attaque : quelques centaines de milliers d’euros

    Un hacker, qui souhaite rester anonyme, pense, lui aussi, que l’on surestime un peu le “cyberpéril jaune”. “J’ai eu l’occasion de voir travailler les Chinois, ce ne sont pas les plus affûtés, dit-il. Leurs techniques sont assez rudimentaires par rapport à celles des Américains ou des Israéliens…”

    REUTERS/Minoru Iwasaki/Pool

    “Les questions de sécurité alimentaire, d’énergie et de cybersécurité deviennent plus aiguës”
    Hu Jintao, secrétaire général du Parti communiste chinois, novembre 2012.

    A chaque pays sa spécificité. En Russie, le dispositif d’attaque est opaque. De nombreux spécialistes occidentaux du renseignement soupçonnent l’existence d’une relation triangulaire entre l’Etat, la mafia et certaines sociétés de conseil informatique qui seraient le bras armé du Kremlin. “Avez-vous déjà vu, en Russie, un hacker avoir des problèmes avec la police ? questionne Garry Kasparov, ancien champion du monde d’échecs, aujourd’hui l’un des opposants au président Poutine. Non, parce que l’on sait qui se trouve aux manettes, dans l’ombre…”

    Contrairement à ce que l’on pourrait croire, les Européens ne sont pas en reste. La France, c’est une surprise, dispose d’une force de frappe numérique. Mais on trouve aussi, sur l’échiquier mondial, des Etats moins avancés sur le plan technique, tels l’Iran et la Corée du Nord. Nul besoin, en effet, d’investir dans des infrastructures coûteuses. Il suffit d’un ordinateur, d’un accès à Internet et de quelques centaines de milliers d’euros pour monter une attaque. Car sur la Toile, comme dans la vraie guerre, on trouve toutes sortes d’armes sur le marché. Il suffit de frapper aux bonnes portes. Au lieu d’une kalachnikov, on repartira avec un logiciel malveillant (malware, dans le jargon) qui permettra de prendre le contrôle d’un système ennemi. La première motivation : “Faire du business !”

    “C’est un enjeu de domination. En maîtrisant l’information, on contrôle tout”, résume Jonathan Brossard. Ce hacker français renommé intervient aujourd’hui dans des groupes internationaux.

    Son job consiste à s’introduire dans les systèmes informatiques pour en révéler les failles – et trouver des parades. Pour lui, les risques d’un cyberconflit existent, mais ils masquent une autre motivation, bien plus puissante : “Faire du business ! Etre capable de griller un réseau électrique, c’est bien, mais le véritable enjeu, c’est surtout de gagner des parts de marché.” Connaître, dans le détail, la proposition d’un concurrent, lors d’un gros appel d’offres, donne un avantage décisif. Pour l’avoir négligé, certaines sociétés ont péri. Des pirates – chinois semble-t-il – ont pillé les secrets du géant canadien des télécoms Nortel pendant près de dix ans, au point de l’acculer à la faillite. De tels exemples abondent.

    Et la France n’est, malheureusement, pas épargnée. Les grandes entreprises du CAC 40 compteraient même parmi les plus vulnérables d’Europe. Sur ce nouveau champ de bataille invisible, on ne compte pas les morts, mais les points de PIB perdus. Et, derrière, sans doute des emplois par milliers.
    Batailles de virus

    STUXNET
    Découverte : juin 2010.
    Cible : ce logiciel a détruit des milliers de centrifugeuses nucléaires, en Iran.
    Origine supposée : opération “Jeux olympiques”, menée par les Etats-Unis et Israël.

    DUQU
    Découverte : septembre 2011.
    Cible : lié à Stuxnet, ce ver informatique a servi à espionner le programme nucléaire iranien.
    Origine supposée : Etats-Unis et Israël.

    MAHDI
    Découverte : février 2012.
    Cible : capable d’enregistrer les frappes sur un clavier et les photos et textes d’un ordinateur, Mahdi a été retrouvé en Iran, en Afghanistan et en Israël.
    Origine supposée : inconnue.

    WIPER
    Découverte : avril 2012.Cible : ce virus fait disparaître les données des disques durs des ordinateurs infectés. Il a touché des compagnies pétrolières iraniennes.
    Origine supposée : inconnue.

    FLAME
    Découverte : mai 2012.
    Cible : ce logiciel très sophistiqué aurait espionné depuis 2007 plusieurs pays, dont l’Iran, la Syrie, le Soudan, ou encore l’Arabie saoudite.
    Origine supposée : opération des Etats-Unis et d’Israël.

    GAUSS
    Découverte : juin 2012.
    Cible : capable d’espionner les transactions financières et messages électroniques, ce virus s’est répandu au Liban, en Israël et en Palestine.
    Origine supposée : inconnue.

    SHAMOON
    Découverte : août 2012.
    Cible : les ordinateurs des compagnies pétrolières saoudiennes Aramco et RasGas au Qatar ont été attaqués par ce virus.
    Origine revendiquée : groupe de hackers appelé “Glaive tranchant de la justice”, peut-être d’origine iranienne.

    La réaction de l’ambassade des Etats-Unis à Paris

    Nous réfutons catégoriquement les allégations de sources non-identifiées, parues dans un article de l’Express, selon lesquelles le gouvernement des Etats-Unis d’Amérique aurait participé à une cyberattaque contre le gouvernement français. La France est l’un de nos meilleurs alliés. Notre coopération est remarquable dans les domaines du renseignement, du maintien de l’ordre et de la cyberdéfense. Elle n’a jamais été aussi bonne et demeure essentielle pour mener à bien notre lutte commune contre la menace extrémiste.
    Mitchell Moss, porte-parole de l’ambassade des Etats-Unis à Paris

    REUTERS/Larry Downing

    “La cybermenace est l’un des plus sérieux défis auxquels nous soyons confrontés en tant que nation”
    Barack Obama, président des Etats-Unis, mai 2009.

    REUTERS/Neil Hall

    “Nous consacrerons un budget de plus d’un demi-milliard de livres [626 millions d’euros] à la cybersécurité”
    David Cameron, Premier ministre britannique, octobre 2010.

    REUTERS/Thomas Peter

    “Les attaques cybernétiques sont aussi dangereuses que la guerre conventionnelle”
    Angela Merkel, chancelière allemande, avril 2011.

    Par Charles Haquet et Emmanuel Paquette (L’Express) – publié le 20/11/2012 à 15:31

    Find this story at 20 November 2012

    © Groupe Express-Roularta

    Onterechte weigering circus in Almelo. Almelo vreest onterecht demonstraties dierenrechtenactivisten

    Circus Belly-Wien heeft in Almelo bezwaar aangetekend tegen de aan het circus geweigerde speelvergunning voor 2012. In TC/Tubantia lezen we waarom Almelo geen speelvergunning wilde afgeven aan Circus Belly-Wien: De gemeente vreest een verstoring van de openbare orde door vechtpartijen met dierenrechtenactivisten.

    De door de gemeente Almelo genoemde demonstraties van dierenrechtenactivisten en vechtpartijen met dierenrechtenactivisten vonden plaats in voornamelijk 2009. Toen heeft een AIVD-infiltrant onder de schuilnaam “Paul Kraaijer” wekelijks demonstraties georganiseerd bij Circus Belly-Wien met slechts een doel: Het in kaart brengen van de in Nederland opererende dierenrechtenactivisten. Tijdens de demonstraties werden activisten door de aanwezige KLPD agenten gefotografeerd en gefilmd. Deze acties van de AIVD en de politie hebben uiteindelijk geleid tot de arrestatie van enkele bekende dierenrechtenactivisten, waaronder de “Vegan Streaker”. Dezelfde AIVD-infiltrant heeft Circus Belly-Wien in diskrediet gebracht. Sinds 2011 is er geen enkele keer meer gedemonstreerd tegen circusdieren. Ook zijn er sinds 2011 geen vechtpartijen meer geweest; ook niet bij Circus Belly-Wien. Door personeelswisselingen is de “grootste vechtersbaas” ook niet meer bij het circus aanwezig.

    Almelo, 18 januari 2013

    Find this story at 18 January 2013

    © http://www.klassiekcircus.nl/

    Circuscommissie ziet complot van AIVD tegen circus Belly Wien

    ALMELO – De gemeente Almelo heeft circus Belly Wien ten onrechte geweigerd, zegt de Commissie Klassiek Circus. De AIVD en de politie zouden een hetze tegen het circus zijn begonnen.

    De commissie legt die complottheorie uit op de eigen website. Almelo weigert Belly Wien omdat de gemeente bang is voor ongeregeldheden. Die angst is gebaseerd op demonstraties van dierenrechtenactivisten en vechtpartijen elders.

    Geplaatst op:
    21 januari 2013
    Laatste update:
    21 januari, 12:18

    Find this story at 21 January 2013

    Copyright © 2012 Wegener Media

    Fascinating profile of the Soviet KGB’s little-known tech wizard

    It is often suggested by intelligence researchers that one major difference between Western and Soviet modes of espionage during the Cold War was their degree of reliance on technology. It is generally accepted that Western espionage was far more dependent on technical innovation than its Soviet equivalent. While this observation may be accurate, it should not be taken to imply that the KGB, GRU, and other Soviet intelligence agencies neglected technical means of intelligence collection. In a recent interview with top-selling Russian newspaper Komsomolskaya Pravda, Russian intelligence historian Gennady Sokolov discusses the case of Vadim Fedorovich Goncharov. Colonel Goncharov was the KGB’s equivalent of ‘Q’, head of the fictional research and development division of Britain’s MI6 in the James Bond films. A veteran of the Battle of Stalingrad, Goncharov eventually rose to the post of chief scientific and technical consultant of KGB’s 5th Special Department, later renamed Operations and Technology Directorate. According to Sokolov, Goncharov’s numerous areas of expertise included cryptology, communications interception and optics. While working in the KGB’s research laboratories, Goncharov came up with the idea of employing the principles behind the theremin, an early electronic musical instrument invented by Soviet physicist Léon Theremin in 1928, in wireless audio surveillance. According to Sokolov, the appropriation of the theremin by the KGB under Goncharov’s leadership “changed the world of intelligence”.

    Renamed “passive bug” by the Soviets, a modified version of Theremin’s invention allowed the KGB to do away with wires and hidden microphones, using instead tiny coils and metal plates surreptitiously hidden in a target room or area. Such contraptions acted as sensors that picked up the vibrations in the air during conversations and transmitted them to a beam (receiver) placed nearby, usually in an adjoined room or vehicle. One such device was planted by the KGB inside the large wooden replica of the Great Seal of the United States given by the Soviets to US Ambassador to the USSR, Averell Harriman, as a present in February 1945. By hanging the decorative artifact in his embassy office in Moscow, the Ambassador enabled the KGB to listen in to his private conversations, as well as those of his successors, including Walter Bedell Smith (later Director of Central Intelligence), Alan G. Kirk, and George F. Kennan, for nearly eight years. The bug was discovered by the US in 1952 and exposed to the world during a conference at the United Nations (see photo).

    Sokolov says that Goncharov also used the “passive bug” in several Moscow hotels frequented by Western visiting dignitaries, such as the Hotel National and the Hotel Soviet. Targets of “passive bug” operations included Indonesian President Sukarno, British Prime Minister Harold Wilson and German Chancellor Konrad Adenauer, whose conversations Goncharov allegedly managed to bug even though the West German leader chose to spend most of his trip to the USSR inside a luxury train compartment provided by the West German government. The Russian intelligence historian also claims that the theremin-based bug was used to eavesdrop on the conversations of Princess Margaret, sister of Queen Elizabeth II of the United Kingdom. The KGB allegedly bugged Margaret’s cigarette lighter, cigarette case and ashtrays, and was able to listen in to the Princess’ “drunken sprees” during her trips around Western Europe, collecting “dirt on the British Royal House”.

    December 24, 2012 by intelNews 5 Comments

    By JOSEPH FITSANAKIS | intelNews.org |

    Find this story at 24 December 2012

    We bugged Princess Margaret’s ashtrays, admit KGB

    KGB homed in on Princess during visit to Copenhagen in 1964
    Bugging devices attached to ashtrays and lighters to listen in on ‘scandalous gossip’
    Spies set up failed ‘honey trap’ for former Prime Minister Harold Wilson

    Soviet spies have admitted using bugging devices on the Royal Family and former British Prime Minister Harold Wilson.

    Secret agents from the KGB targeted Princess Margaret in the 1960s, attaching listening aids to her lighter, cigarette case, ashtrays and telephones.

    According to the Sunday Express, they homed in on the Princess during a trip to Copenhagen, Denmark in 1964.

    Lord Snowdon And Princess Margaret get ready to board a plane in September 1964 ahead of their visit to Copenhagen. Russian spies have admitted bugging the Princess on the trip

    Until now, Russia has always denied the covert operation, which took place in a hotel, but has now admitted compiling a dossier on the Princess’s love affair with Robin Douglas-Home and further relationships with Roddy Llewellyn, Colin Tennant and Dominic Ewes, a painter who later committed suicide.

    Spies passed photos, tape recordings and ‘most interesting, even scandalous’ gossip involving senior royal figures.

    It is also said agents tried to get information from Margaret’s therapist, Kay Kiernan, who also treated the Queen.

    Intelligence on Prince Phillip was gathered via society osteopath and artist Stephen Ward, who later killed himself at the height of the Profumo affair.

    But spies failed in a sting operation on then future leader Harold Wilson, setting up a ‘honey trap’ for him in a Moscow hotel.

    Princess Margaret (second from right and then left) was targeted by KGB spies on her visit to Copenhagen in 1964. Bugging devices were planted in her lighter, cigarette case, ashtrays and telephones

    A new book will detail the KGB spies’ attempts at bugging the Royal Family. Pictured, the Kremlin, in Moscow

    Female agents posing as prostitutes patrolled the hotel overlooking the Kremlin, with a camera planted in a chandelier in his bedroom.

    But when the film was developed, Wilson’s face was disguised.

    Colonel Vadim Goncharov, who has since died, was the KGB chief in charge of the snooping operations, and he was ordered by bosses to go on television to deny the claims, fearing they would cast a shadow over the Queen’s first and only visit to Russia in 1994.

    By Daily Mail Reporter

    PUBLISHED: 11:01 GMT, 23 December 2012 | UPDATED: 17:05 GMT, 23 December 2012

    Find this story at 23 December 2012

    © Associated Newspapers Ltd

    USSR ‘used civilian planes to spy’

    Defence Secretary John Nott warned Mrs Thatcher that the USSR was using civilian aircraft to carry out spying missions in the UK

    The Soviet Union used civil airliners to conduct secret Cold War spying missions over Britain, according to newly published Government files.

    Some aircraft would switch off their transponders, alerting air traffic controllers to their position before veering off their approved flight paths to carry out aerial intelligence-gathering missions over sensitive targets, papers released by the National Archives under the 30-year rule show.

    In a memorandum marked SECRET UK US EYES ONLY, Defence Secretary John Nott informed prime minister Margaret Thatcher in December 1981 that the RAF was monitoring the hundreds of monthly flights through UK airspace by Warsaw Pact airliners.

    “One incident of particular interest took place on 9th November, when an Aeroflot IL62 made an unauthorized and unannounced descent from 35,000 ft to 10,000 ft just below cloud level, to fly over RAF Boulmer, a radar station currently being modernised. It subsequently climbed back to 37,000 ft,” he wrote.

    “During this manoeuvre its Secondary Surveillance Radar which automatically broadcasts the aircraft’s height was switched off, though it was on before and after the incident. It must, therefore, be assumed that it was switched off intentionally to conceal a deliberate and premeditated manoeuvre.

    “Our investigations have now revealed it was the same aircraft which over flew the USN base at Groton when the first Trident submarine was being launched. You will recall that as a result of this incident the President banned Aeroflot flights over the USA for a short period.”

    But that was not the only example of bad behaviour by enemy spies that year. In August 1981 the Second Secretary at the USSR embassy VN Lazin became the first Soviet diplomat for a decade to be expelled for “activities incompatible with his status”.

    The Foreign Office informed No 10 that Lazin, actually the senior member of the scientific and technical intelligence section of the KGB in London, was arrested during a “clandestine meeting” with a Portuguese national.

    “He developed his relationship with the Portuguese national over several months and sought to obtain technical and scientific information in the UK from him and to use him as an agent with the possibility of eventually placing him in a Nato post,” the Foreign Office noted.

    The Soviets responded in traditional fashion with the tit-for-tat expulsion of the British cultural attache in the Moscow embassy. More was to follow six months later in February 1982 when MI5 decided to call time on the espionage career of another Soviet, Vadim Fedorovich Zadneprovskiy, a member of the Soviet trade delegation whom for the previous five years operated as a KGB agent-runner. His recruits included a British businessman who was given the codename COURT USHER.

    Updated: 28 December 2012 11:48 | By pa.press.net

    Find this story at 28 December 2012

    © 2013 Microsoft

    KGB Used Aeroflot Jets as Spy Planes, U.K. Files Show

    Soviet spies used civilian planes to snoop on British and American military installations during the 1980s, newly released U.K. documents show.

    Britain’s Royal Air Force “established that some of these aircraft deviated from their flight-plan routes in circumstances which would lead us to assume that they were gathering intelligence,” the then defense secretary, John Nott, wrote in a memo to Prime Minister Margaret Thatcher that’s among government files from 1982 published today after being kept confidential for the prescribed 30 years.

    The papers from the National Archives in London give an insight into both the extent of Soviet espionage and the U.K. government’s awareness of it. One agent from the KGB, the Soviet security agency, was identified on arrival in 1977 and followed for five years, subject to a series of British intelligence operations before finally being expelled.

    Relations between Thatcher’s government and the Soviet Union were tense at the time, despite attempts by diplomats to persuade her to take a conciliatory line. More than once in her files she rejects a course of action proposed in a memo, referring to the 1979 Soviet invasion of Afghanistan as the reason.

    As Communist Party general secretary Leonid Brezhnev approached his 75th birthday at the end of 1981, Foreign Secretary Peter Carrington said it would be “churlish” of her not to send congratulations.

    “Afghanistan?” Thatcher wrote in the margins of the memo suggesting this. “I really don’t think we should send a message.” She underlined “don’t.”
    ‘Unannounced Descent’

    Nott wrote to Thatcher about the KGB’s use of Aeroflot planes over Britain after the Royal Air Force decided to look at the activities of “the thousand or so Warsaw Pact airliners which fly over the U.K. each month.”

    In “one incident of particular interest,” the defense secretary wrote, an Ilyushin IL62 from the Soviet airline “made an unauthorized and unannounced descent from 35,000 feet to 10,000 feet, just below cloud level, to fly over RAF Boulmer, a radar station currently being modernized” in northeast England.

    The plane turned off its automatic broadcast of its height during the maneuver, after which it returned to its previous altitude and began transmitting again.

    The RAF subsequently established the same plane performed a similar operation over the U.S. Navy base at Groton, Connecticut, when the first Trident submarine was being launched.
    Trade Official

    The KGB was also using more traditional methods. In February 1982, the Security Service, the British internal security agency popularly known as MI5, asked for permission to expel a Russian trade official, Vadim Fedorovich Zadneprovskiy, after he “engaged in unacceptable intelligence-gathering activities.” According to the MI5 report, he had been identified as a KGB agent on his arrival in 1977 and followed.

    MI5 used his inquiries about British counter-surveillance techniques to establish gaps in the KGB’s knowledge, with “some success.” The security service watched as he ran a British businessman, whom they codenamed “Court Usher,” as an agent, even using him to deliver equipment “in a thoroughly clandestine manner.” After concluding it wouldn’t be able to recruit Zadneprovskiy, MI5 demanded he be thrown out.

    It wasn’t just professional spies trying to get in on the act. As the Falklands War raged, and the government wrestled with the question of how to keep French-built Exocet anti-ship missiles out of Argentine hands, Attorney General Michael Havers sent Thatcher a handwritten note suggesting a way to intercept a shipment.
    ‘Bond Movie’

    Acknowledging his idea “may be thought to be more appropriate to a James Bond movie,” Havers said the Secret Intelligence Service, MI6, should try to insert its own person as loadmaster on any flight used to carry missiles to Argentina.

    “If this can be agreed, the loadmaster has total control over the flight and, therefore, could redirect the aircraft in transit to (for example) Bermuda,” he wrote. “This will cost money (this is an expensive dirty business) but could, in my view, be cheap at the price.”

    Havers may not have been aware at the time that MI6 was already running operations to precisely that end. Nott’s diary recalls, without giving details, how the agency both prevented Argentina buying missiles available on the open market and disabled missiles it thought could fall into Argentine hands.

    The U.S., while leading attempts to broker a cease-fire between Argentina and the U.K., provided information from spies as part of its support to Britain in the conflict.
    ‘Magnificent Support’

    By Robert Hutton and Thomas Penny – Dec 27, 2012

    Find this story at 27 December 2012

    ®2013 BLOOMBERG L.P. ALL RIGHTS RESERVED.

    Canadian diplomats spied on Cuba for CIA in aftermath of missile crisis: envoy

    In a little-known chapter of the Cold War, Canadian diplomats spied for the U.S. Central Intelligence Agency in Cuba in the aftermath of the 1962 missile crisis – and for years afterward.

    A major part of that story is told in a forthcoming memoir by retired Canadian envoy John Graham. Mr. Graham was one of a series of Canadian diplomats recruited to spy for the CIA in Havana. The missions went on for at least seven years, during the 1960s.

    “We didn’t have a military attaché in the Canadian embassy,” explained Mr. Graham, who worked under the cover of Political Officer. “And to send one at the time might have raised questions. So it was decided to make our purpose less visible.”

    Mr. Graham said he worked as a spy for two years, between 1962 and 1964. His mandate was to visit Soviet bases, identify weapons and electronic equipment and monitor troop movements.

    The espionage missions began after President John Kennedy asked Prime Minister Lester Pearson – at their May, 1963, summit in Hyannis Port, Mass. – whether Canada would abet American intelligence-gathering efforts in Cuba.

    As a result of the crisis, which brought the superpowers to the brink of nuclear war, the Soviets had agreed to withdraw nuclear missiles from Cuban territory, in exchange for Washington’s pledge to remove its own missile batteries from Turkey and Italy.

    To monitor Russian compliance, the United States needed to supplement data gleaned from almost daily U-2 reconnaissance flights. It had few assets on the ground. Its networks of Cuban agents had been progressively rolled up by Castro’s efficient counterintelligence service. And having severed diplomatic relations with Cuba in 1961, it had no embassy of its own through which to infiltrate American spies.

    Soon after the summit meeting, Ottawa sent diplomat George Cowley to Havana.

    Now deceased, Mr. Cowley, who had served in the Canadian embassy in Japan and sold encyclopedias in Africa, spent about two months in Havana in the late spring of 1963.

    He was followed by Mr. Graham, seconded from his post as chargé d’affaires in the Dominican Republic.

    His formal training, he told The Globe and Mail, was minimal – a few days at CIA headquarters in Langley, Va. At the end of it, an agency officer offered him a farewell gift – a sophisticated camera with an assortment of telephoto lenses.

    He declined the present, arguing that if he were ever caught with it, he’d surely be arrested.

    “But how will we know what the Soviet military convoys are carrying?” a CIA officer asked him. “We need precision. Configuration is essential for recognition.”

    “I’ll draw you pictures,” Mr. Graham said. “It was a bit like the character in Graham Greene’s Our Man in Havana, but that’s what I did.”

    In the Greene novel, an inept salesman, recruited to spy for Britain, sends illustrations of vacuum cleaner parts to his handler, calling them drawings of a military installation.

    Mr. Graham’s sketches, however, were the real thing. To get them to Canada, he flew to Mexico City – the only regional air connection – and deposited the drawings at the Canadian embassy. From there, they were dispatched by diplomatic courier to Ottawa. Copies were subsequently sent to the CIA and, Mr. Graham later heard, to the Kennedy White House.

    His written reports, sent by ciphered telegram to the Canadian embassy in Washington and then to Ottawa, contained details of electronic arrays in use at Soviet bases. “That information,” he said, “could tell an expert what weapons systems they had.”

    Although Moscow had removed its nuclear arsenal by the time Mr. Graham arrived, it maintained a significant military presence. Russian soldiers typically dressed in civilian clothes, usually in plaid sport shirts, khaki pants and running shoes.

    To fit in, Mr. Graham adopted the same ensemble – purchased at a Zellers store in Ottawa. Although many missions involved early morning surveillance of naval facilities, he was never followed. He was stopped only once by the police, roaming through a secure section of a communications building. He pretended to be a bumbling tourist and was let go.

    On several occasions, Mr. Graham conducted joint reconnaissance with an agent of another Western country that he declines to identify. “He was brilliant and altogether remarkable. At parties, he composed Monty-Python-like lyrics to pet and lingerie commercials, accompanying himself on the piano.”

    To relieve the stress of their missions, they would stop for seaside picnics on the way home. “Mr. X would pull out two crystal goblets and a Thermos of premixed martinis. I supplied the olives.”

    Canadian officials, he said, went to extraordinary lengths to protect his identity as an agent. He stamped his sketches with the words, “For Canadian Eyes Only, Confidential.” But in Ottawa they were given an additional security designation – “Secret, Ottawa Only, Protect Source,” a classification he had never seen, before or since.

    In 1964, Mr. Graham was promoted within the embassy and replaced in his espionage work by Alan McLaine.

    In fact, he said, Canada’s role as CIA surrogate in Cuba continued for several years, even under the government of Pierre Trudeau, who had developed a personal friendship with Cuban leader Fidel Castro.

    MICHAEL POSNER

    OTTAWA — The Globe and Mail

    Published Monday, Oct. 15 2012, 9:56 PM EDT

    Last updated Tuesday, Oct. 16 2012, 5:02 AM EDT

    Find this story at 15 October 2012

    © Copyright 2013 The Globe and Mail Inc. All Rights Reserved.

    << oudere artikelen  nieuwere artikelen >>