• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Ermittlungen zur Neonazi-Mordserie: Verfassungsschutz ließ wichtige Akten vernichten

    Im Bundesamt für Verfassungsschutz sollen wichtige Ermittlungsakten zur Zwickauer Terrorzelle vernichtet worden sein. Nach Informationen aus Sicherheitskreisen wurden die Unterlagen erst nach Auffliegen des Thüringer Neonazi-Trios gelöscht – nachdem sie zuvor jahrelang gelagert worden waren.

    Der Verfassungsschutz hat zwischen 1997 und 2003 großen Aufwand betrieben, um die Neonazi-Szene in Thüringen zu unterwandern. Mit acht Spitzeln versuchte er Informationen aus dem “Thüringer Heimatschutz” (THS) zu gewinnen, aus dem auch das Trio stammte, das später die Zwickauer Terrorzelle bildete und jahrelang unentdeckt raubend und mordend durchs Land zog.

    Das Bundesamt für Verfassungsschutz soll sechs Spitzel im rechtsradikalen “Thüringer Heimatschutz” eingesetzt haben (im Bild: das Haus eines mutmaßlichen Terror-Helfers im sächsischen Johanngeorgenstadt). (© dpa)

    Das Bundesamt für Verfassungsschutz koordinierte die Operation “Rennsteig”. Es soll selbst sechs Quellen im THS geführt haben, zusätzlich zu V-Leuten des Thüringer Landesamts. Doch von der Operation, die den Verfassungsschutz dicht heranführte an die rechte Terrorzelle, fehlen nun wichtige Akten: Sie wurden im Bundesamt für Verfassungsschutz gelöscht – nach Auffliegen der Terrorzelle Ende vorigen Jahres. Das erfuhr die Süddeutsche Zeitung am Mittwochabend aus Sicherheitskreisen.

    Am 11. November 2011 sind demnach vier Akten der Operation “Rennsteig” vernichtet worden. Begründung: Es sei aufgefallen, dass die Löschfrist bereits abgelaufen war. Personenbezogene Daten darf der Verfassungsschutz nicht unbegrenzt speichern.

    In Berlin kursiert die Frage, warum die Akten dann überhaupt so lange aufbewahrt wurden – und sie ausgerechnet dann gelöscht wurden, als Politik und Öffentlichkeit erfahren wollten, was eigentlich der Verfassungsschutz über das Neonazi-Trio wusste.

    Andere sagen, das Löschen sei nun einmal aus datenschutzrechtlichen Gründen unumgänglich gewesen. Dass es Spitzel im THS gab, ist zwar schon länger bekannt. Der Thüringer Verfassungsschutz führte den Neonazi Tino Brandt, der den THS maßgeblich prägte, als V-Mann.

    Kontakte der Neonazis nach Bayern

     

     Find this story at 27 June 2012 

    27.06.2012, 22:20
    Von Tanjev Schultz

    Copyright: Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH
    Quelle: (Süddeutsche.de/kat)

    Jegliche Veröffentlichung und nicht-private Nutzung exklusiv über Süddeutsche Zeitung Content. Bitte senden Sie Ihre Nutzungsanfrage an syndication@sueddeutsche.de.

    “Brauner Terror – Blinder Staat”

    Der Film zeichnet Leben und Taten der Terroristen nach und belegt Versagen von Verfassungsschutz und Polizei.

    Find this story at 26 June 2012

    Verfassungsschützer vernichteten Akten

    Das Bundesamt für Verfassungsschutz hat nach Angaben aus dem Bundestagsuntersuchungsausschuss bei den Ermittlungen zur Neonazi-Mordserie Akten vernichtet, nachdem das Trio aus Zwickau bereits aufgeflogen war. “Sie sind aufgefordert worden, Akten zu suchen, sie haben Akten gefunden und sie haben die Akten vernichtet”, sagte der Ausschussvorsitzende Sebastian Edathy (SPD) in Berlin.

    Die Ermittler sollten demnach am 11. November 2011 Akten zur sogenannten “Operation Rennsteig” für die Arbeit der Bundesanwaltschaft zusammenstellen, stattdessen seien am selben Tag Akten vernichtet worden. Bei der “Operation Rennsteig” handelte es sich um eine Zusammenarbeit des Verfassungsschutzes mit der rechtsextremen Gruppe “Thüringer Heimatschutz”, aus der die NSU hervorgegangen sein soll. Die Aktenvernichtung habe Verfassungsschutzpräsident Heinz Fromm am Mittwoch dem Bundesinnenministerium mitgeteilt. Ein Vertreter des Bundesinnenministeriums bestätigte das.

    Das Trio Beate Zschäpe, Uwe Böhnhardt und Uwe Mundlos (v.l.) soll für mindestens zehn Morde verantwortlich sein.
    Im Untersuchungsausschuss sorgte die Information für Empörung – und zwar quer durch die Parteien. “Das ist erklärungsbedürftig”, sagte der Ausschussvorsitzende Edathy der “Mitteldeutschen Zeitung”. “Solche Vorkommnisse machen es schwierig, Verschwörungstheorien überzeugend entgegenzutreten.” Die Obfrau der SPD im Ausschuss, Eva Högl, nannte dies einen “Skandal”. Der Bundesinnenminister müsse aufklären, ob damit Fehler der Sicherheitsbehörden vertuscht werden sollten. Auch Linkspartei-Obfrau Petra Pau zeigte sich entsetzt über den Vorgang.
    Porträt

    Sebastian Edathy – ein kantiger Aufklärer
    Er ist eigenwillig, manchmal etwas ruppig, aber immer “sehr parteilich gegen Rechtsextremisten”. Mit dem Vorsitz des Untersuchungsausschusses übernimmt Edathy die bislang größte Aufgabe seiner Karriere. [mehr]

    Der CDU/CSU-Obmann Clemens Binninger hielt die Begründung des Verfassungsschutzes für die Aktenvernichtung für nicht glaubwürdig. Die Behörde habe erklärt, bei der Suche nach Beweismitteln zu den NSU-Terroristen sei aufgefallen, dass die Speicherfristen für die fraglichen Dokumente abgelaufen seien. Binninger betonte: “Ich halte diese Begründung für wenig überzeugend, für wenig plausibel, weil man in so einem Fall natürlich die Amtsleitung fragen müsste”. Er warnte zudem davor, dass derartige Vorfälle weitere Spekulationen über fragliche Aktionen von Sicherheitsbehörden befeuere.
    Minister fordert Aufklärung

    Bundesinnenminister Hans-Peter Friedrich (CSU) wies inzwischen Verfassungsschutzpräsident Heinz Fromm an, den Vorgang lückenlos aufzuklären. Dem Vernehmen nach ist der Täter inzwischen bekannt. Ihm droht ein Disziplinarverfahren. Der Verfassungsschutz will unterdessen die gelöschten Akten offenbar wieder rekonstruieren. Ein BfV-Vertreter soll dies den Mitgliedern des Untersuchungsausschusses des Bundestages angeboten haben.
    BKA-Chef Ziercke räumt Fehler ein

    BKA-Chef Ziercke vor dem NSU-Untersuchungsausschuss des Bundestags
    Zuvor hatte der Untersuchungsausschuss den Chef des Bundeskriminalamtes, Jörg Ziercke, vernommen. Der Polizeichef sagte während der Befragung, er bedauere, dass die deutschen Sicherheitsbehörden ihrem Schutzauftrag nicht nachgekommen seien. Im Grundsatz verteidigte er das Vorgehen der Ermittler bei der Neonazi-Mordserie. Er räumte zwar Fehler ein, ließ aber offen, wo diese geschehen seien. “Das Versagen hat viele Facetten”, sagte er.

    Der Ausschuss will unter anderem klären, welche Rolle Ziercke bei den Ermittlungspannen gespielt hat. Die Terroristen sollen von 1998 bis zu ihrem Auffliegen 2011 nahezu unbehelligt von den Sicherheitsbehörden im Untergrund gelebt und ihre Morde begangen haben. Ziercke ist seit 2004 Präsident des BKA.

    Find this story at 28 June 2012

     

    Intel ‘destroyed as Nazi terror group exposed’

    Germany’s domestic intelligence service destroyed files on neo-Nazis linked to the terror gang which claimed the murders of ten people – on the day the killings were traced to them, it has emerged. The interior minister has demanded an explanation.

    Hans-Peter Friedrich said on Thursday he had personally called the president of the Federal Office for Protection of the Constitution and told him to tell him what had happened.

    The office destroyed at least four files on its informants within a neo-Nazi group which had strong links to the terror group.

    Operation Rennsteig used eight informers to infiltrate the Thuringia neo-Nazi group the Thüringer Heimatschutz – from which the neo-Nazi terrorists emerged. The informant operation ran from 1997 until 2003.

    The gang, which called itself the National Socialist Underground, killed nine immigrant shop owners, eight Turkish and one Greek, and a policewoman in a murder spree over nearly 13 years.

    Uwe Mundlos and Uwe Böhnhardt botched a bank robbery and died in a murder-suicide, leaving their friend Beate Zschäpe to allegedly blow up their flat and then hand herself in to the police.

    The emergence of the neo-Nazi terror cell as responsible for the until then seemingly unconnected murders shocked Germany – particularly as it emerged at the end of last year that the trio were known to police and intelligence services.

    The Süddeutsche Zeitung newspaper reported on Thursday that crucial files from Operation Rennsteig were missing – destroyed by the Office for Protection of the Constitution, Germany’s internal intelligence agency.

    Four files were destroyed on November 11, 2011, the paper said – after it was realised that the time limit for keeping personal data had been breached.

    This was also the same day as the connection between the neo-Nazi group and the string of murders was made.

    The question now arises as to why the files were kept for so long – and why they were destroyed at exactly the time when it became important to see what had been known about the neo-Nazi trio, the paper said.

    The fact that there were paid informants inside the notorious Thüringer Heimatschutz has been known for a long time, particularly with the outing of Tino Brandt, a neo-Nazi leader, as an informant.

    But now that a parliamentary investigative committee is looking at who knew what and when – and how come nothing was done to stop the National Socialist Underground, details become crucial.

    Jörg Zierke, head of the federal police BKA, admitted to the committee the police had failed in the case.

    Find this story at 28 June 2012

    Published: 28 Jun 12 10:48 CET
    Updated: 28 Jun 12 14:30 CET

    Bradley Manning lawyers accuse prosecutors of misleading judge

    In a motion ahead of Monday’s pre-trial hearing, civilian lawyer says prosecutors are still denying defence access to documents
    Bradley Manning’s lawyers say the prosecution team is keeping important documents from them. Photograph: Cliff Owen/AP

    The US government is deliberately attempting to prevent Bradley Manning, the alleged source of the massive WikiLeaks trove of state secrets, from receiving a fair trial, the soldier’s lawyer alleges in new court documents.

    David Coombs, Manning’s civilian lawyer, has made his strongest accusations yet about the conduct of the military prosecutors. In motions filed with the military court ahead of a pre-trial hearing at Fort Meade, Maryland, on Monday, he goes so far as to accuse the government in essence of lying to the court.

    Coombs charges the prosecutors with making “an outright misrepresentation” to the court over evidence the defence has been trying for months to gain access to through disclosure.

    The dispute relates to an investigation by the Office of the National Counterintelligence Executive, Oncix, into the damage caused by the WikiLeaks disclosures of hundreds of thousands of confidential documents.

    Reports by the Associated Press, Reuters and other news outlets have suggested that official inquiries into the impact of WikiLeaks concluded that the leaks caused some “pockets” of short-term damage around the world, but that generally its impact had been embarrassing rather than harmful.

    Such a finding could prove invaluable to the defence in fighting some of the charges facing Manning or, should he be found guilty, reducing his sentence.

    Yet Coombs says the army prosecutors have consistently kept him, and the court, in the dark, thwarting his legal rights to see the evidence.

    “It was abundantly clear that Oncix had some form of inquiry into the harm from the leaks – but the government switched definitions around arbitrarily so as to avoid disclosing this discovery to the defence.”

    On 21 March, the prosecutors told the court that “Oncix has not produced any interim or final damage assessment” into WikiLeaks.

    Coombs alleges that this statement was inaccurate – and the government knew it to be inaccurate at the time it made it.

    “The defense submits [this] was an outright misrepresentation,” he writes.

    On 20 April, the government told the court that “Oncix does not have any forensic results or investigative files”. Yet a week before that, the prosecutors had handed to the defence documents that clearly showed Oncix had begun to investigate WikiLeaks almost 18 months previously.

    “Oncix was collecting information from various agencies in late 2010 to assess what damage, if any, was occasioned by the leaks. So how could it be that Oncix neither had an investigation nor a damage assessment?” Coombs writes.

    The alleged efforts by the US government to avoid fulfilling its obligations to hand over evidence, Coombs says, has had the effect of rendering it impossible for the defence to prepare for the trial which is scheduled to begin in September.

    Without access to the information, they cannot identify witnesses, develop questions for those witnesses, prepare a cross-examination strategy and so on.

    Find this story at 24 June 2012 

    Ed Pilkington in New York
    guardian.co.uk, Sunday 24 June 2012 14.19 BST
    © 2012 Guardian News and Media Limited or its affiliated companies. All rights reserved.

     

     

     

    Pentagon increasing spy presence overseas

    WASHINGTON — The Pentagon is beefing up its spy service to send several hundred undercover intelligence officers to overseas hot spots to steal secrets on national security threats after a decade of focusing chiefly on the wars in Iraq and Afghanistan.

    The move comes amid concerns that the Defense Intelligence Agency, the Pentagon’s spy service, needs to expand operations beyond the war zones and to work more closely with the CIA, according to a senior Defense official who spoke on condition of anonymity because he was not authorized to speak publicly about the classified program.

    The new Defense Clandestine Service will comprise about 15% of the DIA’s workforce. They will focus on gathering intelligence on terrorist networks, nuclear proliferators and other highly sensitive threats around the world, rather than just gleaning tactical information to assist military commanders on the battlefield, the official said.

    “You have to do global coverage,” the official said.

    Some of the new spies thus are likely to be assigned to targets that now are intelligence priorities, including parts of Africa and the Middle East where Al Qaeda and its affiliates are active, the nuclear and missile programs in North Korea and Iran, and China’s expanding military.

    The initiative, which Defense Secretary Leon E. Panetta approved last Friday, aims to boost the Pentagon’s role in human intelligence collection, and to assign more case officers and analysts around the globe. The CIA has dominated that mission for decades, and the two agencies have long squabbled over their respective roles.

    An internal study by the director of National Intelligence last year concluded that the DIA needed to expand its traditional role and should gather and disseminate more information on global issues. It also found that the DIA did not promote or reward successful case officers, and that many often left for the CIA as a result.

    Find this story at 23 April 2012

    By David S. Cloud

    April 23, 2012, 10:37 a.m.

    Mark Kennedy hired as consultant by US security firm

    Former police spy provides ‘investigative services, risk and threat assessments’ for Densus Group
    Mark Kennedy posed as Mark Stone, a long-haired, tattooed campaigner, and took part in many demonstrations between 2003 and 2010. Photograph: Guardian

    A former police spy who infiltrated the environmental movement for seven years has been hired by a private security firm in the US to give advice on how to deal with political activists.

    Mark Kennedy has become a consultant to the Densus Group, providing “investigative services, risk and threat assessments”, according to an entry on his LinkedIn profile.

    He says he has given lectures to firms and government bodies drawing on his experiences “as a covert operative working within extreme left political and animal rights groups throughout the UK, Europe and the US”.

    Kennedy, 42, went to live in Cleveland, Ohio, after he was unmasked by activists in late 2010. He has claimed to have developed sympathies for the activists while undercover, although many campaigners have scorned this claim.

    The disclosure of his clandestine deployment has led to a series of revelations over the past 18 months about the 40-year police operation to penetrate and disrupt political groups. The convictions of one group of protesters were quashed after it was revealed that prosecutors and police had withheld key evidence – Kennedy’s covert recording of campaigners – from their trial. A second trial of activists collapsed after it emerged that Kennedy had infiltrated them.

    Kennedy was one of a long line of undercover officers since 1968 sent to spy on political activists under a fake identity. He posed as Mark Stone, a long-haired, tattooed campaigner, and took part in many demonstrations between 2003 and 2010. He has admitted sleeping with activists he was spying on, even though police chiefs say this is strictly forbidden.

    Even after the police ended his deployment, he continued to pretend he was a campaigner and to fraternise with activists he had known while undercover. In particular, Kennedy developed a sudden interest in animal rights campaigns, according to activists.

    After he was exposed, he sold his story to the Mail on Sunday which reported that soon after he left the police he worked for Global Open, a security firm that advises corporations on how to thwart campaigners promoting animal rights and other causes. He denied this in a later interview.

    A month before he left the police he set up the first of three commercial firms whose work has not been described. For the past four months he has been working for the Texas-based Densus Group, which advises firms on “countering current and developing threats” from protesters.

     

    Find this story at 21 June 2012

    Rob Evans and Paul Lewis
    guardian.co.uk, Thursday 21 June 2012 17.29 BST
    © 2012 Guardian News and Media Limited or its affiliated companies. All rights reserved.

     

     

    Former CIA spy boss made an unhesitating call to destroy interrogation tapes

    The first and only time I met Jose A. Rodriguez Jr., he was still undercover and in charge of the Central Intelligence Agency’s all-powerful operations directorate. The agency had summoned me to its Langley headquarters and his mission was to talk me out of running an article I had just finished reporting about CIA secret prisons — the “black sites” abroad where the agency put al-Qaeda terrorists so they could be interrogated in isolation, beyond the reach and protections of U.S. law.

    The scene I walked into in November 2005 struck me as incongruous. The man sitting in the middle of the navy blue colonial-style sofa looked like a big-city police detective stuffed uncomfortably into a tailored suit. His face was pockmarked, his dark mustache too big to be stylish. He was not one of the polished career bureaucrats who populate the halls of power in Washington.

    In fact, he fit perfectly the description given by my sources: hardworking but not smooth, loyal to the institution and now, probably, beyond his depth. He was as surprised as anyone that he had risen so quickly to the senior ranks after the Sept. 11, 2001, attacks, according to the account of his decades-long spy career in “Hard Measures: How Aggressive CIA Actions After 9/11 Saved American Lives.” The book is due out Monday, after an exclusive interview Sunday night on CBS’s “60 Minutes.” The Washington Post obtained a copy this week.

    Shortly after the 2001 attacks, the CIA set up the secret prisons in Afghanistan, Thailand and several Eastern European countries for the explicit purpose of keeping detainees picked up on the battlefield or in other countries away from the U.S. justice system, which would grant them some protections against, among other things, torture or otherwise harsh treatment. In an effort to force these detainees to give their handlers information about terrorist plots, CIA interrogators subjected some of them to sleep and food deprivation, incessant loud noise and waterboarding.

    By the time we met, those techniques were no longer in use. Rodriguez had not dealt with American reporters, he writes, but then-CIA Director Porter J. Goss had asked him to meet with me “to see if I could convince her that such a story would harm U.S. national security, put some of our allies around the world in a very difficult position, and potentially disrupt a program that was providing intelligence that was producing real results and helping to keep the country safe.”

    What Rodriguez remembers from our conversation, according to his book, is that I brought him a copy of a book I had written about the U.S. military in an effort to butter him up. “That failed to soften my stance on the lack of wisdom of her proceeding with her article as planned,” he wrote, and “I could see I was not winning her over.” I remember bringing the book because I figured he didn’t know one reporter from the next, and I wanted him to know that I did in-depth work and didn’t want to just hear the talking points.

    A blunt explanation

    It became clear immediately that Rodriguez never even got the talking points, which was refreshing and surprising. Right away he began divulging awkward truths that other senior officers had tried to obfuscate in our conversations about the secret prisons: “In many cases they are violating their own laws by helping us,” he offered, according to notes I took at the time.

    Why not bring the detainees to trial?

    “Because they would get lawyered up, and our job, first and foremost, is to obtain information.”

    (Shortly after our conversation, The Post’s senior editors were called to the White House to discuss the article with President George W. Bush and his national security team. Days later, the newspaper published the story, without naming the countries where the prisons were located.)

    Rodriguez may have never felt the need to even reveal himself publicly or to write a book, complete with family photos, giving his version of many of the unconventional — and eventually repudiated — practices that the CIA engaged in after Sept. 11 had it not been for what happened shortly after our conversation.

    Concerned that the location of one of the prisons was about to be revealed, Rodriguez writes that he ordered the facility closed immediately and the detainees moved to a new site. While dismantling the site, the base chief asked Rodriguez if she could throw a pile of old videotapes, made during the early days of terrorist Abu Zubaida’s interrogation and waterboarding, and now a couple of years old, onto a nearby bonfire that was set to destroy papers and other evidence of the agency’s presence.

    Just at that moment, according to his account, a cable from headquarters came in saying: “Hold up on the tapes. We think they should be retained for a little while longer.”

    “Had that message been delayed by even a few minutes,” Rodriguez writes, “my life in the years following would have been considerably easier.”

    Those actions led to a lengthy and still ongoing investigation of the agency that produced no charges. Rodriguez retired in January 2008 and now works in the private sector.

    A tough CIA veteran

    Rodriguez was born in Puerto Rico, the son of two teachers. He was educated at the University of Florida, where he also received a law degree before being recruited by the CIA. He once gained the confidence of a dictator in a Latin American country because of his gutsy horseback riding skills. He worked as the chief of station in several countries he does not name, and was sent to El Salvador during its bloody civil war (which he glosses over completely) and to Panama, where he pitched the idea of recruiting Panamanian strongman Manuel Noriega’s witch doctor and putting him on the CIA payroll to persuade the dictator to retire to Spain. The CIA director at the time wasn’t impressed and instead, in 1989, “the United States followed a more traditional path: a military invasion.”

    On Sept. 11, 2001, he did what legions of CIA officers not at work that day did: He rushed into headquarters, even as people were being evacuated, and pitched in. Rodriguez ended up in the Counterterrorism Center, which quickly went from a backwater posting to the center of the universe at the agency.

    As CIA operations officers and analysts scrambled to figure out more about al-Qaeda and to plan a counterattack, Rodriguez was in the eye of the storm. “Hard Measures” takes readers through a highly sanitized — censored by the CIA, actually — version of events.

    Although many details are left out and most of the outlines of what Rodriguez writes will not come as news to close readers of newspapers, he does not shy away from addressing the most controversial parts of what became the largest covert action program in U.S. history: the secret decisions to capture suspected terrorists on the battlefield or on the streets and make them disappear from the face of the Earth. Using a fleet of airplanes, the CIA bundled its captives into a netherworld no one else had access to, flew them around the world, deposited them in secret underground prisons where it could control their every move and use especially harsh interrogation methods on some of the most senior prisoners.

    Many CIA officers had misgivings about these practices and what they might mean for America’s reputation around the world. Not Rodriguez. He is unabashedly confident that he and the agency did the right thing and saved lives in the process.

    “I am certain, beyond any doubt, that these techniques, approved at the highest levels of the U.S. government, certified by the Department of Justice, and briefed to and supported by bipartisan leadership of congressional intelligence oversight committees, shielded the people of the United States from harm and led to the capture of killing of Usama bin Ladin.”

    Of course, it is impossible to know this for certain, and many people inside and outside government — some of them involved in interrogations — have argued that with better-trained interrogators and more patience, the same information could have been obtained without such harsh methods.

    The most newsworthy part of the book is a chapter in which Rodriguez explains how he came to order the destruction of 92 videotapes of the interrogation of Abu Zubaida.

    The Senate Select Committee on Intelligence has nearly completed a four-year-long review of the CIA’s post-Sept. 11 detention and interrogation practices.

    Shredding the tapes

    Rodriguez writes that he ordered the tapes’ destruction because he got tired of waiting for his superiors to make a decision. They had at least twice given him the go-ahead, then backed off. In the meantime, a senior agency attorney cited “grave national security reasons” for destroying the material and said the tapes presented ‘“grave risk” to the personal safety of our officers” whose identities could be seen on the recordings.

    In late April 2004, another event forced his hand, he writes. Photos of the abuse of prisoners by Army soldiers at the Abu Ghraib prison in Iraq ignited the Arab world and risked being confused with the CIA’s program, which was run very differently.

    “We knew that if the photos of CIA officers conducting authorized EIT [enhanced interrogation techniques] ever got out, the difference between a legal, authorized, necessary, and safe program and the mindless actions of some MPs [military police] would be buried by the impact of the images.

    “The propaganda damage to the image of America would be immense. But the main concern then, and always, was for the safety of my officers.”

    Readers may disagree with much of what Rodriguez writes and with the importance of some of the facts he omits from his book, but the above sentence speaks volumes about why this book is important. In this case, a loyal civil servant — and the decision-makers above him who blessed these programs — were not thinking about the larger, longer-lasting damage to the core values of the United States that disclosure of these secrets might cause. They were thinking about the near term. About efficiency. About the safety of friends and colleagues. In their minds, they were thinking, too, about the safety of the country.

    Find this story at 25 April 2012

    By Dana Priest, Published: April 25

    © The Washington Post Company

    Researcher: CIA, NSA may have infiltrated Microsoft to write malware

    Did spies posing as Microsofties write malware in Redmond? How do you spell ‘phooey’ in C#?

    June 18, 2012, 2:46 PM — A leading security researcher has suggested Microsoft’s core Windows and application development programming teams have been infiltrated by covert programmer/operatives from U.S. intelligence agencies.

    If it were true it would be another exciting twist to the stories of international espionage, sabotage and murder that surround Stuxnet, Duqu and Flame, the most successful cyberwar weapons deployed so far, with the possible exception of Windows itself.

    Nevertheless, according to Mikko Hypponen, chief research officer of antivirus and security software vendor F-Secure, the scenario that would make it simplest for programmers employed by U.S. intelligence agencies to create the Stuxnet, Duqu and Flame viruses and compromise Microsoft protocols to the extent they could disguise downloads to Flame as patches through Windows Update is that Microsoft has been infiltrated by members of the U.S. intelligence community.

    [ FREE DOWNLOAD: 68 great ideas for running a security department ]

    Having programmers, spies and spy-supervisors from the NSA, CIA or other secret government agencies infiltrate Microsoft in order to turn its technology to their own evil uses (rather than Microsoft’s) is the kind of premise that would get any writer thrown out of a movie producer’s office for pitching an idea that would put the audience to sleep halfway through the first act.

    Not only is it unlikely, the “action” most likely to take place on the Microsoft campus would be the kind with lots of tense, acronymically dense debates in beige conference rooms and bland corporate offices.

    The three remarkable bits of malware that attacked Iranian nuclear-fuel development facilities and stole data from its top-secret computer systems – Flame Duqu and Stuxnet – show clear signs of having been built by the same teams of developers, over a long period of time, Hypponen told PC Pro in the U.K.

    Flame used a counterfeit Microsoft security certificates to verify its trustworthiness to Iranian users, primarily because Microsoft is among the most widely recognized and trusted computer companies in the world, Hypponen said.

    Faking credentials from Microsoft would give the malware far more credibility than using certificates from other vendors, as would hiding updates in Windows Update, Hypponen said.

    The damage to Microsoft’s reputation and suspicion from international customers that it is a puppet of the CIA would be enough to keep Microsoft itself from participating in the operation, even if it were asked.

    That doesn’t mean it didn’t happen.

    “It’s plausible that if there is an operation under way and being run by a US intelligence agency it would make perfect sense for them to plant moles inside Microsoft to assist in pulling it off, just as they would in any other undercover operation,” Hypponen told PC Pro. “It’s not certain, but it would be common sense to expect they would do that.”

    The suggestion piqued the imaginations of conspiracy theorists, but doesn’t have a shred of evidence to support it.

    It does have a common-sense appeal, however. Planting operatives inside Microsoft would probably be illegal, would certainly be unethical and could have a long-range disadvantage by making Microsofties look like tools of the CIA rather than simply tools.

    “No-one has broken into Microsoft, but by repurposing the certificate and modifying it with unknown hash collision technologies, and with the power of a supercomputer, they were able to start signing any program they wanted as if it was from Microsoft,” Hypponen said. “If you combine that with the mechanism they were using to spoof MS Update server they had the crown jewels.”

    Hypponen is one of a number of security experts who have said Stuxnet and Duqu have the hallmarks of software written by traditionally minded software engineers accustomed to working in large, well-coordinated teams.

    After studying the code for Duqu, security researchers at Kaspersky Labs said the malware was most similar to the kind of work done by old-school programmers able to write code for more than one platform at a time, do good quality control to make sure the modules were able to install themselves and update in real time, and that the command-and-control components ahd been re-used from previous editions.

    “All the conclusions indicate a rather professional team of developers, which appear to be reusing older code written by top “old school” developers,” according to Kaspersky’s analysis. “Such techniques are normally seen in professional software and almost never in today’s malware. Once again, these indicate that Duqu, just like Stuxnet, is a ‘one of a kind’ piece of malware which stands out like a gem from the large mass of “dumb” malicious program we normally see.”

    Earlier this month the NYT ran a story detailing two years worth of investigations during which a range of U.S. officials, including, eventually, President Obama, confirmed the U.S. had been involved in writing the Stuxnet and Flame malware and siccing them on Iran.

    That’s far from conclusive proof that the NSA has moved its nonexistent offices to Redmond, Wash. It doesn’t rule it out either, however.

    Very few malware writers are able to write such clean code that can install on a variety of hardware systems, assess their new environments and download the modules they need to successfully compromise a new network, Kaspersky researchers said.

    Stuxnet and Flame are able to do all these things and to get their own updates through Windows Update using a faked Windows Update security certificate.

    No other malware writer, hacker or end user has been able to do that before. Knowing it happened this time makes it more apparent that the malware writers know what they are doing and know Microsoft code inside and out.

    That’s still no evidence that Microsoft could be or has been infiltrated by spies from the U.S. or from other countries.

    It does make sense, but so do a lot of conspiracy theories.

    Until there’s some solid indication Flame came from inside Microsoft, not outside, it’s probably safer to write off this string of associative evidence.

    Even in his own blog, Hypponen makes fun of those who make fun of Flame as ineffective and unremarkable, but doesn’t actually suggest moles at Microsoft are to blame.

    Find this story at 18 June 2012

    By Kevin Fogarty

    © 1994 – 2012 ITworld. All rights reserved.

    CIA agreement touted as evidence in ‘black sites’ investigation

    A partially signed agreement between Poland’s intelligence service and CIA provides central evidence in the ongoing investigation into alleged ‘black sites’ in Poland.

    According to a source at the Krakow Prosecutor’s Office that is handling the investigation, the document was prepared in late 2001, early 2002, in the wake of the September 11 attacks on the US.

    The Americans “did not want to leave traces [of evidence]” the source told Polish daily Gazeta Wyborcza, commenting on the fact that the document was only signed by former head of Poland’s Intelligence Agency (ABW), Zbigniew Siemiatkowski.

    When queried about the document, Siemiatkowski stated that if his signature is present, it means that the document is classified, and that he is unable to talk about it. He did not confirm the existence of such an agreement.

    Meanwhile, Adam Bodnar of the Helsinki Foundation – a human rights body that is monitoring the case – told that the paper that lack of an American signature does not invalidate the document as key evidence.

    “The simple fact that the document was prepared attests to the fact that it there was a will [to create the CIA prisons], and that people who were aware of it, also knew about its contents.”

    Accusations and denials

    In 2011, the Council of Europe’s Commissioner for Human Rights, Thomas Hammarberg, made an unequivocal statement on the matter.

    “It is clear that Poland hosted secret CIA prisons between December 2002 and September 2003. We know who was held there and what interrogation methods were used. They can be described as torture.”

    Leszek Miller was prime minister of Poland at that time, at the head of the Democratic Left Alliance (SLD) government.

    He has repeatedly denied knowledge of such a site, which is alleged to have been located in a villa near the Stare Kiejkuty military base in north east Poland.

     

    Find this story at 19 June 2012 

    19.06.2012 10:58

    Copyright © Polskie Radio S.A

    Criminele drugsinfiltrant VS jarenlang actief in Nederland

    ’Inzet burgerinfiltranten in Nederland strikt verboden’

     

    De Amerikaanse drugsbestrijdingsorganisatie DEA heeft een criminele burgerinfiltrant ingezet in Nederland. Het AD heeft de hand weten te leggen op geheime rapporten van de DEA.

     

    De burgerinfiltrant speelde een hoofdrol bij de gecontroleerde doorvoer van een grote hoeveelheid drugs in Europa. Doel was het in de val lokken van drugscriminelen. Op de partij kwamen meerdere Nederlanders af. Infiltrant ‘Mono’ werkte maandenlang vanuit Amsterdam.

     

    De rol van de DEA-infiltrant ligt gevoelig, omdat het een bom kan leggen onder het proces tegen de potentiële kopers die momenteel in Haarlem terechtstaan. De verdachten vermoeden dat de DEA in Nederland buiten haar boekje is gegaan en eisen inzage in de operatie. De Amerikanen weigeren dat.

     

    Justitie claimt dat ze eind 2009 voor het eerst hoorde dat Mono voor de DEA werkte. Een artikel uit de Poolse krant Gazeta Wyborcza zet vraagtekens bij die verklaring. Nederland zou namelijk al op 11 februari 2009 een bemiddelende rol hebben gespeeld tussen de DEA en de Poolse geheime dienst ABW.

     

    Vindt dit verhaal op 16 juni 2012

     

    Bewerkt door: Leonie Francien Sellies

    16-6-12 – 08:23  bron: ANP

    De infiltrant was maandenlang actief in Amsterdam. © ANP.

     

    De Persgroep Digital. Alle rechten voorbehouden.

    Top Secret CIA Documents on Osama bin Laden Declassified

    Washington, D.C., June 19, 2012 – The National Security Archive today is posting over 100 recently released CIA documents relating to September 11, Osama bin Laden, and U.S. counterterrorism operations. The newly-declassified records, which the Archive obtained under the Freedom of Information Act, are referred to in footnotes to the 9/11 Commission Report and present an unprecedented public resource for information about September 11.

    The collection includes rarely released CIA emails, raw intelligence cables, analytical summaries, high-level briefing materials, and comprehensive counterterrorism reports that are usually withheld from the public because of their sensitivity. Today’s posting covers a variety of topics of major public interest, including background to al-Qaeda’s planning for the attacks; the origins of the Predator program now in heavy use over Afghanistan, Pakistan and Iran; al-Qaeda’s relationship with Pakistan; CIA attempts to warn about the impending threat; and the impact of budget constraints on the U.S. government’s hunt for bin Laden.

    Today’s posting is the result of a series of FOIA requests by National Security Archive staff based on a painstaking review of references in the 9/11 Commission Report.
    DOCUMENT HIGHLIGHTS

    The documents released by CIA detail the meticulousness of al-Qaeda’s plot against the United States and CIA attempts to counter the rising terrorist threat. A previously undisclosed raw intelligence report that became the basis for the December 4, 1998, President’s Daily Brief notes that five years before the actual attack, al-Qaeda operatives had successfully evaded security at a New York airport in a test-run for bin Laden’s plan to hijack a U.S. airplane. [1998-12-03]. CIA analytical reports also provide interesting insights into al-Qaeda’s evolving political strategies. “In our view, the hijackers were carefully selected with an eye to their operational and political value. For instance, the large number of Saudi nationals was most likely chosen not only because of the ease with which Saudi nationals could get US visas but also because Bin Ladin could send a message to the Saudi Royal family.” [2003-06-01]

    Reports on early attempts to apprehend bin Laden detail the beginning of the U.S. Predator drone program in Afghanistan and Pakistan. “First Predator mission over Afghanistan [excised] September 7, 2000.” [1] “Twice in the fall of 2000, the Predator observed an individual most likely to be Bin Ladin; however we had no way at the time to react to this information.” [2004-03-19] American UAVs did not have sufficient weapons capabilities at the time the CIA likely spotted bin Laden in 2000 to fire on the suspect using the UAV.

    Al-Qaeda’s ties to Pakistan before September 11 are also noted in several documents. “Usama ((Bin Ladin))’s Islamic Army considered the Pakistan/Afghanistan area one region. Both Pakistan and Afghanistan serve as a regional base and training center for Islamic Army activities supporting Islamic insurgencies in Tajikistan, the Kashmir region and Chechnya. [Excised] The Islamic Army had a camp in Pakistan [Excised] purpose of the camp was to train and recruit new members, mostly from Pakistan.” [1997-07-14] While, “UBL elements in Pakistan reportedly plan to attack POTUS [U.S. President Clinton’s] plane with [excised] missiles if he visits Pakistan.” [2000-02-18]

    Similar to the 9/11 Commission Report, the document collection details repeated CIA warnings of the bin Laden terrorist threat prior to September 11. According to a January 2000 Top Secret briefing to the Director of Central Intelligence, disruption operations against the Millennium plot “bought time… weeks… months… but no more than one year” before al-Qaeda would strike. [2000-01-07] “A UBL attack against U.S. interests could occur at any time or any place. It is unlikely that the CIA will have prior warning about the time or place.” [1999-08-03] By September 2001, CIA counterterrorism officials knew a plot was developing but couldn’t provide policymakers with details. “As of Late August 2001, there were indications that an individual associated with al-Qa’ida was considering mounting terrorist operations in the United States, [Excised]. No further information is currently available in the timing of possible attacks or on the alleged targets in the United States.” [2001-08-24]

    Despite mounting warnings about al-Qaeda, the documents released today illustrate how prior to September 11, CIA counterterrorism units were lacking the funds to aggressively pursue bin Laden. “Budget concerns… CT [counterterrorism] supplemental still at NSC-OMB [National Security Council – Office of Management and Budget] level. Need forward movement on supplemental soonest due to expected early recess due to conventions, campaigning and elections. Due to budgetary constraints… CTC/UBL [Counterterrorism Center/Osama bin Laden Unit] will move from offensive to defensive posture.” [2000-04-05]

    Although the collection is part of a laudable effort by the CIA to provide documents on events related to September 11, many of these materials are heavily redacted, and still only represent one-quarter of the CIA materials cited in the 9/11 Commission Report. Hundreds of cited reports and cables remain classified, including all interrogation materials such as the 47 reports from CIA interrogations of Khalid Sheikh Mohammed from March 24, 2003 – June 15, 2004, which are referenced in detail in the 9/11 Report.

    Highlights of the CIA September 11 Document Collection Include:
    The 1998 Raw Intelligence Report on UBL’s Plans to Hijack an Airplane that Became an Item in the December 4, 1998 President’s Daily Brief [1998-12-03].
    The report details how bin Laden was planning “new operations against the United States (U.S.) targets in the near future. Plans to hijack a U.S. aircraft were proceeding well. Two individuals from the relevant operational team in the U.S. had successfully evaded security checks during a trial run at “New York airport [excised].”
    Internal CIA E-mails on Osama bin Laden
    1998-05-05 – “[Title Excised]” “Planning for the UBL Rendition is Going Very Well,” To: Michael F. Scheuer, From: [Excised], Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Capture Op,” “[Gary] Schroen to Mike.” [Chapter 4, Endnote 22 9/11 Commission Report]
    1998-12-20 – “Re: urgent re ubl,” Note For: Michael F. Scheuer, From: [Excised], Central Intelligence Agency Email. Cited in 9/11 Commission Report as “[Gary] Schroen to Mike” [Chapter 4, Endnotes 117, 119 9/11 Commission Report]
    1998-12-21 – “your note,” Note For: [Excised], From: Michael F. Scheuer, Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Mike to [Gary] Schroen,” [Chapter 4, Endnote 119 9/11 Commission Report]
    1999-05-17 – “your note,” From Michael F. Scheuer, To [Excised], Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Mike to [Gary] Schroen” [Chapter 4, Endnote 174 9/11 Commission Report]
    2001-05-15 – “[Excised] Query [Excised].” Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Dave to John.” [Chapter 8, Endnote 72 9/11 Commission Report]
    2001-05-24 – [Title Excised] “Agee (sic) we need to compare notes,” Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Dave to John.” [Chapter 8, Endnote 64 9/11 Commission Report]
    2001-07-13 – “[Excised] Khalad [Excised],” Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Richard to Alan” [Chapter 8, Endnote 64 9/11 Commission Report]
    2001-08-21 – “Re: Khalid Al-Mihdhar,” Memorandum, Central Intelligence Agency Email. Cited in 9/11 Commission Report as “Mary to John.” [Chapter 8, Endnote 106 9/11 Commission Report]
    Two Definitive CIA Reports on the September 11, 2001 Attacks
    2003-06-01 – “11 September: The Plot and the Plotters,” CTC 2003-40044HC, Central Intelligence Agency Intelligence Report.
    [Chapter 5, Endnotes 42, 60, 61, 64, 70, 105, Chapter 7, Endnotes 45, 52, 60, 83, 86, 92, 94, 95, 96, 97, 105 9/11 Commission Report]
    This document is a comprehensive CIA history of the 9/11 attack. Analysis includes notes on al-Qaeda, the evolution of the plot, terrorist techniques, timelines and detailed hijacker profiles.
    2004-03-19 – “DCI Report: The Rise of UBL and Al-Qa’ida and the Intelligence Community Response,” Draft, Central Intelligence Agency Analytic Report. [Chapter 2, Endnote 67]
    This document is a detailed summary of CIA efforts to apprehend Osama bin Laden from 1989-2004. Highlights include:
    Agency notes on bin Laden’s evolution from “terrorist financier” in the early 1990s to a significant threat to U.S. interests by mid-1990.
    Discussions and debates regarding the use of Predator drones as early as 2000. [2]
    Critiques of FBI information systems as impediments to counterterrorism efforts – “A major, ongoing concern is FBI’s own internal dissemination system. CIA officers still often find it necessary to hand-deliver messages to the intended recipient within the FBI. In additional FBI has not perfected its FI reporting system and headquarters-field communications so dissemination of intelligence outside of FBI is still spotty.” And the report confirms suggestions by the 9/11 Commission Report that “the different organizational culture and goals of the FBI and CIA sometimes get in the way of desired results.” (p. 22)
    A group of Afghan trial leaders worked with the CIA on the UBL issue, but “[Excised] judged to be unlikely to successfully attack a heavily guarded Bin Ladin.” “Masood has to be engaged to help in the attempt to capture Bin Ladin, but with the understanding that he would be his own man, never an agent of surrogate of the US government… Even if he agreed to do so, his chances of success against the Taliban were judged to be less than five percent.” (p. 58)

    Note “DIF” written on multiple pages stands for “Denied in Full”
    A Series of CIA Senior Executive Intelligence Briefs (SEIBS) from June-September 2001 Warning of “Imminent” Al-Qaeda Attacks:
    2001-06-23 – “International: Bin Ladin Attacks May Be Imminent [Excised]” Senior Executive Intelligence Brief. [Chapter 8, Endnote 14, See also p. 257 9/11 Commission Report]
    2001-06-25 – “Terrorism: Bin Ladin and Associates Making Near-Term Threats,” Senior Executive Intelligence Brief. [Chapter 8, Endnotes 12, 14]
    2001-06-30 – “Terrorism: Bin Laden Planning High Profile Attacks [Excised],” Senior Executive Intelligence Brief. [Chapter 8, Endnote 12]
    2001-07-02 – “Terrorism: Planning for Bin Ladin Attacks Continues, Despite Delay [Excised],” Senior Executive Intelligence Brief. [Chapter 8, Endnote 18]
    2001-07-13 – “Terrorism: Bin Ladin Plans Delayed but Not Abandoned [Excised],” Senior Executive Intelligence Brief. [Chapter 8, Endnote 28]
    2001-07-25 – “Terrorism: One Bin Ladin Operation Delayed, Others Ongoing [Excised],” Senior Executive Intelligence Brief. [Chapter 8, Endnote 28]
    2001-08-07 – “Terrorism: Bin Ladin Determined to Strike in the US,” Senior Executive Intelligence Brief. [Chapter 8, Endnote 38. Chapter 11, Endnote 5. Page 342]
    Detailed Reports on Al-Qaeda Organization
    “The spike in the network’s activity stems in part from changes in Bin Ladin’s practices. To avoid implicating himself and his Taliban hosts, Bin Ladin over the past two years has allowed cells in his network, al-Qa’ida, to plan attacks more independently of the central leadership and has tried to gain support for his agenda outside the group. – The network also has benefited from a sharp increase in mujahidin recruitment since the resumption of the conflict in Chechnya in 1999, which exposed a new generation of militants to terrorist techniques and extremist ideology through training at al-Qai’da-run camps in Afghanistan. – Violence between Israelis and the Palestinians, moreover is making Sunni extremists more willing to participate in attacks against US or Israeli interests.” 2001-02-06 – “Sunni Terrorist Threat Growing,” Senior Executive Intelligence Brief, The Central Intelligence Agency. [Chapter 8, Endnote 4 9/11 Commission Report]
    Bin Laden’s Attempts to Acquire Weapons of Mass Destruction
    “Bin Ladin and his associates have experimented by crude means to make and deploy biological agents… Bin Ladin has sought to acquire military-grade biological agents or weapons.” 2001-02-14 –”Afghanistan: Bin Ladin’s Interest in Biological and Radiological Weapons,” Central Intelligence Agency Analytical Report [Chapter 11, Endnote 5. 9/11 Commission Report Page 342]
    A Positive CIA Assessment of CIA Counterterrorism Capabilities in August 2001
    In contrast to the findings of the 9/11 Commission Report and a 2004 CIA Office of Inspector General’s review of its pre-9/11 counterterrorism practices, a report completed in August 2001 by the CIA Inspector General gives very positively reviews to CIA counterterrorism practices, the management of information and interagency cooperation. “CTC fulfills inter-agency responsibilities for the DCI by coordinating national intelligence, providing warning, and promoting the effective use of Intelligence Community resources on terrorism issues. The Center has made progress on problems identified at the time of the last inspection in 1994 – specifically its professional relationship with the Federal Bureau of Investigation.

    Find this story at 19 June 2012

    The Central Intelligence Agency’s 9/11 File

    National Security Archive Electronic Briefing Book No. 381

    Posted – June 19, 2012

    Edited by Barbara Elias-Sanborn with Thanks to Archive Senior Fellow Jeffrey T. Richelson

    For more information contact:
    Barbara Elias-Sanborn – 202/994-7000
    belias@gwu.edu

    Exclusive: Senate probe finds little evidence of effective “torture”

    (Reuters) – A nearly three-year-long investigation by Senate Intelligence Committee Democrats is expected to find there is little evidence the harsh “enhanced interrogation techniques” the CIA used on high-value prisoners produced counter-terrorism breakthroughs.

     

    People familiar with the inquiry said committee investigators, who have been poring over records from the administration of President George W. Bush, believe they do not substantiate claims by some Bush supporters that the harsh interrogations led to counter-terrorism coups.

     

    The backers of such techniques, which include “water-boarding,” sleep deprivation and other practices critics call torture, maintain they have led to the disruption of major terror plots and the capture of al Qaeda leaders.

     

    One official said investigators found “no evidence” such enhanced interrogations played “any significant role” in the years-long intelligence operations which led to the discovery and killing of Osama bin Laden last May by U.S. Navy SEALs.

     

    President Barack Obama and his aides have largely sought to avoid revisiting Bush administration controversies. But the debate over the effectiveness of enhanced interrogations, which human rights advocates condemn as torture, is resurfacing, in part thanks to a new book by a former top CIA official.

     

    In the book, “Hard Measures,” due to be published on Monday, April 30, the former chief of CIA clandestine operations Jose Rodriguez defends the use of interrogation practices including water-boarding, which involves pouring water on a subject’s face, which is covered with a cloth, to simulate drowning.

     

    “We made some al-Qaeda terrorists with American blood on their hands uncomfortable for a few days,” Rodriguez says in an interview with CBS News’ “60 Minutes” that will air on Sunday, April 29. “I am very secure in what we did and am very confident that what we did saved American lives.”

     

    For nearly three years, the Senate intelligence committee’s majority Democrats have been conducting what is described as the first systematic investigation of the effectiveness of such extreme interrogation techniques.

     

    NO SCIENTIFIC ASSESSMENT

     

    The CIA gave the committee access to millions of pages of written records charting daily operations of the interrogation program, including graphic descriptions of how and when controversial techniques were employed.

     

    Sources agreed to discuss the matter on condition of anonymity because the report has not been finalized.

     

    The committee members’ objective is to conduct a methodical assessment of whether enhanced interrogation techniques led to genuine intelligence breakthroughs or whether they produced more false leads than good ones.

     

    U.S.intelligence officials have acknowledged that while the harshest elements of the interrogation program, including water-boarding and other tactics which cause severe physical stress, were in use, the CIA never carried out a scientific assessment of the program’s effectiveness.

     

    The Bush Administration only used water-boarding on three captured suspects. One of them was Khalid Sheikh Mohammed, the mastermind of the September 11, 2001 attacks.

     

    Other coercive techniques included sleep deprivation, making people crouch or stretch in stressful positions and slamming detainees against a flexible wall.

     

    The CIA started backing away from such techniques in 2004. Obama banned them shortly after taking office.

     

    One source cautioned there could still be lengthy delays before any information or conclusions from the Senate committee’s report are made public.

     

    One reason the inquiry has taken so long is that in 2009, committee Republicans withdrew their participation, saying the panel would be unable to interview witnesses to ensure documentary material was reported in appropriate context due to ongoing criminal investigations.

     

    People familiar with the inquiry said it consisted of as much as 2,000 pages in narrative accounts of how the CIA interrogation program worked, including specific case histories in which enhanced interrogation tactics were used.

     

    ‘PROCEDURES’ UNJUSTIFIED: FEINSTEIN

     

    The Intelligence committee has not issued any official statements about what its inquiry has found or when it expects to wrap up. But committee chair Sen. Dianne Feinstein has made relatively strong statements about the lack of evidence that enhanced interrogations played any material role in generating information leading to bin Laden’s killing.

     

    Only days after the commando raid in which bin Laden was killed, Feinstein told journalists: “I happen to know a good deal about how those interrogations were conducted, and, in my view, nothing justifies the kind of procedures that were used.”

     

    Current and formerU.S.officials have said one key source for information about the existence of the al Qaeda “courier” who ultimately ledU.S.intelligence to bin Laden was Khalid Sheikh Mohammed.

     

    KSM, as he was known toU.S.officials, was subjected to water-boarding 183 times, theU.S.government has acknowledged.

     

    Officials said, however, that it was not until sometime after he was water-boarded that KSM told interrogators about the courier’s existence. Therefore a direct link between the physically coercive techniques and critical information is unproven, Bush administration critics say.

     

    Supporters of the CIA program, including former Vice President Dick Cheney, have portrayed it as a necessary, if distasteful, step that may have stopped extremist plots and saved lives.

     

     

     

    Find this story at 27 April 2012

     

    Fri, Apr 27 2012

    By Mark Hosenball

    (Editing by Todd Eastham)

     

    © Thomson Reuters 2011. All rights reserved. Users may download and print extracts of content from this website for their own personal and non-commercial use only. Republication or redistribution of Thomson Reuters content, including by framing or similar means, is expressly prohibited without the prior written consent of Thomson Reuters. Thomson Reuters and its logo are registered trademarks or trademarks of the Thomson Reuters group of companies around the world.

     

    Thomson Reuters journalists are subject to an Editorial Handbook which requires fair presentation and disclosure of relevant interests.

     

    This copy is for your personal, non-commercial use only. To order presentation-ready copies for distribution to colleagues, clients or customers, use the Reprints tool at the top of any article or visit: www.reutersreprints.com.

    De inzet van de afluisterbevoegdheid en van de bevoegdheid tot de selectie van Sigint door de AIVD

    Bij het toezichtsrapport inzake de inzet van de afluisterbevoegdheid
    en de bevoegdheid tot de selectie van Sigint door de AIVD
    Het onderzoek van de Commissie heeft zich gericht op de rechtmatigheid van de inzet van
    de afluisterbevoegdheid en de bevoegdheid tot de selectie van Sigint door de AIVD in de
    periode van september 2010 tot en met augustus 2011. Deze bevoegdheden zijn neergelegd
    in de artikelen 25 en 27 van de Wiv 2002 en mogen enkel worden ingezet indien dit
    noodzakelijk is in het kader van de veiligheidstaak of de inlichtingentaak buitenland van de
    AIVD. Ook is wettelijk vereist dat de inzet van deze bevoegdheden proportioneel en
    subsidiair is en voldoet aan in de Wiv 2002 neergelegde zorgvuldigheidsvereisten.
    De Commissie constateert dat de AIVD bij de inzet van de afluisterbevoegdheid doordacht
    te werk gaat. Zij heeft in de door haar onderzochte operaties geen onrechtmatigheden
    geconstateerd. Dit is gezien het grote aantal onderzochte operaties een compliment waard.
    Op enkele punten constateert de Commissie evenwel dat er sprake is van
    onzorgvuldigheden, vooral ten aanzien van de motivering van operaties.
    Voor een deugdelijke motivering is van belang dat de AIVD hierin alle beschikbare relevante
    informatie betrekt. Alleen dan kan zorgvuldig worden afgewogen of de privacyinbreuk die
    gepaard gaat met de inzet van de afluisterbevoegdheid inderdaad noodzakelijk,
    proportioneel en subsidiair is. De Commissie heeft in één geval geconstateerd dat contraindicaties
    inzake de dreiging die van een target uitging, niet waren opgenomen in de
    motivering. De Commissie signaleert ook dat de AIVD incidenteel omwille van de efficiëntie
    van het inlichtingenwerk parallelle, verschillend gerubriceerde motiveringen aanwendt.
    Naar het oordeel van de Commissie staat dit op gespannen voet met het belang van een
    zorgvuldige en eenduidige motivering.

    De Commissie constateert dat het in het onderzoek van de AIVD naar
    radicaliseringstendensen niet altijd evident is dat de personen of organisaties jegens wie de
    afluisterbevoegdheid wordt ingezet, ook daadwerkelijk aanleiding geven tot het ernstige
    vermoeden een gevaar te zijn voor de nationale veiligheid. De Commissie onderkent het
    belang van dit onderzoek maar benadrukt dat dan wel voortdurend de inzet van bijzondere
    bevoegdheden jegens deze personen of organisaties kritisch geëvalueerd dient te worden. Zij
    heeft in één geval geconstateerd dat de AIVD gedurende enkele jaren bijzondere
    bevoegdheden heeft ingezet zonder duidelijkheid te hebben verkregen over de dreiging die
    van de betrokken personen uitging. De Commissie is van oordeel dat de inzet van de
    afluisterbevoegdheid met name in de laatste periode van dit onderzoek zich op het
    grensgebied bevond van wat wettelijk is toegestaan. In één geval zijn door de AIVD
    bijzondere bevoegdheden ingezet tegen een persoon die een bepaalde boodschap wilde
    publiceren waarvan volgens de AIVD niet uit te sluiten was dat deze opgevat kon worden
    als een oproep tot activisme of geweld. De Commissie vindt deze formulering te ruim. Voor
    ii
    de inzet van een bijzondere bevoegdheid moet immers gemotiveerd worden dat er een
    ernstig vermoeden van een gevaar is.
    In één geval constateert de Commissie dat de AIVD de afluisterbevoegdheid heeft ingezet
    terwijl er belangrijke redenen waren om voorafgaande hieraan de MIVD de consulteren.
    Hierdoor had de AIVD niet alleen mogelijk operationeel relevante informatie kunnen
    verkrijgen, ook kan zo voorkomen worden dat beide diensten zich los van elkaar met
    dezelfde operationele aangelegenheden bezighouden.
    De Commissie onthoudt zich, net als in twee eerdere rapporten waarin dit onderwerp ter
    sprake kwam, van een oordeel over de rechtmatigheid van de selectie van Sigint door de
    AIVD. Bij de inzet van deze bevoegdheid licht de AIVD vaak niet toe aan wie de nummers
    en technische kenmerken toebehoren en waarom deze telecommunicatie dient te worden
    geselecteerd. Deze problematiek lijkt eigen aan de selectie van Sigint, de Commissie heeft dit
    onlangs ook ten aanzien van de MIVD geconstateerd. De motiveringsvereisten van de Wiv
    2002 zijn evenwel strikt, aangezien bij de selectie van Sigint kennis wordt genomen van de
    inhoud van communicatie van personen en organisaties. In het eind 2011 uitgebrachte
    toezichtsrapport 28 inzake de inzet van Sigint door de MIVD heeft de Commissie het
    juridisch kader voor het gehele proces van de inzet van Sigint uiteengezet en
    aanknopingspunten gegeven voor een betere motivering. De Commissie zal dan ook in het
    volgende diepteonderzoek naar de inzet van de afluisterbevoegdheid en de bevoegdheid tot
    de selectie van Sigint door de AIVD nagaan in hoeverre de motivering van de selectie van
    Sigint is verbeterd.

    Het rapport is te vinden bij CTIVD

    Reactie van de minister

    Persbericht

    G4S chief predicts mass police privatisation

    Private companies will be running large parts of the police service within five years, according to security firm head

    David Taylor-Smith, the head of G4S for the UK and Africa, said he expected most UK police forces to sign up to privatisation deals. Photograph: Guardian

    Private companies will be running large parts of the UK’s police service within five years, according to the world’s biggest security firm.

    David Taylor-Smith, the head of G4S for the UK and Africa, said he expected police forces across the country to sign up to similar deals to those on the table in the West Midlands and Surrey, which could result in private companies taking responsibility for duties ranging from investigating crimes to transporting suspects and managing intelligence.

    The prediction comes as it emerged that 10 more police forces were considering outsourcing deals that would see services, such as running police cells and operating IT, run by private firms.

    Taylor-Smith, whose company is in the running for the £1.5bn contract with West Midlands and Surrey police, said he expected forces across the country to have taken similar steps within five years . “For most members of the public what they will see is the same or better policing and they really don’t care who is running the fleet, the payroll or the firearms licensing – they don’t really care,” he said.

    G4S, which is providing security for the Olympics, has 657,000 staff operating in more than 125 countries and is one of the world’s biggest private employers. It already runs six prisons in the UK and in April started work on a £200m police contract in Lincolnshire, where it will design, build and run a police station. Under the terms of the deal, 575 public sector police staff transferred to the company.

    Taylor-Smith said core policing would remain a public-sector preserve but added: “We have been long-term optimistic about the police and short-to-medium-term pessimistic about the police for many years. Our view was, look, we would never try to take away core policing functions from the police but for a number of years it has been absolutely clear as day to us – and to others – that the configuration of the police in the UK is just simply not as effective and as efficient as it could be.”

    Concern has grown about the involvement of private firms in policing. In May more than 20,000 officers took to the streets to outline their fears about pay, conditions and police privatisation. The Police Federation has warned that the service is being undermined by creeping privatisation.

    Unite, the union that represents many police staff, said the potential scale of private-sector involvement in policing was “a frightening prospect”. Peter Allenson, national officer, said: “This is not the back office – we are talking about the privatisation of core parts of the police service right across the country, including crime investigation, forensics, 999 call-handling, custody and detention and a wide range of police services.”

    Taylor-Smith said “budgetary pressure and political will” were driving the private-sector involvement in policing but insisted that the “public sector ethos” had not been lost.

    “I have always found it somewhere between patronising and insulting the notion that the public sector has an exclusive franchise on some ethos, spirit, morality – it is just nonsense,” he said. “The thought that everyone in the private sector is primarily motivated by profit and that is why they come to work is just simply not accurate … we employ 675,000 people and they are primarily motivated by pretty much the same as would motivate someone in the public sector.”

    In the £1.5bn deal being discussed by West Midlands and Surrey police, the list of policing activities up for grabs includes investigating crimes, detaining suspects, developing cases, responding to and investigating incidents, supporting victims and witnesses, managing high-risk individuals, managing intelligence, managing engagement with the public, as well as more traditional back-office functions such as managing forensics, providing legal services, managing the vehicle fleet, finance and human resources.

    Chris Sims, West Midlands chief constable, has said his force is a good testing ground for fundamental change as he battled to find £126m of savings. He said the armed forces had embraced a greater role for the private sector more fully than the police without sparking uproar.

    But a home affairs select committee report said many of the policing contracts being put up for tender amounted to a “fishing expedition”. MPs added that they were not convinced the forces understood what they were doing. The committee chair, Keith Vaz, said: “The Home Office must ensure it knows what services local forces wish to contract out before agreeing to allow expenditure of £5m on what is little more than a fishing expedition.”

    Cambridgeshire, Bedfordshire and Hertfordshire police announced this month that they were considering privatising some services in an attempt to tackle a £73m funding shortfall created by government cuts. Police authority members in the three counties will be asked to consider how services including HR, finance and IT could be outsourced in line with the G4S contract in Lincolnshire as part of a joint recommendation made by the three chief constables.

    Find this story at 20 June 2012

    Matthew Taylor and Alan Travis
    guardian.co.uk, Wednesday 20 June 2012 19.31 BST

    • This article was amended on 21 June to add a quote from a Home Office spokesperson.
    © 2012 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    << oudere artikelen  nieuwere artikelen >>