• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Capturing Jonathan Pollard

    De Amerikaanse voormalig spion Jonathan Pollard zit een levenslange gevangenisstraf uit. Als werknemer bij de VS Marine Inlichtingendienst stal hij honderdduizenden geheime documenten en verkocht die aan Israël. De man die hem ontmaskerde, schreef er een boek over.

    lees meer

    The Revelation of the Concealed

    Hal Foster bedacht de uitdrukking ‘archival impulse’, waarbij het verwezenlijken van historiciteit en het verzamelen van data en informatie in het visuele werk door middel van een performatieve handeling naar voren gebracht worden. Deze ‘archiverende impuls’ omvat zaken die worden gevonden maar toch readymade zijn, feitelijk doch fictief, publiek doch privé.1 In mijn werk als kunstenaar geef ik de voorkeur aan onderzoek. Mijn praktijk draait om het overbrengen van gefilterde informatie en beelden. Gebruikmakend van interviews, statistieken, enquêtes, reportage, veldonderzoek en archiefonderzoek – om de hiaten binnen het ‘feitelijke’ bloot te leggen – triggert mijn werk ruimten van reflectie door de inhoud. Ik raadpleeg veelvuldig archieven en breng vervolgens archiefmateriaal bijeen in contextgevoelige, performatieve ensceneringen. Het hergebruik van dit archiefmateriaal bepaalt de vorm en context van mijn installaties, interventies en publicaties. Je zou dus kunnen spreken van een performatief archief, waarbij het archief wordt geactiveerd en uitgevoerd als kunst.

    The Revelation of the Concealed

    Stuxnet was work of U.S. and Israeli experts, officials say

    A damaging cyberattack against Iran’s nuclear program was the work of U.S. and Israeli experts and proceeded under the secret orders of President Obama, who was eager to slow that nation’s apparent progress toward building an atomic bomb without launching a traditional military attack, say current and former U.S. officials.

    The origins of the cyberweapon, which outside analysts dubbed Stuxnet after it was inadvertently discovered in 2010, have long been debated, with most experts concluding that the United States and Israel probably collaborated on the effort. The current and former U.S. officials confirmed that long-standing suspicion Friday, after a New York Times report on the program.

    The officials, speaking on the condition of anonymity to describe the classified effort code-named Olympic Games, said it was first developed during the George W. Bush administration and was geared toward damaging Iran’s nuclear capability gradually while sowing confusion among Iranian scientists about the cause of mishaps at a nuclear plant.

    The use of the cyberweapon — malware designed to infiltrate and damage systems run by computers — was supposed to make the Iranians think that their engineers were incapable of running an enrichment facility.

    “The idea was to string it out as long as possible,” said one participant in the operation. “If you had wholesale destruction right away, then they generally can figure out what happened, and it doesn’t look like incompetence.”

    Even after software security companies discovered Stuxnet loose on the Internet in 2010, causing concern among U.S. officials, Obama secretly ordered the operation continued and authorized the use of several variations of the computer virus.

    Overall, the attack destroyed nearly 1,000 of Iran’s 6,000 centrifuges — fast-spinning machines that enrich uranium, an essential step toward building an atomic bomb. The National Security Agency developed the cyberweapon with help of Israel.

    Several senior Iranian officials on Friday referred obliquely to the cyberattack in reaffirming Iran’s intention to expand its nuclear program.

    “Despite all plots and mischievous behavior of the Western countries . . . Iran did not withdrawal one iota from its rights,” Kazem Seddiqi, a senior Iranian cleric, said during services at a Tehran University mosque, according to news reports from Iran.

    Iran previously has blamed U.S. and Israeli officials and has said its nuclear program is solely for peaceful purposes, such as generating electricity.

    White House officials declined to comment on the new details about Stuxnet, and an administration spokesman denied that the material had been leaked for political advantage.

    “It’s our view, as it is the view of everybody who handles classified information, that information is classified for a reason: that it is kept secret,” deputy press secretary Josh Earnest told reporters. “It is intended not to be publicized because publicizing it would pose a threat to our national security.”

    The revelations come at a particularly sensitive time, as the United States and five other world powers are engaged in talks with Iran on proposed cuts to its nuclear program. Iran has refused to agree to concessions on what it says is its rightful pursuit of peaceful nuclear energy. The next round of negotiations is scheduled for this month in Moscow.

    “Effectively the United States has gone to war with Iran and has chosen to do so in this manner because the effects can justify this means,” said Rafal Rohozinski, a cyber-expert and principal of the SecDev Group, referring to the slowing of Iran’s nuclear program.

    “This officially signals the beginning of the cyber arms race in practice and not in theory,” Rohozinski said.

    In 2006, senior Bush administration officials developed the idea of using a computer worm, with Israeli assistance, to damage Iranian centrifuges at its uranium enrichment plant in Natanz. The concept originated with Gen. James E. Cartwright, who was then head of U.S. Strategic Command, which handles nuclear deterrence, and had a reputation as a cyber-strategist.

    “Cartwright’s role was describing the art of the possible, having a view or vision,” said a former senior official familiar with the program. But “the heavy lifting” was done by NSA Director Keith Alexander, who had “the technical know-how and carried out the actual activity,” said the former official.

    Olympic Games became a collaborative effort among NSA, the CIA and Israel, current and former officials said. The CIA, under then-Director Michael V. Hayden, lent its covert operation authority to the program.

    The CIA and Israelis oversaw the development of plans to gain physical access to the plant. Installing the worm in plant equipment not connected to the Internet depended on spies and unwitting accomplices — engineers, plant technicians — who might connect an infected device to one of the systems, officials said.

    The cyberweapon took months of testing and development. It began to show effects in 2008, when centrifuges began spinning at faster-than-normal speeds until sensitive components began to warp and break, participants said.

    By Ellen Nakashima and Joby Warrick, Published: June 1 | Updated: Saturday, June 2, 12:03 PM

    © The Washington Post Company

    Find this story at 1 june 2012

    Russian Reserve Colonel Convicted of Spying for U.S.

    A Russian court has convicted a reserve colonel of spying on behalf of the United States and sentenced him to 12 years in prison, the country’s intelligence agency said Thursday.

    Vladimir Lazar would be sent to a high-security prison and stripped of his military rank, the Federal Security Service said in a statement.

    Prosecutors alleged that Lazar purchased a disk with more than 7,000 images of classified topographical maps of Russia from a collector in 2008 and smuggled it to neighboring Belarus where he gave it to an American agent.

    31 May 2012
    The Associated Press

    Find this story at 31 may 2012

    Bradley Manning lawyer in struggle to have government documents released

    US government withholding 250,000 pages of damage assessment reports relating to WikiLeaks transmission

    Bradley Manning is charged with 22 counts connected to the largest leak of state secrets in US history. Photograph: Brendan Smialowski/AFP/Getty Images

    The US government is in possession of 250,000 pages of documents relating to the transmission of state secrets to whistleblower website WikiLeaks, which it is refusing to disclose to defence lawyers representing the alleged source of the leaks, Bradley Manning.

    Manning’s civilian lawyer, David Coombs, has lodged a motion with the military court that is hearing the court-martial of the US soldier. Coombs writes in the motion that the government has revealed to him in a throwaway footnote that there are 250,000 pages in its possession that relate to Manning, WikiLeaks and secret official assessments of the damage that the massive leak caused to US interests around the world.

    Yet none of these pages have been made available to the defence. “If so, this is very disconcerting to the defence,” Coombs says.

    Manning, an intelligence analyst who was working outside Baghdad when he was arrested two years ago, is charged with 22 counts connected to the largest leak of state secrets in US history.

    In the motion, published in redacted form on his website, Coombs renews his long-standing efforts to compel the US government to hand over information that could prove crucial in preparing Manning’s defence.

    He accuses the army of continuing to resist its legal obligations to disclose anything that could help Manning prove his innocence or achieve a lighter sentence.

    The motion is one of several defence motions that have been submitted to the court and that will be the subject of a pre-trial hearing at Fort Meade in Maryland. Manning himself is likely to attend the hearing, which comes three months before a full trial, which is scheduled for 21 September.

    The language of Coombs’s legal submission suggests that the lawyer, who himself has a military background, is growing increasingly frustrated by the obfuscations and alleged sleights of hand played by the prosecution.

    In recent motions, the lawyer has accused the US government of preventing Manning from having a fair trial.

    Coombs paints an almost Kafkaesque world in which the military authorities play word games in order to keep deflecting his requests for disclosure.

    Sometimes the government says that the defense is being “too narrow” in its requests, at other times “too broad”.

    Coombs comments sarcastically: “The defence believes that no defence discovery request would ever be ‘just right’ to satisfy Goldilocks.”

    When the defence asked to see “damage assessments” or “investigations” that the government had carried out into the likely impact of WikiLeaks, he was told none existed.

    After much effort was expended, Coombs managed to get the government to admit that what he should have asked for – according to its vocabulary – was “working papers”.

    “By morphing, distorting and constantly changing definitions, the government is trying to ‘define’ itself out of producing relevant discovery,” Coombs complains. “It cannot be permitted to do this.”

    Ed Pilkington in New York
    guardian.co.uk, Sunday 3 June 2012 21.10 BST

    © 2012 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Find this story at

    Little hope for robust scrutiny of undercover cops

    If the first official review of undercover policing is to set the tone for the next dozen or so evaluations to come, there is not much hope. Of all reviews, this is the only one focusing on the activities of Mark Kennedy specifically and the supervision of undercover officers by the National Public Order Intelligence Unit (NPOIU) more generally.

    police units which provide intelligence on crimina
    HMIC Report into domestic extremists units disgust

    Scripties en rapporten over etnisch profileren

    Etnisch profileren binnen het politie en justitie apparaat lijkt steeds meer aandacht te krijgen. Lijkt omdat in de jaren negentig ook al onderzoek werd gedaan naar het selectieve optreden van de politie. Hier een overzicht van de afstudeerscripties en rapporten uit binnen- en buitenland. Niet al het onderzoek is opgenomen. Veel theoretisch werk wordt niet gepresenteerd, alleen een overzichtsartikel en een literatuurstudie. De scripties en rapporten gaan over de praktijk van de politie.

    lees meer

    National Lawyers Guild Attorneys Accuse City of Sensational Charges Applied to NATO Protesters

    Use of terrorism-related charges by police stem from infiltration, provocation according to defense attorneys

    Chicago, IL – Three NATO protesters were brought before a bond judge today on charges of possession of explosives or incendiary devices, material support for terrorism, and conspiracy. For the first time since a Wednesday night raid on a Bridgeport home where activists were staying, the State’s Attorney’s Office read a laundry list of allegations and sought $5 million cash bonds for each of them. However, after hearing from National Lawyers Guild (NLG) attorneys defending the three Occupy activists, Cook County Judge Edward Harmening imposed a $1.5 million D-Bond.

    During the Wednesday night house raid, police broke down the doors of multiple apartment units with guns drawn and searched residences without a warrant or consent. In addition to 9 arrests made that night, NLG attorneys believe that two undercover police or confidential informants were arrested with the others and were later released. Of the 9 activists arrested, 6 were released without any charges despite being shackled for at least 18 hours in solitary confinement and denied access to attorneys.

    “These sensational accusations are unfounded and contradict the accounts of other detained witnesses and released arrestees,” said NLG attorney Michael Deutsch with the People’s Law Office. “This effort to vilify protesters smacks of entrapment based on manufactured crimes, and is a common tactic of law enforcement during National Special Security Events.” In the bond hearing, the State’s Attorney said that the defendants were self-described anarchists, yet no such political beliefs were expressed by any of them.

    During the raid, police seized computers, cell phones and home brew-making equipment among other items. However, police have not yet disclosed the search warrant or the affidavit of probable cause. The 3 defendants, Jared Chase, Brent Betterly, and Brian Jacob Church, will appear again in Cook County Court, Branch 98 at 2600 South California on Tuesday at 11:30am to determine how the State’s Attorney will proceed with the criminal cases.

    Just last week, all three defendants were surrounded by several police squad cars outside of a CVS, detained for no apparent reason and asked questions about why they were in Chicago and what they planned to do during the NATO summit. One of the defendants recorded the encounter and posted an edited version on YouTube. When Superintendent McCarthy questioned the validity of the footage in the media, the entire video was quickly posted.

    More than two-dozen people have been arrested so far in the lead up to the NATO summit, which begins tomorrow. At least 7 arrestees in addition to the ones with terrorism-related charges are currently in custody. The NLG is staffing a 24-hour hotline, as well as dispatching dozens of Legal Observers to record police misconduct and representing anyone arrested during the demonstrations.

    Revealed: Hundreds of words to avoid using online if you don’t want the government spying on you (and they include ‘pork’, ‘cloud’ and ‘Mexico’)

    Department of Homeland Security forced to release list following freedom of information request
    Agency insists it only looks for evidence of genuine threats to the U.S. and not for signs of general dissent

    Revealing: A list of keywords used by government analysts to scour the internet for evidence of threats to the U.S. has been released under the Freedom of Information Act

    The Department of Homeland Security has been forced to release a list of keywords and phrases it uses to monitor social networking sites and online media for signs of terrorist or other threats against the U.S.

    The intriguing the list includes obvious choices such as ‘attack’, ‘Al Qaeda’, ‘terrorism’ and ‘dirty bomb’ alongside dozens of seemingly innocent words like ‘pork’, ‘cloud’, ‘team’ and ‘Mexico’.

    Released under a freedom of information request, the information sheds new light on how government analysts are instructed to patrol the internet searching for domestic and external threats.

    The words are included in the department’s 2011 ‘Analyst’s Desktop Binder’ used by workers at their National Operations Center which instructs workers to identify ‘media reports that reflect adversely on DHS and response activities’.

    Department chiefs were forced to release the manual following a House hearing over documents obtained through a Freedom of Information Act lawsuit which revealed how analysts monitor social networks and media organisations for comments that ‘reflect adversely’ on the government.

    However they insisted the practice was aimed not at policing the internet for disparaging remarks about the government and signs of general dissent, but to provide awareness of any potential threats.

    As well as terrorism, analysts are instructed to search for evidence of unfolding natural disasters, public health threats and serious crimes such as mall/school shootings, major drug busts, illegal immigrant busts.

    The list has been posted online by the Electronic Privacy Information Center – a privacy watchdog group who filed a request under the Freedom of Information Act before suing to obtain the release of the documents.

    In a letter to the House Homeland Security Subcommittee on Counter-terrorism and Intelligence, the centre described the choice of words as ‘broad, vague and ambiguous’.

    Threat detection: Released under a freedom of information request, the information sheds new light on how government analysts are instructed to patrol the internet searching for domestic and external threats

    They point out that it includes ‘vast amounts of First Amendment protected speech that is entirely unrelated to the Department of Homeland Security mission to protect the public against terrorism and disasters.’

    Find this story at

    By Daniel Miller

    PUBLISHED: 09:32 GMT, 26 May 2012 | UPDATED: 17:46 GMT, 26 May 2012

    Part of the Daily Mail, The Mail on Sunday & Metro Media Group
    © Associated Newspapers Ltd

    Pentagon to expand cybersecurity program for defense contractors

    The Pentagon is expanding and making permanent a trial program that teams the government with Internet service providers to protect defense firms’ computer networks against data theft by foreign adversaries.

    It is part of a larger effort to broaden the sharing of classified and unclassified cyberthreat data between the government and industry in what Defense Department officials say is a promising collaboration between the public and private sectors.

    “The expansion of voluntary information sharing between the department and the defense industrial base represents an important step forward in our ability to stay current with emerging cyberthreats,” Ashton B. Carter, deputy secretary of defense, said in announcing the move Friday.

    Carter said that industry’s increased reliance on the Internet for daily business has exposed large amounts of sensitive information held on network servers to the risk of digital theft. Corporate cyber-espionage has reached epidemic scale, experts and officials say, with much of the activity traced to China and Russia.

    Begun a year ago, the Defense Industrial Base enhanced pilot program included 17 companies that volunteered to have commercial carriers such as Verizon and AT&T scan e-mail traffic entering their networks for malicious software. Outgoing traffic that shows signs of being redirected to illegitimate sites is blocked so that it does not fall into an adversary’s hands.

    A study in November by Carnegie Mellon University said that the pilot program showed the public-private model could work but that initial results on the efficacy of the National Security Agency measures were mixed, with the most value going to companies with less mature network defenses.

    The report also said companies reported large numbers of false positives in detecting traffic to illegitimate sites. That flaw largely has been fixed, officials said.

    One telecom industry official familiar with the program said he thought the results were better than reflected in the report. “There are a lot of opportunities for improving,” said the official, who was not authorized to speak on the record. For instance, the official said, “the longer it takes NSA to provide the data” to the carriers, the less useful the program will be. Overall, the official said, “we think it was a successful model.”

    U.S. officials said that after initial difficulties, the program has become more effective, so much so that senior officials agreed at a White House meeting Thursday to expand it and make it permanent.

    “It’s the best example of information sharing that helps in an operational way,” said Eric Rosenbach, deputy assistant secretary of defense for cyber-policy. “We haven’t heard of any other country that’s doing anything like this — a really collaborative relationship between government and private sector.”

    Rosenbach acknowledged that the program was not perfect. “We’re definitely not claiming this is the silver bullet when it comes to cybersecurity for the defense firms,” he said. “It is an additional tool they can use to mitigate some of the risk of attacks.”

    The carriers are using classified threat data or indicators provided by the NSA to screen the traffic, as well as unclassified threat data provided by the Department of Homeland Security. DHS reviews all the screening data before it goes to the carriers.

    The companies may turn over results of the screening to the government. The data would go to DHS and could be shared with agencies such as the NSA and FBI, but with strict privacy protections, officials said.

    Rosenbach said that although the NSA should get feedback on how effective its measures are, the agency does not deal directly with the carriers or companies. And, he said, no information that can identify a person is shared with the government.

    Still, privacy concerns are high, especially as Congress considers legislation to foster a broader exchange of cyberthreat data between the government and industry.

    “Having the NSA provide classified cyberattack signatures to network operators to help them protect their networks . . . is far preferable to having the NSA scan private networks for those signatures,” said Greg Nojeim, senior counsel at the Center for Democracy & Technology. “However, the flow of information back to the government raises significant privacy concerns in the program and in the pending cybersecurity legislation.”

    The cybersecurity program will remain voluntary, officials said. As of December, companies have had to pay their Internet carrier for the service. It is unclear how many of the roughly 8,000 eligible defense contractors will sign up.

    Find this story at

     

    By Ellen Nakashima, Published: May 11

    © The Washington Post Company

    Fidel Castro was a ‘supreme, unchallenged spymaster whose double agents duped the CIA for decades’, according to new book

    For almost three decades after Fidel Castro took power, Cuba’s budding intelligence service fielded four dozen double agents in a world-class operation under the nose of the CIA, according to a new book by a veteran CIA analyst.

    It was not until June 1987, when a Cuban spy defected to the U.S. Embassy in Vienna, blind-siding U.S. intelligence services, that the CIA learned how badly it had been duped, writes Brian Latell, a retired veteran CIA analyst and Cuba specialist.
    ‘Castro was a supreme, unchallenged spy master,’ Latell told an audience at a recent book reading.

    The revelations in Latell’s book help explain how Castro survived several well-documented assassination attempts and the impoverished island of Cuba weathered the changes that toppled other communist regimes in the late 20th Century.

    ‘In the annals of modern spycraft it’s a pretty extraordinary accomplishment. It’s difficult to keep one double agent in play, and he managed them all … down to the minute details,’ added Latell, author of Castro’s Secrets, the CIA and Cuba’s Intelligence Machine.

    Latell began watching Cuba in the mid-1960s and served as U.S. National Intelligence Officer for Latin America before retiring from the CIA in 1998.

    All four dozen double agents were recruited in Cuba and other parts of the world and personally run by Castro. He favored young, rough-hewn, impressionable teens without a university education.

    ‘Castro wanted them to be uncontaminated by the old Cuba. He wanted them to be malleable and enthusiastic,’ Latell says.

    While Cuba has trumpeted its success with double agents in the past, Latell’s book shows the penetration was more extensive than previously known, and compromised U.S. intelligence sources and methods.

    The defection in 1987 of Florentino Aspillaga finally alerted the CIA to the extent of Castro’s spy network. ‘They were in a state of shock. Nothing like this had ever happened to us before,’ said Latell.

    Aspillaga was ‘the most informed and highly decorated officer ever to defect from Cuban intelligence’, Latell says, and his defection was a turning point in the CIA’s attitude toward Cuba.

    ‘Until that point we grossly underestimated the Cubans. We never imagined that little Cuba could run an intelligence service that was world class,’ he says.

    Counter-intelligence operations were subsequently stepped up. After only four Cubans spies were arrested between 1959 and 1995, that number rose more than ten-fold between 1998 and 2011, Latell writes in his book.

    Aspillaga was recruited as a spy at age 16 and spent 25 years in Cuban intelligence. His defection provided ‘some of the most precious secrets including the double agents,’ says Latell, who interviewed him over several days in 2007.

    The interview was conducted at the request of Aspillaga, who said he simply wanted to tell his story.

    Aspillaga also shared an unpublished memoir with Latell, asking for no payment or favor in return.

    The former agent now lives with a new identity after surviving an assassination attempt in London in 1988.

    Aspillaga is just one of a dozen defectors Latell interviewed in the book, which relies on thousands of pages of declassified CIA documents the author reviewed at the National Archives in Maryland, as well as interviews with several CIA officers.

    In the book, Latell reveals that Cuban intelligence knew more about the 1963 assassination of President John F. Kennedy than they admitted at the time, including information about the shooter, Lee Harvey Oswald.

    Aspillaga told the CIA that in his first year he was trained to do radio intercept work, listening for CIA transmissions to spies on the island and incursions by sea.

    On November 22, 1963, the day of the assassination, he was ordered to stop all CIA tracking efforts and redirect his antennas away from Miami and direct them toward Texas.

    Castro knew Kennedy was to be fired upon, Latell says Aspillaga told him.

    The Warren Commission never attributed a motive to Oswald but Latell argues Oswald was fascinated with Castro and ‘his motive was to protect Fidel’.

    It is well known Oswald met Cuban officials during visits to Cuba’s Mexican consulate in the summer of 1963, but there is no evidence he ever worked directly for Cuban intelligence.

    Latell says that while Cuban agents had kept track of Oswald, his research found no evidence linking Castro to the assassination. Instead, Latell has his own more nuanced theory.

    Castro and his intelligence officers ‘were complicit in Kennedy’s death’, Latell writes, ‘but … their involvement fell short of an organized assassination plot’.

    Cuban intelligence officers ‘exhorted Oswald’ and ‘encouraged his feral militance’, he writes, ‘but it was his Oswald’s plan and his rifle, not theirs’.

    Castro had plenty of reason to want Kennedy out of the way. A Senate Committee found in 1975 that the CIA had pursued assassination as an instrument of foreign policy, with Fidel Castro as one of its prime targets.

    The Committee’s first documented plots against Castro began in 1960, when the CIA contacted organized crime figures eager to return to the good old days of gambling, extortion and corruption in Cuba.

    Subsequent plots involved poison, an exploding seashell and marksmen with high-powered rifles.

    Find this story at 

    Published by Associated Newspapers Ltd

    Part of the Daily Mail, The Mail on Sunday & Metro Media Group
    © Associated Newspapers Ltd

     


    Inhoudsopgave Observant #60, maart 2012

    de elektronische nieuwsbrief van Buro Jansen & Janssen

    Mocht je een interessant artikel hebben over je confrontatie met politie en justitie, een nieuwe wetgeving, onderzoek of scriptie mail het dan ons, info@burojansen.nl.

    01 Inhoudsopgave
    02 Gaan jullie stenen gooien?
    03 Duurzaam afwimpelen
    04 Tilburgse fouilleer-polonaise
    05 Tilburg en preventief fouilleren
    06 Breivik’s misdaad staat niet op zichzelf
    07 Spy Wars
    08 Ethnic profiling in the Netherlands?
    09 Waarborgen bij preventief fouilleren
    10 Jansen & Janssen zoekt nieuwe donateurs

    In deze nieuwsbrief aandacht voor studenten die in de gaten worden gehouden door de inlichtingendienst, het duurzaam inkoopbeleid van de overheid, fouilleren in Tilburg, Breivik, Spy Wars uit de jaren zestig, etnisch profileren in Nederland en allerhande andere zaken.

    Ook voor 2012 zijn er veel plannen. Natuurlijk een serie nieuwsbrieven met eigen onderzoek, maar ook enkele websites. Een met headlines die dagelijks bij jansen binnenkomen, een website over de inlichtingendiensten en een project website waarbij wij de informatie achter de Wikileaks documenten boven tafel proberen te halen. Tot slot staat ook een magazine over preventief fouilleren op de agenda van 2012. Al die plannen kosten ook geld. Vandaar dat Jansen & Janssen 50 nieuwe donateurs zoekt die maandelijks met 10 euro ons werk ondersteunen. Wordt donateur of vraag familie, vrienden en bekenden donateur te worden. Giro 603904 ten name van Stichting Res Publica, de stichting van Jansen & Janssen.

    Al 25 jaar diepgravend, kritisch en doortastend burgerrechten onderzoek. Buro Jansen & Janssen gewoon inhoud.

     

    ‘Gaan jullie stenen gooien?’

    Inlichtingenoperatie rondom studentenprotest

    Dat studenten actie voeren tegen aangekondigde bezuinigingen op het onderwijs is van alle tijden. Daar is niets staatsondermijnend aan. Des te meer opmerkelijk dat diverse actieve studenten gedurende de acties en betogingen door de Regionale Inlichtingendienst en geheime dienst AIVD benaderd zijn met de vraag informant te worden.
    lees meer

    Duurzaam afwimpelen.

    Hoe duurzaam koopt de overheid in?

    In nota’s stelt de overheid een actief inkoopbeleid voor te staan van duurzaam geproduceerde producten voor haar ambtenaren, alsmede de aanstelling van extern adhoc-personeel gebonden aan sociale voorwaarden. Mooie woorden, maar de praktijk is echter weerbarstig, zo blijkt.
    lees meer

    Tilburgse fouilleer-polonaise

    Preventief fouilleren werd in 2003 met veel tromgeroffel geïntroduceerd in Tilburg, maar de aftocht verliep in stilte, alsof de driehoek moest erkennen dat het middel volstrekt zinloos is geweest.

    “Ultimum remedium, zwaar middel met verstrekkende gevolgen voor persoonlijke levenssfeer, niet lichtvaardig mee omgaan.” Grote woorden werden door bestuur en politiek gebruikt bij de introductie van preventief fouilleren in Tilburg. Een steekincident in de zomer van 2003 en een vechtpartij bleken voldoende om alle zorgvuldigheid met betrekking tot de verstrekkende gevolgen terzijde te schuiven. Een eerder schietincident op een vol terras in de stad zorgde echter niet voor een vergelijkbare reactie.

    lees meer

    << oudere artikelen  nieuwere artikelen >>