• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • THE CIA CAMPAIGN TO STEAL APPLE’S SECRETS

    Van nieuwsblog.burojansen.nl

    RESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept.

    The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released.

    By targeting essential security keys used to encrypt data stored on Apple’s devices, the researchers have sought to thwart the company’s attempts to provide mobile security to hundreds of millions of Apple customers across the globe. Studying both “physical” and “non-invasive” techniques, U.S. government-sponsored research has been aimed at discovering ways to decrypt and ultimately penetrate Apple’s encrypted firmware. This could enable spies to plant malicious code on Apple devices and seek out potential vulnerabilities in other parts of the iPhone and iPad currently masked by encryption.

    The CIA declined to comment for this story.

    The security researchers also claimed they had created a modified version of Apple’s proprietary software development tool, Xcode, which could sneak surveillance backdoors into any apps or programs created using the tool. Xcode, which is distributed by Apple to hundreds of thousands of developers, is used to create apps that are sold through Apple’s App Store.

    The modified version of Xcode, the researchers claimed, could enable spies to steal passwords and grab messages on infected devices. Researchers also claimed the modified Xcode could “force all iOS applications to send embedded data to a listening post.” It remains unclear how intelligence agencies would get developers to use the poisoned version of Xcode.

    Researchers also claimed they had successfully modified the OS X updater, a program used to deliver updates to laptop and desktop computers, to install a “keylogger.”

    Other presentations at the CIA conference have focused on the products of Apple’s competitors, including Microsoft’s BitLocker encryption system, which is used widely on laptop and desktop computers running premium editions of Windows.

    The revelations that the CIA has waged a secret campaign to defeat the security mechanisms built into Apple’s devices come as Apple and other tech giants are loudly resisting pressure from senior U.S. and U.K. government officials to weaken the security of their products. Law enforcement agencies want the companies to maintain the government’s ability to bypass security tools built into wireless devices. Perhaps more than any other corporate leader, Apple’s CEO, Tim Cook, has taken a stand for privacy as a core value, while sharply criticizing the actions of U.S. law enforcement and intelligence agencies.

    “If U.S. products are OK to target, that’s news to me,” says Matthew Green, a cryptography expert at Johns Hopkins University’s Information Security Institute. “Tearing apart the products of U.S. manufacturers and potentially putting backdoors in software distributed by unknowing developers all seems to be going a bit beyond ‘targeting bad guys.’ It may be a means to an end, but it’s a hell of a means.”

    Apple declined to comment for this story, instead pointing to previous comments Cook and the company have made defending Apple’s privacy record.

    lockheed
    Lockheed Martin Dulles Executive Plaza, Herndon, Virginia.
    SECURITY RESEARCHERS from Sandia National Laboratories presented their Apple-focused research at a secret annual CIA conference called the Trusted Computing Base Jamboree. The Apple research and the existence of the conference are detailed in documents provided to The Intercept by National Security Agency whistleblower Edward Snowden.

    The conference was sponsored by the CIA’s Information Operations Center, which conducts covert cyberattacks. The aim of the gathering, according to a 2012 internal NSA wiki, was to host “presentations that provide important information to developers trying to circumvent or exploit new security capabilities,” as well as to “exploit new avenues of attack.” NSA personnel also participated in the conference through the NSA’s counterpart to the CIA’s Trusted Computing Base, according to the document. The NSA did not provide comment for this story.

    The Jamboree was held at a Lockheed Martin facility inside an executive office park in northern Virginia. Lockheed is one of the largest defense contractors in the world; its tentacles stretch into every aspect of U.S. national security and intelligence. The company is akin to a privatized wing of the U.S. national security state — more than 80 percent of its total revenue comes from the U.S. government. Via a subsidiary, Lockheed also operates Sandia Labs, which is funded by the U.S. government. The lab’s researchers have presented Apple findings at the CIA conference.

    “Lockheed Martin’s role in these activities should not be surprising given its leading role in the national surveillance state,” says William Hartung, director of the Arms and Security Project at the Center for International Policy and author of Prophets of War, a book that chronicles Lockheed’s history. “It is the largest private intelligence contractor in the world, and it has worked on past surveillance programs for the Pentagon, the CIA and the NSA. If you’re looking for a candidate for Big Brother, Lockheed Martin fits the bill.”

    The Apple research is consistent with a much broader secret U.S. government program to analyze “secure communications products, both foreign and domestic” in order to “develop exploitation capabilities against the authentication and encryption schemes,” according to the 2013 Congressional Budget Justification. Known widely as the “Black Budget,” the top-secret CBJ was provided to The Intercept by Snowden and gives a sprawling overview of the U.S. intelligence community’s spending and architecture. The White House did not respond to a request for comment.

    As of 2013, according to the classified budget, U.S. intelligence agencies were creating new capabilities against dozens of commercially produced security products, including those made by American companies, to seek out vulnerabilities.

    Last week, CIA Director John Brennan announced a major reorganization at the agency aimed, in large part, at expanding U.S. cyber-operations. The Information Operations Center, which organized the Jamboree conferences, will be folded into a new Directorate of Digital Innovation. Notwithstanding its innocuous name, a major priority of the directorate will be offensive cyberattacks, sabotage and digital espionage. Brennan said the CIA reorganization will be modeled after the agency’s Counterterrorism Center, which runs the U.S. targeted killing and drone program.

    THE DOCUMENTS do not address how successful the targeting of Apple’s encryption mechanisms have been, nor do they provide any detail about the specific use of such exploits by U.S. intelligence. But they do shed light on an ongoing campaign aimed at defeating the tech giant’s efforts to secure its products, and in turn, its customers’ private data.

    “Spies gonna spy,” says Steven Bellovin, a former chief technologist for the U.S. Federal Trade Commission and current professor at Columbia University. “I’m never surprised by what intelligence agencies do to get information. They’re going to go where the info is, and as it moves, they’ll adjust their tactics. Their attitude is basically amoral: whatever works is OK.”

    Bellovin says he generally supports efforts by U.S. intelligence to “hack” devices — including Apple’s — used by terrorists and criminals, but expressed concern that such capabilities could be abused. “There are bad people out there, and it’s reasonable to seek information on them,” he says, cautioning that “inappropriate use — mass surveillance, targeting Americans without a warrant, probably spying on allies — is another matter entirely.”

    In the top-secret documents, ranging from 2010 through 2012, the researchers appear particularly intent on extracting encryption keys that prevent unauthorized access to data stored — and firmware run — on Apple products.

    “The Intelligence Community (IC) is highly dependent on a very small number of security flaws, many of which are public, which Apple eventually patches,” the researchers noted in an abstract of their 2011 presentation at the Jamboree. But, they promised, their presentation could provide the intelligence community with a “method to noninvasively extract” encryption keys used on Apple devices. Another presentation focused on physically extracting the key from Apple’s hardware.

    A year later, at the 2012 Jamboree, researchers described their attacks on the software used by developers to create applications for Apple’s popular App Store. In a talk called “Strawhorse: Attacking the MacOS and iOS Software Development Kit,” a presenter from Sandia Labs described a successful “whacking” of Apple’s Xcode — the software used to create apps for iPhones, iPads and Mac computers. Developers who create Apple-approved and distributed apps overwhelmingly use Xcode, a free piece of software easily downloaded from the App Store.

    The researchers boasted that they had discovered a way to manipulate Xcode so that it could serve as a conduit for infecting and extracting private data from devices on which users had installed apps that were built with the poisoned Xcode. In other words, by manipulating Xcode, the spies could compromise the devices and private data of anyone with apps made by a poisoned developer — potentially millions of people. “Trying to plant stuff in Xcode has fascinating implications,” says Bellovin.

    The researchers listed a variety of actions their “whacked” Xcode could perform, including:

    — “Entice” all Mac applications to create a “remote backdoor” allowing undetected access to an Apple computer.

    — Secretly embed an app developer’s private key into all iOS applications. (This could potentially allow spies to impersonate the targeted developer.)

    — “Force all iOS applications” to send data from an iPhone or iPad back to a U.S. intelligence “listening post.”

    — Disable core security features on Apple devices.

    THE INTELLIGENCE COMMUNITY IS HIGHLY DEPENDENT ON A VERY SMALL NUMBER OF SECURITY FLAWS, MANY OF WHICH ARE PUBLIC, WHICH APPLE EVENTUALLY PATCHES.
    For years, U.S. and British intelligence agencies have consistently sought to defeat the layers of encryption and other security features used by Apple to protect the iPhone. A joint task force comprised of operatives from the NSA and Britain’s Government Communications Headquarters, formed in 2010, developed surveillance software targeting iPhones, Android devices and Nokia’s Symbian phones. The Mobile Handset Exploitation Team successfully implanted malware on iPhones as part of WARRIOR PRIDE, a GCHQ framework for secretly accessing private communications on mobile devices.

    That program was disclosed in Snowden documents reported on last year by The Guardian. A WARRIOR PRIDE plugin called NOSEY SMURF allowed spies to remotely and secretly activate a phone’s microphone. Another plugin, DREAMY SMURF, allowed intelligence agents to manage the power system on a phone and thus avoid detection. PARANOID SMURF was designed to conceal the malware in other ways. TRACKER SMURF allowed ultra-precise geolocating of an individual phone. “[If] its [sic] on the phone, we can get it,” the spies boasted in a secret GCHQ document describing the targeting of the iPhone.

    All of the SMURF malware — including the plugin that secretly turns on the iPhone’s microphone — would first require that agencies bypass the security controls built into the iOS operating system. Spies would either need to hack the phone in order to plant their malware on it, or sneak a backdoor into an app the user installed voluntarily. That was one of the clear aims of the Apple-focused research presented at the CIA’s conference.

    “The U.S. government is prioritizing its own offensive surveillance needs over the cybersecurity of the millions of Americans who use Apple products,” says Christopher Soghoian, the principal technologist at the American Civil Liberties Union. “If U.S. government-funded researchers can discover these flaws, it is quite likely that Chinese, Russian and Israeli researchers can discover them, too. By quietly exploiting these flaws rather than notifying Apple, the U.S. government leaves Apple’s customers vulnerable to other sophisticated governments.”

    Security experts interviewed by The Intercept point out that the SMURF capabilities were already available to U.S. and British intelligence agencies five years ago. That raises the question of how advanced the current capacity to surveil smartphone users is, especially in light of the extensive resources poured into targeting the products of major tech companies. One GCHQ slide from 2010 stated that the agency’s ultimate goal was to be able to “Exploit any phone, anywhere, any time.”

    jobs_stage
    Steve Jobs unveiling the first iPhone on January 9, 2007.
    THE FIRST JAMBOREE took place in 2006, just as Apple was preparing to unveil its highly-anticipated iPhone. In March 2010, according to a top-secret document, during a talk called “Rocoto: Implanting the iPhone,” a presenter discussed efforts to target the iPhone 3G. In addition to analyzing the device’s software for potential vulnerabilities, the presentation examined “jailbreak methods,” used within the iPhone community to free phones from their built-in constraints, that could be leveraged by intelligence agencies. “We will conclude with a look ahead at future challenges presented by the iPhone 3GS and the upcoming iPad,” the abstract noted. Over the years, as Apple updates its hardware, software and encryption methods, the CIA and its researchers study ways to break and exploit them.

    The attempts to target vulnerabilities in Apple’s products have not occurred in a vacuum. Rather, they are part of a vast multi-agency U.S./U.K. effort to attack commercial encryption and security systems used on billions of devices around the world. U.S. intelligence agencies are not just focusing on individual terrorists or criminals — they are targeting the large corporations, such as Apple, that produce popular mobile devices.

    “Every other manufacturer looks to Apple. If the CIA can undermine Apple’s systems, it’s likely they’ll be able to deploy the same capabilities against everyone else,” says Green, the Johns Hopkins cryptographer. “Apple led the way with secure coprocessors in phones, with fingerprint sensors, with encrypted messages. If you can attack Apple, then you can probably attack anyone.”

    According to the Black Budget, U.S. intelligence agencies have tech companies dead in their sights with the aim of breaking or circumventing any existing or emerging encryption or antiviral products, noting the threat posed by “increasingly strong commercial” encryption and “adversarial cryptography.”

    The Analysis of Target Systems Project produced “prototype capabilities” for the intelligence community, enabled “the defeat of strong commercial data security systems” and developed ways “to exploit emerging information systems and technologies,” according to the classified budget. The project received $35 million in funding in 2012 and had more than 200 personnel assigned to it. By the end of 2013, according to the budget, the project would “develop new capabilities against 50 commercial information security device products to exploit emerging technologies,” as well as new methods that would allow spies to recover user and device passwords on new products.

    Among the project’s missions:

    — Analyze “secure communications products, both foreign and domestic produced” to “develop exploitation capabilities against the authentication and encryption schemes.”

    — “[D]evelop exploitation capabilities against network communications protocols and commercial network security products.”

    — “Anticipate future encryption technologies” and “prepare strategies to exploit those technologies.”

    — “Develop, enhance, and implement software attacks against encrypted signals.”

    — “Develop exploitation capabilities against specific key management and authentication schemes.”

    — “[D]evelop exploitation capabilities against emerging multimedia applications.”

    — Provide tools for “exploiting” devices used to “store, manage, protect, or communicate data.”

    — “Develop methods to discover and exploit communication systems employing public key cryptography” and “communications protected by passwords or pass phrases.”

    — Exploit public key cryptography.

    — Exploit Virtual Private Networks, or VPNs, which allow people to browse the Internet with increased security and anonymity.

    The black budget also noted that the U.S. intelligence community partners with “National Laboratories” to conduct the type of research presented at the CIA’s annual Jamboree conference. It confirms the U.S. government’s aggressive efforts to steal encryption and authentication keys, as occurred in the NSA and GCHQ operations against Gemalto, the world’s largest manufacturer of SIM cards, through the use of Computer Network Exploitation attacks. In that case, spy agencies penetrated Gemalto’s internal networks and cyberstalked its employees to steal mass quantities of keys used to encrypt mobile phone communications.

    The CIA’s Information Operations Center is currently the second largest of the spy agency’s specialized centers. It not only conducts cyber-ops, but has operated covertly in other nations, working to develop assets from targeted countries to assist in its cyber-surveillance programs, according to the Black Budget. At times, its personnel brief the president.

    obama_ipad
    U.S. President Barack Obama holds up an iPad.
    AT THE CIA’s Jamboree in 2011, the computer researchers conducted workshops where they revealed the specifics of their efforts to attack one of the key privacy elements of Apple’s mobile devices. These machines have two separate keys integrated into the silicon of their Apple-designed processors at the point of manufacture. The two, paired together, are used to encrypt data and software stored on iPhones and iPads. One, the User ID, is unique to an individual’s phone, and is not retained by Apple. That key is vital to protecting an individual’s data and — particularly on Apple’s latest devices — difficult to steal. A second key, the Group ID, is known to Apple and is the same across multiple Apple devices that use the same processor. The GID is used to encrypt essential system software that runs on Apple’s mobile devices.

    The focus of the security researchers, as described at the CIA conferences, was to target the GID key, which Apple implants on all devices that use the same processors. For instance, Apple’s A4 processor was used in the iPhone 4, the iPod Touch and the original iPad. All of those devices used the same GID. As Apple designs new processors and faster devices that use those processors, the company creates new GIDs. If someone has the same iPhone as her neighbor, they have the exact same GID key on their devices. So, if intelligence agencies extract the GID key, it means they have information useful to compromising any device containing that key.

    At the 2011 Jamboree conference, there were two separate presentations on hacking the GID key on Apple’s processors. One was focused on non-invasively obtaining it by studying the electromagnetic emissions of — and the amount of power used by — the iPhone’s processor while encryption is being performed. Careful analysis of that information could be used to extract the encryption key. Such a tactic is known as a “side channel” attack. The second focused on a “method to physically extract the GID key.”

    Whatever method the CIA and its partners use, by extracting the GID — which is implanted on the processors of all Apple mobile devices — the CIA and its allies could be able to decrypt the firmware that runs on the iPhone and other mobile devices. This would allow them to seek out other security vulnerabilities to exploit. Taken together, the documents make clear that researching each new Apple processor and mobile device, and studying them for potential security flaws, is a priority for the CIA.

    According to the 2011 document describing the Jamboree presentations on Apple’s processor, the researchers asserted that extracting the GID key could also allow them to look for other potential gateways into Apple devices. “If successful, it would enable decryption and analysis of the boot firmware for vulnerabilities, and development of associated exploits across the entire A4-based product-line, which includes the iPhone 4, the iPod touch and the iPad.”

    At the CIA conference in 2012, Sandia researchers delivered a presentation on Apple’s A5 processor. The A5 is used in the iPhone 4s and iPad 2. But this time, it contained no abstract or other details, instructing those interested to contact a CIA official on his secure phone or email.

    “If I were Tim Cook, I’d be furious,” says the ACLU’s Soghoian. “If Apple is mad at the intelligence community, and they should be, they should put their lawyers to work. Lawsuits speak louder than words.”

    tim_cook
    Apple CEO Tim Cook testifies on Capitol Hill in Washington, May 21, 2013.
    FOR YEARS, Apple has included encryption features in the products it sells to consumers. In 2014, the company dramatically broadened the types of data stored on iPhones that are encrypted, and it incorporated encryption by default into its desktop and laptop operating system. This resulted in criticism from leading law enforcement officials, including the FBI director. The encryption technology that Apple has built into its products — along with many other security features — is a virtual wall that separates cybercriminals and foreign governments from customer data. But now, because Apple claims it can no longer extract customer data stored on iPhones, because it is encrypted with a key the company does not know, the U.S. government can be locked out too — even with a search warrant. The FBI director and other U.S. officials have referred to the advent of the encryption era — where previously accessible data and communications may now be off limits because of the security technology protecting them — as “going dark.”

    In the face of this rising challenge to its surveillance capabilities, U.S. intelligence has spent considerable time and resources trying to find security vulnerabilities in Apple’s encryption technology, and, more broadly, in its products, which can be leveraged to install surveillance software on iPhones and Macbooks. “The exploitation of security flaws is a high-priority area for the U.S. intelligence community, and such methods have only become more important as U.S. technology companies have built strong encryption into their products,” says the ACLU’s Soghoian.

    Microsoft has, for nearly a decade, included BitLocker, an encryption technology that protects data stored on a computer, in its Windows operating system. Unlike Apple, which made encryption available to all customers, Microsoft had included this feature only in its more expensive premium and professional versions of Windows, up until a few years ago. BitLocker is designed to work with a Trusted Platform Module, a special security chip included in some computers, which stores the encryption keys and also protects against unauthorized software modification.

    Also presented at the Jamboree were successes in the targeting of Microsoft’s disk encryption technology, and the TPM chips that are used to store its encryption keys. Researchers at the CIA conference in 2010 boasted about the ability to extract the encryption keys used by BitLocker and thus decrypt private data stored on the computer. Because the TPM chip is used to protect the system from untrusted software, attacking it could allow the covert installation of malware onto the computer, which could be used to access otherwise encrypted communications and files of consumers. Microsoft declined to comment for this story.

    In the wake of the initial Snowden disclosures, Apple CEO Tim Cook has specifically denounced the U.S. government’s efforts to compel companies to provide backdoor access to their users’ data.

    “I want to be absolutely clear that we have never worked with any government agency from any country to create a backdoor in any of our products or services. We have also never allowed access to our servers. And we never will,” Cook said last September in announcing Apple’s new privacy policy. More recently, Cook said, “None of us should accept that the government or a company or anybody should have access to all of our private information. This is a basic human right. We all have a right to privacy. We shouldn’t give it up. We shouldn’t give in to scare-mongering.”

    As corporations increasingly integrate default encryption methods and companies like Apple incorporate their own indigenous encryption technologies into easy-to-use text, voice and video communication platforms, the U.S. and British governments are panicking. “Encryption threatens to lead all of us to a very dark place,” declared FBI Director James Comey in an October 2014 lecture at the Brookings Institution. Citing the recent moves by Apple to strengthen default encryption on its operating systems, and commitments by Google to incorporate such tools, Comey said, “This means the companies themselves won’t be able to unlock phones, laptops, and tablets to reveal photos, documents, e-mail, and recordings stored within.”

    Under current U.S. regulations, law enforcement agencies can get a court order to access communications channeled through major tech companies and wireless providers. But if those communications are encrypted through a process not accessible by any involved company, the data is essentially meaningless, garbled gibberish. “In a world in which data is encrypted, and the providers don’t have the keys, suddenly, there is no one to go to when they have a warrant,” says Soghoian. “That is, even if they get a court order, it doesn’t help them. That is what is freaking them out.”

    Comey alleged that “even a supercomputer would have difficulty with today’s high-level encryption,” meaning a “brute force” attempt to decrypt intercepted communications would be ineffective, and, even if successful, time-consuming.

    “Encryption isn’t just a technical feature; it’s a marketing pitch,” Comey added. “But it will have very serious consequences for law enforcement and national security agencies at all levels. Sophisticated criminals will come to count on these means of evading detection. It’s the equivalent of a closet that can’t be opened. A safe that can’t be cracked.”

    A few months after Comey’s remarks, Robert Litt, the general counsel for the Office of the Director of National Intelligence, also appeared at Brookings. “One of the many ways in which Snowden’s leaks have damaged our national security is by driving a wedge between the government and providers and technology companies, so that some companies that formerly recognized that protecting our nation was a valuable and important public service now feel compelled to stand in opposition,” Litt said. He appealed to corporations to embrace “a solution that does not compromise the integrity of encryption technology but that enables both encryption to protect privacy and decryption under lawful authority to protect national security.”

    Green, the Johns Hopkins professor, argues that U.S. government attacks against the products of American companies will not just threaten privacy, but will ultimately harm the U.S. economy. “U.S. tech companies have already suffered overseas due to foreign concerns about our products’ security,” he says. “The last thing any of us need is for the U.S. government to actively undermine our own technology industry.”

    The U.S. government is certainly not alone in the war against secure communications. British Prime Minister David Cameron has suggested that if he is re-elected, he may seek to ban encrypted chat programs that do not provide backdoor access to law enforcement. “Are we going to allow a means of communications which it simply isn’t possible to read?” Cameron said in a speech in England earlier this year. “My answer to that question is: ‘No, we must not.’”

    When the Chinese government recently tried to force tech companies to install a backdoor in their products for use by Chinese intelligence agencies, the U.S. government denounced China. “This is something that I’ve raised directly with President Xi,” President Obama said in early March. “We have made it very clear to them that this is something they are going to have to change if they are to do business with the United States.” But China was actually following the U.S. government’s lead. The FBI has called for an expansion of U.S. law, which would require Apple and its competitors to design their products so that all communications could be made available to government agencies. NSA officials have expressed similar sentiments.

    “Obama’s comments were dripping with hypocrisy,” says Trevor Timm, executive director of the Freedom of the Press Foundation. “Don’t get me wrong, his actual criticism of China for attempting to force tech companies to install backdoors was spot on — now if only he would apply what he said to his own government. Since he now knows backdooring encryption is a terrible policy that will damage cybersecurity, privacy, and the economy, why won’t he order the FBI and NSA to stop pushing for it as well?”

    ———

    Documents published with this article:

    TCB Jamboree 2012 Invitation
    Strawhorse: Attacking the MacOS and iOS Software Development Kit
    TPM Vulnerabilities to Power Analysis and An Exposed Exploit to Bitlocker
    TCB Jamboree 2012
    Apple A4/A5 Application Processors Analysis
    Differential Power Analysis on the Apple A4 Processor
    Secure Key Extraction by Physical De-Processing of Apple’s A4 Processor
    Rocoto: Implanting the iPhone
    Smurf Capability – iPhone
    Black Budget: Cryptanalysis & Exploitation Services – Analysis of Target Systems
    ———

    Andrew Fishman, Alleen Brown, Andrea Jones, Ryan Gallagher, Morgan Marquis-Boire, and Micah Lee contributed to this story.

    Note: An earlier draft of this story incorrectly suggested that the iOS Group ID is used to sign software. An earlier draft also incorrectly stated that Lockheed Martin owns Sandia National Laboratories. Sandia Corporation, a wholly owned subsidiary of Lockheed Martin, operates Sandia National Laboratories as a contractor for the U.S. Department of Energy’s National Nuclear Security Administration.

    Disclosure: Freedom of the Press Foundation, which Trevor Timm represents, has received grant funding from First Look Media, The Intercept’s parent company. Intercept co-founders Glenn Greenwald and Laura Poitras are on the board of the organization.

    Photo: Google Maps; Simon Dawson/Bloomberg/Getty Images; Tony Avelar/Getty Images; Kevin Lamarque/Reuters/Landov; J. Scott Applewhite/AP

    Email the authors: jeremy.scahill@theintercept.com, josh.begley@theintercept.com

    BY JEREMY SCAHILL AND JOSH BEGLEY @jeremyscahill@joshbegley 10 MAR 2015

    Find this story at 10 March 2015

    Copyright firstlook.org

    The Intercept, Mass Surveillance and the State

    Van nieuwsblog.burojansen.nl

    Like a proud father CIA director John Brennan has announced that he’s creating a new directorate to conduct cyberespionage. Never mind all those classified documents published recently by the Intercept which prove that the CIA has been active in the cyber domain for years. While it goes without saying that the CIA’s subversion campaign is unsettling what’s equally thought-provoking is the manner in which the Intercept frames the involvement of the private sector.

    Every year the CIA showcases its latest batch of subversion tools, taking them for a victory lap at a secret conference which internal documents refer to glibly as a “Jamboree.” In 2012 the Jamboree was hosted by Lockheed Martin at a campus in northern Virginia. Journalists at the Intercept describe Lockheed as follows:

    “Lockheed is one of the largest defense contractors in the world; its tentacles stretch into every aspect of U.S. national security and intelligence. The company is akin to a privatized wing of the U.S. national security state — more than 80 percent of its total revenue comes from the U.S. government.”

    Note how this description subtly creates the impression that the ultimate culprit with regard to mass surveillance is the government. Lockheed is merely a “wing” of an overarching “national security state”. All roads lead to U.S. intelligence, it’s all about the state.

    Yet close examination of the history of the CIA yields a different picture. Contractors like Lockheed Martin aren’t a subordinate extension of the national security state. Quite the opposite. It’s probably more accurate to conclude that intelligence agencies, like the NSA, represent a public sector appendage of a much larger corporate power structure whose nexus resides in profound sources of wealth and influence outside of the government. A Deep State, if you will, that’s fundamentally driving what goes on in Washington.

    In the absence of mass public outcry private capital sets the rules. It’s been this way since Ferdinand Lundberg wrote America’s Sixty Families back in 1937. Or perhaps Mr. Scahill hasn’t glimpsed politicians on both sides of the aisle trotting out in front of billionaires to audition for public office?

    Hence there is a recurring theme in L’affaire Snowden that arises from the Intercept’s coverage of mass surveillance. Focus is maintained almost exclusively on the government without acknowledging the central role that corporations play. According to the Intercept’s worldview hi-tech companies are but helpless pawns being coerced and assailed by runaway security services rather than willing symbiotic accomplices that directly benefit from the global panopticon.

    Honestly, doesn’t Ed Snowden have more information on Booz Allen?

    When a doctor is faced with a serious medical condition the diagnosis typically informs the subsequent course of treatment. So it is with mass surveillance. Only in the case of mass surveillance the diagnosis is being shaped by certain actors to fit a preconceived solution. The agenda of the far right is clear. Nothing short of corporate feudalism. Libertarian political operator Grover Norquist boldly spelled it out: “I don’t want to abolish government. I simply want to reduce it to the size where I can drag it into the bathroom and drown it in the bathtub.”

    A messaging scheme which depicts the government as the chief villain is a godsend for people who are itching for reasons to demolish the state. Techno libertarians rejoice and present the public with their version of salvation. “Crypto everywhere” roar CEOs across Silicon Valley. How predictably shallow and self-serving. Their counter-surveillance talking points provide them with something new to sell us. It also absolves them of responsibility while redirecting the public’s attention away from more far-reaching systemic measures.

    In light of this it’s hard not to notice the various twists of fate in L’affaire Snowden. Classified documents gradually trickled into the public record thanks to a whistle-blower who donated money to Ron Paul and exhibited some decidedly right-wing inclinations online. A copy of the classified documents were provided to a journalist who wrote a policy whitepaper for the CATO Institute (formerly known as the Charles Koch Foundation). Then out of the woodwork appears a kindly libertarian billionaire who dazzles the said journalist with fame and fortune, “a dream opportunity that was impossible to decline.”

    The product of coincidence? To an extent. But what’s undeniable is that a member of the financial elite, a man who has clocked over a dozen visits to the Obama White House, deliberately leveraged his assets to inject himself into the unfolding course of events. Once more the narrative about mass surveillance that his news organization conveys tends to cast corporations as champions against mass surveillance while omitting to acknowledge how they stand to benefit from the global panopticon. It appears that elements within the ruling class would have us believe that the Deep State will solve the very problem that it intentionally created.

    Bill Blunden is an independent investigator whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including The Rootkit Arsenal , and Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex. Bill is the lead investigator at Below Gotham Labs.

    by BILL BLUNDEN
    WEEKEND EDITION MARCH 13-15, 2015

    Find this story at March 2015

    Copyright © CounterPunch

    CIA Aided Program to Spy on U.S. Cellphones

    Van nieuwsblog.burojansen.nl

    WASHINGTON—The Central Intelligence Agency played a crucial role in helping the Justice Department develop technology that scans data from thousands of U.S. cellphones at a time, part of a secret high-tech alliance between the spy agency and domestic law enforcement, according to people familiar with the work.

    The CIA and the U.S. Marshals Service, an agency of the Justice Department, developed technology to locate specific cellphones in the U.S. through an airborne device that mimics a cellphone tower, these people said.

    Today, the Justice Department program, whose existence wasreported by The Wall Street Journal last year, is used to hunt criminal suspects. The same technology is used to track terror suspects and intelligence targets overseas, the people said.

    The program operates specially equipped planes that fly from five U.S. cities, with a flying range covering most of the U.S. population. Planes are equipped with devices—some past versions were dubbed “dirtboxes” by law-enforcement officials—that trick cellphones into reporting their unique registration information.
    The surveillance system briefly identifies large numbers of cellphones belonging to citizens unrelated to the search. The practice can also briefly interfere with the ability to make calls, these people said.

    Some law-enforcement officials are concerned the aerial surveillance of cellphone signals inappropriately mixes traditional police work with the tactics and technology of overseas spy work that is constrained by fewer rules. Civil-liberties groups say the technique amounts to a digital dragnet of innocent Americans’ phones.

    ….

    The cooperation between technical experts at the CIA and the Marshals Service, which law-enforcement officials have described as a “marriage,” represents one way criminal investigators are increasingly relying on U.S. intelligence agencies for operational support and technical assistance in the wake of the Sept. 11, 2001, attacks. Many Justice Department officials view the joint effort with the CIA as having made valuable contributions to both domestic and overseas operations.

    A CIA spokesman declined to comment on whether the CIA or any other agency uses the devices. Some technologies developed by the agency “have been lawfully and responsibly shared with other U.S. government agencies,” the spokesman said. “How those agencies use that technology is determined by the legal authorities that govern the operations of those individual organizations—not CIA.” He also said the relationship between the Marshals Service and CIA tech experts couldn’t be characterized as a marriage.

    A Justice Department spokesman said Marshals Service techniques are “carried out consistent with federal law, and are subject to court approval.” The agency doesn’t conduct “domestic surveillance, intelligence gathering, or any type of bulk data collection,” the spokesman said, adding that it doesn’t gather any intelligence on behalf of U.S. spy agencies.

    By DEVLIN BARRETT
    Updated March 10, 2015 7:39 p.m. ET

    Find this story at 10 March 2015
    Copyright wsj.com

    CIA looks to expand its cyber espionage capabilities

    Van nieuwsblog.burojansen.nl

    CIA Director John Brennan is planning a major expansion of the agency’s cyber-espionage capabilities as part of a broad restructuring of an intelligence service long defined by its human spy work, current and former U.S. officials said.

    The proposed shift reflects a determination that the CIA’s approach to conventional espionage is increasingly outmoded amid the exploding use of smartphones, social media and other technologies.

    U.S. officials said Brennan’s plans call for increased use of cyber capabilities in almost every category of operations — whether identifying foreign officials to recruit as CIA informants, confirming the identities of targets of drone strikes or penetrating Internet-savvy adversaries such as the Islamic State.

    Several officials said Brennan’s team has even considered creating a new cyber-directorate — a step that would put the agency’s technology experts on equal footing with the operations and analysis branches, which have been pillars of the CIA’s organizational structure for decades.

    U.S. officials emphasized that the plans would not involve new legal authorities and that Brennan may stop short of creating a new directorate. But the suggestion underscores the scope of his ambitions, as well as their potential to raise privacy concerns or lead to turf skirmishes with the National Security Agency, the dominant player in electronic espionage.

    “Brennan is trying to update the agency to make sure it is prepared to tackle the challenges in front of it,” said a U.S. official familiar with the reorganization plan. “I just don’t think you can separate the digital world people operate in from the human intelligence” mission that is the CIA’s traditional domain.

    Like others, the official spoke on the condition of anonymity to discuss internal decision-making.

    The expanded emphasis on cyber is part of a broader restructuring envisioned by Brennan that is expected to break down long-standing boundaries between the CIA’s operations and analysis directorates, creating hybrid “centers” that combine those and other disciplines.

    Brennan is expected to begin implementing aspects of his plan this month, officials said. He recently met with senior members of the House and Senate Intelligence Committees to outline the proposed changes.

    CIA spokesman Dean Boyd declined to comment, saying that “final decisions have not yet been made with respect to agency reorganization efforts.” In a notice to the CIA workforce last year, Brennan said that he had become “increasingly convinced that the time has come to take a fresh look at how we are organized.”

    The changes are designed to replicate the model of the CIA’s Counterterrorism Center, which has surged in size and influence since the Sept. 11, 2001, attacks. The restructuring could lead to new reporting lines for thousands of CIA employees, as long-standing units such the Latin America and Near East divisions give way to new centers that combine analysis, collection and covert operations.

    The National Clandestine Service and the Directorate of Intelligence — the formal names for the operations and analysis branches — would continue to exist, but would focus more on developing talent and resources that could be distributed to the new centers.

    “It would be a huge deal,” said Michael Allen, a former White House and congressional aide who wrote a 2013 book about intelligence reform. Unlike at the FBI and other security agencies, Allen said, “there hasn’t been wholesale structural reform in the CIA post-9/11.”

    Former officials who are familiar with the plan said it has caused generational friction within the CIA’s ranks, with longtime officers resisting changes that younger employees are more eager to embrace.

    The head of the clandestine service recently resigned, in part over objections to the scope of Brennan’s plan, officials said. Brennan quickly replaced him with a longtime officer who had led an internal review panel that broadly endorsed the director’s reform agenda.

    Although limited compared with the larger NSA, the CIA has substantial cyber capabilities. Its Information Operations Center, which handles assignments such as extracting information from stolen laptops and planting surveillance devices, is now second only to the Counterterrorism Center in size, former officials said.

    The CIA also oversees the Open Source Center, an intelligence unit created in 2005 to scour publicly available data, including Twitter feeds, Facebook postings and Web forums where al-Qaeda and other terrorist groups post material.

    Brennan hopes to make the use of such capabilities more pervasive, U.S. officials said, ensuring that expertise and tools that now reside in the Information Operations Center are distributed across the agency.

    The move comes at a time when the CIA has struggled to gain traction against adversaries — including the Islamic State and the Jabhat al-Nusra terrorist group — that recruit and communicate extensively online but operate in combat zones that CIA officers are generally not able to enter.

    But officials said digital changes have transformed even the most conventional cloak-and-dagger scenarios. Secrets that were once obtained by recruiting a source or meeting in a safe house increasingly reside in clouds of digital transmissions that surround espionage targets.

    To recruit a Russian spy, “you may need to manipulate someone’s e-mail, read someone’s e-mail and track the whereabouts of the FSB,” a former official said, referring to the Russian security service. “Cyber is now part of every mission. It’s not a specialized, boutique thing.”

    Beyond elevating the role of the Information Operations Center, U.S. officials said, Brennan is seeking to ensure that the agency is not lagging in other areas, such as counterintelligence work and the CIA’s internal e-mail system.

    Brennan provided only broad outlines of his plan in recent congressional meetings, which excluded all but the four highest-ranking members of the House and Senate intelligence panels. A senior U.S. intelligence official said some senior NSA executives remain in the dark on Brennan’s cyber ambitions.

    In recent years, the CIA has collaborated extensively with the NSA on a range of covert programs, including its drone campaign against al-Qaeda. Documents released by former NSA contractor Edward Snowden showed that e-mails and cellphone signals intercepted by the NSA were used to confirm the identities of targets in strikes.

    But the CIA also has fought budget and bureaucratic battles to maintain its standalone capability, prompting some to view the latest push as an attempt to capi­tal­ize on Washington’s growing alarm over cyberthreats — and the corresponding shifts in federal budgets.

    Former CIA officials said that the agency is mainly concerned about having direct control over the cyber components of its operations and that Brennan’s plans would not encroach on the global surveillance programs run by the NSA. Nor would they interfere with the work of a new agency the Obama administration is creating to fuse intelligence on cyberattacks.

    Brennan’s push to expand the CIA’s cyber capabilities is “entirely appropriate, even overdue,” said Stephen Slick, a former CIA official who directs the Intelligence Studies Project at the University of Texas at Austin. “Advances in digital technology are having a revolutionary impact on the intelligence business, and it’s important for CIA to adapt its collection and covert action missions to account for the new opportunities and dangers.”

    Ellen Nakashima and Julie Tate contributed to this report.

    By Greg Miller February 23

    Find this story at 23 February 2015

    Copyright washingtonpost.com

    Selected extracts of “top” NSA intercepts of French leadership and chief officials, taken from various editions of the National Security Agency’s Top Secret Global SIGINT Highlights executive briefings.

    Van nieuwsblog.burojansen.nl

    EU and French diplomats who strongly criticize U.S. trade policies and call TPP treaty a confrontation against China.
    High-ranking French official complaining about President Sarkozy’s inflammatory and inaccurate statements on WTO that no-one in government backs
    French ministerial agenda for planned G7 and G20 meeting intercepted
    French economy in dire straits according to intercepted communications between French Finance Minister and French Senator
    Spying on French Ambassador who contemplated exposing U.S. misuse of UN Oil-for-food program in Iraq
    NSA Eavesdrops as Hollande Tries End Run Around Merkel on Greek Eurozone Exit
    US Intercepts of France Complaining About US Intercepts of France
    US Spying On Chirac Discussing UN Appointments
    US Spying on Sarkozy Talking Tough on Israel-Palestine
    US Eavesdrops as Sarkozy Plots French Leadership on Financial Crisis
    EU and French diplomats who strongly criticize U.S. trade policies and call TPP treaty a confrontation against China.

    Date 2 August 2011
    Classification TOP SECRET//COMINT//ORCON/NOFORN
    WikiLeaks Synopsis
    Intercepted communication between French Minister-Counselor for Economic and Financial Affiars Jean-Francois Boittin and EU Trade Section head Hiddo Houben, reveals Boittin’s discontent with U.S. approach towards a WTO pact. Additionally Houben stated that the TPP (being an American initiative) seems devised as a confrontation with China.
    Download PDF

    EU Officials Perceive Lack of U.S. Leadership on Trade Issues, Skeptical of Pacific Initiative (TS//SI//OC/NF)

    (TS//SI//OC/NF) Washington-based EU trade officials ascertained in late July that the U.S. administration is severely lacking in leadership when it comes to trade matters, as shown by the absence of a clear consensus on the future course of the WTO Doha Development Agenda (DDA). French Minister-Counselor for Economic and Financial Affairs Jean-Francois Boittin expressed astonishment at the level of “narcissism” and wasteful contemplation currently on display in Washington, while describing the idea of scrapping the DDA in favor of another plan–which some U.S. officials are seen to favor–as stupefying. The Frenchman further asserted that once a country makes deep cuts in its trade barriers, as the U.S. has done, it no longer has incentives to offer nor, as a consequence, a strong position from which to negotiate with emerging nations. Boittin’s interlocutor, EU Trade Section head Hiddo Houben, after noting the leadership void in the Office of the U.S. Trade Representative, declared that with regard to the disagreement within his host government on DDA, a political decision must be made about what direction is to be followed. On another subject, Houben insisted that the Trans-Pacific Partnership (TPP), which is a U.S. initiative, appears to be designed to force future negotiations with China. Washington, he pointed out, is negotiating with every nation that borders China, asking for commitments that exceed those countries’ administrative capacities, so as to “confront” Beijing. If, however, the TPP agreement takes 10 years to negotiate, the world–and China–will have changed so much that that country likely will have become disinterested in the process, according to Houben. When that happens, the U.S. will have no alternative but to return to the WTO. Finally, he assessed that this focus on Asia is added proof that Washington has no real negotiating agenda vis-´-vis emerging nations, including China and Brazil, or an actual, proactive WTO plan of action.

    Unconventional

    EU diplomatic

    Z-3/OO/531614-11, 011622Z
    High-ranking French official complaining about President Sarkozy’s inflammatory and inaccurate statements on WTO that no-one in government backs

    Date July 2008
    Classification TOP SECRET//COMINT/NOFORN
    WikiLeaks Synopsis
    Intercepted communication reveals discontent of head of Trade Policy Renaud Lassus regarding some statements from Sarkozy regarding a potential negative impact of a WTO trade negotiation pact on France economy.
    Download PDF

    Sarkozy Remarks on WTO Deemed Injurious to France; Rules Clarity Sought (TS//SI//NF)

    (TS//SI//NF) A high-ranking French treasury official lamented in early July recent inflammatory and inaccurate statements by President Nicolas Sarkozy, statements that the official said were certain to complicate French efforts to balance its national interests with its responsibilities as current EU President. Assuming his duties as head of the Trade Policy and Investment Office in the Treasury and Economic Policy Directorate, Renaud Lassus indicated that Sarkozy’s declaration that there will be no WTO Doha Round accord has effectively set the bar extremely high, while also increasing the chances of a dark scenario in which France finds itself as the lone dissenter on a national level, but responsible as EU President for representing the views of the entire union. The choice for France then becomes one of either capitulating or provoking a crisis within the EU. Paris is totally unprepared to deal with this scenario, Lassus confirmed, as no one wants to try to “spin” the situation in which Sarkozy has placed the country when doing so would be admitting that the President had been wrong in the first place. He further commented that Sarkozy’s assertion that a WTO pact would bring a 20-percent drop in production and the loss of 100,000 French jobs was patently incorrect and believed by no one in the government. As for those who thought that Sarkozy would dampen his rhetoric when France actually assumed the Presidency on 1 July, their hopes were dashed, Lassus insisted, by the President’s most virulent personal attack yet on the EU Trade Commissioner. In other WTO-related commentary, knowledgeable insiders believed that the 21 July WTO ministerial could be disrupted if Rules Committee chairman Guillermo Valles Galmes does not make his intentions clear in advance. If this is not done, it is possible that rules issues will be raised at the ministerial, leading to heated negotiations. In addition, fish subsidies could cause problems. India could threaten to torpedo the ministerial unless it were to get a carve-out on special and differential treatment on fish. This would leave developed countries as the only ones that would have disciplines on fish subsidies and would be unacceptable to Europe and Japan.

    Unconventional

    French, EU, Japanese diplomatic

    Z-3/OO/5427-08, 111833Z; Z-3/OO/5416-08, 111607Z
    French ministerial agenda for planned G7 and G20 meeting intercepted

    Date 2012
    Classification TOP SECRET//COMINT//NOFORN
    WikiLeaks Synopsis
    Intercepted communication reveals French Minister of Economy, Finance, and Industry Francois Baroin’s intentions to emphasize the need for the implementation of the Basel Accords on banking laws in the G7 and G20 meeting in 2012 and his support of the U.S. initiative on oil reserves.
    Download PDF

    G-7/G-20: French Minister to Push U.S. on Banking Reform, Warn Against Stifling Growth (TS//SI//NF)

    (TS//SI//NF) With some messages targeted for the United States, the French Treasury Directorate has drafted talking points for Minister of Economy, Finance, and Industry Francois Baroin to use during meetings of the Group of 7 and Group of 20 on 19 and 20 April, just before the spring meetings of the IMF and World Bank. Baroin will emphasize the need to stay on schedule for implementing the Basel Accords (recommendations on banking laws and regulations), given Washington’s slowness to act. He will also support the U.S. initiative on strategic oil reserves in his remarks on the threat to global growth posed by rising oil prices. While repeatedly reminding his colleagues of the hard choices the EU has made the deal with its financial situation, he will also caution against endangering growth by acting too quickly.

    Unconventional
    French diplomatic

    Z-3/OO/512583-12, 171712Z
    French economy in dire straits according to intercepted communications between French Finance Minister and French Senator

    Date 31 July 2012
    Classification TOP SECRET//COMINT//NOFORN
    WikiLeaks Synopsis
    Intercepted communication reveals that Finance, Economy, and Trade Minister Pierre Moscovici believes the French economic situation was far worse than perceived. Additionally, he remarks about that the situation with the automotive industry was more critical than a pre-retirement unemployment supplement known as AER, which he also thought wouldn’t have had a severe impact on elections (while senator Bourquin thought would have driven voters to right-wing National Front).
    Download PDF

    French Finance Minister Says Economy in Dire Straits, Predicts Two Atrocious Years Ahead (TS//SI//NF)

    (TS//SI//NF) The French economic situation is worse than anyone can imagine and drastic measures will have to be taken in the next 2 years, according to Finance, Economy, and Trade Minister Pierre Moscovici. On 19 July, Moscovici, under pressure to re-establish a pre-retirement unemployment supplement known as the AER, warned that the situation is dire. Upon learning that there are no funds available for the AER, French Senator Martial Bourquin warned Moscovici that without the AER program the ruling Socialist Party will have a rough time in the industrial basin of the country, with voters turning to the right-wing National Front. Moscovici disagreed, asserting that the inability to reinstitute the AER will have no impact in electoral terms, besides, the situation with faltering automaker PSA Peugeot Citroen is more important than the AER. (COMMENT: PSA has announced plans to close assembly plants and lay off some 8,000 workers.) Moscovici warned that the 2013 budget is not going to be a “good news budget,” with the government needing to find at least an additional 33 billion euros ($39.9 billion). Nor will 2014 be a good year. Bourquin persisted, warning that the Socialist Party will find itself in a situation similar to that of Socialist former Spanish President Zapatero, who was widely criticized for his handling of his country’s debt situation. Moscovici countered that it was not Zapatero whose behavior the French government would emulate, but rather Social Democrat former German Chancellor Gerhard Schroeder. (COMMENT: Schroeder, chancellor from 1998 to 2005, was widely credited with helping to restore German competitiveness. He favored shifting from pure austerity measures to measures that encourage economic growth and advocated a common EU financial policy.)

    Unconventional

    French diplomatic

    Z-3/OO/524122-12, 271748Z
    Spying on French Ambassador who contemplated exposing U.S. misuse of UN Oil-for-food program in Iraq

    Date 2004
    Classification TOP SECRET//COMINT
    WikiLeaks Synopsis
    Intercepted communication between French Ambassador in Washington Jean-David Levitte reveals his frustration towards a report he defines “scandalous” regarding a possible misuse of the UN Oil-For-Food (OFF) program by French companies during the regime of Saddam Hussein in Iraq, while he claims some of these French companies where in fact U.S. companies’ subsidiaries and no American company was mentioned in such report. Levitte likely refers to the report filed by the US Senate that accused Russian, British and French politicians of receiving oil allocations from Iraq in exchange for their political alliance. Levitte planned to present a list of such U.S. companies to U.S. Congress and the media.
    Download PDF

    (TS//SI) French Envoy Plans to Release List of U.S. Firms Who Allegedly Profited From OFF

    (TS//SI//REL TO USA, AUS, CAN, GBR and NZL) French Ambassador Jean-David Levitte in Washington plans to respond as early as today to information in the Iraq Survey Group report regarding possible misuse of the UN Oil-for-Food (OFF) program by companies from France and other countries during the former Iraqi regime. The ambassador termed the report scandalous, since it named no U.S. companies and he claimed that many French companies with contracts under the OFF program were actually subsidiaries of U.S. firms that also profited from the business dealings. He therefore planned, with foreign ministry backing, to present a list of these U.S. companies to both the U.S. Congress and the media.

    Unconventional

    French diplomatic

    3/OO/27079-04, 071948Z
    NSA Eavesdrops as Hollande Tries End Run Around Merkel on Greek Eurozone Exit

    Date 22 May 2012
    Classification TOP SECRET//COMINT-GAMMA//ORCON/NOFORN
    WikiLeaks Synopsis
    Intercepted communication reveals that Francois Hollande has approved holding a secret meeting with French officials as well as German opposition (without the knowledge of Merkel) to discuss the euro-zone crisis.
    Download PDF

    French President Approves Secret Eurozone Consultations, Meeting With German Opposition (TS//SI-G//OC/NF)

    (TS//SI-G//OC/NF) French President Francois Hollande has approved holding secret meetings in Paris to discuss the eurozone crisis, particularly the consequences of a Greek exit from the eurozone. On 18 May, Hollande directed Prime Minister (PM) Jean-Marc Ayrault to set up a meeting at the Office of the President (the Elysee) for the following week. Hollande, Ayrault, and “appropriate ministers” would attend, and special emphasis would be given to consequences for the French economy in general and for French banks in particular. Hollande stressed that the meeting would be secret. (COMMENT: The French president seems worried that if word were to get out that Paris is seriously considering the possibility of a Greek exit, it would deepen the crisis.) In addition, secret meetings are to be held in Paris between French officlans and members of the German Social Democratic Party (SPD). Hollande assured the PM that hosting the meeting at the Elysee was “doable,” although Ayrault warned the president to keep the event a secret so as to avoid diplomatic problems. (COMMENT: By “diplomatic problems,” Ayrault is referring to what could happen if German Chancellor Angela Merkel finds out that Hollande is going behind her back to meet with the German opposition.) Earlier reporting reveals that following talks last week in Berlin with Merkel, Hollande complained that nothing of substance was achieved; it was purely for show. Hollande had found the chancellor fixated on the Fiscal Pact and above all on Greece, on which he claimed she had given up and was unwilling to budge. This made Hollande very worried for Greece and the Greek people, who might react by voting for an extremist party. After meeting Merkel, the French president contacted SPD Chairman Sigmair Gabriel and invited him to Paris so that they could talk.

    Foreign Satellite, Unconventional

    French, German governmental

    Z-G/OO/503643-12, 211549Z; Z-G/OO/503541-12, 161711Z
    US Intercepts of France Complaining About US Intercepts of France

    Date 24 March 2010
    Classification TOP-SECRET//COMINT/NOFORN
    WikiLeaks Synopsis
    Intercepted communication between French Ambassador in Washington Pierre Vimont and Sarkozy’s diplomatic advisor Jean-David Levitte, reveals potential topics of discussion for a meeting between Sarkozy and U.S. President, particularly Sarkozy’s frustration regarding Washington step back on a bilateral intelligence cooperation agreement and the U.S. desire to continue spying on France.
    Download PDF

    Sensitive Issues on the Agenda When French, U.S. Presidents Meet Next Week in Washington (TS//SI//NF)

    (TS//SI//NF) French President Sarkozy intends to raise a number of sensitive topics with the U.S. President when the two leaders meet in Washington on 31 March, according to an exchange last week between the French ambassador in Washington Pierre Vimont, and Sarkozy’s diplomatic advisor, Jean-David Levitte. Vimont conveyed that the French President will express his frustration that Washington has backed away from its proposed bilateral intelligence cooperation agreement and Sarkozy intends to continue to push for closure. As Vimont and Levitte understand it, the main sticking point is the U.S. desire to continue spying on France. On the topic of Afghanistan, Levitte noted that Sarkozy is ready to authorize more military trainers but wants clarification on how many are needed, given the conflicting figures from U.S. sources. Another proposed topic was efforts by the European Aeronautic, Defense, and Space Corporation (EADS) to win a tanker aircraft contract with the U.S. military. Vimont revealed cryptically that the deal is moving forward but did not provide any details. Levitte had not expected to put the labeling dispute with Pernod Ricard (the world’s second largest spirits group) on the agenda, but Sarkozy had just spoken to the company’s chairman who had asked the president to intercede on his behalf. (COMMENT: Patrick Ricard, chairman of the Pernod Ricard board of directors, is said to be one of Sarkozy’s wealthy backers.) Vimont characterized the issue as a very political matter in the U.S., and suggested that a direct appeal to the White House might be useful. While Sarkozy intends to broach the issue with the U.S. President, Levitte will talk to the U.S. President’s Economic Adviser and Deputy National Security Adviser. Finally, Levitte expected the two leaders to discuss other pressing subjects including Iran, the Middle East Peace Process, Afghanistan and Pakistan, Yemen, Somalia, the Sahel, Russia, China, Turkey, climate change, and the financial situation of several European countries; however, he provided no details on those topics.

    Unconventional

    French diplomatic

    Z-3/OO/507179-10, 231635Z
    US Spying On Chirac Discussing UN Appointments

    Date 2006
    Classification TOP SECRET//COMINT-GAMMA//ORCON/REL TO USA, AUS, CAN, GBR, NZL
    WikiLeaks Synopsis
    Intercepted communication between French President Jacques Chirac and French Foreign Minister Philippe Douste-Blazy reveals that Chirac gave specific instructions to approach UNSYG Ban Ki-Moon and ask the appointment of Terje Roed-Larsen as Deputy UNSYG or another position of equal responsibility.
    Download PDF

    (TS//SI-G//OC) French President Presses for Selection of Roed-Larsen as Deputy UNSYG

    (TS//SI-G//OC/REL TO USA, AUS, CAN, GBR, NZL) French President Jacques Chirac told Foreign Minister Philippe Douste-Blazy on 23 December to work to ensure that current UN Special Envoy for the Implementation of UNSC Resolution 1559 Terje Roed-Larsen is selected as Deputy UNSYG or at least offered a position of similar responsibility. Chirac spelled out in deliberate fashion exactly how he wanted Douste-Blazy to proceed, instructing him to approach new UNSYG Ban Ki-moon and report back on Ban’s sentiments regarding the deputy post. (COMMENT: Chirac’s detailed orders may be in response to the foreign minister’s propensity, amply demonstrated in the past and the impetus behind a number of presidential reprimands, for making ill-timed or inaccurate remarks.) The President was keen on Roed-Larsen’s selection for several reasons, including his belief that the situation in the Middle East requires a skilled hand with experience in the region and the realization that–for once–France, Russia, and the U.S. all support the same man. Other considerations were that Ban intends to keep Frenchman Jean-Marie Guehenno on as head of the UN Department of Peacekeeping Operations, which is to be divided into two parts, with the newer organization handling logistics. That planned division, however, has drawn fire from Douste-Blazy, who thinks that it would be a catastrophe.

    Unconventional

    French leadership, UN diplomatic

    G/OO/6411-06, 271650Z
    US Spying on Sarkozy Talking Tough on Israel-Palestine

    Date 10 June 2011
    Classification TOP SECRET//COMINT-GAMMA//ORCON/NOFORN
    WikiLeaks Synopsis
    Intercepted communication reveals that Sarkozy was determined to resume peace talks between Israel and Palestine, possibly without the involvement of the U.S.
    Download PDF

    Sarkozy Determined to Proceed With Mideast Initiative, May Pressure U.S. President (TS//SI-G//OC/NF)

    (TS//SI-G//OC/NF) In spite of an apparent lack of interest on the part of some major players, French President Nicolas Sarkozy affirmed on 7 June his determination of go forward with an initiative to restart direct Mideast peace talks between Israel and the Palestinians. It was also disclosed in a conversation between Sarkozy and his foreign minister, Alain Juppe, that consideration was given to including the Quartet in the process; however, they were wary about such an invitation because that group might not bow to Paris’s wishes. Not being a member of the Quartet, they surmised, France would have no control over what transpired in one of its meetings, and if the group elected not to support direct talks, the French initiative would be a non-starter. Another concern centered on the dynamics of the Quartet: the fear in Paris was that in any session involving the EU High Representative for Foreign Affairs and Security Policy, UNSYG Ban Ki-moon, Russian Foreign Minister Sergey Lavrov, and the U.S. Secretary of State, the last two individuals would dominate the proceedings. Finally, the president was giving thought to appealing to Russian President Dmitriy Medvedev for a possible joint initiative without the United States or, as another option, issuing an ultimatum to the U.S. President regarding Palestinian statehood. The ultimatum would demand that Washington back France’s efforts to restart the peace process, failing which Sarkozy would tell the U.S. President that Paris will not side with the U.S. in September (presumably referring to the deliberations in the UN General Assembly on Palestinian statehood).

    Unconventional

    French leadership

    Z-G/OO/513370-11, 091416Z
    US Eavesdrops as Sarkozy Plots French Leadership on Financial Crisis

    Date 2008
    Classification TOP SECRET//COMINT-GAMMA//ORCON/REL TO USA, AUS, CAN, GBR, NZL
    WikiLeaks Synopsis
    Intercepted communication reveals that Sarkozy blamed U.S. Government’s many mistakes for the world economic crisis, and given a lack of engagement by the U.S., France, as EU president at the time, had to take the lead in devising solutions.
    Download PDF

    Sarkozy Sees Himself as Only One Who Can Resolve World Financial Crisis (TS//SI-G//OC)

    (TS//SI-G//OC/REL TO USA, AUS, CAN, GBR, NZL) French President Nicolas Sarkozy considers it his responsibility to Europe and the world to step up to the plate and resolve the world financial crisis. He further declared that he is the only one, given France’s EU Presidency, who can step into the breach at this time. The President blamed many of the current economic problems on mistakes made by the U.S. Government, but believes that Washington is now heeding some of his advice. In his view, this is the first time that the U.S. has not taken the lead in managing a global crisis and France will now take the helm. Sarkozy is determined that the mid-November financial summit, which he proposed, will bring drastic change to the world financial system. Finally, the French President was pleased by some progress made within the EU to ease the crisis and by his excellent working relationship with the British and Spanish prime ministers.

    Unidentified

    French leadership

    G/OO/503290-08, 291640Z

    Find this story at 29 June 2015

    WikiLeaks – Chirac, Sarkozy et Hollande : trois présidents sur écoute

    Van nieuwsblog.burojansen.nl

    WIKILEAKS Les documents obtenus par WikiLeaks et que publie «Libération» révèlent que la NSA a, au moins de 2006 à mai 2012, espionné Jacques Chirac, Nicolas Sarkozy et François Hollande.
    Un adage en vogue dans les milieux du renseignement veut qu’en matière d’espionnage, on n’ait pas d’alliés – ou, à tout le moins, qu’ils ne soient pas forcément des amis. «S’espionner entre amis, cela ne se fait pas», s’était d’ailleurs indignée Angela Merkel en apprenant en octobre 2013, par des révélations du Spiegel, que l’Agence nationale de sécurité (NSA) américaine avait ciblé son téléphone portable. Une sélection de documents que publient Libération et Mediapart en collaboration avec WikiLeaks révèle qu’en France, ce sont trois présidents successifs, et certains de leurs collaborateurs, qui ont été espionnés sur une période allant au moins de 2006, lors du second mandat de Jacques Chirac, à mai 2012, juste après l’installation à l’Elysée de François Hollande.

    Ces documents obtenus par WikiLeaks – regroupés sous le titre «Espionnage Elysée» – consistent notamment en cinq rapports d’analyse émanant de la NSA, sous l’intitulé «Global SIGINT Highlights», autrement dit, des «faits marquants» tirés du renseignement d’origine électromagnétique, les interceptions de communications. Tous sont classés «Top Secret», et destinés à des responsables de la NSA et de la communauté américaine du renseignement ; seuls deux d’entre eux, les plus anciens, sont voués à être partagés au sein des «Five Eyes», l’alliance des services de renseignement des Etats-Unis, de l’Australie, du Canada, de la Nouvelle-Zélande et du Royaume-Uni, les autres étant exclusivement à usage américain. Ces comptes rendus émanent, selon des experts interrogés par WikiLeaks, d’un bureau identifié comme étant celui des Summary Services («le service des synthèses»).

    «SÉLECTEURS»
    On peut y lire, notamment, comment Jacques Chirac a, en 2006, poussé son candidat pour le poste de sous-secrétaire général adjoint des Nations unies, mais aussi que, selon la NSA, le ministre des Affaires étrangères de l’époque, Philippe Douste-Blazy, avait une «propension […] à faire des déclarations inexactes ou inopportunes». On peut y lire aussi – ce qui ne surprendra personne – que Nicolas Sarkozy se voyait, en 2008, comme «le seul homme capable de résoudre la crise financière». Ou qu’il se plaignait, en 2010, du «recul de Washington sur sa proposition d’accord de coopération bilatérale sur le renseignement», accord que les deux interlocuteurs mentionnés dans la note, l’ambassadeur de France à Washington, Pierre Vimont, et le conseiller diplomatique, Jean-David Levitte, attribuaient précisément au «souhait des Etats-Unis de continuer à espionner la France»…

    Le mémo le plus récent date du 22 mai 2012 – soit après la mise en place d’un protocole d’échanges d’informations ­entre la Direction générale de la sécurité extérieure (DGSE) et la NSA, qui remonterait, selon le Monde, à la fin 2011 – et fait état de «réunions secrètes» pour discuter d’une possible sortie de la Grèce de la zone euro, mais également des inquiétudes de Jean-Marc Ayrault quant aux réactions d’Angela Merkel si elle venait à avoir vent de la rencontre entre le nouveau président et l’opposition allemande.

    A vrai dire, si le contenu des notes est classé comme hautement confidentiel, il ne révèle pas pour autant de secrets d’Etat. Il témoigne, en tout état de cause, de l’intérêt porté par la NSA à la France. A ce titre, l’autre type de document obtenu par WikiLeaks est au moins aussi frappant. Il s’agit d’un extrait d’une base de données de la NSA mentionnant une série de numéros de téléphone, fixes et mobiles, identifiés comme des «sélecteurs». Autrement dit, sur la base d’une collecte massive d’informations, l’agence identifie des cibles qui motivent par la suite des recherches précises de contenus. Le tout en fonction de «besoins d’information» formalisés à partir de 2002, qui touchent à la politique intérieure ou aux enjeux économiques.

    Extrait d’une base de données de la NSA montrant les personnalités politiques qu’ils ont ciblé.

    «NOUVELLES POSSIBILITÉS DE COLLECTE»
    Dans cette liste, qui date d’après nos recoupements de l’année 2010, Libération a pu identifier les numéros de portable de membres de l’exécutif – le président Nicolas Sarkozy, les secrétaires d’Etat aux Affaires européennes et au Commerce Jean-Pierre Jouyet et Pierre Lellouche –, mais aussi des cibles plus larges : le standard du ministère des Finances, celui de l’Agriculture, ainsi que l’antenne à l’Elysée du Centre de transmissions gouvernemental, qui dépend du Secrétariat général de la défense et de la sécurité nationale (SGDSN). Ce service est précisément responsable de la sécurisation des communications de l’exécutif, ainsi que de la permanence des liaisons gouvernementales, le «téléphone rouge». Rien n’indique pour autant que les liaisons sécurisées aient, elles, été compromises.

    Parmi les autres noms, la liste témoigne d’une identification plutôt précise des interlocuteurs. Les téléphones mobiles de conseillers du Président, comme le secrétaire général de l’Elysée de l’époque, Claude Guéant, ou Jean-David Levitte, sont aussi listés. Contactés par Libération, ni l’un ni l’autre ne se disent surpris. Le premier juge le procédé «inadmissible». Le second, philosophe, indique être «toujours parti du principe [qu’il était] écouté, et pas seulement par nos amis et partenaires américains».

    On trouve aussi des membres du cabinet ou de l’administration du ministère des Affaires étrangères – son porte-parole d’alors, Bernard Valero, ainsi que Laurence Tubiana, fonctionnaire au Quai d’Orsay qui a été chargée en 2009 des négociations pour la conférence sur le climat de Copenhague. A la différence des autres cibles, cette dernière ne relève d’ailleurs pas de la branche chargée d’intercepter les communications européennes, le «S2C32» (déjà identifié dans le scandale Merkel), mais d’un bureau chargé notamment d’«améliorer l’accès à la cible», d’«accroître les efforts de ciblage et d’exploitation» et de «développer de nouvelles possibi­lités de collecte». En clair, de voir dans quelle mesure il serait possible de pirater son téléphone, voire d’installer des logiciels espions dans son ordinateur.

    Cette sélection de documents ne révèle qu’une partie des activités de la NSA en matière d’espionnage des dirigeants français : rien ne permet de connaître la quantité de comptes rendus d’écoutes ayant été communiqués aux dirigeants de la NSA, et les présidents prennent également des précautions pour évoquer les sujets les plus sensibles – rencontres bilatérales ou communications chiffrées. Mais les documents confirment, en tout état de cause, à quel point les Etats-Unis peuvent s’intéresser au détail des communications de dirigeants de pays alliés. En octobre 2013, le ­député ­socialiste Jean-Jacques Urvoas, rapporteur du projet de loi sur le renseignement, se plaignait d’ailleurs dans les colonnes du Monde que «les Etats-Unis n’ont pas d’alliés, ils n’ont que des cibles ou des vassaux».

    «ZONE GRISE»
    Reste désormais à savoir si ces pratiques se sont poursuivies au-delà de la date des derniers documents que nous publions en collaboration avec WikiLeaks. Sollicité par Libération et Mediapart, l’entourage de François Hollande assure qu’au moment de la visite d’Etat du Président à Washington, en février 2014, «l’engagement a été pris [par Barack Obama] de ne plus pratiquer d’écoutes indifférenciées concernant les services de l’Etat des pays alliés». Egalement sollicités, ni la NSA ni la Maison Blanche n’avaient encore réagi, mardi soir à l’heure du bouclage.

    L’espionnage à l’étranger est l’ultime «zone grise» du renseignement – il est d’ailleurs, en France, le véritable point aveugle du projet de loi sur le renseignement, voué à être adopté ce mercredi. En avril, une résolution de l’Assemblée parlementaire du Conseil de l’Europe préconisait la mise en place d’un «code du renseignement multilatéral». On en est évidemment encore très loin.

    AMAELLE GUITON , ALEXANDRE LÉCHENET , JEAN-MARC MANACH ET AVEC JULIAN ASSANGE 23 JUIN 2015 À 21:55 (MIS À JOUR : 23 JUIN 2015 À 22:56)

    Find this story at 23 June 2015

    Copyright liberation.fr

    NSA Economic Spy Order

    Van nieuwsblog.burojansen.nl

    Information Need (IN) – France: Economic Developments
    EEI: H – Foreign Contracts/Feasibility Studies/Negotiations
    Information Need (IN) – France: Economic Developments

    Date 2012
    Classification SECRET
    WikiLeaks Synopsis
    This classified US intelligence “Information Need” spying order mandates long term economic espionage against France in order to obtain details about the economic activities of French companies and the economic policies and decisions of the French government. Information Needs (IN) are collection requirements extracted from the National SIGINT Requirements List, and are used to broadly justify the interception of communications in order to satisfy generic intelligence demands from U.S. policy makers and the U.S. Intelligence Community. This IN, identified as 2002-204 (first created in 2002 and updated for more than a decade) and referenced in the list of Top NSA French Targets previously published by WikiLeaks, shows which particular information of interest (“Essential Elements of Information”, EEI) the relevant Signals Intelligence units are instructed to collect and report about. Such requirements include France’s economic relations with the United States, other countries and international institutions, France’s financial and trade policies, and its views on G-8 and G-20 agendas. “Supported Elements” are those parts of the US government which are supported by (i.e receive intelligence reports derived from) the espionage.
    Download PDF

    IN Standard Report: S-C-2002-204

    Title : (S//REL TO USA, AUS, CAN, GBR, NZL) France: Economic Developments

    Originator Classification : SECRET//REL TO USA, AUS, CAN, GBR, NZL

    Table of Contents

    EEI A : (U//FOUO) Economic Relations with the United States
    EEI B : (S//REL TO USA, AUS, CAN, GBR, NZL) French Business Practices
    EEI C : (S//REL TO USA, AUS, CAN, GBR, NZL) French Financial/Macroeconomic Policy Development
    EEI D : (U//FOUO) Views On G-8, G-20 Developments/Issues
    EEI E : (U//FOUO) Budgetary Constraints/Contributions To NATO
    EEI F : (S//REL TO USA, AUS, CAN, GBR, NZL) French Views
    EEI G : (U//FOUO) Relations With Least Developed Countries (LDCs) And Transitional States
    EEI H : (U//FOUO) Foreign Contracts/Feasibility Studies/Negotiations
    EEI I : (U//FOUO) Relations With International Financial Institutions
    EEI J : (S//REL TO USA, AUS, CAN, GBR, NZL) French Trade Policies
    EEI K : (U//FOUO) Questionable Trade Activities

    (U//FOUO) Supported Element(s):

    CIA
    COMMERCE
    DHS
    DIA/DI
    DIA/OSR-2
    DIA/USEUCOM
    FEDERAL RESERVE BOARD
    STATE/INR
    TREASURY
    US TRADE REP
    DOE/IN
    EEI: H – Foreign Contracts/Feasibility Studies/Negotiations

    Date 2012
    Classification SECRET//NOFORN
    WikiLeaks Synopsis
    This US economic espionage order (“Essential Elements of Information) for France instructs US spies to collect information on all French sales and financing of significant projects related to telecommunications, electrical generation, gas, oil, nuclear and renewable energy and environmental and healthcare technologies. Most substantially it also mandates the interception and reportage of all French company negotiations and contracts valued at over $200 million. The results of the spying are to be reported to various US trade, political and intelligence agencies (“Supported Elements”).
    Download PDF

    EEI : H

    EEI Classification : SECRET//NOFORN

    Originator EEI Classification : SECRET//REL TO USA, AUS, CAN, GBR, NZL

    EEI Title : (U//FOUO) Foreign Contracts/Feasibility Studies/Negotiations
    Question(s) :

    1. (S//REL TO USA, AUS, CAN, GBR, NZL) Report impending French contract proposals or feasibility studies and negotiations for international sales or investments in major projects or systems of significant interest to the foreign host country or $200 million or more in sales and/or services, including financing information or projects of high interest including:

    A. Information and telecommunications facilities networks and technology?

    B. Electric power, natural gas, and oil facilities and infrastructure to include nuclear power and renewable energy generation?

    C. Transportation infrastructure and technology to include ports, airports, high-speed rail, and subways?

    D. Environmental technologies used domestically and for export?

    E. Health care infrastructure, services, and technologies, including biotechnology developments?

    Find this story at 29 June 2015

    DOSSIER: LA RÉPUBLIQUE SUR ÉCOUTE ENQUÊTE 2006-2012: Hollande, Sarkozy et Chirac écoutés

    Van nieuwsblog.burojansen.nl

    Au-delà des trois chefs d’État français, des ministres, des hauts fonctionnaires, des parlementaires et des diplomates ont été surveillés téléphoniquement pendant près d’une décennie par les services secrets américains, selon des documents obtenus par WikiLeaks.

    Les États-Unis ont placé la République sur écoute. Les présidents François Hollande, Nicolas Sarkozy et Jacques Chirac, ainsi que de nombreux ministres, des hauts fonctionnaires, des parlementaires ou des diplomates, ont été écoutés directement ou par ricochet pendant près d’une décennie par les services secrets américains, selon des documents confidentiels de la National Security Agency (NSA) obtenus par WikiLeaks (lire aussi notre version en anglais de cet article).

    D’après des notes de synthèse de la NSA auxquelles Mediapart et Libération ont eu accès, en collaboration avec WikiLeaks, dans le cadre de l’opération Espionnage Élysée, les interceptions se sont étalées de 2006 à 2012 – mais rien ne dit qu’elles n’ont pas commencé plus tôt et ne se sont pas poursuivies depuis. Toutes classifiées « top secret », ces notes détaillent les dessous d’un espionnage obsessionnel de la France par les États-Unis sur des questions diplomatiques, de politique locale ou économiques de tous ordres.

    Les trois présidents français écoutés par la NSA
    Les trois présidents français écoutés par la NSA © DR
    Que les États-Unis écoutent les principaux dirigeants d’un pays allié comme la France relève pour certains du secret de polichinelle. L’information est désormais prouvée par des documents issus du cœur de l’appareil d’État américain.

    Surtout, les éléments que nous rendons publics à partir d’aujourd’hui (voir ici l’analyse des documents) révèlent l’ampleur jusqu’ici insoupçonnée de l’espionnage états-unien, réalisé en dehors de tout cadre judiciaire et de tout réel contrôle. Car ce ne sont pas seulement les présidents de la République successifs qui ont été écoutés ces dernières années, mais toutes les strates de la puissance publique qui ont été, à un moment ou à un autre, la cible des États-Unis, qu’il s’agisse de directeurs d’administration, de ministres, de conseillers présidentiels et ministériels, de diplomates, de porte-parole. Au sein même de l’Élysée, par exemple, de très nombreuses lignes téléphoniques (fixes ou portables) ont été branchées.

    Déjà passablement écornée par les révélations de l’ancien agent Edward Snowden, l’image de la NSA et, avec elle, des États-Unis ne devrait pas sortir grandie de ces nouvelles révélations, qui jettent une lumière crue sur les pratiques agressives et déloyales de la première puissance mondiale à l’encontre d’un pays normalement considéré comme « ami ». Du moins, en façade.

    Contactée, la NSA n’a pas souhaité faire de commentaire.

    Comme ses deux prédécesseurs de droite, l’actuel président socialiste François Hollande n’a pas échappé à la curiosité des grandes oreilles de Washington. Un rapport du 22 mai 2012 de la NSA fait ainsi explicitement référence à une conversation tenue quatre jours plus tôt entre le président fraîchement élu et son premier ministre de l’époque, Jean-Marc Ayrault. La conversation porte sur la volonté de François Hollande d’organiser des « consultations secrètes » avec l’opposition allemande, concernant l’éventualité d’une sortie de la Grèce de la zone euro – un sujet toujours d’actualité.

    Les analystes de la NSA évoquent dans le même document l’existence de « précédents rapports » concernant des entretiens passés au sujet de la chancelière Angela Merkel. Ce qui laisse donc supposer que les interceptions américaines du président français ont bel et bien été monnaie courante.

    À l’Élysée, on indiquait mardi 23 juin que, sans avoir conservé la trace de cette conversation, celle-ci est « tout à fait crédible ». Mais sur le fond, la présidence de la République n’a souhaité faire aucun commentaire à ce stade. Dans l’entourage du président, on précise toutefois qu’en amont de la rencontre entre François Hollande et Barack Obama, le 11 février 2014 à Washington, puis lors de cette entrevue, « l’engagement a été pris de ne plus pratiquer d’écoutes indifférenciées des services de l’État d’un pays allié ».

    Le directeur général de LR (ex-UMP), Frédéric Péchenard, a communiqué l’information à Nicolas Sarkozy, qui « ne souhaite pas réagir pour l’instant ».

    Comme pour la plupart des documents obtenus par WikiLeaks, le rapport de mai 2012 de la NSA ciblant François Hollande est surmonté de nombreuses initiales qui, une fois décryptées, donnent la mesure du caractère ultrasensible des données désormais publiques. Estampillées « top secret » (TS), ces notes traitent de renseignements obtenus par des interceptions de signaux électroniques (SI pour SIGINT, soit “signal intelligence”) et ne doivent sous aucun prétexte être partagées avec un pays étranger (NF pour NOFORN, soit “no foreigner”).

    La note Hollande est également accompagnée, comme pour de nombreuses autres, de la mention « unconventional », une catégorie particulière dans la nomenclature de la NSA qui correspond aux opérations non conventionnelles.

    LIRE AUSSI
    Revealed: how US tapped phones of three French presidents
    PAR FABRICE ARFI ET JÉRÔME HOURDEAUX ET JULIAN ASSANGE (WIKILEAKS)

    US phone taps on France – why Paris would prefer to keep a low profile
    PAR LÉNAÏG BREDOUX ET MATHIEU MAGNAUDEIX

    WikiLeaks documents on US snooping on France – what the presidents said
    PAR LÉNAÏG BREDOUX ET ELLEN SALVI ET JULIAN ASSANGE (WIKILEAKS)

    France condemns ‘unacceptable’ spying on its presidents
    PAR LÉNAÏG BREDOUX ET MATHIEU MAGNAUDEIX ET ELLEN SALVI

    35 « leaders internationaux » espionnés par la NSA
    PAR LA RÉDACTION DE MEDIAPART

    Espionnage d’intérêts français par le renseignement allemand : la France se tait
    PAR MATHIEU MAGNAUDEIX

    Espionnage : à droite et à gauche, l’allié américain a déçu
    PAR LÉNAÏG BREDOUX ET MATHIEU MAGNAUDEIX ET ELLEN SALVI
    Toujours dans cette même note Hollande figure une petite mention supplémentaire, qui est tout sauf anodine : « Foreign Satellite ». Ce terme, FORNSAT en abrégé, désigne un réseau mondial de stations d’écoutes de la NSA réparties dans les pays alliés. Tous les regards se portent aujourd’hui, sans qu’il soit possible d’en avoir la certitude absolue, vers des antennes satellites allemandes.

    La presse a en effet plusieurs fois fait état ces derniers mois de la sous-traitance par les services secrets allemands (le BND) de l’espionnage américain, ce qui a provoqué une forte indignation en Allemagne et l’ouverture d’une enquête parlementaire qui cherche précisément le type de documents que WikiLeaks a obtenus.

    En dehors de l’actuel chef de l’État français, d’autres hautes personnalités françaises ont été écoutées. D’après les documents en notre possession, sur lesquels nous reviendrons dans les prochains jours, les anciens présidents Nicolas Sarkozy et Jacques Chirac, l’ancien ministre socialiste de l’économie Pierre Moscovici (aujourd’hui commissaire européen) ou l’ex-ambassadeur de France à Washington Pierre Vimont ont ainsi été espionnés.

    Il faut dire que l’appétit de renseignements des États-Unis pour la France relève de la boulimie. Un autre document confidentiel (voir ci-dessous) de la NSA, rédigé sous la présidence Sarkozy (2007-2012), révèle quant à lui la liste des cibles françaises définies par les États-Unis. Sont concernés, pêle-mêle : le portable personnel du président de l’époque, Nicolas Sarkozy, ceux du conseiller diplomatique Jean-David Levitte, du secrétaire général de l’Élysée Claude Guéant, du porte-parole du ministère des affaires étrangères Bernard Valero, de l’ancien ministre Jean-Pierre Jouyet (aujourd’hui secrétaire général de l’Elysée), celui d’un responsable du Quai d’Orsay non identifié, ou du ministre du commerce extérieur Pierre Lellouche.

    La liste des cibles françaises établie par la NSA sous la présidence Sarkozy
    La liste des cibles françaises établie par la NSA sous la présidence Sarkozy
    Pour Claude Guéant, ancien secrétaire général de l’Elysée et ex-ministre de l’intérieur, « cette pratique est scandaleuse ». « Le gouvernement français doit réagir comme il se doit. Au minimum, cela nécessite une explication au plus haut niveau, un engagement absolu à mettre un terme à ces pratiques. Nous nous acheminons vers un monde qui est extrêmement préoccupant, où plus personne n’a plus d’intimité, de confidentialité », se plaint ce proche de Nicolas Sarkozy.

    « Si les Américains ont écouté Merkel, on ne voit pas pourquoi les autres n’auraient pas été écoutés », commente Frédéric Péchenard, ancien patron de la police nationale et actuel directeur général des Républicains. « Mais si l’on veut être capables de se défendre, il faut que nos services soient à la hauteur. Il nous faut des moyens techniques humains et juridiques plus efficaces. Être espionné par ceux qui sont censés être nos amis, ça peut poser un problème d’ordre diplomatique », précise-t-il.

    « Moi qui étais un grand ami de l’Amérique, je le suis de moins en moins », réagit pour sa part le député Pierre Lellouche auprès de Mediapart. « Je ne suis pas surpris. Ça ne m’étonne pas d’avoir été écouté lorsque j’étais au commerce extérieur, ça intéresse beaucoup les Américains, l’espionnage industriel. On a tout le temps ce genre de conversations. C’est d’ailleurs l’argument qu’on nous rétorque en ce moment dans le cadre de la loi sur le renseignement : on est écouté par tout le monde, pourquoi s’empêcher de nous écouter ? On s’écoute de partout. Malheureusement, je le dirai à l’Assemblée nationale, on est dans un imperium global sur le plan économique, où les États-Unis n’hésitent pas à mettre en réseaux la CIA, la NSA, mais aussi la justice américaine, qui ensuite fait des saisines. Je le dénonce sans arrêt », ajoute-t-il.

    D’après les documents de la NSA, les lignes fixes des conseillers africains en poste à l’Élysée et les numéros des… standards des ministères de l’agriculture et des finances sont également visés. On trouve encore dans la liste des cibles l’antenne du Centre de transmission gouvernemental (CTG) situé à l’Élysée. Celui-ci est chargé d’assurer, à l’abri du “secret défense”, la permanence des liaisons gouvernementales et tout particulièrement celles du chef de l’État et du Premier ministre. Un autre numéro, référencé sous l’intitulé « FR VIP AIRCRAFT REL », renvoie après vérification à une ligne de la flotte aérienne du gouvernement, l’Etec, qui dépend de l’armée de l’air.

    Au-delà du scandale que peut susciter aujourd’hui cet espionnage américain, la facilité avec laquelle les États-Unis paraissent pouvoir intercepter la moindre conversation des plus hauts dirigeants français interroge aujourd’hui la faiblesse des capacités de contre-ingérence des services de renseignement français. À ce propos, l’Élysée a coutume de rappeler que sur les questions diplomatiques et militaires, il n’y a jamais eu de fuite quelle qu’elle soit, précisant que s’agissant des sujets les plus sensibles, toutes les précautions sont prises. Jusqu’à preuve du contraire.

    23 JUIN 2015 | PAR FABRICE ARFI ET JÉRÔME HOURDEAUX ET JULIAN ASSANGE (WIKILEAKS)

    Find this story at 23 June 2015

    Copyright mediapart.fr

    Espionnage Élysée (2015)

    Van nieuwsblog.burojansen.nl

    Press Release Top French NSA Targets Top French NSA Intercepts Economic Spy Order

    Today, 29 June 2015, WikiLeaks continues “Espionnage Élysée”, our ongoing publication of a collection of TOP SECRET documents from United States surveillance operations against France.

    Today’s publication comprises seven top secret documents detailing how the US has had a decade- long policy of economic espionage against France, including the interception of all French corporate contracts and negotiations valued at more than $200 million. The documents demonstrate that the US National Security Agency, far from being a rogue organisation, is carrying out an economic espionage policy created by the US Director of National Intelligence. The documents detail the intelligence process, from the tasking of the NSA with collection of desired economic information to the production of developed intelligence reports, which are sent to “Supported Elements” of the US government, including the US Department of Commerce, the US Trade Represenative, the US Treasury and the Central Intelligence Agency.

    Central within the cache of documents are two long-term spying orders (“collection requirements”) which define the kinds of intelligence the NSA is tasked with collecting in its surveillance operations against France. The documents make clear that the NSA has been tasked with obtaining intelligence on all aspects of the French economy, from government policy, diplomacy, banking and participation in international bodies to infrastructural development, business practices and trade activities. The documents establish that the US economic intelligence operations against France have run for more than a decade and started as early as 2002. Some of the documents are authorised for sharing with the “Five Eyes” partners – the group of Anglophone countries in close intelligence co-operation with the United States: Canada, New Zealand, Australia and France’s fellow member state of the European Union, the United Kingdom, strongly suggesting that the United Kingdom has also benefited from the United States’ economic espionage activities against France.

    The cache also includes five TOP SECRET intelligence summaries from US spying on the conversations and communications of French officials. The documents show US spying on the French Finance Minister, a French Senator, officials within the Treasury and Economic Policy Directorate, the French ambassador to the United States, and officials with direct responsibility for EU trade policy. The intercepts reveal internal French deliberation and policy on the World Trade Organization, the Trans-Pacific Partnership Agreement, the G7 and the G20, the 2013 French budget, the decline of the automotive industry in France, and the involvement of French companies in the Oil for Food programme in Iraq during the 1990s.

    WikiLeaks founder Julian Assange said: “The United States has been conducting economic espionage against France for more than a decade. Not only has it spied on the French Finance Minister, it has ordered the interception of every French company contract or negotiation valued at more than $200 million. That covers not only all of France’s major companies, from BNP Paribas, AXA and Credit Agricole to Peugeot and Renault, Total and Orange, but it also affects the major French farming associations. $200 million is roughly 3,000 French jobs. Hundreds of such contracts are signed every year. The United States not only uses the results of this spying itself, but swaps these intercepts with the United Kingdom. Do French citizens deserve to know that their country is being taken to the cleaners by the spies of supposedly allied countries? Mais oui!”

    For French-language interviews/comment regarding Espionnage Élysée please contact WikiLeaks’ Paris-based legal advisor, Juan Branco: Tel. +33 671 19 21 47

    Cartoon
    Today, 23 June 2015, WikiLeaks began publishing “Espionnage Élysée”, a collection of TOP SECRET intelligence reports and technical documents from the US National Security Agency (NSA) concerning targeting and signals intelligence intercepts of the communications of high-level officials from successive French governments over the last ten years.

    The top secret documents derive from directly targeted NSA surveillance of the communications of French Presidents Francois Hollande (2012–present), Nicolas Sarkozy (2007–2012), and Jacques Chirac (1995–2007), as well as French cabinet ministers and the French Ambassador to the United States. The documents also contain the “selectors” from the target list, detailing the cell phone numbers of numerous officials in the Elysee up to and including the direct cell phone of the President.

    Prominent within the top secret cache of documents are intelligence summaries of conversations between French government officials concerning some of the most pressing issues facing France and the international community, including the global financial crisis, the Greek debt crisis, the leadership and future of the European Union, the relationship between the Hollande administration and the German government of Angela Merkel, French efforts to determine the make-up of the executive staff of the United Nations, French involvement in the conflict in Palestine and a dispute between the French and US governments over US spying on France.

    A founding member state of the European Union and one of the five permanent members of the UN Security Council, France is formally a close ally of the United States, and plays a key role in a number of US-associated international institutions, including the Group of 7 (G7), the North Atlantic Treaty Organization (NATO) and the World Trade Organization (WTO).

    The revelation of the extent of US spying against French leaders and diplomats echoes a previous disclosure in the German press concerning US spying on the communications of German Chancellor Angela Merkel and other German officials. That disclosure provoked a political scandal in Germany, eventuating in an official inquiry into German intelligence co-operation with the United States, which is still ongoing.

    While the German disclosures focused on the isolated fact that senior officials were targeted by US intelligence, WikiLeaks’ publication today provides much greater insight into US spying on its allies, including the actual content of intelligence products deriving from the intercepts, showing how the US spies on the phone calls of French leaders and ministers for political, economic and diplomatic intelligence.

    WikiLeaks founder Julian Assange said: “The French people have a right to know that their elected government is subject to hostile surveillance from a supposed ally. We are proud of our work with leading French publishers Liberation and Mediapart to bring this story to light. French readers can expect more timely and important revelations in the near future.”

    Find this story at 29 June 2015

    Trade Secrets : Is the U.S.’s most advanced surveillance system feeding economic intelligence to American businesses? (1999)

    Van nieuwsblog.burojansen.nl

    No one is surprised that the United States uses sophisticated electronic spying techniques against its enemies. But Europeans are increasingly worried about allegations that the U.S. uses those same techniques to gather economic intelligence about its allies.
    The most extensive claims yet came this spring in a report written for the European Parliament. The report says that the U.S.

    National Security Agency, through an electronic surveillance system called Echelon, routinely tracks telephone, fax, and e-mail transmissions from around the world and passes on useful corporate intelligence to American companies.

    Among the allegations: that the NSA fed information to Boeing and McDonnell Douglas enabling the companies to beat out European Airbus Industrie for a $ 6 billion contract; and that Raytheon received information that helped it win a $ 1.3 billion contract to provide radar to Brazil, edging out the French company Thomson-CSF. These claims follow previous allegations that the NSA supplied U.S. automakers with information that helped improve their competitiveness with the Japanese (see “Company Spies,” May/June 1994).

    Is there truth to these allegations? The NSA is among the most secretive of U.S. intelligence agencies and won’t say much beyond the fact that its mission is “foreign signals intelligence.” The companies involved all refused to comment.

    “Since the NSA’s collection capabilities are so grotesquely powerful, it’s difficult to know what’s going on over there,” says John Pike, an analyst at the watchdog group Federation of American Scientists, who has tracked the NSA for years.

    This much is known: The NSA owns one of the largest collections of supercomputers in the world, and it’s an open secret–as documented in the European Parliament report–that Echelon vacuums up massive amounts of data from communications satellites and the Internet and then uses its computers to winnow it down. The system scans communications for keywords–“bomb,” for instance–that might tip off analysts to an interesting topic.

    Fueling allegations of corporate espionage is the fact that defense contractors and U.S. intelligence agencies are linked extensively through business relationships. Raytheon, for instance, has large contracts to service NSA equipment, according to the European report.

    Englishman Glyn Ford, the European Parliament member who initiated the study, wants the NSA to come clean about its activities in Europe. And the Europeans have some leverage on this issue, if they decide to use it. In a drive to improve surveillance, the United States is pressuring European governments to make telephone companies build eavesdropping capabilities into their new systems. But if that’s what the U.S. wants, says Ford, it’s going to have to be open about what information it’s collecting: “If we are going to leave the keys under the doormat for the United States, we want a guarantee that they’re not going to steal the family silver,” he says.

    In the meantime, congressional critics have started to wonder if all that high-powered eavesdropping is limited to overseas snooping. In April, Bob Barr (R-Ga.), a member of the House Government Reform Committee, said he was worried by reports that the NSA was engaged in illicit domestic spying.

    “We don’t have any direct evidence from the NSA, since they’ve refused to provide any reports, even when asked by the House Intelligence Committee,” Barr says. “But if in fact the NSA is pulling two million transmissions an hour off of these satellites, I don’t think there’s any way they have of limiting them to non-U.S. citizens.”

    Last May, after the NSA stonewalled requests to discuss the issue, Congress amended the intelligence appropriations bill to require the agency to submit a report to Congress. (The bill is still in a conference committee.) And the NSA will face more questions when the Government Reform Committee holds hearings on Echelon and other surveillance programs.

    “We ought to prevent any agency from the dragnet approach–where they throw out a net and drag anything in,” Barr says.

    Kurt Kleiner
    Mother Jones November 1, 1999

    Find this story at 1 November 1999

    Copyright Mother Jones

    KGB spy shares details of his escape to Britain in 1985

    Van nieuwsblog.burojansen.nl

    Oleg GordievskyA Soviet double spy, who secretly defected to Britain 30 years ago this month, has revealed for the first time the details of his exfiltration by British intelligence in 1985. Oleg Gordievsky was one of the highest Soviet intelligence defectors to the West in the closing stages of the Cold War. He joined the Soviet KGB in 1963, eventually reaching the rank of colonel. But in the 1960s, while serving in the Soviet embassy in Copenhagen, Denmark, Gordievsky began feeling disillusioned about the Soviet system. His doubts were reinforced by the Soviet invasion of Czechoslovakia in 1968. It was soon afterwards that he made the decision to contact British intelligence.
    Cautiously, Britain’s Secret Intelligence Service (known as MI6) communicated with Gordievsky, and in 1974 he secretly became an agent-in-place for the United Kingdom. Eight years later, in 1982, Gordievsky was promoted to KGB rezident (chief of station) in London. While there, he frequently made contact with his MI6 handlers, giving them highly coveted information on Soviet nuclear strategy, among other things. He is credited with informing London of Mikhail Gorbachev’s imminent ascendency to the premiership of the Soviet Union, long before he was seen by Western intelligence as a viable candidate to lead the country.
    But in May of 1985, Gordievsky was suddenly recalled to Moscow, where he was detained by the KGB. He was promptly taken to a KGB safe house in the outskirts of Moscow and interrogated for five hours, before being temporarily released pending further questioning. Remarkably, however, Gordievsky managed to escape his KGB surveillance and reappear in Britain less than a week later. How did this happen? On Sunday, the former double spy gave a rare rare interview to The Times, in which he revealed for the first time the details of his escape to London. He told The Times’ Ben Macintyre that he was smuggled out of the USSR by MI6 as part of Operation PIMLICO. PIMLICO was an emergency exfiltration operation that had been put in place by MI6 long before Gordievsky requested its activation in May of 1985.
    Every Tuesday, shortly after 7:00, a British MI6 officer would take a morning stroll at the Kutuzovsky Prospekt in Moscow. He would pass outside a designated bakery at exactly 7:24 a.m. local time. If he saw Gordievsky standing outside the bakery holding a grocery bag, it meant that the double agent was requesting to be exfiltrated as a matter of urgency. Gordievsky would then have to wait outside the bakery until a second MI6 officer appeared, carrying a bag from the Harrods luxury department store in London. The man would also be carrying a Mars bar (a popular British candy bar) and would bite into it while passing right in front of Gordievsky. That would be a message to him that his request to be exfiltrated had been received.
    Four days later, Gordievsky used his skills in evading surveillance and shook off (or dry-cleaned, in espionage tradecraft lingo) the KGB officers trailing him. He was then picked up by MI6 officers and smuggled out of the country in the trunk of a British diplomatic car that drove to the Finnish border. Gordievsky told The Times that Soviet customs officers stopped the car at the Finnish border and surrounded it with sniffer dogs. At that moment, a British diplomat’s wife, who was aware that Gordievsky was hiding in the car, came out of the vehicle and proceeded to change her baby’s diaper on the trunk, thus safeguarding Gordievsky’s hiding place and masking his scent with her baby’s used diaper. If it hadn’t been for the diplomat’s wife, Gordievsky told The Times that he might have been caught.
    After crossing the Soviet-Finnish border, Gordievsky traveled to Norway and from there he boarded a plane for England. Soviet authorities promptly sentenced him to death, but allowed his wife and children to join him in Britain six years later, after British Prime Minister Margaret Thatcher personally lobbied the Soviet government. Gordievsky’s death penalty still stands in Russia. In 2007, the Queen made Gordievsky a Companion of the Most Distinguished Order of St. Michael and St. George for services rendered to the security of the British state.

    JULY 6, 2015 BY JOSEPH FITSANAKIS LEAVE A COMMENT

    Find this story at 6 July 2015

    Copyright intelnews.org

    Top KGB defector begged Margaret Thatcher to secure release of his family

    Van nieuwsblog.burojansen.nl

    Oleg Gordievsky told the prime minister that without his wife and young daughters his “life has no meaning”, papers released by the National Archives show

    Oleg Gordievsky, the most prominent Soviet agent to defect to Britain during the Cold War, personally pleaded with Margaret Thatcher to help secure the release of his family from Moscow.
    The KGB colonel told the prime minister that without his wife and young daughters, who were prevented from following him to London, his “life has no meaning”.
    Files released by the National Archives reveal that MI6 secretly sought to broker a deal with the Russians to secure the safe passage of his family. When the offer was rejected, Mrs Thatcher insisted on expelling every KGB agent in Britain.
    Mr Gordievsky, who was one of the most important spies during the Cold War, provided Britain with reports on Soviet operations for more than a decade.
    When he issued his appeal to Mrs Thatcher in 1985, she responded personally in an emotive note on Sept 7 1985 urging him to have hope.
    Related Articles
    Tony Benn, the veteran Labour politician, has died at the age of 88. The former cabinet minister, who served as an MP for more than 50 years, died at his home in west London surrounded by family members.
    Tony Benn, a KGB spy? No, he was far too dangerous for us 26 Dec 2014
    Former KGB colonel says he paid late union leader Jack Jones £200 for information 22 Apr 2009
    Sir Christopher Curwen 23 Dec 2013
    They can’t take their eyes off us 07 Dec 2010
    “Our anxiety for your family remains and we shall not forget them,” she said. “Having children of my own, I know the kind of thoughts and feelings which are going through your mind each and every day. But just as your concern is about them, so their concern will be for your safety and well-being.
    “Please do not say that life has no meaning. There is always hope. And we shall do all to help you through these difficult days.”
    Mrs Thatcher went on to suggest that the pair should meet when the “immediate situation” – the public announcement of Mr Gordievsky’s defection to Britain – had passed.
    Her personal involvement was greeted with extreme gratitude by Christopher Curwen, the MI6 chief who had arranged Mr Gordievsky’s extraction from Moscow.
    Curwen said: “The reassurance that his family would not be forgotten provided the help and support which he most needs at this difficult time.”
    Her comments “greatly assisted” MI6’s dealings with Mr Gordievsky at a “very dificult time,” he added.
    Mr Gordievsky arrived in London as a result of an emergency extraction sanctioned by Mrs Thatcher in the summer of 1985. Originally recruited in 1974, Mr Gordievsky became Britain’s star source inside the KGB after being posted to the Soviet secret service’s London bureau.
    However, on May 17 1985, having just been promised the job of head of station in London, he was suddenly summoned back to Moscow and subsequently accused of being a spy. He eventually escaped to London with the help of MI6, who smuggled him across the border into Finland, after giving his KBG minders the slip.
    When she formally announced Mr Gordievsky’s defection Mrs Thatcher said she hoped that “on humanitarian grounds” the Soviet authorities would agree to his request for his family to join him in London.
    However it was another six years before he was reunited with his wife Leila and children. His elder daughter Mariya was 11 on her arrival in London in 1991, and his second child Anna was 10.
    The National Archives files show that the prime minister took a close interest in Mr Gordievsky’s well-being, asking his handlers “whether he has some sort of companion to talk to and confide in at what is obviously a very difficult time for him.”

    By Edward Malnick7:00AM GMT 30 Dec 2014

    Find this story at 30 December 2014

    © Copyright of Telegraph Media Group Limited 2015

    Inside Toronto’s secret Cold War History

    Van nieuwsblog.burojansen.nl

    In the 50s and 60s, Soviet and American spies waged a secret war of espionage across the city of Toronto.

    At the height of the Cold War, Toronto was the site of an elaborate game of espionage played between the U.S and the Soviet Union, declassified CIA documents show.
    The records provide new details about how the CIA and the KGB spied on the city’s growing community of eastern European immigrants.
    And those details came as a surprise to at least one Toronto target who learned she was the subject of the CIA investigations.
    “I’m amazed. I’m absolutely in shock,” says Ukrainian-born Natalie Bundza, 78, who worked as a travel agent at an agency on Bloor St. when the CIA first began to monitor her travels.
    Because of her line of work, Bundza was used to being singled out by Soviet authorities. But when the Star showed her the declassified CIA file bearing her name, Bundza was stunned. The depth and breadth of the information that had been collected on her was startling.
    In one of Bundza’s trips to Ukraine in the late ’60s, the CIA had amassed enough intelligence to describe everything from the people she met with overseas to the content of her suitcase, even going as far as to mention the art books she had packed.
    “Took many books to Ukraine: several copies of Archipenko’s monograph Hnizdovsky monograph, poetry collections of the New York group, a Bible for Ivan Mykolaychuk,” the file reads.
    As a young travel agent in her early 30s, Bundza, who now lives in a bungalow in Etobicoke, would often accompany performance groups and tourists across the Iron Curtain and to the Soviet Union. She believes her job and her friends in the art world made her an attractive target for CIA spies.
    Mykolaychuk, an actor, and her other friends, she says, were part of what she calls the “Ukrainian intelligentsia.”
    They included famous sculptor Ivan Honchar, poet Ivan Drach, and prominent political activist Dmytro Pavlychko — names which were all dutifully noted by the CIA spy.
    “I was constantly followed (by the Soviets). They just knew my background. They knew I was a patriot, that I wasn’t a communist,” she says.
    She kept abreast of news from her home country, and she wasn’t afraid to take risks. In her early 30s, Bundza was “all guts, no brains,” she remembers. “I would have knocked on the president’s door if I had to.”
    “We were great tourist guides. We took no BS from (the Soviets),” she says.
    During one of her organized trips, she noticed that a Soviet customs official had been eyeing the stack of Bibles she carried with her. And so, without prompting, Bundza handed him a copy.
    Still, as far as Bundza remembers, she never divulged the minutiae of her travels to anyone — let alone an American spy. How, then, was the CIA able to monitor her travels?
    In Toronto, many served as the agency’s eyes and ears.
    “This was a period of time when the United States did not know nearly as much about the Soviet Union, whether it be its intentions or its capabilities,” said Richard Immerman, a Cold War historian at Temple University in Philadelphia. For the CIA, the goal was to “put different pieces (together) in the hope that one pattern would emerge.”
    Eyewitness accounts were deemed especially important by American intelligence officials.
    At the time, it was not uncommon for those venturing beyond the Iron Curtain to spy on behalf of the CIA, says Immerman. “Our aerial surveillance was limited (so) in many cases, those who did travel to the Soviet Union willingly co-operated with the CIA to provide information — whatever information,” he says. “These could be tourists. These could be businessmen. This was not a time when thousands of people from the West would travel to the Soviet Union.”
    http://www.foia.cia.gov/sites/default/files/document_conversions/1705143/AERODYNAMIC%20%20%20VOL.%2021_0111.pdf
    But for the CIA, Toronto was also rife with potential enemies. In a 1959 declassified file, an American spy describes how 18 Canadians, 11 of whom lived in Toronto, were suspected of working for the KGB. According to the CIA agent, the Canadians had secretly travelled to the Soviet Union and received special training, only to return years later as undercover KGB operatives.
    Other suspected KGB spies, such as Ivan Kolaska, had apparently immigrated to Toronto as part of a bold Soviet plan to infiltrate Ukrainian communities overseas. Kolaska, along with other alleged KGB operatives, one of whom lived a double life as a Toronto City Hall employee, regularly met with Soviet diplomats in Toronto, the files say.
    http://www.foia.cia.gov/sites/default/files/document_conversions/1705143/AERODYNAMIC%20%20%20VOL.%2033%20%20%28OPERATIONS%29_0048.pdf
    In one of those meetings with Soviet embassy staff, the files say, Kolaska revealed the identities of dozens of Ukrainian students who had held a secret meeting in Kyiv. They were later arrested by Soviet authorities, according to the files.
    In many of the declassified documents, the CIA’s informants are named. Bundza’s file contains no such information, leaving only one clue as to the identity of the mysterious spy: Bundza’s full name.
    There is no mention of a “Natalie Bundza” in the file. Her name is listed as “Natalka” instead.
    Only another Ukrainian, she says, would have known her as “Natalka.”
    “It must have been someone from the community here.”

    By: Laurent Bastien Corbeil Staff Reporter, Published on Thu Jul 02 2015

    Find this story at 2 July 2015

    © Copyright Toronto Star Newspapers Ltd. 1996-2015

    The Spy Among Us

    Van nieuwsblog.burojansen.nl

    Jack Barsky held a job at some of the top corporations in the U.S. and lived a seemingly normal life — all while spying for the Soviet Union

    The following is a script from “The Spy Among Us” which aired on May 10, 2015. Steve Kroft is the correspondent. Draggan Mihailovich, producer.

    Tonight, we’re going to tell you a story you’ve probably never heard before because only a few people outside the FBI know anything about it. It’s a spy story unlike any other and if you think your life is complicated, wait till you hear about Jack Barsky’s, who led three of them simultaneously. One as a husband and father, two as a computer programmer and administrator at some top American corporations and three as a KGB agent spying on America during the last decade of the Cold War.

    The FBI did finally apprehend him in Pennsylvania but it was long after the Soviet Union had crumbled. What makes Jack Barsky’s story even more remarkable is he’s never spent a night in jail, the Russians declared him dead a long time ago, he’s living a quiet life in upstate New York and has worked in important and sensitive jobs. He’s now free to tell his story…as honestly as a former spy ever can.

    Jack Barsky CBS NEWS
    Steve Kroft: So who are you?
    Jack Barsky: Who am I? That depends when the question is asked. Right now, I’m Jack Barsky. I work in the United States. I’m a U.S. citizen. But it wasn’t always the case.

    Steve Kroft: How many different identities do you have?

    Jack Barsky: I have two main identities. A German one, and an American one.

    “Who am I? That depends when the question is asked. Right now, I’m Jack Barsky. I work in the United States. I’m a U.S. citizen. But it wasn’t always the case.”
    Steve Kroft: What’s your real name?

    Jack Barsky: My real name is Jack Barsky.

    Steve Kroft: And what name were you born with?

    Jack Barsky: Albrecht Dittrich. Say that three times real fast.

    Steve Kroft: Just say it once slowly…(laughs)

    Jack Barsky: Albrecht Dittrich.

    How Albrecht Dittrich became Jack Barsky is one of the untold stories of the Cold War, an era when the real battles were often fought between the CIA and the KGB. Barsky was a rarity, a Soviet spy who posed as an American and became enmeshed in American society. For the 10 years he was operational for the KGB, no one in this country knew his real story, not even his family.

    Steve Kroft: Did you think you were going to get away with this?

    Jack Barsky: Yeah, otherwise I wouldn’t have done it (laughs).

    youngbarsky.jpg
    Young Jack Barsky
    What Barsky did can be traced back to East Germany, back to the days when he was Albrecht Dittrich. A national scholar at a renowned university in Jena, Dittrich was on the fast track to becoming a chemistry professor, his dream job.
    Jack Barsky: Didn’t work out that way, because I was recruited by the KGB to do something a little more adventurous.

    Steve Kroft: Spy?

    Jack Barsky: We called it something different. We used a euphemism. I was going to be a “scout for peace.”

    Steve Kroft: A KGB “scout for peace”?

    Jack Barsky: That is correct. The communist spies were the good guys. And the capitalist spies were the evil ones. So we didn’t use the word spy.

    He says his spying career began with a knock on his dorm room door one Saturday afternoon in 1970. A man introduced himself, claiming to be from a prominent optics company.

    Jack Barsky: He wanted to talk with me about my career, which was highly unusual. I immediately, there was a flash in my head that said, “That’s Stasi.”

    Steve Kroft: East German secret police?

    Jack Barsky: East German secret police, yeah.

    60 MINUTES: SEGMENT EXTRAS
    HOW DOES A COVERT SPY GET AROUND?
    It was a Stasi agent. He invited Dittrich to this restaurant in Jena where a Russian KGB agent showed up and took over the conversation. The KGB liked Dittrich’s potential because he was smart, his father was a member of the Communist party and he didn’t have any relatives in the West. Dittrich liked the attention and the notion he might get to help the Soviets.

    Steve Kroft: And what did you think of America?

    Jack Barsky: It was the enemy. And, the reason that the Americans did so well was because they exploited all the third-world countries. That’s what we were taught, and that’s what we believed. We didn’t know any better. I grew up in an area where you could not receive West German television. It was called the “Valley of the Clueless.”

    For the next couple of years, the KGB put Dittrich through elaborate tests and then in 1973 he was summoned to East Berlin, to this former Soviet military compound. The KGB, he says, wanted him to go undercover.

    Jack Barsky: At that point, I had passed all the tests, so they wanted, they made me an offer.

    Steve Kroft: But you had been thinking about it all along, hadn’t you?

    Jack Barsky: That’s true. With one counterweight in that you didn’t really know what was going to come. Is– how do you test drive becoming another person?

    It was a difficult decision, but he agreed to join the KGB and eventually found himself in Moscow, undergoing intensive training.

    Jack Barsky: A very large part of the training was operational work. Determination as to whether you’re being under surveillance. Morse code, short wave radio reception. I also learned how to do microdots. A microdot is, you know, you take a picture and make it so small with the use of microscope that you can put it under a postage stamp.

    60 MINUTES: SEGMENT EXTRAS
    JACK BARSKY SHARES SOME HOW-TOS OF SPYING
    The Soviets were looking to send someone to the U.S. who could pose as an American. Dittrich showed a command of English and no trace of an East German accent that might give him away. He learned a hundred new English words every day.

    Jack Barsky: It took me forever. I did probably a full year of phonetics training. The difference between “hot” and “hut.” Right? That, that’s very difficult and, and most Germans don’t get that one.

    Steve Kroft: Did you want to go to the United States?

    Jack Barsky: Oh yeah. Sure. There was New York, there was San Francisco, you know, we heard about these places.

    Steve Kroft: Your horizons were expanding…

    Jack Barsky: Oh, absolutely. Now I’m really in the big league, right?

    Dittrich needed an American identity. And one day a diplomat out of the Soviet embassy in Washington came across this tombstone just outside of D.C. with the name of a 10-year-old boy who had died in 1955. The name was Jack Philip Barsky.

    60 MINUTES: SEGMENT EXTRAS
    THE ORIGINAL JACK PHILIP BARSKY
    Jack Barsky: And they said, “Guess what? We have a birth certificate. We’re going to the U.S.”

    Steve Kroft: And that was the Jack Barsky birth certificate.

    Jack Barsky: The Jack Barsky birth certificate that somebody had obtained and I was given. I didn’t have to get this myself.

    Steve Kroft: Did you feel strange walking around with this identity of a child?

    Jack Barsky: No. No. When you do this kind of work, some things you don’t think about. Because if you explore, you may find something you don’t like.

    The newly minted Jack Barsky landed in New York City in the fall of 1978, with a phony back story called a legend and a fake Canadian passport that he quickly discarded. The KGB’s plan for him was fairly straightforward. They wanted the 29-year-old East German to get a real U.S. passport with his new name, then become a businessman, then insert himself into the upper echelons of American society and then to get close to National Security Adviser Zbigniew Brzezinski so that he could spy on him.

    Jack Barsky: That was the plan. It failed.

    Steve Kroft: Why?

    Jack Barsky: Because I was not given very good instructions with regard to how to apply for a passport.

    When he went to apply for a passport at Rockefeller Center, Barsky was thrown off by the list of questions.

    Jack Barsky: Specific details about my past, for which I had no proof. So I walked out of it.

    Steve Kroft: Did the KGB have a pretty good grasp on the United States and how things worked there?

    Jack Barsky: No.

    Steve Kroft: No?

    Jack Barsky: Absolutely not. They made a number of mistakes in terms of giving me advice, what to do, what not to do. They just didn’t know.

    Left to fend for himself in a country the KGB didn’t understand, he got himself a cheap apartment and tried to make do with a birth certificate and $6,000 dollars in cash the Soviets had given him. His spying career at that point more resembled the bumbling Boris Badenov than James Bond…

    Steve Kroft: So you were working as a bike messenger?

    Jack Barsky: Right.

    Steve Kroft: That doesn’t sound like a promising position for a spy.

    Jack Barsky: No. But there were a lot of things that I didn’t know…

    Steve Kroft: So how close did you ever get to Brzezinski?

    Jack Barsky: Not very.

    To get a Social Security card, which he would need if he wanted a real job, Barsky knew he would have to do some acting.

    Jack Barsky: It was unusual for a 30-plus-year-old person to, to say, “You know, I don’t have a Social Security card. Give me one.” So in order to make my story stick I made my face dirty. So I looked like somebody who just came off a farm. It worked! The lady asked me, she said, “So how come you don’t, you don’t have a card?” And when the answer was, “I didn’t need one.” “Why?” “Well, I worked on a farm.” And that was the end of the interview.

    The Social Security card enabled him to enroll at Baruch College in Manhattan, where he majored in computer systems. He was class valedictorian but you won’t find a picture of him in the school yearbook. In 1984, he was hired as a programmer by Metropolitan Life Insurance where he had access to the personal information of millions of Americans.

    Steve Kroft: You were writing computer code?

    Jack Barsky: Right. Yes. Lots of it. And I was really good at it.

    What he didn’t write, he stole, on behalf of the KGB.

    Steve Kroft: What was the most valuable piece of information you gave them?

    Jack Barsky: I would say that was the computer code because it was a very prominent piece of industrial software still in use today.

    Steve Kroft: This was IBM code?

    Jack Barsky: No comment.

    Steve Kroft: You don’t want to say?

    Jack Barsky: No. It was good stuff. Let’s put it this way, yeah.

    Steve Kroft: It was helpful to the Soviet Union…

    Jack Barsky: It would’ve been helpful to the Soviet Union and their running organizations and, and factories and so forth.

    Steve Kroft: How often did you communicate with the Russians?

    Jack Barsky: I would get a radiogram once a week.

    Steve Kroft: A radiogram, meaning?

    Jack Barsky: A radiogram means a transmission that was on a certain frequency at a certain time.

    Every Thursday night at 9:15 Barsky would tune into his shortwave radio at his apartment in Queens and listen for a transmission he believed came from Cuba.

    Jack Barsky: All the messages were encrypted that they became digits. And the digits would be sent over as, in groups of five. And sometimes that took a good hour to just write it all down, and then another three hours to decipher.

    During the 10 years he worked for the KGB, Barsky had a ready-made cover story.

    Steve Kroft: When somebody’d ask you, you know, “Where you from Jack?,” what’d you say?

    Jack Barsky: I’m originally from New Jersey. I was born in Orange. That’s it. American. Nobody ever questioned that. People would question my, “You have an accent.” But my comeback was, “Yeah, my mother was German and we spoke a lot of German at home.”

    Steve Kroft: You had to tell a lot of lies.

    Jack Barsky: Absolutely. I was living a lie.

    Steve Kroft: Were you a good liar?

    Jack Barsky: The best.

    You had to be a good liar to juggle the multiple lives he was leading. Every two years while he was undercover for the KGB, Barsky would return to East Germany and Moscow for debriefings. During one of his visits to East Berlin he married his old girlfriend Gerlinde and they had a son.

    Steve Kroft: Did that complicate matters?

    Jack Barsky: Initially it wasn’t complicated at all, it got complicated later.

    Steve Kroft: Because?

    Jack Barsky: Because I got married in the United States to somebody else.

    Steve Kroft: Did she know about your other wife in Germany?

    Jack Barsky: No.

    Steve Kroft: Did your wife in Germany know about the…

    Jack Barsky: Not at all.

    Steve Kroft: So you had two wives?

    Jack Barsky: I did. I’m, I was officially a bigamist. That’s, that’s the one thing I am so totally not proud of.

    Steve Kroft: Being a spy was all right. Being a bigamist…

    Jack Barsky: In hindsight, you know, I was a spy for the wrong people. But I, this one hurt because I had promised my German wife, that you know, we would be together forever. And I broke that promise. And the one way I can explain it to myself is I had separated the German, the Dittrich from the Barsky to the point where the two just didn’t know about each other.

    Not only did he have two different identities, and two wives, he had a son named Matthias in Germany and a daughter named Chelsea in America. And by November 1988, a radiogram from the KGB would force him to make an excruciating choice.

    Jack Barsky: I received a radiogram that essentially said, “You need to come home. Your cover may soon be broken and you’re in danger of being arrested by the American authorities.”

    Barsky was given urgent instructions from the KGB to locate an oil can that had been dropped next to a fallen tree just off this path on New York’s Staten Island. A fake passport and cash that he needed to escape the United States and return to East Germany would be concealed inside the can.

    Jack Barsky: I was supposed to pick up the container and go on, leave. Not even go back home to the apartment, just disappear. The container wasn’t there. I don’t know what I would have done if I had found it, but I know what I did when I didn’t find it. I did not tell them, “repeat the operation.” I made the decision to stay.

    Steve Kroft: Why?

    Jack Barsky: Because of Chelsea.

    Steve Kroft: Your daughter.

    Jack Barsky: Yes. If Chelsea’s not in the mix, that’s a no brainer, I’m outta here.

    Barsky had chosen Chelsea over Matthias.

    Jack Barsky: I had bonded with her. It was a tough one because on the one hand I had a wife and child in Germany but if I don’t take care of Chelsea, she grows up in poverty.

    Steve Kroft: This may be a little harsh but it sounds like the first time in your life that you thought about somebody besides yourself.

    Jack Barsky: You’re absolutely right. I was quite an egomaniac. I was.

    Jack Barsky was still left with the not insignificant matter of telling the KGB that he was staying in America. In a moment, we’ll tell you how he duped the KGB and how the FBI changed his life.

    PART TWO
    At the end of 1988, Jack Barsky’s 10-year run as a clandestine KGB agent in the United States was about to come to an end. He had ignored Soviet warnings that his cover had been blown and decided to remain in America and not return to his native East Germany. He was taking a chance that no one in America would ever find out who he really was. And he was taking a bigger chance that the KGB wouldn’t retaliate for disobeying an order. The urgency with which the Soviets seemed to view the situation became clear one morning in Queens.

    Jack Barsky says he was on his way to work in December 1988, standing and waiting for an “A” train on this subway platform when a stranger paid him a visit.

    Jack Barsky: There’s this character in, in a black coat and he sidles up to me and he whispers in my ear, he says, “You gotta come home or else you’re dead.” And then he walked out.

    Steve Kroft: Russian accent?

    Jack Barsky: Yes.

    Steve Kroft: That’s an incentive.

    Jack Barsky: It’s an incentive to go.

    Steve Kroft: I mean spies get killed all the time.

    Jack Barsky: They do. But not me. The entire time I always had this childlike belief that everything would be all right.

    “There’s this character in, in a black coat and he sidles up to me and he whispers in my ear, he says, ‘You gotta come home or else you’re dead.’ And then he walked out.”
    Steve Kroft: So what are you going to tell the Russians?

    Jack Barsky: Well, I (sighs) I sent them, this “Dear John” letter, the goodbye letter in which I stated that I had contracted AIDS and that the only way for me to get a treatment would be in the United States.

    Steve Kroft: You just wrote them a letter and said, ‘I can’t come back. I’ve got AIDS”?

    Jack Barsky: There’s three things I tell people that the Russians were afraid of. AIDS, Jewish people and Ronald Reagan. And they were deathly…

    Steve Kroft: In that order?

    Jack Barsky: I think Ronald Reagan took the top spot. They thought he would push the button.

    The AIDS letter apparently worked because in East Berlin the Soviets told his German wife Gerlinde he wasn’t coming back.

    Jack Barsky: They went to Gerlinde and told her that I had died of AIDS. So I think they just wrote me off completely.

    Steve Kroft: You were officially dead in East Germany?

    Jack Barsky: Right. After five years she was able to declare me dead.

    Once the Berlin Wall fell and the Soviet Union fell apart, Barsky was a man without a country. No one would want him back. He felt his secret was safe in America. He became a family guy, with a wife, two kids, Chelsea and Jessie, and a job. He burrowed himself into suburbia, keeping a low profile.

    Jack Barsky: I was settling down, I was living in the, in rural Pennsylvania at the time, in a nice house, with two children. I was, like, typical middle class existence.

    And his life would have stayed quiet if a KGB archivist named Vasili Mitrokhin hadn’t defected to the West in 1992 with a trove of notes on the Soviets’ spying operations around the world. Buried deep in his papers was the last name of a secret agent the KGB had deployed somewhere in America: Barsky.

    Joe Reilly: We were concerned that he might be running an agent operating in the federal government somewhere. Who knows? In the FBI, the CIA, the State Department. We had no idea.

    Joe Reilly was an FBI agent when the bureau got the Mitrokhin tip, and the Barsky case quickly became serious enough that FBI director Louis Freeh got personally involved. The FBI didn’t know who or where he was, but the best lead seemed to be a Jack Barsky who was working as an I.T. specialist in New Jersey, with a suburban home across the border in Mount Bethel, Pennsylvania.

    Steve Kroft: Aside from his name was there anything else that made you suspicious and make you think that this was the guy you were looking for?

    Joe Reilly: Yes. One thing was the fact that he had applied for a Social Security number late in life. Especially someone like him who was educated and intelligent.

    The FBI began following Barsky, and when this surveillance photo caught him talking to a native of Cuba, the bureau grew increasingly concerned.

    Joe Barsky: There were some indications that I could possibly be the head of a international spy ring, because I had a friend who was originally from Cuba. And it so happened that this friend owned an apartment that was rented to a Soviet diplomat. So that one and raised all kinds of flags and they investigated me very, very, very carefully.

    FBI agent Joe Reilly went so far as to set up an observation post on a hillside behind Barsky’s house. This is a picture he took of his view.

    Joe Reilly: I got a telescope and binoculars, as if I was a birdwatcher. But I was looking at his backyard and at him. Over time, I learned a great deal about him.

    Steve Kroft: Like what?

    Joe Reilly: …just watching him. Well, I became convinced that he loved his children. And that was important because I wanted to know if he would flee. There was less chance of that if, if he was devoted to his children. And he was.

    But that wasn’t enough for the FBI. The bureau bought the house next door to get a closer look at the Barskys.

    Steve Kroft: Did you get a good deal?

    Joe Reilly: I think we paid what he was asking. And we had agents living there so that we could be sure who was coming and going from his house without being too obvious in our surveillance.

    Steve Kroft: You had no idea the FBI was living next door to you?

    Jack Barsky: No.

    Steve Kroft: Never saw…

    Jack Barsky: No.

    Steve Kroft: …Joe Reilly up on the hill with the binoculars?

    Jack Barsky: Absolutely not.

    When the FBI finally got authorization from the Justice Department to bug Barsky’s home, the case broke wide open.

    Joe Reilly: Within, I’d say, the first two weeks that we had microphones in his house, he had an argument with his wife in the kitchen. And during the course of that dispute, he readily admitted that he was an agent, operating from the Soviet Union.

    It was all the FBI needed to move in on Barsky. They set a trap for him at a toll bridge across the Delaware River as he drove home from work late one Friday afternoon in May of 1997.

    Jack Barsky: I’m being waved to the side by a state trooper. And he said, “We’re doing a routine traffic check. Would you please get out of the car?” I get out of the car and somebody steps up from, from behind and shows me a badge. And he said, “FBI. We would like to talk to you.”

    Joe Reilly: His face just dropped. And we told him that he had to go with us.

    Jack Barsky: The first words out of my mouth were, “Am I under arrest?” And the answer was, “No.” Now that took a big weight off of me, so I figured there was a chance to get out of this in one piece. And the next question I asked, “So what took you so long?”

    The FBI had rented an entire wing of a motel off Interstate 80 in Pennsylvania for Barsky’s interrogation.

    Joe Reilly: But on the way to the motel, I remember turning to him. And I, I told him that this didn’t have to be the worst day of his life. And he immediately realized that he had an out.

    Jack Barsky: I said to them, “Listen, I know I have only one shot out of this and that means I need to come clean and be 100 percent honest and tell you everything I know.”

    The FBI questioned Barsky throughout the weekend and gave him a polygraph test that he passed. Convinced that his spying days were over, and that his friendship with the Cuban was just that, the FBI decided to keep the whole thing quiet and allowed Barsky to go back to work on Monday morning.

    Steve Kroft: Was he charged with something?

    Joe Reilly: No.

    Steve Kroft: Even though he confessed to being a Soviet spy?

    Joe Reilly: Yes.

    Steve Kroft: That seems odd.

    Joe Reilly: Well, we wanted him to cooperate with us. We didn’t want to put him in jail. He was no use to us there.

    Barsky continued to meet not only with the FBI but with the National Security Agency to offer his first-hand insights into the KGB and the Russians.

    Jack Barsky: I was able to provide them with a lot of valuable information how the KGB operated.

    The only people who were aware of his secret were the FBI and Penelope, his wife in America, who subsequently filed for divorce. His daughter Chelsea, then a teenager, knew only that he wanted to tell her something when she turned 18. That day finally arrived on a four-hour drive to St. Francis University.

    Chelsea: He started chuckling to himself and he said, “Well, I’m a, I was a spy. I was a KGB spy.” I was like “What? Really?”

    Jack also revealed to Chelsea why he had decided to stay in America.

    Chelsea: He said that, you know, he fell in love with me and my, my curls when I was a little baby. And then I cried.

    Steve Kroft: Did he tell you everything?

    Chelsea: No, he didn’t. He didn’t tell me 100 percent the whole truth. He left some things out at that point.

    Jack Barsky: I told her everything that you can tell in four hours that is age appropriate. She was still a teenager. I may not have told her that I was married in Germany.

    He waited another two years before he matter-of-factly dropped another bombshell about his past.

    Chelsea: He just looked straight ahead at the TV. And he said, “Did I tell you you have a brother?” And I turned my head. I’m like, “What? Are you serious?”

    The half brother was Matthias, the boy Jack had left behind in Germany. Chelsea was determined to find him. Jack didn’t like the idea.

    Jack Barsky: I did not feel comfortable getting in touch with him. I did not feel comfortable with my acknowledging my German past.

    After a year of trying to track him down online, Chelsea finally got a reply from Matthias…

    Chelsea: The subject line said, “Dear little sister.” And when I saw, “Dear little sister,” I just started weeping, because that meant everything to me. That meant that he accepted me.

    Matthias: And this is me…

    A month later, Matthias was in Pennsylvania visiting Chelsea and her brother Jessie. They hit it off. Matthias wasn’t interested in seeing his father, then changed his mind.

    barksys-american-kids-with-his-german-son.jpg
    Barsky’s children, from left: Jessie, Matthias and Chelsea
    Steve Kroft: Was it awkward?
    Jack Barsky: I just remember he stared at me for a couple of minutes. He just stared at me.

    Steve Kroft: I mean he had reason to be angry with you.

    Jack Barsky: When I told him the dilemma that I was faced with, he actually said, “I understand.”

    Steve Kroft: And what’s your relationship like with Matthias now?

    Jack Barsky: He feels like he’s my son.

    Gerlinde, the wife in Germany who thought he was dead, wants nothing to do with Jack today – or with 60 Minutes.

    He has remarried and has a four-year-old daughter. They live in upstate New York where Jack has worked as director of software development for a company that manages New York’s high voltage power grid, a critical piece of U.S. infrastructure. When he told his employer recently that he had once been a KGB spy, he was placed on a paid leave of absence. Before becoming an American citizen last year, he had been given a clean bill of health by the FBI and U.S. intelligence agencies. But in the world of espionage it’s often difficult to tell what’s true and what’s legend.

    Steve Kroft: Are you telling the truth right now?

    Jack Barsky: I am, absolutely. The truth as far as I know it. Yes.

    Steve Kroft: As far as you know it?

    Jack Barsky: Well, you know, sometimes memory fails you. But I am, I am absolutely not holding back anything.

    Steve Kroft: Why tell the story now?

    Jack Barsky: I want to meet my maker clean. I need to get clean with the past. I need to digest this fully.

    The FBI agent who apprehended him, Joe Reilly, still believes in Barsky. And in yet another twist to this story, the two are good friends and golfing buddies.

    Joe Reilly: He’s a very honest person. And if you want to find out how honest someone is, play golf with them.

    Steve Kroft: But you’re a former FBI guy and he’s a former spy. What’s the bond?

    Joe Reilly: It’s personal. He credits me for keeping him out of prison.

    After nearly 30 years, Jack Barsky went back to visit a unified Germany, first in October, then again last month.

    [Jack Barsky: So that was essentially the very beginning of my career…]

    He showed his kids where this improbable tale began and some other key settings in his odyssey. And he caught up with old classmates who knew him as Albrecht Dittrich.

    barsky-in-germany-with-his-american-kids.jpg
    Barsky in Germany with his American children CBS NEWS
    Steve Kroft: When you’re here in Germany…
    Jack Barsky: Yeah…

    Steve Kroft: …are you Albrecht or are you Jack?

    Jack Barsky: No, I’m Jack. I am 100 percent Jack. You know, the, I let the Albrecht out and sometimes he interferes, but they, they get along very well now (laughs)…

    The Berlin wall, which once divided east and west, is now gone except for a section that has been turned into an art display. Checkpoint Charlie, once the epicenter of the Cold War, is now a tourist attraction, full of kitsch. Statues of Karl Marx and Friedrich Engels still stand in the eastern part of Berlin, relics of another era as is the man who straddled two worlds and got away with it.

    2015 May 10 CORRESPONDENT Steve Kroft

    Find this story at 10 May 2015

    © 2015 CBS Interactive Inc. All Rights Reserved.

    De pot verwijt de ketel

    Dupont op Justitie en Veiligheid

    Vandaag 3 juli 2015, bericht de NOS het volgende:

    ‘De particuliere beveiligingsbranche neemt maatregelen om infiltratie van criminelen te voorkomen. Dat zegt Laetitia Griffith, voorzitter van de branchevereniging voor beveiligingsbedrijven, in het Financieele Dagblad. Daarmee reageert de branche op waarschuwingen van de politie dat omstreden motorclubs pogingen doen om beveiligingsbedrijven in handen te krijgen. De branchevereniging heeft maatregelen genomen die het moeilijker moeten maken voor leden van deze motorclubs om actief te worden in de beveiliging. Zo toetst het ministerie van Veiligheid en Justitie sinds kort bij het verlenen van een beveiligingsvergunning of de aanvrager betrokken is bij criminele activiteiten. Dat dit tot nu toe niet gebeurde, is “een kwestie van voortschrijdend inzicht,” aldus Griffith. Volgens het voormalige Kamerlid moeten bedrijven en overheidsinstanties er beter op letten met welk beveiligingsbedrijf ze in zee gaan. Ze maken nog te vaak gebruik van bedrijven zonder keurmerk.’

    lees meer

    << oudere artikelen  nieuwere artikelen >>