• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Inhoudsopgave Observant #64, februari 2014

    de elektronische nieuwsbrief van Buro Jansen & Janssen

    Mocht je een interessant artikel hebben over je confrontatie met politie en justitie, een nieuwe wetgeving, onderzoek of scriptie mail het dan ons, info@burojansen.nl.

    01 inhoudsopgave
    02 profiel vreemdelingen in detentie: justitie spasme
    03 profiel vreemdelingen in detentie: openbaarmaking
    04 profiel vreemdelingen in detentie: leeswijzer
    05 profiel vreemdelingen in detentie: onderzoek
    06 overheid benadert hackers
    07 Special Branch Spied on Animal Rights Movement
    08 NSA: Uncle Sam’s grote oren
    09 NSA: Op het spoor van de afluisteraars
    10 NSA: It Greate Ear
    11 Ana Montes: de Cubaanse Poor Man’s NSA
    12 donateurs gezocht

    Daar is ie weer, het heeft even geduurd, maar toch een nieuwe nieuwsbrief van Buro Jansen & Janssen. Vanaf nu wordt er geprobeerd elke twee maanden een nieuwsbrief uit te brengen. Kortere artikelen, minder onderzoek per keer, maar in totaal natuurlijk evenveel onderzoek zoals altijd.
    In deze nieuwsbrief aandacht voor de openbaarmaking van profielschetsen van vreemdelingen in detentie, provocateurs van de politie en inlichtingenoperaties in de dierenrechtenbeweging in het Verenigd Koninkrijk (GB), de benadering van hackers in Nederland, NSA oud en NSA nieuw en de True Believer, de Poor Man’s NSA.

    Steun Janssen ook in 2014

    Wordt donateur of vraag familie, vrienden en bekenden donateur te worden. Bankrekening NL56 INGB 0000 6039 04 (ING 603904 BIC: INGBNL2A) ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam. Res Publica is de stichting van Jansen & Janssen.

    Al 30 jaar diepgravend, kritisch en doortastend burgerrechten onderzoek. Buro Jansen & Janssen gewoon inhoud

    profiel vreemdelingen in detentie: Jusititie Spasme

    Vreemdelingendetentie is een wonderlijk iets. Het wordt gepresenteerd als een bestuurlijke maatregel, alsof het acceptabel is om mensen die niets misdaan hebben op te sluiten. Het klinkt bijna klinisch, maar helaas is een bestuursrechtelijke straf vaak erger dan een strafrechtelijke. Beroepsmogelijkheden, uitgebreide rechterlijke toetsing en andere rechten van verdachten zijn in de loop der jaren meer en meer uitgehold.

    lees meer

    profiel vreemdelingen in detentie: Openbaarmaking

    De overheid doet onderzoek naar de uitvoering van haar eigen beleid. Dit onderzoek is zowel voor de beeldvorming als voor de juridische praktijk van belang. Een hoogleraar en niet-gouvernementele organisaties (ngo’s) zijn op de hoogte van dit ‘interne onderzoek’. Waarom brengt dan niemand de resultaten naar buiten? En waarom ontkennen de hoogleraar en het ministerie het bestaan van intern onderzoek? En waarom wordt dit onderzoek niet overhandigd aan de Tweede Kamer?

    lees meer

    profiel vreemdelingen in detentie: Leeswijzer

    De profielschetsen heten respectievelijk ‘Profielschets van vreemdelingen in bewaring, een verkennend onderzoek uit september 2009’ en ‘Een profielschets van vreemdelingen in bewaring 2010 van 1 februari 2012, definitief onderzoek’. Het verkennende onderzoek heeft betrekking op 2008. ‘Iedereen die in dit jaar als vreemdeling bij de sector DBV (Directie Bijzondere Voorzieningen, -red.) aanwezig is geweest, is meegenomen in het onderzoek. Concreet betekent dit een optelling van diegenen die aanwezig waren per 1 januari 2008, plus diegenen die in 2008 als vreemdeling zijn ingestroomd. Indien een vreemdeling meerdere keren in 2008 is ingestroomd, is gekozen om alleen de laatste instroom in de vreemdelingenbewaring mee te nemen in de selectie.’

    lees meer

    profiel vreemdelingen in detentie: onderzoek

    Interne justitiële rapportages scheppen onrustbarend beeld

    De op basis van intern justitieel onderzoek opgestelde profielschetsen over mensen in vreemdelingenbewaring, die buro Jansen & Janssen onder ogen heeft gekregen, zijn verre van volledig en vertonen veel ongerijmdheden.

    Het getuigt van een gebrek aan rechtsstatelijkheid om mensen zonder identiteits- en/of verblijfspapieren zomaar op te sluiten. Nederland heeft dan wel een Vreemdelingenwet (lees: een soort bestuurswet) maar personen wiens enige ‘vergrijp’ is dat zij niet over de juiste documenten beschikken gevangen zetten, soms voor zeer lange tijd of meerdere keren, druist in tegen de rechten van de mens.

    De mate van onrechtvaardigheid wordt nog groter als mensen die in vreemdelingenbewaring zitten worden afgeschilderd als criminelen, terwijl uit de feiten blijkt dat daar weinig van waar is. De rechtsstatelijke absurditeit hiervan bereikt ten slotte grote hoogte als onderzoek dat aangeeft dat deze vluchtelingen in bewaring gewoon nette mensen zijn, onder het tapijt wordt geschoven.

    lees meer

    Overheid benadert hackers

    ‘We willen het imago van de AIVD onder hackers verbeteren, misschien kan je daarbij een rol spelen’, aldus Hans Turksma van Binnenlandse Zaken of de AIVD.

    Augustus 2013, na afloop van de internationale hackersconferentie OHM2013 die in Oudkarspel plaatsvond, heeft AIVD’er ‘Hans Turksma’ geprobeerd hacker ‘Stefan’ te benaderen voor een vermoedelijke informantenrol. Stefan was die bewuste maandag niet thuis, maar Turksma dacht kennelijk dat hij zich verstopt had achter de vensterbank en bleef daarom wachten.

    lees meer

    What Cold War CIA Interrogators Learned from the Nazis

    At a secret black site in the years after the end of WWII, CIA and US intelligence operatives tested LSD and other interrogation techniques on captured Soviet spies—all with the help of former Nazi doctors. An excerpt from Annie Jacobsen’s Operation Paperclip, published this week.

    It was 1946 and World War II had ended less than one year before. In Top Secret memos being circulated in the elite ‘E’ ring of the Pentagon, the Joint Chiefs of Staff were preparing for ‘total war’ with the Soviets—to include atomic, chemical, and biological warfare. They even set an estimated start date of 1952. The Joint Chiefs believed that the U.S. could win this future war, but not for reasons that the general public knew about. Since war’s end, across the ruins of the Third Reich, U.S. military officers had been capturing and then hiring Hitler’s weapons makers, in a Top Secret program that would become known as Operation Paperclip. Soon, more than 1,600 of these men and their families would be living the American dream, right here in the United States. From these Nazi scientists, U.S. military and intelligence organizations culled knowledge of Hitler’s most menacing weapons including sarin gas and weaponized bubonic plague.

    As the Cold War progressed, the program expanded and got stranger still. In 1948, Operation Paperclip’s Brigadier General Charles E. Loucks, Chief of U.S. Chemical Warfare Plans in Europe, was working with Hitler’s former chemists when one of the scientists, Nobel Prize winner Richard Kuhn, shared with General Loucks information about a drug with military potential being developed by Swiss chemists. This drug, a hallucinogen, had astounding potential properties if successfully weaponized. In documents recently discovered at the U.S. Army Heritage Center in Pennsylvania, Loucks quickly became enamored with the idea that this drug could be used on the battlefield to “incapacitate not kill.” The drug was Lysergic acid diethylamide, or LSD.

    It did not take long for the CIA to become interested and involved. Perhaps LSD could also be used for off-the-battlefield purposes, a means through which human behavior could be manipulated and controlled. In an offshoot of Operation Paperclip, the CIA teamed up with Army, Air Force and Naval Intelligence to run one of the most nefarious, classified, enhanced interrogation programs of the Cold War. The work took place inside a clandestine facility in the American zone of occupied Germany, called Camp King. The facility’s chief medical doctor was Operation Paperclip’s Dr. Walter Schreiber, the former Surgeon General of the Third Reich. When Dr. Schreiber was secretly brought to America—to work for the U.S. Air Force in Texas—his position was filled with another Paperclip asset, Dr. Kurt Blome, the former Deputy Surgeon General of the Third Reich and the man in charge of the Nazi’s program to weaponize bubonic plague. The activities that went on at Camp King between 1946 and the late 1950s have never been fully accounted for by either the Department of Defense or the CIA.

    Camp King was strategically located in the village of Oberursel, eleven miles northwest of the United States European Command (EUCOM) headquarters in Frankfurt. Officially the facility had three names: the U.S. Military Intelligence Service Center at Oberursel, the 7707th European Command Intelligence Center, and Camp King. In 1945, the place housed captured Nazis but by 1948 most of its prisoners were Soviet bloc spies. For more than a decade Camp King would function as a Cold War black site long before black sites were known as such—an ideal facility to develop enhanced interrogation techniques in part because it was “off-site” but mainly because of its access to Soviet prisoners.

    It was an international crisis in June of 1948 that gave Operation Paperclip momentum at Camp King. Early on the morning of June 24, the Soviets cut off all land and rail access to the American zone in Berlin, an action that would become known as the Berlin Blockade. “The Soviet blockade of Berlin in 1948 clearly indicated that the wartime alliance [between the Soviets and the United States] had dissolved,” explained CIA deputy director for operations Jack Downing. “Germany then became a new battlefield between east and west.”“In our conversation of 9 February 1951, I outlined to you the possibilities of augmenting the usual interrogation methods by the use of drugs, hypnosis, shock, etc., and emphasized the defensive aspects as well as the offensive opportunities in this field of applied medical science,” wrote Dulles.
    At this time, the CIA believed the Soviets were pursing mind control programs—supposedly a means of getting captured spies to talk—and the Agency wanted to know what it would be up against if the Russians got hold of its American spies. Since the end of the war, the various U.S. military branches had developed advanced air, land and sea rescue programs, based in part by research conducted by Nazi doctors during the war. But the Soviets had also made great advances in rescue programs and this presented a serious, new concern for the Pentagon and the CIA. If a downed U.S. pilot or soldier was rescued and captured by the Russians, that person would almost certainly be subjected to unconventional Soviet interrogation techniques. In an attempt to determine what kinds of Soviet techniques might be used, a research program was set up at Camp King. Documents obtained through the Freedom of Information Act (FOIA) reveal that the U.S. developed its post-war enhanced interrogation techniques here at Camp King, under the CIA code name Operation Bluebird.

    Initially, Bluebird was to be a so-called “defensive” program. Officers were instructed “to apply special methods of interrogation for the purpose of evaluation of Russian practices,” only. In other words, to merely mimic Soviet techniques. But it did not take long for the CIA to decide that the best defense is offense, and the Agency began developing enhanced interrogation techniques of its own. FOIA documents reveal that the CIA saw LSD as a potential, “truth serum.” What if its officers could drug captured Soviet spies, interrogate them using LSD, and somehow make them forget that they’d talked? Inside Camp King, the LSD program was expanded and given a new code name.

    “Bluebird was rechristened Artichoke,” writes John Marks, a former State Department official and authority on the CIA’s mind control programs. The goal of the Artichoke interrogation program, Marks explains, was “modifying behavior through covert means.” According to the program’s administrator, Richard Helms—the future director of the CIA—using drugs like LSD were a means to that end. “We felt that it was our responsibility not to lag behind the Russians or the Chinese in this field, and the only way to find out what the risks were was to test things such as LSD and other drugs that could be used to control human behavior,” Helms later told journalist David Frost, in an interview, in 1978. Soon, other U.S. intelligence agencies were brought on board to help conduct these controversial interrogation experiments at Camp King. As declassified dossiers reveal, with them they brought Nazi scientists from Operation Paperclip.

    ‘Operation Paperclip: The Secret Intelligence Program that Brougt Nazi Scientists to America’ By Annie Jacobsen. 592 pages. Little, Brown and Company. $30. ()

    Back in the United States, the CIA teamed up with the Army Chemical Corps at Camp Detrick, in Maryland, to conduct further research and development on the chemistry of mind-altering drugs. Scientists and field agents were culled from a pool of senior Army bacteriologists and chemists, then assigned to a unit called the Special Operations Division, a division of the CIA. The men worked inside a classified facility, designated Building No. 439, a one-story concrete-block building set among similar-looking buildings at Camp Detrick so as to blend in. Almost no one outside the Special Operations Division knew about the Top Secret work going on inside. One of these field agents was Dr. Harold Batchelor, the Army scientist in charge of consultations with Nazi doctor and former Deputy Surgeon General of the Third Reich, Dr. Kurt Blome. Another Special Operations Division agent was Dr. Frank Olson, a former army officer and bacteriologist turned agency operative whose sudden demise—by covert LSD poisoning—in 1953 would nearly bring down the CIA. Batchelor and Olson were assigned to the program at Camp King, where Dr. Blome was chief physician. Their assignment, according to documents obtained through the FOIA and interviews with Olson’s former partner, Norman Cournoyer, was to use unconventional interrogation techniques on Soviet prisoners, including dosing them with LSD.

    In April 1950, Frank Olson was issued a diplomatic passport. Olson was not a diplomat; the passport allowed him to carry items in a diplomatic pouch that would not be subject to searches by customs officials. Frank Olson began taking trips to Germany, flying to Frankfurt and making the short drive out to Camp King. In one of the rare, surviving official documents from the program, Deputy Director of Central Intelligence Allen Dulles sent a secret memo to Richard Helms and CIA Deputy Director for Plans Frank Wisner regarding the specific kinds of interrogation techniques that would be used. “In our conversation of 9 February 1951, I outlined to you the possibilities of augmenting the usual interrogation methods by the use of drugs, hypnosis, shock, etc., and emphasized the defensive aspects as well as the offensive opportunities in this field of applied medical science,” wrote Dulles. “The enclosed folder, ‘Interrogation Techniques,’ was prepared in my Medical Division to provide you with a suitable background.” Camp King was the perfect location to conduct these radical trials. Overseas locations were preferred for Artichoke interrogations, explained Dulles, since foreign governments “permitted certain activities which were not permitted by the United States government (i.e. anthrax etc.).”

    The next trip on record made by Frank Olson occurred on June 12, 1952. Frank Olson arrived at Frankfurt from the Hendon military airport in England and made the short drive west into Oberursel. There, Artichoke interrogation experiments were taking place at a safe house called Haus Waldorf. “Between 4 June 1952 and 18 June 1952, an IS&O [CIA Inspection and Security Office] team… applied Artichoke techniques to two operational cases in a safe house,” explains an Artichoke memorandum, written for CIA Director Dulles, and one of the few action memos on record not destroyed by Richard Helms when he was CIA director. The two individuals being interrogated at the Camp King safe house “could be classed as experienced, professional type agents and suspected of working for Soviet Intelligence.” These were Soviet spies captured by the Nazi spy ring, the Gehlen Organization, now being run by the CIA. “In the first case, light dosages of drugs coupled with hypnosis were used to induce a complete hypnotic trance,” the memo reveals. “This trance was held for approximately one hour and forty minutes of interrogation with a subsequent total amnesia produced.” The plan for the enhanced interrogation program was meant to be straightforward: drug the spies, interrogate the spies, and give them amnesia to make them forget. Instead, the program produced questionable results and evolved into one of the most notorious CIA programs of the Cold War, MKULTRA.

     

    LSD, the drug that induces paranoia and unpredictability and makes people see things that are really not there, would become its own strange allegory for the Cold War. Its potential use as a truth serum would also become a cautionary tale. One CIA report, declassified and shared with Congress decades later, in 1977, expressed Agency fears about Soviets plans to use LSD against Americans during the Cold War: “the Soviets purchased a large quantity of LSD-25 from the Sandoz [Pharmaceutical] Company [the only supplier of LSD at the time]… reputed to be sufficient for 50 million doses,” the report read. The CIA believed the Soviets might drug millions of Americans with LSD, through the U.S. water system, in a covert, psy-ops attack.

    Or so the CIA thought. A later analysis of the information revealed that the CIA analyst working on the report made a decimal point error while performing dosage calculations. The Soviets had in fact purchased enough LSD from Sandoz for a few thousand tests—a far cry from 50 million.

    It was a bizarre plan, in a foreign place, during a strange time. The Cold War had become a battlefield marked by doublespeak. Disguise, distortion, and deception were accepted as reality. Truth was promised in a serum. And Operation Paperclip, born of the ashes of World War II, was the inciting incident in this hall of mirrors. As it grew, it created monsters of its own.

    02.11.14 Annie Jacobsen

    Find this story at 11 February 2014

    © 2014 The Daily Beast Company LLC

    New Book ‘Operation Paperclip’ Shows Nazi Scientists Worked For CIA During Cold War

    The United States recruited Nazi scientists after the end of World War II and put them to work on secret military and intelligence programs during the Cold War — that is the astonishing topic of a new book published this week.

    In “Operation Paperclip: The Secret Intelligence Program that Brought Nazi Scientists to America,” journalist Annie Jacobsen documents how the Joint Chiefs of Staff brought more than 1,600 German scientists to work for the U.S. after 1945.

    The book describes the roles of 21 Nazi scientists who were part of Operation Paperclip, drawing on declassified intelligence and historical records to detail their startling role in America’s Cold War effort. According to Jacobson, the scientists had helped Adolf Hitler to develop weapons such as sarin gas and weaponized bubonic plague, and several had even stood trial for war crimes.

    But the U.S. military was consumed by a new looming menace, the prospect of ‘total war’ with the Soviets post WWII. “Operation Paperclip” employed the scientific brainpower of the Third Reich to help develop America’s arsenal of rockets and chemical and biological weapons, as well as aviation and space medicine.

    The intelligence community saw another use for the Nazi scientists, Jacobson adds. They were running a secret black site in Germany to test the effects of LSD on captured Soviet spies, part of the Cold War battle to stay ahead in the art of mind-control.

    Jacobsen explains in an excerpt of the book published on The Daily Beast:
    In an offshoot of Operation Paperclip, the CIA teamed up with Army, Air Force and Naval Intelligence to run one of the most nefarious, classified, enhanced interrogation programs of the Cold War. The work took place inside a clandestine facility in the American zone of occupied Germany, called Camp King. The facility’s chief medical doctor was Operation Paperclip’s Dr. Walter Schreiber, the former Surgeon General of the Third Reich. When Dr. Schreiber was secretly brought to America—to work for the U.S. Air Force in Texas—his position was filled with another Paperclip asset, Dr. Kurt Blome, the former Deputy Surgeon General of the Third Reich and the man in charge of the Nazi’s program to weaponize bubonic plague. The activities that went on at Camp King between 1946 and the late 1950s have never been fully accounted for by either the Department of Defense or the CIA.

    “Does accomplishment cancel out past crimes?” Jacobsen asks in her book, noting that several Nazi scientists were celebrated with awards in America, and one had a government building named after him.

    She writes: “Some officials believed that by endorsing the Paperclip program they were accepting the lesser of two evils – that if America didn’t recruit these scientists, the Soviet Communists surely would. Other generals and colonels admired and respected these men and said so.”

    Posted: 02/13/2014 10:09 am EST Updated: 02/13/2014 1:00 pm EST

    Find this story at 13 February 2014

    Copyright huffingtonpost.com

    Behind the secret plan to bring Nazi scientists to US

    As the Allied troops advanced through France in November 1944, three experts in biological weapons huddled, by candlelight, in a grand apartment in Strasbourg, France, guarded by US soldiers.

    The scientists were poring through documents left behind by Dr. Eugen Haagen, a high-ranking Nazi who specialized in weaponizing deadly viruses. They were looking for evidence of the Third Reich’s progress in atomic and biochemical warfare; what they found were chronicles of devastating carnage.

    “Of the 100 prisoners you sent me, 18 died in transport,” Haagen wrote in a memo dated Nov. 15, 1943. “Only 12 are in a condition suitable for my experiments. I therefore request that you send me another 100 prisoners, between 20 and 40 years of age, who are healthy and in a physical condition comparable to soldiers. Heil Hitler.”
    Modal Trigger

    Hermann Oberth (forefront) with officials of the Army Ballistic Missile Agency at Huntsville, Alabama in 1956.
    Photo: Corbis

    Haagen was once a world-renowned genius who had won a fellowship from the Rockefeller Foundation in New York City, who had been shortlisted for a Nobel Prize, who helped create the first vaccine for yellow fever. Yet here was evidence that he — and could it only have been just one doctor? — had been conducting medical experiments on live humans.

    Samuel Goudsmit, leader of this investigative unit, made a list. Haagen was at the top, and he added any names referenced or copied on Haagen’s memos, including Dr. Kurt Blome, the Third Reich’s deputy surgeon general, and Walter Schreiber, the surgeon general. These men were now among America’s most wanted — but not in the way one might assume.

    Within the year, hundreds of the Third Reich’s upper echelon would be relocated to the United States, where they would be given excellent jobs, healthy salaries, and all the benefits of living in a free society.
    Modal Trigger

    The von Braun rocket team is congratulated by Nazi brass in 1942
    Photo: Corbis

    It was a secret program known as Paperclip, and it remains one of the most complicated and controversial epochs in American history. And, still, one of the most classified.

    In her new book “Operation Paperclip: The Secret Intelligence Program to Bring Nazi Scientists to America” (Little, Brown and Company), author Annie Jacobsen uses newly released documents, court transcripts, and family-held archives to give the fullest accounting yet of this endeavor — one shared by the British, the French, and the Russians, all of whom enlisted and embraced top Nazis.

    Wernher von Braun, the Nazi scientist crucial to the development of the V-2 rocket — which held a payload of 2,000 pounds and flew five times beyond the speed of sound — saw it coming: In March 1945, he conscripted two friends to stash his most important research out in an abandoned mine; when Germany lost, von Braun said, he’d use these documents to broker a new life in the United States.

    He knew that no matter what atrocities were eventually discovered, no major world power would refuse the technological advances made by the Nazis — nor could they afford not to know how to combat them, vaccinate against them, outpace them.

    That same year, the Department of Defense created a top-secret, elite task force called the Joint Intelligence Objectives Agency, or JOIA. They were subordinate to the Joint Intelligence Committee, which briefed the Joint Chiefs of Staff on national security threats.

    “To understand the mind-set of the Joint Intelligence Committee,” Jacobsen writes, “consider this: Within one year of the atomic bombing of Hiroshima and Nagasaki, the JIC warned the Joint Chiefs of Staff that the United States needed to prepare for ‘total war’ with the Soviets — to include atomic, chemical, and biological warfare — and they even set an estimated start date of 1952.”

    As of May 1945, Werner von Braun was No. 1 on America’s list for desired Nazi rocket scientists. When he surrendered to US forces on May 2 — having voluntarily decamped from a luxury ski resort in the Alps — von Braun and his colleagues were treated to a hearty breakfast of eggs, coffee and bread, then given freshly made beds in which to sleep.
    Modal Trigger

    President Truman ‘was not made aware of the initiative’
    Photo: Harry S. Truman Library

    “I did not expect to be kicked in the teeth,” von Braun later told an American reporter. “The V-2 was something we had and you didn’t have. Naturally, you wanted to know all about it.”

    Also at the top of the list was Dr. Kurt Blome, Hitler’s head of cancer research and a diehard Nazi. He was discovered at a checkpoint on May 17, 1945, and in his initial interrogation, Blome admitted that he had seen experiments “which led to later atrocities e.g. mass sterilization, gassing of Jews.”

    Then came the capture of Georg Rickhey, an expert on the Third Reich’s impenetrable underground bunkers. Rickhey was interrogated by Col. Peter Beasley, who told him, “As an American officer, I want my country to have full possession of all your knowledge. To my superiors, I shall recommend that you be taken to the United States.”

    Among those tasked with finding and apprehending the most wanted men in the Third Reich — and the number of government agencies that became involved — there was deep discord about the morality of Operation Paperclip.

    Jacobsen accessed the transcript of a volatile meeting, secretly recorded, at the War Department. The names were redacted.

    “One of the ground rules for bringing them over,” said one general, “is that it will be temporary, and at the return of their exploitation they will be sent back to Germany.”

    “I’m opposed,” said another general. “And Pop Powers [nickname of an unknown official] is opposed, the whole War Department is opposed.”

    It didn’t matter. Unofficial US policy held that it was imperative to secretly procure those Nazis who could accelerate America’s scientific, technological and economic advancement.

    This was an increasingly delicate operation. On May 7, 1945, Life magazine had run a series of photos from the concentration camps, and the official US line held that countries such as Uruguay and Argentina, which were welcoming Nazi refugees, should turn them over to stand trial.

    Simultaneously, the US government was learning more and more about just what the Nazis had done: the extermination of millions of Jews; the mass sterilization, the live experiments and operations conducted without anesthesia on humans code-named “adult pigs,” the systematic yanking of gold teeth, the slave labor and starvation, the drowning of men in ice-cold tubs and the many failed attempts to resurrect them, the exploding bodies forced into high-altitude chambers in efforts to master space flight.

    “German science presents a grim spectacle,” wrote Dr. Leopold Alexander, a Viennese Jew who immigrated to the US in 1933. When the US entered the war, Alexander enlisted, and at its end was sent to Germany to determine what the Nazis had wrought and learned medically.
    Modal Trigger

    Wernher von Braun holds a model rocket Aug. 5, 1955, at the Pentagon in Washington.
    Photo: AP

    “Grim for many reasons,” he continued. “First it became incompetent and then it was drawn into the maelstrom of depravity of which this country reeks — the smell of concentration camps, the smell of violent death, torture and suffering.”

    He went on to call the Third Reich’s experimentation “really depraved pseudoscientific criminality . . . It sometimes seems as if the Nazis had taken special pains in making practically every nightmare come true.”

    Meanwhile, the Allies held elite Nazis in two luxurious locales: the Palace Hotel in Luxembourg, renamed “Ashcan,” and Crane Mountain Castle in Hesse, Germany, renamed “Dustbin.”

    Here, the most warped and wicked Nazis lounged in well-appointed rooms, strolled through apple orchards, played chess, smoked and drank, and gave each other lectures in grand halls. In the mornings, Hitler’s doctor taught a workout class.

    In June 1945, officers at Dustbin put out an alert for Dr. Otto Ambros, valuable for his work with toxic gases — specifically tabun, developed by the Nazis and a chemical far more lethal than sarin. Ambros was picked up by an American soldier, who then drove him to a meeting in Heidelberg with members of the US Chemical Warfare Service.

    So comfortable were these negotiations that when the US contingent told Ambros to retrieve the documents relating to tabun production, they let him drive off on his own. Ambros never returned; instead, he fled to an area controlled by the French, who let him return to civilian life in Germany.

    The War Department moved quickly. In July, they made their top-secret project official, circulating a memo titled “Exploitation of German Specialists in Science and Technology in the United States.”

    Jacobsen writes that President Truman “was not made aware of the initiative,” which was initially known as Operation Overcast.

    Months later, when the War Department began tagging the files of their most reprehensible Nazi recruits with paper clips as intra-office code — these Nazis were truly to be smuggled in, made known to no other bureaucracies — the program became known as Operation Paperclip.

    Meanwhile, Truman ordered the Department of Commerce to propagandize the advances made by the Nazis, ones that were now making Americans’ lives easier, more comfortable: Women could buy stockings that wouldn’t run, butter churned so fast and juice now sterilized so simply that there would be an abundance for all. Electrical equipment that had once been the size of crates was no bigger than your smallest finger.
    Modal Trigger

    William Picketing, James Van Allen, and Wernher von Braun (L to R) brandish a model of the first American satellite “Explorer 1″, 31 January 1958.
    Photo: OFF/AFP/Getty Images

    By January 1946, two months after the Nuremberg trials had begun, there were more than 160 Nazis — many with their families — living and working in the United States.

    A good number were housed at a facility called Hilltop in Dayton, Ohio, where many complained they were little more than “caged animals.” The US military scientists working alongside them were disgusted by their new colleagues, expressing “emotions . . . ranging from vehemence to frustration.”

    The other group — at 115, the largest — was a team of rocket scientists held on Fort Bliss in Texas. Their leader was Wernher von Braun, who, it turned out, really loved America. He was enthralled with the desert and the open-air jeeps driven by Army personnel. He became an evangelical Christian. He was permitted to return to Germany to marry his 18-year-old cousin — von Braun was 46 — and bring her back to the US. If he had one complaint, it was his research budget.

    As he later said, while working for the Third Reich “we’d been coddled. Here they were counting pennies.”

    In November 1946, shortly after 10 Nazis were executed at Nuremberg by US Master Sgt. John C. Woods (“I hanged those 10 Nazis . . . and I am proud of it”), news broke that the US had smuggled hundreds of Nazis into the country, and that about 1,000 more were coming. (The final count was close to 1,600.) The government attempted damage control, then message control: These men, so mild-mannered with their silver hair and American sport jackets, had never been members of the Nazi party. The Army disseminated pictures of the men and their families engaged in wholesome outdoor activities, and any reporter requesting an interview had to submit their copy, pre-publication, to the army for approval.

    Not everyone was fooled. Eleanor Roosevelt publicly decried the program, as did Albert Einstein. By March 1947, Paperclip had generated such lacerating public opinion that General Eisenhower, then the US Army chief of staff, demanded a briefing. It lasted 20 minutes, and upon emerging, Eisenhower said he approved of the project.

    The legacy of Paperclip, Jacobsen writes, speaks to the triumph of pragmatism and self-interest above unthinkable atrocity.

    Wernher von Braun helped get us to the moon; in the years before the landing, he was photographed with President Kennedy. Heinrich Rose and Konrad Buttner, two hardcore Nazis, conducted experiments for the US on how best to protect soldiers in atomic warfare.

    Today, the Space Medicine Association and the National Space Club continue to bestow awards named after Nazis. When Jacobsen asked Steve Griffin, head of the National Space Club, why they memorialize Nazi Kurt Debus in this way, he was dispassionate and logical.

    “Simple as it is,” he said, “Kurt Debus is an honored American.”

    By Maureen Callahan February 1, 2014 | 12:29pm

     Find this story at 1 February 2014

    © 2014 NYP Holdings, Inc.

    Nazis Were Given ‘Safe Haven’ in U.S., Report Says

    WASHINGTON — A secret history of the United States government’s Nazi-hunting operation concludes that American intelligence officials created a “safe haven” in the United States for Nazis and their collaborators after World War II, and it details decades of clashes, often hidden, with other nations over war criminals here and abroad.

    The 600-page report, which the Justice Department has tried to keep secret for four years, provides new evidence about more than two dozen of the most notorious Nazi cases of the last three decades.

    It describes the government’s posthumous pursuit of Dr. Josef Mengele, the so-called Angel of Death at Auschwitz, part of whose scalp was kept in a Justice Department official’s drawer; the vigilante killing of a former Waffen SS soldier in New Jersey; and the government’s mistaken identification of the Treblinka concentration camp guard known as Ivan the Terrible.

    The report catalogs both the successes and failures of the band of lawyers, historians and investigators at the Justice Department’s Office of Special Investigations, which was created in 1979 to deport Nazis.

    Perhaps the report’s most damning disclosures come in assessing the Central Intelligence Agency’s involvement with Nazi émigrés. Scholars and previous government reports had acknowledged the C.I.A.’s use of Nazis for postwar intelligence purposes. But this report goes further in documenting the level of American complicity and deception in such operations.

    The Justice Department report, describing what it calls “the government’s collaboration with persecutors,” says that O.S.I investigators learned that some of the Nazis “were indeed knowingly granted entry” to the United States, even though government officials were aware of their pasts. “America, which prided itself on being a safe haven for the persecuted, became — in some small measure — a safe haven for persecutors as well,” it said.

    The report also documents divisions within the government over the effort and the legal pitfalls in relying on testimony from Holocaust survivors that was decades old. The report also concluded that the number of Nazis who made it into the United States was almost certainly much smaller than 10,000, the figure widely cited by government officials.

    The Justice Department has resisted making the report public since 2006. Under the threat of a lawsuit, it turned over a heavily redacted version last month to a private research group, the National Security Archive, but even then many of the most legally and diplomatically sensitive portions were omitted. A complete version was obtained by The New York Times.

    The Justice Department said the report, the product of six years of work, was never formally completed and did not represent its official findings. It cited “numerous factual errors and omissions,” but declined to say what they were.

    More than 300 Nazi persecutors have been deported, stripped of citizenship or blocked from entering the United States since the creation of the O.S.I., which was merged with another unit this year.

    In chronicling the cases of Nazis who were aided by American intelligence officials, the report cites help that C.I.A. officials provided in 1954 to Otto Von Bolschwing, an associate of Adolph Eichmann who had helped develop the initial plans “to purge Germany of the Jews” and who later worked for the C.I.A. in the United States. In a chain of memos, C.I.A. officials debated what to do if Von Bolschwing were confronted about his past — whether to deny any Nazi affiliation or “explain it away on the basis of extenuating circumstances,” the report said.

    The Justice Department, after learning of Von Bolschwing’s Nazi ties, sought to deport him in 1981. He died that year at age 72.

    The report also examines the case of Arthur L. Rudolph, a Nazi scientist who ran the Mittelwerk munitions factory. He was brought to the United States in 1945 for his rocket-making expertise under Operation Paperclip, an American program that recruited scientists who had worked in Nazi Germany. (Rudolph has been honored by NASA and is credited as the father of the Saturn V rocket.)

    The report cites a 1949 memo from the Justice Department’s No. 2 official urging immigration officers to let Rudolph back in the country after a stay in Mexico, saying that a failure to do so “would be to the detriment of the national interest.”

    Justice Department investigators later found evidence that Rudolph was much more actively involved in exploiting slave laborers at Mittelwerk than he or American intelligence officials had acknowledged, the report says.

    Some intelligence officials objected when the Justice Department sought to deport him in 1983, but the O.S.I. considered the deportation of someone of Rudolph’s prominence as an affirmation of “the depth of the government’s commitment to the Nazi prosecution program,” according to internal memos.

    The Justice Department itself sometimes concealed what American officials knew about Nazis in this country, the report found.

    In 1980, prosecutors filed a motion that “misstated the facts” in asserting that checks of C.I.A. and F.B.I. records revealed no information on the Nazi past of Tscherim Soobzokov, a former Waffen SS soldier. In fact, the report said, the Justice Department “knew that Soobzokov had advised the C.I.A. of his SS connection after he arrived in the United States.”

    (After the case was dismissed, radical Jewish groups urged violence against Mr. Soobzokov, and he was killed in 1985 by a bomb at his home in Paterson, N.J. )

    The secrecy surrounding the Justice Department’s handling of the report could pose a political dilemma for President Obama because of his pledge to run the most transparent administration in history. Mr. Obama chose the Justice Department to coordinate the opening of government records.

    The Nazi-hunting report was the brainchild of Mark Richard, a senior Justice Department lawyer. In 1999, he persuaded Attorney General Janet Reno to begin a detailed look at what he saw as a critical piece of history, and he assigned a career prosecutor, Judith Feigin, to the job. After Mr. Richard edited the final version in 2006, he urged senior officials to make it public but was rebuffed, colleagues said.

    When Mr. Richard became ill with cancer, he told a gathering of friends and family that the report’s publication was one of three things he hoped to see before he died, the colleagues said. He died in June 2009, and Attorney General Eric H. Holder Jr. spoke at his funeral.

    “I spoke to him the week before he died, and he was still trying to get it released,” Ms. Feigin said. “It broke his heart.”

    After Mr. Richard’s death, David Sobel, a Washington lawyer, and the National Security Archive sued for the report’s release under the Freedom of Information Act.

    The Justice Department initially fought the lawsuit, but finally gave Mr. Sobel a partial copy — with more than 1,000 passages and references deleted based on exemptions for privacy and internal deliberations.

    Laura Sweeney, a Justice Department spokeswoman, said the department is committed to transparency, and that redactions are made by experienced lawyers.

    The full report disclosed that the Justice Department found “a smoking gun” in 1997 establishing with “definitive proof” that Switzerland had bought gold from the Nazis that had been taken from Jewish victims of the Holocaust. But these references are deleted, as are disputes between the Justice and State Departments over Switzerland’s culpability in the months leading up to a major report on the issue.

    Another section describes as “a hideous failure” a series of meetings in 2000 that United States officials held with Latvian officials to pressure them to pursue suspected Nazis. That passage is also deleted.

    So too are references to macabre but little-known bits of history, including how a director of the O.S.I. kept a piece of scalp that was thought to belong to Dr. Mengele in his desk in hopes that it would help establish whether he was dead.

    The chapter on Dr. Mengele, one of the most notorious Nazis to escape prosecution, details the O.S.I.’s elaborate efforts in the mid-1980s to determine whether he had fled to the United States and might still be alive.

    It describes how investigators used letters and diaries apparently written by Dr. Mengele in the 1970s, along with German dental records and Munich phone books, to follow his trail.

    After the development of DNA tests, the piece of scalp, which had been turned over by the Brazilian authorities, proved to be a critical piece of evidence in establishing that Dr. Mengele had fled to Brazil and had died there in about 1979 without ever entering the United States, the report said. The edited report deletes references to Dr. Mengele’s scalp on privacy grounds.

    Even documents that have long been available to the public are omitted, including court decisions, Congressional testimony and front-page newspaper articles from the 1970s.

    A chapter on the O.S.I.’s most publicized failure — the case against John Demjanjuk, a retired American autoworker who was mistakenly identified as Treblinka’s Ivan the Terrible — deletes dozens of details, including part of a 1993 ruling by the United States Court of Appeals for the Sixth Circuit that raised ethics accusations against Justice Department officials.

    That section also omits a passage disclosing that Latvian émigrés sympathetic to Mr. Demjanjuk secretly arranged for the O.S.I.’s trash to be delivered to them each day from 1985 to 1987. The émigrés rifled through the garbage to find classified documents that could help Mr. Demjanjuk, who is currently standing trial in Munich on separate war crimes charges.

    Ms. Feigin said she was baffled by the Justice Department’s attempt to keep a central part of its history secret for so long. “It’s an amazing story,” she said, “that needs to be told.”

    New York Times, November 12, 2010

    By Eric Lichtblau

    Find this story at 12 November 2010

    The report

    Copyright New York Times 2010

    Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters

    Top-secret documents from the National Security Agency and its British counterpart reveal for the first time how the governments of the United States and the United Kingdom targeted WikiLeaks and other activist groups with tactics ranging from covert surveillance to prosecution.

    The efforts – detailed in documents provided previously by NSA whistleblower Edward Snowden – included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at what the U.S. government calls “the human network that supports WikiLeaks.” The documents also contain internal discussions about targeting the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous.

    One classified document from Government Communications Headquarters, Britain’s top spy agency, shows that GCHQ used its surveillance system to secretly monitor visitors to a WikiLeaks site. By exploiting its ability to tap into the fiber-optic cables that make up the backbone of the Internet, the agency confided to allies in 2012, it was able to collect the IP addresses of visitors in real time, as well as the search terms that visitors used to reach the site from search engines like Google.

    Another classified document from the U.S. intelligence community, dated August 2010, recounts how the Obama administration urged foreign allies to file criminal charges against Assange over the group’s publication of the Afghanistan war logs.

    A third document, from July 2011, contains a summary of an internal discussion in which officials from two NSA offices – including the agency’s general counsel and an arm of its Threat Operations Center – considered designating WikiLeaks as “a ‘malicious foreign actor’ for the purpose of targeting.” Such a designation would have allowed the group to be targeted with extensive electronic surveillance – without the need to exclude U.S. persons from the surveillance searches.

    In 2008, not long after WikiLeaks was formed, the U.S. Army prepared a report that identified the organization as an enemy, and plotted how it could be destroyed. The new documents provide a window into how the U.S. and British governments appear to have shared the view that WikiLeaks represented a serious threat, and reveal the controversial measures they were willing to take to combat it.

    In a statement to The Intercept, Assange condemned what he called “the reckless and unlawful behavior of the National Security Agency” and GCHQ’s “extensive hostile monitoring of a popular publisher’s website and its readers.”

    “News that the NSA planned these operations at the level of its Office of the General Counsel is especially troubling,” Assange said. “Today, we call on the White House to appoint a special prosecutor to investigate the extent of the NSA’s criminal activity against the media, including WikiLeaks, its staff, its associates and its supporters.”

    Illustrating how far afield the NSA deviates from its self-proclaimed focus on terrorism and national security, the documents reveal that the agency considered using its sweeping surveillance system against Pirate Bay, which has been accused of facilitating copyright violations. The agency also approved surveillance of the foreign “branches” of hacktivist groups, mentioning Anonymous by name.

    The documents call into question the Obama administration’s repeated insistence that U.S. citizens are not being caught up in the sweeping surveillance dragnet being cast by the NSA. Under the broad rationale considered by the agency, for example, any communication with a group designated as a “malicious foreign actor,” such as WikiLeaks and Anonymous, would be considered fair game for surveillance.

    Julian Sanchez, a research fellow at the Cato Institute who specializes in surveillance issues, says the revelations shed a disturbing light on the NSA’s willingness to sweep up American citizens in its surveillance net.

    “All the reassurances Americans heard that the broad authorities of the FISA Amendments Act could only be used to ‘target’ foreigners seem a bit more hollow,” Sanchez says, “when you realize that the ‘foreign target’ can be an entire Web site or online forum used by thousands if not millions of Americans.”
    GCHQ Spies on WikiLeaks Visitors

    The system used by GCHQ to monitor the WikiLeaks website – codenamed ANTICRISIS GIRL – is described in a classified PowerPoint presentation prepared by the British agency and distributed at the 2012 “SIGDEV Conference.” At the annual gathering, each member of the “Five Eyes” alliance – the United States, United Kingdom, Canada, Australia and New Zealand – describes the prior year’s surveillance successes and challenges.

    In a top-secret presentation at the conference, two GCHQ spies outlined how ANTICRISIS GIRL was used to enable “targeted website monitoring” of WikiLeaks (See slides 33 and 34). The agency logged data showing hundreds of users from around the world, including the United States, as they were visiting a WikiLeaks site –contradicting claims by American officials that a deal between the U.K. and the U.S. prevents each country from spying on the other’s citizens.

    The IP addresses collected by GCHQ are used to identify individual computers that connect to the Internet, and can be traced back to specific people if the IP address has not been masked using an anonymity service. If WikiLeaks or other news organizations were receiving submissions from sources through a public dropbox on their website, a system like ANTICRISIS GIRL could potentially be used to help track them down. (WikiLeaks has not operated a public dropbox since 2010, when it shut down its system in part due to security concerns over surveillance.)

     

    In its PowerPoint presentation, GCHQ identifies its target only as “wikileaks.” One slide, displaying analytics derived from the surveillance, suggests that the site monitored was the official wikileaks.org domain. It shows that users reached the targeted site by searching for “wikileaks.org” and for “maysan uxo,” a term associated with a series of leaked Iraq war logs that are hosted on wikileaks.org.

    The ANTICRISIS GIRL initiative was operated by a GCHQ unit called Global Telecoms Exploitation (GTE), which was previously reported by The Guardian to be linked to the large-scale, clandestine Internet surveillance operation run by GCHQ, codenamed TEMPORA.

    Operating in the United Kingdom and from secret British eavesdropping bases in Cyprus and other countries, GCHQ conducts what it refers to as “passive” surveillance – indiscriminately intercepting massive amounts of data from Internet cables, phone networks and satellites. The GTE unit focuses on developing “pioneering collection capabilities” to exploit the stream of data gathered from the Internet.

    As part of the ANTICRISIS GIRL system, the documents show, GCHQ used publicly available analytics software called Piwik to extract information from its surveillance stream, not only monitoring visits to targeted websites like WikiLeaks, but tracking the country of origin of each visitor.

    It is unclear from the PowerPoint presentation whether GCHQ monitored the WikiLeaks site as part of a pilot program designed to demonstrate its capability, using only a small set of covertly collected data, or whether the agency continues to actively deploy its surveillance system to monitor visitors to WikiLeaks. It was previously reported in The Guardian that X-KEYSCORE, a comprehensive surveillance weapon used by both NSA and GCHQ, allows “an analyst to learn the IP addresses of every person who visits any website the analyst specifies.”

    GCHQ refused to comment on whether ANTICRISIS GIRL is still operational. In an email citing the agency’s boilerplate response to inquiries, a spokeswoman insisted that “all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorized, necessary and proportionate, and that there is rigorous oversight.”

    But privacy advocates question such assurances. “How could targeting an entire website’s user base be necessary or proportionate?” says Gus Hosein, executive director of the London-based human rights group Privacy International. “These are innocent people who are turned into suspects based on their reading habits. Surely becoming a target of a state’s intelligence and security apparatus should require more than a mere click on a link.”

    The agency’s covert targeting of WikiLeaks, Hosein adds, call into question the entire legal rationale underpinning the state’s system of surveillance. “We may be tempted to see GCHQ as a rogue agency, ungoverned in its use of unprecedented powers generated by new technologies,” he says. “But GCHQ’s actions are authorized by [government] ministers. The fact that ministers are ordering the monitoring of political interests of Internet users shows a systemic failure in the rule of law.”
    Going After Assange and His Supporters

    The U.S. attempt to pressure other nations to prosecute Assange is recounted in a file that the intelligence community calls its “Manhunting Timeline.” The document details, on a country-by-country basis, efforts by the U.S. government and its allies to locate, prosecute, capture or kill alleged terrorists, drug traffickers, Palestinian leaders and others. There is a timeline for each year from 2008 to 2012.

     

    An entry from August 2010 – headlined “United States, Australia, Great Britain, Germany, Iceland” – states: “The United States on August 10 urged other nations with forces in Afghanistan, including Australia, United Kingdom, and Germany, to consider filing criminal charges against Julian Assange.” It describes Assange as the “founder of the rogue Wikileaks Internet website and responsible for the unauthorized publication of over 70,000 classified documents covering the war in Afghanistan.”

     

    In response to questions from The Intercept, the NSA suggested that the entry is “a summary derived from a 2010 article” in the Daily Beast. That article, which cited an anonymous U.S. official, reported that “the Obama administration is pressing Britain, Germany, Australia, and other allied Western governments to consider opening criminal investigations of WikiLeaks founder Julian Assange and to severely limit his nomadic travels across international borders.”

    The government entry in the “Manhunting Timeline” adds Iceland to the list of Western nations that were pressured, and suggests that the push to prosecute Assange is part of a broader campaign. The effort, it explains, “exemplifies the start of an international effort to focus the legal element of national power upon non-state actor Assange, and the human network that supports WikiLeaks.” The entry does not specify how broadly the government defines that “human network,” which could potentially include thousands of volunteers, donors and journalists, as well as people who simply spoke out in defense of WikiLeaks.

    In a statement, the NSA declined to comment on the documents or its targeting of activist groups, noting only that the agency “provides numerous opportunities and forums for their analysts to explore hypothetical or actual circumstances to gain appropriate advice on the exercise of their authorities within the Constitution and the law, and to share that advice appropriately.”

    But the entry aimed at WikiLeaks comes from credentialed officials within the intelligence community. In an interview in Hong Kong last June, Edward Snowden made clear that the only NSA officials empowered to write such entries are those “with top-secret clearance and public key infrastructure certificates” – a kind of digital ID card enabling unique access to certain parts of the agency’s system. What’s more, Snowden added, the entries are “peer reviewed” – and every edit made is recorded by the system.

    The U.S. launched its pressure campaign against WikiLeaks less than a week after the group began publishing the Afghanistan war logs on July 25, 2010. At the time, top U.S. national security officials accused WikiLeaks of having “blood” on its hands. But several months later, McClatchy reported that “U.S. officials concede that they have no evidence to date that the documents led to anyone’s death.”

    The government targeting of WikiLeaks nonetheless continued. In April 2011, Salon reported that a grand jury in Virginia was actively investigating both the group and Assange on possible criminal charges under espionage statutes relating to the publication of classified documents. And in August of 2012, the Sydney Morning Herald, citing secret Australian diplomatic cables, reported that “Australian diplomats have no doubt the United States is still gunning for Julian Assange” and that “Australia’s diplomatic service takes seriously the likelihood that Assange will eventually be extradited to the US on charges arising from WikiLeaks obtaining leaked US military and diplomatic documents.”

    Bringing criminal charges against WikiLeaks or Assange for publishing classified documents would be highly controversial – especially since the group partnered with newspapers like The Guardian and The New York Times to make the war logs public. “The biggest challenge to the press today is the threatened prosecution of WikiLeaks, and it’s absolutely frightening,” James Goodale, who served as chief counsel of the Times during its battle to publish The Pentagon Papers, told the Columbia Journalism Review last March. “If you go after the WikiLeaks criminally, you go after the Times. That’s the criminalization of the whole process.”

    In November 2013, The Washington Post, citing anonymous officials, reported that the Justice Department strongly considered prosecuting Assange, but concluded it “could not do so without also prosecuting U.S. news organizations and journalists” who had partnered with WikiLeaks to publish the documents. According to the Post, officials “realized that they have what they described as a ‘New York Times problem’” – namely, that any theory used to bring charges against Assange would also result in criminal liability for the Times, The Guardian, and other papers which also published secret documents provided to WikiLeaks.
    NSA proposals to target WikiLeaks

    As the new NSA documents make clear, however, the U.S. government did more than attempt to engineer the prosecution of Assange. NSA analysts also considered designating WikiLeaks as a “malicious foreign actor” for surveillance purposes – a move that would have significantly expanded the agency’s ability to subject the group’s officials and supporters to extensive surveillance.

    Such a designation would allow WikiLeaks to be targeted with surveillance without the use of “defeats” – an agency term for technical mechanisms to shield the communications of U.S. persons from getting caught in the dragnet.

    That top-secret document – which summarizes a discussion between the NSA’s Office of the General Counsel and the Oversight and Compliance Office of the agency’s Threat Operations Center – spells out a rationale for including American citizens in the surveillance:

    “If the foreign IP is consistently associated with malicious cyber activity against the U.S., so, tied to a foreign individual or organization known to direct malicious activity our way, then there is no need to defeat any to, from, or about U.S. Persons. This is based on the description that one end of the communication would always be this suspect foreign IP, and so therefore any U.S. Person communicant would be incidental to the foreign intelligence task.”

    In short, labeling WikiLeaks a “malicious foreign target” would mean that anyone communicating with the organization for any reason – including American citizens – could have their communications subjected to government surveillance.

    When NSA officials are asked in the document if WikiLeaks or Pirate Bay could be designated as “malicious foreign actors,” the reply is inconclusive: “Let us get back to you.” There is no indication of whether either group was ever designated or targeted in such a way.

    The NSA’s lawyers did, however, give the green light to subject other activists to heightened surveillance. Asked if it would be permissible to “target the foreign actors of a loosely coupled group of hackers … such as with Anonymous,” the response is unequivocal: “As long as they are foreign individuals outside of the US and do not hold dual citizenship … then you are okay.”
    NSA Lawyers: “It’s Nothing to Worry About”

    Sanchez, the surveillance expert with the Cato Institute, says the document serves as “a reminder that NSA essentially has carte blanche to spy on non-Americans. In public statements, intelligence officials always talk about spying on ‘terrorists,’ as if those are the only targets — but Section 702 [of the 2008 FISA Amendments Act] doesn’t say anything about ‘terrorists.’ They can authorize collection on any ‘persons reasonably believed to be [located] outside the United States,’ with ‘persons’ including pretty much any kind of group not ‘substantially’ composed of Americans.”

    Sanchez notes that while it makes sense to subject some full-scale cyber-attacks to government surveillance, “it would make no sense to lump together foreign cyberattackers with sites voluntarily visited by enormous numbers of Americans, like Pirate Bay or WikiLeaks.”

    Indeed, one entry in the NSA document expressly authorizes the targeting of a “malicious” foreign server – offering Pirate Bay as a specific example –“even if there is a possibility that U.S. persons could be using it as well.” NSA officials agree that there is no need to exclude Americans from the surveillance, suggesting only that the agency’s spies “try to minimize” how many U.S. citizens are caught in the dragnet.

    Another entry even raises the possibility of using X-KEYSCORE, one of the agency’s most comprehensive surveillance programs, to target communications between two U.S.-based Internet addresses if they are operating through a “proxy” being used for “malicious foreign activity.” In response, the NSA’s Threat Operations Center approves the targeting, but the agency’s general counsel requests “further clarification before signing off.”

    If WikiLeaks were improperly targeted, or if a U.S. citizen were swept up in the NSA’s surveillance net without authorization, the agency’s attitude seems to be one of indifference. According to the document – which quotes a response by the NSA’s Office of General Counsel and the oversight and compliance office of its Threat Operations Center – discovering that an American has been selected for surveillance must be mentioned in a quarterly report, “but it’s nothing to worry about.”

    The attempt to target WikiLeaks and its broad network of supporters drew sharp criticism from the group and its allies. “These documents demonstrate that the political persecution of WikiLeaks is very much alive,” says Baltasar Garzón, the Spanish former judge who now represents the group. “The paradox is that Julian Assange and the WikiLeaks organization are being treated as a threat instead of what they are: a journalist and a media organization that are exercising their fundamental right to receive and impart information in its original form, free from omission and censorship, free from partisan interests, free from economic or political pressure.”

    For his part, Assange remains defiant. “The NSA and its U.K. accomplices show no respect for the rule of law,” he told The Intercept. “But there is a cost to conducting illicit actions against a media organization.” Referring to a criminal complaint that the group filed last year against “interference with our journalistic work in Europe,” Assange warned that “no entity, including the NSA, should be permitted to act against a journalist with impunity.”

    Assange indicated that in light of the new documents, the group may take further legal action.

    “We have instructed our general counsel, Judge Baltasar Garzón, to prepare the appropriate response,” he said. “The investigations into attempts to interfere with WikiLeaks’ work will go wherever they need to go. Make no mistake: those responsible will be held to account and brought to justice.”

    By Glenn Greenwald and Ryan Gallagher
    18 Feb 2014, 1:50 AM EST

    Find this story at 18 February 2014

    © 2014 First Look Productions, Inc.

    Leaked NSA documents show debate over tracking WikiLeaks, The Pirate Bay, and others

    Leaked documents posted by Glenn Greenwald and Ryan Gallagher hint at the discussions that took place around online actors like WikiLeaks, The Pirate Bay, and Anonymous, as well as the standards for spying on foreign and domestic internet users. At The Intercept, Greenwald and Gallagher have revealed details about when the NSA and agencies abroad believe it’s acceptable to target a person or site without “defeats” or measures to prevent collecting American information, with an eye towards groups that have proved a thorn in the side of government agencies.

    Julian Assange appears in national security ‘Manhunting Timeline’

    “Can we treat a foreign server who stores, or potentially disseminates leaked or stolen US data on it’s [sic] server as a ‘malicious foreign actor’ for the purpose of targeting with no defeats? Examples: WikiLeaks, thepiratebay.org, etc.” says one of several frequently asked questions apparently posted to an intelligence wiki for the US and other nations in the Five Eyes surveillance partnership. “Let us get back to you,” said a response from the NSA/CSS [Central Security Service] Threat Operation Center and the NSA’s Office of General Counsel. Another question asks whether it’s legal to target members of Anonymous who operate outside the US. “As long as they are foreign individuals outside of the US and do not hold dual citizenship… then you are okay,” came the answer. Agencies were not, however, apparently allowed to store copies of classified documents leaked by Anonymous or other groups in order to analyze the data.

    WikiLeaks in particular came under fire. In addition to these questions, The Intercept leaked parts of a “Manhunting Timeline” that details where and how the US government is attempting to find, capture, or kill terrorists, drug traffickers, and others. This timeline apparently included information on Julian Assange, including attempts to pressure foreign governments into taking legal action against him and “the human network that supports WikiLeaks.” None of this comes as a surprise — the government’s attempts to get governments to put pressure on Assange is well known. Likewise, Anonymous has allegedly compromised government computers, and it’s not strange that the NSA wants to monitor it. The question of treating leaked document repositories as malicious foreign actors is thornier, playing into much larger debates over whether non-traditional journalism should be given the same protection as older outlets like The New York Times.

    “If you ‘guess’ foreign and it’s not, then it is a serious violation.”

    More generally, the document shows a complicated dance between minimizing US data collection and casting an expansive net over foreign surveillance. According to the FAQ, it’s legal to monitor foreign servers that Americans visit (The Pirate Bay is cited again) so long as agents attempt to filter out US information. The same goes for botnets that are operated from hacked US computers by a foreign source. As before, the document points to a fairly low standard for being certain that a target is foreign: 51 percent. A more complicated question is how agents are allowed to search traffic from US-based web giants like Gmail and Twitter. If an agency knows that a foreign potential threat is using one of these sites, it’s theoretically possible to look for traffic from it. But “if you ‘guess’ foreign and it’s not, then it is a serious violation.” In general, though, accidentally making queries a US person who was believed to be foreign was “nothing to worry about,” although it had to be logged for the Office of General Counsel.

    The revelations here are far less conclusive than many of the leaked documents published so far. One slide apparently from an expanded version of this GCHQ document shows an analytics page that seems to monitor visits to WikiLeaks, including which countries visitors came from and how they found the site. But it’s not clear whether this is an ongoing program or a proof of concept test, especially given how few visits appear to be logged. The results are also broadly similar to what someone would get from a basic analytics page, not detailed user information. This slideshow and the FAQ do, however, give us a look into how the NSA and other agencies view online spycraft, both inside and outside the US.

    By Adi Robertson on February 18, 2014 10:36 am

     

    Find this story at 18 February 2014

    © 2014 Vox Media,

    New Snowden docs show NSA, GCHQ spied on WikiLeaks, Pirate Bay users; GCHQ conducts broad surveillance of social media and watched WikiLeaks users.

    Squeaky Dolphin, GCHQ’s broad social media monitoring tool, is part of the agency’s campaign to “understand and shape the Human Terrain”—that is, regional public sentiment.

     

    Documents obtained by former NSA contractor Edward Snowden and published on The Intercept show that NSA analysts monitored content on The Pirate Bay and used the agency’s surveillance systems to track where it came from. The documents also show that the NSA’s British partners at the GCHQ used XKeyscore data as part of a surveillance program on sites that included WikiLeaks. That was part of a broader psychological profiling and targeting program to collect intelligence, influence individuals online, and disrupt groups like Anonymous that were considered threats.

    The new documents show that the GCHQ conducted “broad real-time monitoring of social media activities, processing data on activities like watching YouTube videos and Facebook Likes to profile, categorize, and target individuals for psychological operations.” The NSA documents in the latest disclosure refer to monitoring for content that could be considered “malicious foreign activity.” But it’s clear that the NSA also used its XKeyscore surveillance to dig through traffic to the torrent-sharing site, and it could very well have profiled foreign users of sites like WikiLeaks and monitored their access to that and other websites.

    However, the documents—one an internal NSA “frequently asked questions” Wiki page and the other a set of GCHQ slides on psychological operations—do not provide a picture of how much information about people accessing WikiLeaks was shared between the GCHQ and the NSA. And while the documents point to NSA monitoring of Pirate Bay, there’s no suggestion of how the information gathered was used or if it was used at all.

    A third, unpublished document shows that the Obama administration apparently encouraged foreign governments in 2010 (including the UK) to pursue charges against WikiLeaks for the publication of diplomatic “wires” provided by Chelsea Manning, formerly known as Bradley Manning.
    “Squeaky Dolphin,” “Airwolf,” and “AnticrisisGirl”

    The GCHQ slide deck, published in 2012, highlights two tools used to conduct social networking, Web monitoring, and profiling. The first, called “Squeaky Dolphin,” pulls online activities within Web traffic caught by the agency’s monitoring systems. The monitoring systems are called “Airwolf” in the slides, which may be a UK codeword for the GCHQ’s equivalent of XKeyscore. That data includes webmail, blogs visited, YouTube views, Facebook “likes” clicked on websites themselves, and other data culled from individual users’ captured activity.

    It runs those activities, captured in real-time, through IBM’s InfoSphere Streams processing software to create analytical feeds. Those feeds are then piped into a Splunk database and surfaced through a “dashboard” view that allows analysts to find trends in sentiment. As an example, the slides showed activity related to cricket matches in London and the surge in Facebook likes for Conservative member of Parliament Liam Fox. It can also be used to spot trends in traffic that might indicate upcoming events such as protests or other civil unrest.

    While Squeaky Dolphin tends to look at things with a wider view, “AnticrisisGirl” is a bit more targeted. It can be used to passively monitor specific websites—including traffic to WikiLeaks, as the slides demonstrate. The tool can be tuned to a specific set of Internet user signatures or keywords, and it provides analytics of their behavior in real time, capturing search terms or direct Web addresses used to get to the sites in question.
    “Nothing to worry about”

    The final document in the latest disclosure, from an NSA internal Wiki, is entitled “Discovery SIGINT Targeting Scenarios and Compliance.” Created in 2011, it provides guidance on what is and isn’t allowed in performing XKeyscore queries and using other analytics tools to capture and analyze data. The document explains when it’s allowed to query against US “selectors”—people or systems running within the United States.

    One of the entries is entitled “Unknowingly targeting a US person”:

    I screwed up…the selector had a strong indication of being foreign, but it turned out to be US…now what?

    NOC/OGC RESPONSE: With all querying, if you discover it actually is US, then it must be submitted and go in the [Office of General Counsel] quarterly report…’but it’s nothing to worry about.’ (Source #001)

    Several of the entries on the Wiki page relate to monitoring of PirateBay. One question posted asked whether it was OK to back-trace connections to thepiratebay.org “even if it hops through US based proxies.” The NSA’s Office of General Counsel responded that it was allowed only by use of metadata “chaining” in compliance with the Department of Defense’s Supplemental Procedures Governing Communications Metadata Analysis” (SPCMA). That order requires that analysts “enter a foreign intelligence (FI) justification for making a query or starting a chain”—in other words, analysts can’t just start a query of a post on The Pirate Bay without documenting their cause.

    Another question posted about The Pirate Bay asked if a password for an account associated with a US person was enough to rule out tracking the source. “If a list of .mil passwords were released to thepiratebay.org…can we go back into [XKeyscore data] (using a custom created fingerprint) to search for traffic containing that password in foreign traffic just before the release?” The official response was that while a password alone would not normally be considered to a “US person,” searching for the password data for military accounts would be allowed due to the NSA’s support role for the Defense Department. Such actions would be “consistent with the SIGINT Consensual Collection package signed by [the commander of] USCYBERCOM and [director of the NSA], appropriate to both of his hats”—referring to Gen. Keith Alexander’s dual role as head of both DOD’s cyber operations and the NSA.

    Ironically, the NSA’s privacy regulations do keep it from collecting one type of data—private information published by hackers. In a response to a question on whether it was legal to store data exposed by Anonymous or other groups for forensic purposes, the NSA general counsel said it was only legal to retain “.mil information.” It wasn’t clear whether it was legal to retain data from other government agencies.

    by Sean Gallagher – Feb 18 2014, 8:35pm +0100

     Find this story at 18 February 2014

    © 2014 Condé Nast.

    NSA, GCHQ targeted WikiLeaks network; U.K. and U.S. governments used surveillance and political pressure against publishers of government abuses

    The latest report from the Intercept based on Edward Snowden’s NSA leaks reveals how the NSA and its British counterpart GCHQ targeted WikiLeaks and its supporters. The report details how the U.S. and U.K. governments deployed surveillance tools against WikiLeaks networks and supporters, while pressuring international governments to persecute the organization’s founder, Julian Assange, over the publication of the Afghanistan war logs. The documents also show that the NSA considered ways to spy on Anonymous affiliates and hackers as well as users of file-sharing site Pirate Bay.

    The documents are some of the most significant to come to light yet in highlighting the government’s engagement in what Snowden’s attorney Jesselyn Raddack has long called a “war on information.” Publishers and activists have been specifically targeted for making public otherwise secrecy-shrouded instances of abuses of power by the government and the military. “This is a very troubling report,” said Jameel Jaffer, American Civil Liberties Union deputy legal director. “Publishers who disclose abuses of government power should not be subjected to invasive surveillance for having done so, and individuals should not be swept up into surveillance dragnets simply because they’ve visited websites that report on those abuses.”

    The efforts – detailed in documents provided previously by NSA whistleblower Edward Snowden – included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at what the U.S. government calls “the human network that supports WikiLeaks.” The documents also contain internal discussions about targeting the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous.

    One classified

    Tuesday, Feb 18, 2014 07:31 PM +0100
    Natasha Lennard

    Find this story at 18 February 2013

    © 2014 The Associated Press

    NSA, British spy agency targeted Assange & the WikiLeaks’ ‘human network’

    American and British spy agencies conducted a campaign against the WikiLeaks website and its surrounding “human network,” according to a new report.

    The article, appearing Tuesday in the online publication The Intercept, is based on new information found in documents previously released by Edward Snowden. He is the former National Security Agency (NSA) contractor who has made public — through WikiLeaks — a large cache of otherwise secret NSA materials.

    One classified document from the British spy agency Government Communications Headquarters (GCHQ) appears to be presenting a primer on passive monitoring of websites. But the Intercept story adds the factor that GCHQ’s monitoring system, called ANTICRISIS GIRL, secretly monitored visitors to WikiLeaks via a tap into Internet backbone cables, capturing in real time the IP addresses of site visitors.

    Also included is a 2011 document of an internal NSA wiki with a brief discussion about whether the classification “malicious foreign actor” can be applied to WikiLeaks:

    “Can we treat a foreign server who stores or potentially disseminates leaked or stolen data on its server as a ‘malicious foreign actor’ for the purpose of targeting with no defeats? Examples: WikiLeaks, thepiratebay.org, etc.”

    The response by an unnamed NSA employee says, “Let me get back to you.” The term “no defeats” is considered to mean “with no protections.” The inclusion of the Pirate Bay site, which has been cited for copyright violations, either indicates that classified material was thought to be part of its inventory, or the national security agency was expanding its scope to include copyright.

    There is no indication that WikiLeaks or Pirate Bay was actually classified as a “malicious foreign actor” by the NSA. But a 2008 U.S. Army report did identify WikiLeaks as an enemy.

    The “human network” also included, of course, WikiLeaks’ founder and editor-in-chief, Julian Assange. An August, 2010 unclassified document also unearthed by The Intercept indicates that the U.S. urged other countries fighting in Afghanistan to file criminal charges against Assange for the publication of more than 70,000 classified documents relating to the war, which had been provided by Army Private First Class Bradley Manning.

    The document said that this “appeal exemplifies the start of an international effort to focus the legal element of national power upon non-state actor Assange and the human network that supports WikiLeaks.”

    Last year, James Goodale, then the chief counsel of The New York Times, told the Columbia Journalism Review that “the biggest challenge to the press today is the threatened persecution of WikiLeaks, and it’s absolutely frightening.” The Times worked with WikiLeaks in publishing the content of some of the secret documents.

    February 18, 2014 1:00 PM
    Barry Levine

     Find this story at 18 February 2014

    © Copyright 2014 VentureBeat

    << oudere artikelen  nieuwere artikelen >>