• Buro Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, de overheid in Nederland en Europa kritisch volgt. Een grond-rechten kollektief dat al 30 jaar publiceert over uitbreiding van repressieve wetgeving, publiek-private samenwerking, bevoegdheden, overheids-optreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Stakeknife: double agent in IRA ‘was given alibi by senior British officials’

    Van nieuwsblog.burojansen.nl

    Panorama documentary claims agent who leaked secrets to British army is
    linked to 18 murders in 1980s and 90s

    One of Britain’s most important agents inside the IRA has been linked to
    18 murders and was provided with an alibi by a senior police officer to
    avoid getting him arrested during the Troubles, it has emerged.
    Army whistleblower to testify on IRA double agent Stakeknife
    Read more

    The Guardian can also reveal that the informer codenamed “Stakeknife”
    reported directly to the late Martin McGuinness in the 1980s and 90s
    when the man who would become Northern Ireland’s deputy first minister
    was the IRA’s northern commander and army council member.

    Stakeknife, whose real name is believed to be Freddie Scappaticci, was
    the IRA’s chief spycatcher, briefing McGuinness, all the while betraying
    some of the most important secrets to the British army.

    Further light is shone on the career of Stakeknife in the BBC Panorama
    documentary titled The Spy in the IRA to be broadcast on Tuesday night.

    The programme focuses on Scappaticci’s role as head of the IRA’s
    so-called “nutting squad”, whose task was to smoke out, interrogate and
    in most cases kill members suspected of being informers.

    Panorama claims to have linked Stakeknife directly to 18 murders of IRA
    members accused of being agents, with Scappaticci’s unit responsible for
    30 deaths overall.

    In the film, a retired Royal Ulster Constabulary DI, Tim McGregor,
    claims that a superior officer in the force thwarted his and his
    colleagues’ efforts to arrest Scappaticci. McGregor and fellow RUC
    officers wanted to question Scappaticci after a forensic investigation
    found his thumbprint in a Belfast house where the police believed one of
    their agents was about to be shot by the IRA.

    The programme alleges that an army report stated a senior police officer
    told Scappaticci’s handlers about the pending arrest and an alibi was
    concocted by them to prevent Stakeknife being taken into custody.

    McGregor tells Panorama that without that alibi Scappaticci would have
    been arrested and charged in connection with the other informer’s
    abduction.
    IRA informer accuses police of abandoning him to die
    Read more

    Northern Ireland’s director of public prosecutions, Barra McGrory, who
    was once a solicitor for the president of Sinn Féin, Gerry Adams,
    described any move to “allow” certain informers to die in order to
    promote and protect Stakeknife within IRA’s ranks as having “driven a
    coach and horses” through the criminal justice system.

    McGrory refused to comment on allegations aired in the programme over
    the retirement of the deputy director of public prosecutions after
    reviewing her decision in 2007 not to prosecute Scappaticci over claims
    he committed perjury in court. The Belfast-born son of Italian
    immigrants denied in court he was Stakeknife.

    The then senior DPP lawyer, now deputy DPP, who made that decision was
    Pamela Aitchison but her former boss McGrory tells the programme he
    could not discuss “personnel issues”.

    A former RUC assistant chief constable, Raymond White, also declines to
    state how many of his agents or informers he lost while Scappaticci led
    the IRA’s internal security unit.

    Meanwhile, the whistleblower who first exposed the existence of
    Stakeknife back in 2003 accused the agent’s associates of “turning a
    blind eye” to the corruption of the criminal justice system.

    Ian Hurst, a former military intelligence operative for the army’s Force
    Research Unit, told the Guardian: “The political class created this and
    other similar intelligence problems. That said, they needed and relied
    upon weak-minded or selfish people in sensitive positions to facilitate
    cover-ups.

    “The aim of the state cover-up was to degrade the available evidence and
    make it almost impossible to portion blame upon culpable individuals.
    The state succeeded on both points,” he said.
    ‘Stakeknife’: police spy in IRA to be investigated over murders
    Read more

    The “Stakeknife” scandal is being investigated by an independent police
    team led by former counter-terrorism detective John Boutcher, now chief
    constable of Bedfordshire. Boutcher’s Operation Kenova has a budget of
    £30m but has so far been unable to interview Ian Hurst, the man who
    first made public the existence of Stakeknife.

    A Ministry of Defence court injunction still bars Hurst from talking to
    police officers about his knowledge of Stakeknife from his time as a FRU
    officer.

    Another military intelligence officer who operated in the region when
    Stakeknife was being managed as a high-grade agent, compared the IRA
    relationship between Scappaticci and McGuinness respectively to that of
    the “operation manager” and the “managing director” in terms of deciding
    on the approach to suspected spies and their fate once unmasked.

    Henry McDonald Ireland correspondent
    Tuesday 11 April 2017 06.02 BST
    Find this story at 11 April 2017

    Copyright The Guardian

    Met police accused of using hackers to access protesters’ emails

    Van nieuwsblog.burojansen.nl

    Exclusive: Watchdog investigates claim that secretive unit worked with Indian police to obtain campaigners’ passwords

    An anonymous letter claimed the Scotland Yard unit accessed activists’ email accounts for ‘a number of years’.

    The police watchdog is investigating allegations that a secretive Scotland Yard unit used hackers to illegally access the private emails of hundreds of political campaigners and journalists.

    The allegations were made by an anonymous individual who says the unit worked with Indian police, who in turn used hackers to illegally obtain the passwords of the email accounts of the campaigners, and some reporters and press photographers.

    Met presses undercover police inquiry to examine fewer officers
    Read more
    The person, who says he or she previously worked for the intelligence unit that monitors the activities of political campaigners, detailed their concerns in a letter to the Green party peer Jenny Jones. The peer passed on the allegations to the Independent Police Complaints Commission (IPCC), which is investigating.

    Hacked passwords were passed to the Metropolitan police unit, according to the writer of the letter, which then regularly checked the emails of the campaigners and the media to gather information. The letter to Jones listed the passwords of environmental campaigners, four of whom were from Greenpeace. Several confirmed they matched the ones they had used to open their emails.

    The letter said: “For a number of years the unit had been illegally accessing the email accounts of activists. This has largely been accomplished because of the contact that one of the officers had developed with counterparts in India who in turn were using hackers to obtain email passwords.”

    Jones said: “There is more than enough to justify a full-scale criminal investigation into the activities of these police officers and referral to a public inquiry. I have urged the Independent Police Complaints Commission to act quickly to secure further evidence and to find out how many people were victims of this nasty practice.”

    The letter also alleges that emails of reporters and photographers, including two working for the Guardian, were monitored. A spokesperson for the Guardian said: “Allegations that the Metropolitan police has accessed the email accounts of Guardian journalists are extremely concerning and we expect a full and thorough investigation into these claims.”

    The IPCC has for several months been investigating claims that the national domestic extremism and disorder intelligence unit shredded a large number of documents over a number of days in May 2014.

    The stories you need to read, in one handy email
    Read more
    Last month the IPCC said it had uncovered evidence suggesting the documents had been destroyed despite a specific instruction that files should be preserved to be examined by a judge-led public inquiry into the undercover policing of political groups.

    The letter claimed that the shredding “has been happening for some time and on a far greater scale than the IPCC seems to be aware of”. The author added that “the main reason for destroying these documents is that they reveal that [police] officers were engaged in illegal activities to obtain intelligence on protest groups”.

    The letter to Jones lists 10 individuals, alongside specific passwords that they used to access their email accounts. Lawyers at Bindmans, who are representing Jones, contacted six on the list and, after outlining the allegations, asked them to volunteer their passwords.

    Five of them gave the identical password that had been identified in the letter. The sixth gave a password that was almost the same. The remaining four on the list have yet to be approached or cannot be traced.

    Colin Newman has for two decades volunteered to help organise mainly local Greenpeace protests which he says were publicised to the media. He used the password specified in the letter for his private email account between the late 1990s and last year.

    Newman said he felt “angry and violated, especially for the recipients”. He added: “I am open about my actions as I make a stand and am personally responsible for those, but it is not fair and just that others are scrutinised.

    “I am no threat. There is no justification for snooping in private accounts unless you have a reason to do so, and you have the authority to do that.”

    He said he had been cautioned by the police once, for trespassing on the railway during a protest against coal about two years ago.

    Another on the list was Cat Dorey who has worked for Greenpeace, both as an employee and a volunteer, since 2001. She said all the protests she had been involved in were non-violent.

    The password specified in the letter sent to Jones had been used for emails that contained private information about her family and friends.

    She said: “Even though Greenpeace UK staff, volunteers, and activists were always warned to assume someone was listening to our phone conversations or reading our emails, it still came as a shock to find out I was being watched by the police. It’s creepy to think of strangers reading my personal emails.”

    In 2005, she was part of a group of Greenpeace protesters who were sentenced to 80 hours of community service after installing solar panels on the home of the then deputy prime minister, John Prescott, in a climate change demonstration.

    According to the letter, the “most sensitive side of the work was monitoring the email accounts of radical journalists who reported on activist protests (as well as sympathetic photographers) including at least two employed by the Guardian newspaper”. None were named.

    Investigators working for the IPCC have met Jones twice with her lawyer, Jules Carey, and have asked to interview the peer. An IPCC spokesperson said: “After requesting and receiving a referral by the Metropolitan police service, we have begun an independent investigation related to anonymous allegations concerning the accessing of personal data. We are still assessing the scope of the investigation and so we are not able to comment further.”

    The letter’s writer said he or she had spoken out about the “serious abuse of power” because “over the years, the unit had evolved into an organisation that had little respect for the law, no regard for personal privacy, encouraged highly immoral activity and, I believe, is a disgrace”.

    In recent years, the unit has monitored thousands of political activists, drawing on information gathered by undercover officers and informants as well as from open sources such as websites. Police chiefs say they need to keep track of a wide pool of activists to identify the small number who commit serious crime to promote their cause.

    But the unit has come in for criticism after it was revealed to be compiling files on law-abiding campaigners, including John Catt, a 91-year-old pensioner with no criminal record as well as senior members of the Green party including the MP Caroline Lucas.

    The Metropolitan police said the IPCC had made it “aware of anonymous allegations concerning the accessing of personal data, and requested the matters were referred to them by the MPS. This was done. The MPS is now aware that the IPCC are carrying out an independent investigation.”

    Rob Evans
    Tuesday 21 March 2017 16.35 GMT Last modified on Wednesday 22 March 2017 00.50 GMT

    Find this story at 22 March 2017

    © 2017 Guardian News and Media Limited

    The letter I received about alleged police hacking shows how at risk we all are

    Van nieuwsblog.burojansen.nl

    The whistleblower lists damning claims of spying on innocent individuals by a secretive Scotland Yard unit. It’s now vital that we hold the police to account
    ‘When the police act with impunity all of our private lives are put at risk’

    As the only Green party peer I receive a lot of post to my office in the House of Lords. Rarely, though, do I open letters like the one that has been revealed. The anonymous writer alleged that there was a secretive unit within Scotland Yard that has used hackers to illegally access the emails of campaigners and journalists. It included a list of 10 people and the passwords to their email accounts.

    As soon as I read the first sentence of the letter, I knew the content would be astonishing – and when some aspects of the letter were corroborated by lawyers and those on the list – I was convinced that we owed it to this brave whistleblower to hold the police to account.

    The list of allegations is lengthy. It includes illegal hacking of emails, using an Indian-based operation to do the dirty work, shredding documents and using sex as a tool of infiltration. And these revelations matter to all of us. None of us knows whether the police organised for our emails to be hacked, but all of us know the wide range of personal information that our emails contain. It might be medical conditions, family arguments, love lives or a whole range of drug- or alcohol-related misdemeanours.

    When the police act with impunity, all of our private lives are put at risk. Whether you’re involved in a local campaign against library closures, a concerned citizen worried about air pollution or someone working for a charity – who’s to say that officers won’t be spying on the emails you send? The police put me on the domestic extremism database during the decade when I was on the Metropolitan Police Authority signing off their budgets and working closely with officers on the ground to fight crimes such as road crime and illegal trafficking. If someone in my position – no criminal record and on semi-friendly terms with the Met commissioner – can end up on the database, then you can too.

    The truth is that without the bravery and professionalism of two serving police officers who have blown the whistle on state snooping I would know nothing about my files, and those of other campaigners, being shredded by the Domestic Extremism Unit. We would have had no suspicion that those files had been shredded to cover up the illegal hacking of personal and work e-mails by the police.

    Please don’t fall for the old establishment lie that the problem is a few rotten apples. This alleged criminality is the result of a deliberate government policy of using the police and security services to suppress dissent and protest in order to protect company profits and the status quo. Such an approach inevitably leads to police officers overstepping the mark as they feel emboldened by those at the top levels of government and an immunity from prosecution provided by senior officers keen to please the people who decide their budgets.

    The stories you need to read, in one handy email
    Read more
    The police don’t always act as neutral agents of the law. We know that the Thatcher government’s determination to break the miners’ strike led to the Orgreave confrontation in 1984. There are still allegations about the links between the police and those running blacklisting databases that led to hundreds of construction workers being condemned to unemployment and poverty.

    And don’t mistake this for a partisan attack on Conservative politicians. Theresa May has forced through the draconian Investigatory Powers Act, but the Labour party too has been timid at best in opposing this snoopers’ charter. Indeed it was the Blair government that left a legacy of draconian public order laws, and which broadly defined the anti-terrorism legislation upon which an edifice of modern surveillance powers has been constructed.

    Many are unaware that joining an anti-fracking group, or going on a demonstration, could get you labelled a domestic extremist, photographed, questioned and followed for months or even years – without ever having been convicted of a crime.

    It’s only by speaking out against these intrusions that we are able to challenge this rotten culture of impunity. After all, it was David Cameron who gave us the Hillsborough inquiry and Theresa May who set up the Pitchford inquiry into undercover officers. Politicians don’t always do things for good reasons, but they do respond to public pressure.

    Change is possible, but in the meantime, we should be doing everything we can to make it hard for the police to spy on us. Use encryption, two-step email security and other precautions suggested by organisations such as Liberty. Don’t stop saying what you think, or working to make the world a better place, but do assume that the police will be working to protect the companies, banks or energy companies that you want to challenge.

    It isn’t how things should be, but the evidence shows that is the way things are.

    A campaign to get the police out of the lives of environmentalists and social justice campaigners is a good start, but it will fail unless it reaches out – starting by working with those in the Muslim community intimidated by Prevent.

    Above all, we must convince the middle ground of society that everyone will be safer if the security services focused on what we all want them to do – stopping terrorists and serious criminals. This is not unreasonable, and the starting point is a change to the legislation so that it narrows the definition of terrorism to exclude the nonviolent, noisy and rebellious

    Wednesday 22 March 2017 15.23 GMT Last modified on Wednesday 22 March 2017 17.29 GMT
    Jenny Jones
    Find this story at 22 March 2017

    © 2017 Guardian News and Media Limited

    Police Scotland confirms secret G8 file on notorious undercover police unit

    Van nieuwsblog.burojansen.nl

    POLICE Scotland has confirmed that a secret file was created on the activities of a disgraced undercover unit at the G8 summit at Gleneagles.

    The “intelligence briefings” on the National Public Order Intelligence Unit, whose officers had sex with the protestors they spied on, will now be examined by a watchdog as part of its covert policing probe. Police Scotland said they would not comment on the contents of the file.

    Two Met-based units – the Special Demonstration Squad and the NPOIU – were set up to keep tabs on so-called subversives and domestic extremists.

    Loading article content

    A key strategy was to embed undercover officers in campaign groups, which included anti-racism organisations, and report back to handlers.

    However, some of the tactics deployed by officers in the units, such as using the identities of dead babies and deceiving women into long-term sexual relationships before vanishing, have since been exposed.

    The Pitchford Inquiry, set up by Theresa May when she was Home Secretary, is examining undercover policing going back decades.

    Although the judicial-led investigation does not apply to Scotland, NPOIU activity took place north of the border in the run up to the G8 summit in Scotland in 2005.

    Mark “Stone” was a driver for campaigners at the G8, but was unmasked as undercover officer Mark Kennedy.

    He later said in an interview: “My superior officer told me on more than one occasion, particularly during the G8 protests in Scotland in 2005, that information I was providing was going directly to Tony Blair’s desk.”

    Ahead of the G8, the then Scottish Executive issued a Ministerial Certificate blocking the release of information connected with the summit. The blackout applied to all Scottish public authorities, including police forces, health bodies and the Government.

    However, it can be revealed that the SNP Government quietly revoked the certificate in 2010, a decision that could result in information on the summit being released.

    After being asked by this newspaper for the titles of all files produced by on the G8 in 2005, Police Scotland confirmed the names of 1168 files.

    Forty-four were created by the former Fife Constabulary, whose patch included the Gleneagles hotel, while 1124 files were produced by Lothian and Borders police.

    Many of the files are on routine policing matters, but one document is described as “intelligence briefings” on the “National Public Order Intelligence Unit”.

    Other files include “stop the war coalition – regulatory board” and “indymedia”, which was a left-wing website at the time.

    There was also correspondence with the security services on the “Senior Leadership Development Programme”, a funding request for a “special branch operation” in May 2005 and over a dozen files on the peaceful Make Poverty History march.

    After the UK Government refused to extend the Pitchford Inquiry to Scotland, Her Majesty’s Inspectorate of Constabulary in Scotland launched its own review of undercover policing.

    A spokesperson for HMICS said: “As outlined in our terms of reference HMICS will examine the scale and extent of undercover police operations in Scotland conducted by the SDS and the NPOIU. As part of our scrutiny, we will review the authorisations for undercover deployments during the G8 Summit in Scotland in July 2005. HMICS are currently engaged in this process with the full cooperation of Police Scotland. With specific regard to the intelligence file, HMICS will ?examine this file for any information that may inform our review process.”

    Donal O’Driscoll, a core participant in the Pitchford Inquiry who was spied on in Scotland, said: “We have long argued that the both the SDS and the NPOIU were active in Scotland, particularly around the 2005 G8. The existence of this file strengthens our case that there needs to be a full inquiry into the activities of spy cops in Scotland – and renders the exclusion of Scotland from the Pitchford Inquiry even more inexplicable.

    “We continue to have no confidence in the HMICS review. Nevertheless, I’d expect them to at least make the effort to examine this and related briefings as part of the bare minimum they need to do. Not least because it is now beyond dispute there were multiple undercover police from the NPOIU and foreign police forces present at the G8 protests. However, only a full public inquiry can get to the truth as to what the police and the state had planned and co-ordinated when they interfered in legitimate democratic protest.”

    A Police Scotland spokesperson said: “Police Scotland does not routinely comment on covert policing or intelligence. We will not offer any comment on the contents of any specific files. Any inquiries relating to the NPOIU should be directed to the Met Police. Police Scotland will also fully and openly co-operate with the review of undercover policing to be carried out by HMICS.”

    / Paul Hutcheon, Investigations Editor / @paulhutcheon

    Find this story at 25 March 2017
    © Copyright 2017 Herald & Times Group

    Donald Trump’s Muslim Laptop Ban Could Be a Protectionist Scheme

    Van nieuwsblog.burojansen.nl

    THE DEPARTMENT OF Homeland Security announced an unprecedented new restriction on travelers from 10 airports in eight Muslim-majority countries on Tuesday.

    The DHS restriction states “that all personal electronic devices larger than a cell phone or smart phone be placed in checked baggage at 10 airports where flights are departing for the United States.”

    It’s a Muslim laptop ban.

    The 10 airports are in Jordan, Egypt, Turkey, Saudi Arabia, Kuwait, Morocco, Qatar, and the United Arab Emirates.

    American-based airlines do not fly directly to the United States from these airports, so these restrictions will not apply to them. The impact of this move will instead fall on nine airlines, including Gulf-based carriers that U.S. airlines have been asking President Trump to punish since the day after his election.

    The U.S. carriers have long complained that Gulf carriers such as Emirates, Etihad Airways, and Qatar Airways are unfairly subsidized by their national governments.

    Executives at Delta Airlines, United Airlines, and American Airlines met with Trump in early February. The day before the meeting, a group representing these American airlines, called the Partnership for Open & Fair Skies, distributed a slick video using Trump’s own words to argue against the subsidies.

    With this new travel impediment, Trump may be throwing these executives a bone. The new restrictions appear to be targeting airports that serve as flight “hubs” for these airlines — such as Dubai International, which is the hub of Emirates. Airlines use these hub airports to transfer passengers between flights, delivering significant savings.

    California Democratic Rep. Adam Schiff, who is the ranking member of the House Intelligence Committee, quickly rose to the defense of Trump’s DHS on Tuesday, calling the restrictions both “necessary and proportional to the threat”:

    Ranking House Intel Dem Schiff backs new electronics ban on US-bound flights from 8 Muslim-maj countries – critics say measure is arbitrary pic.twitter.com/3zPwehf2ZW

    — Jessica Schulberg (@jessicaschulb) March 21, 2017

    In 2015, Schiff was one of 262 Members of the House who signed a letter protesting subsidies for the Gulf airlines. The letter is featured on the website of the Partnership for Open & Fair Skies.

    Whatever the motivation, the security justifications are unclear at best. The Guardian interviewed a number of top technologists about the new policy on Tuesday, and they were puzzled. “If you assume the attacker is interested in turning a laptop into a bomb, it would work just as well in the cargo hold,” Nicholas Weaver, who is a researcher at the International Computer Science Institute, told the paper.

    “From a technological perspective, nothing has changed between the last dozen years and today. That is, there are no new technological breakthroughs that make this threat any more serious today,” Bruce Schneier, a top technologist at the Berkman Klein Center for Internet & Society at Harvard University, told the Guardian. “And there is certainly nothing technological that would limit this newfound threat to a handful of Middle Eastern airlines.”

    The United Kingdom enacted similar restrictions hours after the United States, but with two puzzling differences. The U.K. ban includes 14 airlines, including six based in the U.K. And it does not include airports in Qatar or the UAE — which are the epicenter of the subsidies dispute. Canada is reportedly weighing its own restrictions.

    For its part, Emirates responded by inviting customers to sample its in-flight entertainment in lieu of tablets and laptops — by repurposing an old advertisement featuring Jennifer Anniston:

    Let us entertain you. pic.twitter.com/FKqayqUdQ7

    — Emirates airline (@emirates) March 21, 2017

    Zaid Jilani
    March 21 2017, 7:51 p.m.
    Find this story at 21 March 2017

    Copyright https://theintercept.com/

    The Many Mysteries of the Muslim Laptop Ban

    Van nieuwsblog.burojansen.nl

    A new Homeland Security rule will ban electronics on flights from airports in Muslim-majority countries. Is this protectionism or prudence? Well, it’s complicated.

    Travelers from eight different Muslim-majority nations will no longer be allowed to carry laptops, tablets, or certain other electronic devices with them in the cabin on flights inbound to the U.S., according to new rules that take effect on Tuesday. The U.K. was quick to announce that it would follow suit with a Muslim laptop ban of its own.

    Officials at the U.S. Department of Homeland Security and Transportation Security Administration say that the new rules reflect a potential threat of terrorists smuggling explosive devices on board planes using portable electronic devices—iPads, Kindles, and the like. The DHS guidance cites a 2016 attempted airliner downing in Somalia as one recent incident that could be linked to a laptop bomb. The U.S. rules affect last-point-of-departure airports from 10 airports—some of them the busiest hubs in the Middle East—from Saudi Arabia to Istanbul to the UAE.

    Behind the order, though, lies a long history of conflict between America’s big three carriers—Delta, United, and American—and their peers in the Gulf. Critics spied an ulterior motive behind the Trump administration’s new rule: a protectionist measure for U.S. carriers promised by President Donald Trump.

    Henry Farrell and Abraham Newman floated this notion in the Washington Post, suggesting that the financial security of United, American, and Delta might be behind the new counterterrorism measures. The U.S. airlines have grumbled for years that their counterparts from the Gulf—specifically Emirates, Etihad Airways, and Qatar Airways—benefit unfairly from government subsidies. Those carriers have recently expanded their service to U.S. cities such as Chicago and Washington, D.C. (as any Washington Wizards fan can tell you, since Etihad is a major advertiser in the Verizon Center).

    Back in February, the chief executives of United, American, and Delta sent a letter to U.S. Secretary of State Rex Tillerson complaining about the “massive subsidization of three state-owned Gulf carriers … and the significant harm this subsidized competition is causing to U.S. airlines and U.S. jobs.” In a meeting with the executives shortly thereafter, Trump promised “phenomenal” tax relief, broad deregulation, and other forms of support to the industry.

    It’s not yet clear whether this laptop travel ban applies exclusively to all inbound flights from Muslim-majority airports or just those from Gulf carriers. If the latter, that would be a boon to U.S. operators. International business-class travelers—and there are a lot of them circulating between the U.S. and the Middle East—are bound to prefer flights that allow them to work on the plane. During a 14-hour nonstop haul from Dubai to Dulles, passengers are likely to appreciate all the electronic conveniences and entertainment they can carry.

    But a one-sided ban would also be a plain violation of trade rules. Global airline carriers have been duking it out over national subsidies for years. In September, the World Trade Organization ruled that the European Union had been illegally propping up Airbus to the tune of $22 billion, a decision that the Washington Post described as “the most expensive dispute in international history.”

    A U.K. electronics ban in the Gulf would bite the hand that feeds British Airways.
    The Financial Times reports that the rule applies only to non-U.S. carriers: Saudi Arabian Airlines, Royal Jordanian Airlines, Emirates, Etihad Airways, Qatar Airways, Kuwait Airways, Turkish Airlines, EgyptAir, and Royal Air Maroc. Several of these state-owned airlines have indeed enjoyed massive subsidies from their governments. But there’s nothing in the guidance released by Homeland Security that specifies those carriers or otherwise exempts U.S. domestic airlines from the electronics ban. DHS is specific only about the 10 affected airports.

    According to CNN, domestic carriers are not affected by the ruling because they do not operate any direct flights to the U.S. from those airports. A travel engine search corroborates and complicates that explanation. Delta runs flights from Cairo to Washington, D.C., that are operated by Air France, for example. British Airways operates American Airlines flights from Istanbul to New York. Both Delta and United operate inbound flights by other carriers—Lufthansa, KLM, and so on—from the restricted airports.

    Homeland Security has not responded to a request for clarification. Across the pond, an electronics ban is even more more complicated, since Qatar Airways has increased its ownership stake in the parent company for British Airways to 20 percent after Brexit. A U.K. electronics ban in the Gulf would bite the hand that feeds British Airways.

    These bans may be motivated by urgent and legitimate national security concerns. Rep. Adam Schiff, the ranking member of the House Permanent Select Committee on Intelligence and a Democrat, says that the electronics ban is justified. There is a debate to be had even if the threat is real, though. The tradeoff between travel security and convenience is an enormous drag on productivity (not to mention a cost for airports and airlines). The new rules may sidestep that debate. If an electronics ban applies solely to Gulf carriers, exempting domestic airlines, then it’s pretty plainly a protectionist measure, of the kind that Trump has explicitly promised to deliver for U.S. airlines.

    The risk, of course, is that Gulf states could respond in kind—meaning that no one gets to binge on Netflix on international flights. Trade battles have a way of escalating quickly. After the European Union restricted hormone-treated beef from America in 1999, the Clinton administration retaliated with a 100 percent tariff on Roquefort from France. The Bush administration escalated the conflict—totally arbitrarily!—with a 300 percent duty on Roquefort in 2003. The ensuing cheese war lasted nearly through the Obama administration.

    Depriving Americans of imported fromage is one thing; taking screens away from their toddlers could represent a whole other degree of inconvenience. Whether or not the Trump administration is pushing protectionist trade policies under the guise of national security, it seems likely that international flights are going to feel a whole hell of a lot longer.

    KRISTON CAPPS @kristoncapps Mar 21, 2017 10 Comments

    Find this story at 21 March 2017

    Copyright 2017 The Atlantic Monthly Group.

    German spies ‘can’t be trusted’: Relations between the UK and Berlin intelligence chiefs hit after comments by London

    Van nieuwsblog.burojansen.nl

    Germany’s spy agency BND is being frozen out by GCHQ as well as in America
    Both believe insecure servers have led to Wikileaks taking classified documents

    Berlin officials are angry that secret intelligence data has not been handed over

    The freeze-out also applies to the Metropolitan Police and UK Border Force

    Relations between British and German spy chiefs have hit rock bottom because London says its counterparts in Berlin cannot be trusted to keep secrets.

    At a time of escalating Islamic terror threats across Europe, Germany’s spy agency BND is being frozen out by GCHQ and the National Security Agency in the US.

    Both London and Washington believe insecure German data servers have contributed to the leaking of tens of thousands of classified documents to Wikileaks.

    And they have infuriated Berlin by refusing to hand over secret intelligence data demanded by left wing and Green politicians which they fear will be aired in the German parliament.

    At a time of escalating Islamic terror threats across Europe, Germany’s spy agency BND is being frozen out by GCHQ (base pictured)
    At a time of escalating Islamic terror threats across Europe, Germany’s spy agency BND is being frozen out by GCHQ (base pictured)

    It is claimed in Germany that a tranche of 500,000 sides of files put out by Wikileaks this month were GCHQ documents on covert mobile phone policy for British intelligence agents dated June 2010 and classified as secret.

    They believe that the documents, once shared with Germany, were transferred to hackers – possibly Russian – who then fed them to the whistleblowing group.

    Also listed as top secret was a briefing paper for attendees at a pre-G20 meeting held in London between September 2 and 5 2009 in which Turkey’s role in Europe was on the agenda.

    It is understood that in November 2014 there was a meeting in Berlin between Sir Simon McDonald, the then British ambassador to Germany, together with Patrick McGuinness, Deputy National Security Adviser for Intelligence, Security, and Resilience at the Cabinet Office, and high security officials in Angela Merkel’s government.

    In November 2014 there was a meeting in Berlin between Sir Simon McDonald, the then-British ambassador to Germany, and high security officials in Angela Merkel’s government
    In November 2014 there was a meeting in Berlin between Sir Simon McDonald, the then-British ambassador to Germany, and high security officials in Angela Merkel’s government

    The British made it plain at the meeting that co-operation between Britain and Germany was becoming increasingly problematic because of leaks.

    A source familiar with the meeting said: ‘They stressed that a secret service is just that and that its workings and operations must remain secret and they felt that Germany was leaking them like a sieve.

    Britain told the Germans that the freeze on information would not only apply to MI6 and GCHQ but also to the Metropolitan Police, the Serious Organised Crime Agency (SOCA) and the UK Border Force.

    The source said: ‘It has now reached the point where there is virtual radio silence between the two biggest and most important intelligence services of the western world and the BND of Germany.

    ‘Germany is worried because it needs the umbrella protection of these agencies. It is virtually blind without it.’

    Another crisis meeting was held in Berlin in February last year to discuss the biggest rift between secret services since the end of the Second World War. It failed to placate the British and the Americans.

    High-grade information on jihadists, their movements and terror plans as discovered by London and Washington and directly involving Germany, are no longer being passed on as a matter of routine.

    The upheaval has been caused in part by left-wing and green politicians still fuming over the spying activities carried out in Germany by America’s National Security Agency, which involved the eavesdropping on Mrs Merkel’s personal mobile telephone.

    The German government requested Britain to release details of the secret operations to a committee probing the NSA and other foreign spy agency activities in the country.

    The move was forced by politicians of the hard-left Die Linke and the environmentalist Green parties.

    Left-wing and green politicians are still fuming over the spying activities carried out by the National Security Agency, including eavesdropping on Mrs Merkel’s personal mobile
    Left-wing and green politicians are still fuming over the spying activities carried out by the National Security Agency, including eavesdropping on Mrs Merkel’s personal mobile

    Both the UK and America refused to send any of the requested files to Germany. Included among them was a demand for information about a 2013 operation handled by both countries – and in co-operation with the BND – which was, and remains, top secret but was known to involve a massive surveillance programme on suspected Islamic terrorists across Europe.

    Britain fears a ‘big debate’ in the German parliament which would lay open secret sources and intelligence gathering techniques.

    A BND insider said: ‘Never has a friendly nation been asked to divulge its secrets in this way. It is outrageous and we completely understand the fury that this has unleashed in Whitehall. But it has left us vulnerable.’

    By ALLAN HALL IN BERLIN and IAN DRURY IN LONDON FOR THE DAILY MAIL
    PUBLISHED: 00:22 GMT, 16 December 2016 | UPDATED: 01:36 GMT, 16 December 2016

    Find this story at 16 December 2016
    © Associated Newspapers Ltd

    German spy inquiry could demand access to British intelligence secrets

    Van nieuwsblog.burojansen.nl

    Exclusive: Chairman warns German parliamentary inquiry into spying known as NSA Committee could force Angela Merkel’s government to disclose files on joint intelligence operations with UK

    German spy inquiry could demand access to British intelligence secrets
    The German inquiry was set up last year in the wake of Edward Snowden’s disclosure that the US spied on Mrs Merkel’s mobile phone Photo: Reuters

    A German parliamentary inquiry into spying is demanding access to classified information on British intelligence, its chairman has said.
    Prof Patrick Sensburg told the Telegraph his committee of MPs could go to court to force Angela Merkel’s government to disclose files on joint intelligence operations with Britain.
    He also called for a new Europe-wide agreement to limit powers on data surveillance.
    Britain has reportedly threatened to end intelligence cooperation with Germany if the files on joint operations are opened to the inquiry.
    “In the end, we can go to our highest court and ask them to decide. We have a right as a parliamentary inquiry to get information from our government,” Prof Sensburg said.
    “But I hope it won’t come to that point because that’s not a good situation for our partners.
    “There’s no agreement with the British yet. There are a lot of documents we want to see that we’re looking for their agreement on.”
    • Head of German inquiry into spying claims his own phone may have been hacked
    • Britain ‘threatens to stop sharing intelligence’ with Germany
    The warning presents the latest security threat to British intelligence, after officials warned that Russia and China had cracked the encryptions on secret files leaked by whistleblower Edward Snowden, forcing MI6 to withdraw compromised agents from operations in dangerous countries around the world.

    Former U.S. defence contractor Edward Snowden (Reuters)
    The German inquiry was set up last year in the wake of Edward Snowden’s disclosure that the US spied on Mrs Merkel’s mobile phone.
    German prosecutors on Friday closed a criminal investigation into that case, citing lack of evidence.
    But the parliamentary inquiry continues, and has taken on a wider remit, to investigate spying in general.
    Prof Sensburg said the German government was in discussions with Britain to find an acceptable way of sharing the information with the inquiry.
    His committee is facing a similar stand-off with the US over requests for files on joint operations with American agencies.
    “I never expected a lorry full of lever arch files from the British Embassy to arrive outside my office,” Prof Sensburg said.
    “Of course, we’re dealing with an issue that concerns intelligence. I understand that a lot of the information is top secret.
    “It comes to a question of the branches of government: does it include parliament? We have a duty as MPs to monitor our government.”
    The issue has underlined how decisions made in a committee room in Berlin can have a serious impact on British intelligence operations.
    Prof Sensburg declined to comment on reports the British government sent a letter to Mrs Merkel’s office earlier this year threatening to end all intelligence cooperation if the files were shown to the inquiry.
    Angela Merkel with her mobile phone
    “I can’t talk to the British government as chairman of the committee,” he said, adding that he was relying on the German government to fnd a solution acceptable to Britain.
    Mrs Merkel’s government is proposing solving a similar impasse with the US by appointing a special commissioner to read the classified files, according to reports.
    The commissioner would then report back to the MPs.
    The Americans have reportedly already frozen intelligence cooperation with German soldiers in Iraq over the inquiry, and declined to respond to requests for help locating a German hostage in Afghanistan.
    The British and American concerns are believed to centre on a series of leaks of classified information suspected to have come from the inquiry.
    Mrs Merkel’s office wrote to its members last year threatening them with prosecution if there were further leaks.
    But Mr Sensburg denied his committee was the source of the leaks.
    “None of those documents had stamps on them from the inquiry,” he said. “They could have been leaked from abroad, or by our own government. One has even been proved to be a fake.”
    Initially set up in the wake of disclosures that the US National Security Agency spied on Mrs Merkel, the inquiry is known in Germany as the “NSA Committee”.
    But it has found itself at the centre of an ever-widening spy scandal after allegations emerged that Germany’s own BND intelligence service spied on French government officials and other European targets – at the NSA’s request.
    “I think these days we should rename it the BND Committee,” Prof Sensburg joked.
    The dispute with the US is over the inquiry’s request to see a list of the phone numbers and email addresses the NSA asked the BND to monitor.
    European countries including Austria and Belgium have opened their own investigations in the wake of allegations.
    “I think it’s time for all of us in Europe, including the UK, to find a common policy on limits for data surveillance,” Prof Sensburg said.
    Currently, different national intelligence agencies all have their own rules on what they’re allowed to spy on.
    The BND filters out German results but not those from friendly European countries.
    “It’s no good if Germany agrees to filters out European results, but other countries don’t,” Prof Sensburg said.
    A member of Mrs Merkel’s Christian Democrats, Prof Sensburg has often had to act as a moderating voice on the committee against the shriller demands of opposition members.
    He is quick to distance himself from criticism of the UK after reports there was a listening post on the British Embassy in Berlin, for instance.
    “I don’t know why the UK and the US were singled out for that, and not Russia or China,” he said.
    Opposition inquiry members have already taken the German government to court once, to try to force it to allow Mr Snowden to come to Germany and testify in person.
    The court rejected that bid, ruling that the government couldn’t give Mr Snowden immunity from extradition to the US.
    “I think what Edward Snowden did is he gave this issue a face,” Prof Sensburg said.
    “Without Snowden it would have been an issue for experts and freaks, not the wider public.”

    By Justin Huggler, Berlin10:17AM BST 18 Jun 2015

    Find this story at 18 june 2015

    © Copyright of Telegraph Media Group Limited 2017

    Going global: the UK government’s ‘CVE’ agenda, counter-radicalisation and covert propaganda

    Van nieuwsblog.burojansen.nl

    Countering Violent Extremism (CVE) efforts, the government tells us, “address the root causes of extremism through community engagement”. But could this globalising project have counter-productive consequences?

    Earlier this week the advocacy group CAGE and the Guardian both published revelations concerning a covert propaganda programme run by the UK Home Office as part of the Prevent programme.

    We have been investigating the government Research and Information Communications Unit (RICU), the PR agency Breakthrough Media and the many ‘grassroots’ campaigns they worked with for almost a year with varying degrees of complicity. We have only published a small amount of the information we amassed and expect the Guardian and other journalists to reveal more in the coming days.

    In this article we show how those orchestrating the campaigns have global ambitions – and despite the abject lack of debate – how the UK’s “industrial scale propaganda” programme is already being held up as best practice by the EU and UN.

    The story so far
    Over the past five years, the Home Office and a secretive government department called RICU, the Research, Information and Communications Unit, has been cultivating a network of ‘grassroots’ Muslim voices to promote ‘counter-narratives’ that combat the appeal of an ill-defined ‘extremism’ among Britain’s Muslim youth. Parliament has not been informed of these activities and the policy has been kept from public scrutiny by draconian secrecy legislation and the veil of ‘national security’.

    Working with specialist PR agencies and new media companies to target young people who fit the profile of ‘vulnerable young Muslim’, RICU’s interventions represent the first concerted foray into cyberspace by the British state with the aim of covertly engineering the thoughts of its citizens. In practice this means the chosen ‘grassroots’ organisations and ‘counter-narratives’ receive financial and technical support from the government for the production of their multimedia campaigns (videos, websites, podcasts, blogs etc).

    These state-sponsored ‘counter-narratives’ are in turn promoted to specific groups of internet users, chosen on the basis of their demographics, the websites they visit, the social media accounts they ‘follow’, and the search terms they use.

    It has now been revealed that the following ‘grassroots’ campaigns have received some kind of support from the Home Office, RICU or Breakthrough Media: My 2012 Dream, Return to Somalia, Help for Syria, Faith on the Frontline, Families matter, Imams online, Not another brother, Ummah Sonic, The fightback starts here, Open Your Eyes: Isis Lies, The truth about Isis, and Making a Stand. At issue is not what these initiatives stand for, or even that they are government supported, but that they are presented as independent, community-based campaigns.

    While the government has defended RICU’s programme as some kind of ‘necessary evil’, we should not be duped. When democratic governments start using community groups and NGOs to disseminate government propaganda and hoodwink the public into believing they are authentic ‘grassroots’ campaigns, it damages everyone in civil society. Democracy requires clear lines between the security state and the police on the one hand, and civil society, public and social services on the other.

    Breakthrough Media – an official secret no more

    Fair use.
    Breakthrough Media is the government’s go-to creative media agency for its “counter-narratives”. It specializes in “emotionally driven films, campaigns and other communications products” and its clients include government and intergovernmental agencies (UK, US, European Union, African Union, United Nations) and various NGOs. It has offices in London, Nairobi and Mogadishu and employs 100 people across Europe and East Africa.

    Some of Breakthrough’s work for the UK government has been protected by the Official Secrets Act – an extraordinary use of national security legislation to conceal the activities of a government-contracted PR company.

    Breakthrough was founded by Managing Director Robert Elliot, and originally called “Camden Creative”, which was incorporated in 2008. Camden Creative operated as a drama and documentaries production company that delivered a ten-part reality drama series for Channel 5 and a one-off documentary about the Mayor of Mogadishu for Al Jazeera English. The name of the company was changed to “Breakthrough Media” on 27 November 2012. Breakthrough’s CEO is Scott Brown, appointed on 17 August 2012. Brown was formerly an account director at M&C Saatchi and Deputy Chief of Staff at Bell Pottinger (the UK’s biggest PR company) in Nairobi.

    Breakthrough has earned £11.8m from the UK government since 2012. Lest there be any doubt about the commitment of the UK government to this cause, it has just asked PR companies to pitch for a further £60 million.

    Horizon PR

    Fair use.
    Horizon PR was incorporated in March 2015 and is part of the M&C Saatchi Group, the international PR and advertising group formed by Maurice and Charles Saatchi after they were ousted from their original firm, Saatchi and Saatchi. Horizon has five directors: Robert Elliot and Scott Brown of Breakthrough Media, and Andrew Blackstone, Molly Aldridge and Marcus Peffers from the M&C Saatchi group. Blackstone and Aldridge are senior executives at M&C Saatchi, while Peffers was a senior account director who founded the company’s World Services division in 2011 to bring the “experience and creative capabilities” of the agency to “help tackle complex behavioural and social issues in fragile states and developing markets”. M&C Saatchi’s World Services works with a range of national and international governments, IGOs, INGOs and foundations and is among the group’s most successful divisions. Feffers has also worked at a senior advisory level with successive UK governments, including HMT, the FCO, the Home Office, HMRC and Number 10, and oversaw M&C Saatchi’s campaign to keep Scotland in the Union on behalf of the three main UK political parties.

    Horizon provides PR solutions to “ethnic, social and faith based issues” to clients including “non-government and civil-society groups who want to improve and increase the impact and scale of their activity and better reach audiences at a local, regional, national and international level”. This is achieved through “creative news generation, traditional and social media campaigns and targeted events”. In launching Horizon, Breakthrough and the Saatchis are clearly betting on a big future in communicating government messages on sensitive issues such as “terrorism” and “extremism”.

    Hand-in-hand: censorship and propaganda
    The lengths of the UK’s covert propaganda programme appear even more extraordinary in the context of the government’s mass censorship of the internet – something which can only be achieved with the cooperation of internet service providers and social media companies.

    Since the Edward Snowden revelations, and having realized that working hand-in-glove with the “Five Eyes” global surveillance system was not good for their reputation or business prospects, Silicon Valley appears to have enjoyed a much less comfortable relationship with western governments. Some of its biggest names have taken formal positions that distance themselves from government surveillance, and introduced corresponding procedures designed to reassure and protect their users.

    But Silicon Valley has been unable to extricate itself from the broader ‘war on terror’ and ad hoc public-private partnerships have emerged to address demands from law enforcement and intelligence agencies to block “terrorist propaganda”. In the UK, this process has essentially replicated the model developed to combat the proliferation of child pornography on the internet.

    As with child porn, states have passed laws banning the production and dissemination of terrorist propaganda, providing grounds for the state to request companies to close accounts or block websites (so-called “notice and take-down” requests) said to contravene national law. In the absence of obvious legal breaches, the censors argue that the content breaches the provider’s terms of service.

    The UK has pioneered the censorship of “terrorist” content, having established the world’s first Counter Terrorism Internet Referral Unit (CITRU) in 2010, modelled on the Child Exploitation and Online Protection agency. CITRU is the central contact point for police and intelligence officers seeking to block web pages or close social media accounts, and refers their requests to service providers, search engines and content platforms. By December 2015, CITRU claimed to have taken down “more than 120,000 pieces of unlawful terrorist-related content online” since 2010, with one-third removed in 2015.

    In practice, content hosted outside the UK (as most “terrorist propaganda” is) is not actually “taken down” – access is instead blocked by British ISPs (and can therefore be easily circumvented). Nor do these figures include independent action by social media companies. In February 2016, Twitter announced that it had shut down more than 125,000 ISIS related accounts.

    Following the Charlie Hebdo attacks, the EU launched a Europe-wide blocking system modelled on CITRU. The EU Counter-terrorism Internet Referral Unit began operating in July 2015 and is housed at Europol.

    You would instinctively think that “terrorist propaganda” means the horrific videos of ISIS beheadings and such like, yet violent material is said to make up just 2% of what is blocked. Regardless, the level of censorship of terrorists and extremists has now reached levels that would have been unthinkable just a few years ago. But this is only one side of the story.

    Silicon Valley and counter-narratives
    Having played ball with content take-down, the Silicon Valley behemoths have also increasingly embraced the “counter-narrative” agenda – an agenda they are of course uniquely placed to implement. In February 2015, a “White House Summit To Counter Violent Extremism” gathered foreign leaders, United Nations officials, and “a broad range of international representatives and members of civil society”.

    Following the summit, the White House announced several new initiatives. First, the US government would organize “technology camps” alongside social media companies, which will “work with governments, civil society and religious leaders to develop digital content that discredits violent extremist narratives and amplifies positive alternatives”. Second, the US will partner with the United Arab Emirates to create a “digital communications hub that will counter ISIL’s propaganda and recruitment efforts, both directly and through engagement with civil society, community, and religious leaders”. In other words: the stratosphere that includes organisations RICU, CITRU, Breakthrough, ‘grassroots’.

    While Facebook and Google were tight-lipped, a Twitter spokesman stated that they “support counterspeech efforts around the world and we plan to participate in this effort through third-party NGOs”. Twitter has also run a series of workshops for UK NGOs concerned with countering extremism to help them enhance their presence on social media.

    Giving evidence to the House of Commons’ Home Affairs Select Committee in February 2016, Google announced that it was going one step further and “piloting two pilot programmes. One is to make sure that these types of videos [counter-narratives] are more discoverable on YouTube. The other one is to make sure when people put potentially damaging search terms into our search engine… they also find this counter-narrative”. It was later clarified that the programme took the form of “free Google AdWords” to enable NGOs to place “counter-radicalisation adverts against search queries of their choosing”.

    To be clear about what this means in practice, imagine an internet user fitting the profile of ‘impressionable young Muslim’ (as defined by Prevent), searching Google for “Syria war” (or clicking on a Facebook link about it) and being referred to Breakthrough’s Open Your Eyes: Isis Lies campaign, among others. And as we know from the Snowden revelations, these searches will be logged and investigated by the intelligence services.

    The symbolism of all of this cannot be understated. Removing one kind of ‘propaganda’ and promoting another at the request of governments – or via government-backed NGOs or contractors – is a far cry from the free speech-cum-great leveller Silicon Valley told us to believe in.

    And as well-intentioned as their interventions may be, having embarked on this slippery slope, can or should we now expect the likes of Google to assist in re-directing would be white supremacists to #blacklivesmatter websites, or Europe’s growing army of neo-Nazis to #hopenothate?

    Your answer to this question should help you think through the legitimacy of what has been revealed to address ‘radicalisation’ among Muslims.

    Against Violent Extremism Network

    Fair use.
    The Against Violent Extremism (AVE) Network is a partnership between Google Ideas, the Institute for Strategic Dialogue and Gen Next Foundation (GNF). GNF, which initially described itself as an “exclusive membership organization and platform for successful individuals” committed to social change through venture capital funding, “aspires to solve the greatest generational challenges of our time using a unique hybrid of private sector and non-profit business models – called a venture philanthropy model”. Its core areas are education, economic opportunity and global security.

    AVE was hatched at the 2011 Google Ideas (now ‘Jigsaw’) Summit Against Violent Extremism and is managed by the Institute for Strategic Dialogue. It claims to have brought together “hundreds of former extremists and survivors of violent extremism to fight back against online extremist messaging and recruitment”. In 2015, AVE claimed to have “over 2,000 members globally”, “over 60 counter-extremism projects” and “partnerships with global technology firms including Twitter and Facebook”.

    The counter-narratives projects incubated and assisted by AVE are believed to include myextremism.org, a juvenile platform for “extremists against extremism”, and Abdullah X, the former extremist turned ‘down with the kids’ cartoon ‘Jihobbyist’.

    ‘Abdullah-X’ – the counter-narratives’ poster boy
    Abdullah-X says: “I am here to deliver awareness, develop and divert young Muslims from the path of relying solely on information that can take them on a journey towards extremism and hate. You will find me in content that is created to instil critical thinking and understanding in the minds of those who are often vulnerable to the messaging of extremist ideologies.”

    The ‘street-savvy’ looking cartoon character, complete with chains and corn-rows, is given a Muslim name with the suffix ‘X’, an obvious reference to Malcolm X, and a means of co-opting a legacy that disenfranchised youth may respect. Abdullah-X’s videos attempt to take on contentious issues within the Muslim world, providing a ‘counter-narrative’ to questions that many Muslims have. In one video, he considers Palestine and the growing call to boycott Israel, by questioning what it can achieve: “I wonder, is all my plaque waving and shouting in anger to others a Sunnah? I mean in truth, will my ‘peaceful protest’ for Gaza truly aid the Palestinian people or does it aid my ego… What is the bigger picture?”

    For Abdullah-X, the bigger picture is not Israeli occupation and apartheid, but the failure of the Arab world to intervene in Gaza: “Because they live in the shadow of their paymasters… sadly their paymasters are not those who follow the Sunnah.” This ahistorical presentation is part of a wider trend in which Abdullah-X seeks to depoliticise British Islam in favour of shallower spiritual reflection.

    Abdullah-X claims that he was a former adherent of Abu Hamza al-Masri and Omar Bakri Mohammed. He claims that his position as a former extremist uniquely places to deter others from following similar routes. He now has a female sidekick in Muslimah-X.

    One of the most astonishing achievements of the counter-radicalisation industry is its burial of the idea that the people best-placed to deter individuals from extremism, might actually be those who have never engaged in any form of it.

    In an interview with On the Media on 19 June 2015, Abdullah-X was asked if he is funded by MI6 or some other entity. He responded with the claim that the cartoon is “…a self funded project of myself and a few like-minded people.”

    Fair use.

    Going global
    The 2015 White House Summit on Combating Violent Extremism was more a product than a catalyst of the global CVE agenda, which has been developing under the auspices of the Global Counter Terrorism Forum (GCTF). The GCTF is an informal group of 29 states plus the European Union launched in no small part because of resistance to the dominant security and counter-terrorism paradigm at the UN on the part of many developing countries, which served to prevent those states most invested in the ‘war on terror’ from enhancing their operational cooperation through UN mechanisms.

    The UK co-chairs, in partnership with the United Arab Emirates, the GCTF’s CVE working group, which held its inaugural meeting in Abu Dhabi in April 2012. The minutes report that “The UK opened the session by underscoring the belief common to many GCTF members: that countering violent extremism is a battle of ideas; in such a battle, altering the grounds of debate and countering radical messages are vital.”

    The following year, the GCTF organised the UN Conference on “Best Practice in Communications” in June 2013 in London. The meeting was co-chaired by Richard Chalk, then head of RICU. It recommended that “practitioners must take a strategic approach to CVE communications work and articulate the totality of a government’s engagement on a given issue”; that “messages should be simple, concise, tailored, and delivered by credible messengers”; and that “policies must be aligned with messages in order to be credible”.

    Countering violent extremism… with our friends in Abu Dhabi and Riyadh
    The GCTF has also launched the Hedayah Center of Excellence in Countering Violent Extremism, based in Abu Dhabi, to which at least one British government official is seconded. Hedayah’s publications include “National CVE Strategies: Guidelines and Good Practices”, a document that draws heavily on the Prevent school of counter-extremism. Hedayah has been lavished with US, EU and Gulf state funding, and is the obvious home for the UAE-based “digital communications hub” to counter ISIL propaganda announced by the White House last year.

    Hedayah also hosted the GLOBAL CVE EXPO in December 2014, which stressed the need for “more effective collaboration on counter-narratives, drawing from experiences of policymakers, practitioners and industry/private sector representatives”. The month before it held an expert workshop on counter-narratives which extolled the virtues of using “victims, formers and ex-prisoners” in counter-narrative products.

    The irony of establishing an International Center of Excellence on Countering Violent Extremism in a country whose CVE efforts include a strict ban on the regime’s political opponents, the Muslim Brotherhood, the mass deportation of Shi’a residents, and hiring Erik Prince, the founder of Blackwater (now Academi), to form secret, mercenary armies, is not lost on all observers. In advance of the White House CVE summit, Steven Hawkins, director of Amnesty International USA, warned that abusive regimes could take advantage of ‘CVE-mania’ and use international funding to violate human rights in the absence of appropriate safeguards.

    The UK is also exporting its counter-narratives programme through the EU and the UN. The former has established the Radicalisation Awareness Network (RAN) under the ‘PREVENT’ strand of the EU Counter-Terrorism strategy, which has a dedicated Communication and Narratives Working Group. The WG is co-chaired by Najeeb Ahmed, a Home Office Prevent coordinator, and Guillaume de Saint Marc, CEO of the French Association of Victims of Terrorism. The RAN network also has a Working Group on the Internet and Social Media, co-chaired by Yasmin Green (Google Ideas) and Rachel Briggs (Institute for Strategic Dialogue). RAN’s Issue Paper on Counter Narratives and Alternative Narratives reads as if it was written by RICU.

    Similarly, the UN had a Working Group on the Use of the Internet for Terrorist Purposes, under the auspices of the UN Counter-Terrorism Implementation Task Force. This appears to have been disbanded, and its work taken-up the GCTF, but not before it had staged the Riyadh Conference on “Use of the Internet to Counter the Appeal of Extremist Violence” in 2011. This in a country declared an “Enemy of the Internet” by Reporters Without Borders and notorious for the mass beheading of alleged terrorists, apostates and blasphemers.

    The Riyadh conference, which was co-funded by the German government and the Saudi royal family, brought together around 150 policy-makers, experts and practitioners from the public sector, international organisations, industry, academia and the media. The speakers included Christopher Wainwright (RICU) and Jared Cohen (Google Ideas). Top of the list of summit Recommendations was to “Promote counter-narratives through all relevant media channels (online, print, TV/Radio)”.

    Under the heading “Credible Messengers as Important as the Message”, the summary of the proceedings produced by the CTITF records:

    Leaving aside the many dubious assertions in this passage, when a UN Working Group meets in Saudi Arabia to recommend that security and intelligence agencies recruit former extremists and provide them with institutional homes in fake NGOs to produce state propaganda, things have clearly gone badly awry.

    Do as I say not as I do
    As we said in our report, there is nothing objectionable in principle about grassroots activism that tries to steer people away from violence and ‘extremism’ – or any form of other ‘-ism’ for that matter. Indeed, freedom to engage in whatever kind of non-violent activism one chooses gets to the heart of what it means to live in a democracy that holds freedom of expression dear.

    But there has to be a basic degree of transparency and accountability, without which communities will not trust government, and people will not trust anyone. They need to be confident in the difference between government propaganda and genuine activism. They need to know that non-governmental organisations and grassroots organisations are independent of government and corporations, or otherwise open about their relationship to them. When civil society organisations become tools of government or business, it damages the non-profit sector as a whole.

    This week’s revelations are symptomatic of the capture of government policy by an increasingly influential counter-radicalisation industry. Yet for all the best practice and international recommendations described above, radicalisation theory is still mired in Islamophobic bunkum, with no reliable metrics through which to substantiate its claims of effectiveness, and no evidence to support the assertion that the UK’s Prevent programme has been anything other than a divisive failure.

    As a paper by the International Centre for Counter-terrorism in the Hague suggests: “Doing the right thing rather than saying the right thing produces, ideally, the stronger narrative and in that sense the interaction patterns between host community and vulnerable youth constitute a non-verbal message that might better manage to prevent extremists gaining more ground in a community”.

    BEN HAYES and ASIM QURESHI 4 May 2016

    Find this story at 4 May 2016

    British anti-extremism agencies are working at an ‘industrial scale and pace’ and using Cold War tactics to combat ISIS propaganda

    Van nieuwsblog.burojansen.nl

    Terror group puts out around 18 messages a day to its followers
    Government has set up covert group to counter radical propaganda
    David Cameron is to announce new laws targeting hate preachers

    A covert unit set up to tackle extremism is working ‘at an industrial scale and pace’ as it attempts to counter the barrage of ISIS propaganda online.

    The Research, Information and Communications Unit (RICU), a little-known group set up by the UK government, is using Cold War tactics to stop the spread of radical jihadism.

    Some of the methods used by the unit emerged today as David Cameron prepares to announce tough new laws to crack down on extremism.

    Radical material is now available to anyone wanting to access it as jihadists flood the web with propaganda
    +3
    Radical material is now available to anyone wanting to access it as jihadists flood the web with propaganda

    RICU was set up in response to the July 7 terror attacks in 2005, but the importance of its role has increased with the rise of ISIS, who now put out an estimated 18 messages a day to their followers.

    The slick production techniques behind ISIS’s infamous beheading videos and the terrorists’ use of social media to spread them has meant even the most extreme propaganda can be accessed in homes, schools and workplaces around the world.

    It emerged today that RICU often conceals the origin of information it sends out over fears that knowing it came from the government would undermine its credibility in the eyes of some young Muslims.

    One initiative, which portrays itself as a campaign providing advice on how to raise funds for Syrian refugees, has spoken to thousands of students at university freshers’ fairs without any of them realising they were engaging with a government programme.

    The Help for Syria campaign has distributed leaflets to 760,000 homes without the recipients realising they were government communications.

    Meanwhile, some of the group’s work has been outsourced to a communications firm, Breakthrough Media Network, which produced websites, leaflets and social media pages with titles such as The Truth about ISIS,The Guardian revealed.

    The tactics used by a government counter-extremism group, which include setting up the Help for Syria campaign (website pictured), emerged today as the government plans a new crackdown on hate preachers
    The tactics used by a government counter-extremism group, which include setting up the Help for Syria campaign (website pictured), emerged today as the government plans a new crackdown on hate preachers

    The methods have been criticised as ‘deceptive’ by critics, with human rights lawyer Imran Khan telling the newspaper: ‘This government needs to stop thinking of young British Muslims as some sort of fifth column that it needs to deal with.’

    But the Home Office insisted RICU’s work could involve ‘sensitive issues’ and some of the organisations it worked with did not want to publicly reveal the relationship with the Government.

    A Home Office spokeswoman said: ‘The battle against terrorism and extremism must be fought on several fronts including countering its twisted narrative online and in our communities. The need for this work is recognised at a national and international level.

    Videos including those of Jihadi John, since killed, have been used by ISIS to spread hate
    Videos including those of Jihadi John, since killed, have been used by ISIS to spread hate

    ‘As the Prime Minister has said, we face a generational challenge and it is vital we work in partnership with communities, civil society groups and individuals to confront extremism in all its forms.

    ‘This has been a key part of the Government’s counter-terrorism strategy since publication of the Prevent review in 2011.

    ‘We are very proud of the support RICU has provided to organisations working on the front line to challenge the warped ideology of groups such as Daesh [ISIS], and to protect communities.

    ‘This work can involve sensitive issues, vulnerable communities and hard to reach audiences and it has been important to build relationships out of the media glare.

    ‘We respect the bravery of individuals and organisations who choose to speak out against violence and extremism and it is right that we support, empower and protect them.

    ‘Our guiding principle has to be whether or not any organisation we work with is itself happy to talk publicly about what they do. At the same time we are as open as possible about RICU’s operating model, and have referenced the role of RICU in a number of publications and in Parliament.’

    By RICHARD SPILLETT FOR MAILONLINE
    PUBLISHED: 08:16 GMT, 3 May 2016 | UPDATED: 10:02 GMT, 3 May 2016

    Find this story at 3 May 2016

    © Associated Newspapers Ltd

    Blair government’s rendition policy led to rift between UK spy agencies MI5 chief’s complaint over MI6 role in ‘war on terror’ abductions caused prolonged breakdown in relations

    Van nieuwsblog.burojansen.nl

    British involvement in controversial and clandestine rendition operations provoked an unprecedented row between the UK’s domestic and foreign intelligence services, MI5 and MI6, at the height of the “war on terror”, the Guardian can reveal.

    The head of MI5, Eliza Manningham-Buller, was so incensed when she discovered the role played by MI6 in abductions that led to suspected extremists being tortured, she threw out a number of her sister agency’s staff and banned them from working at MI5’s headquarters, Thames House.

    According to Whitehall sources, she also wrote to the then prime minister, Tony Blair, to complain about the conduct of MI6 officers, saying their actions had threatened Britain’s intelligence gathering and may have compromised the security and safety of MI5 officers and their informants.

    The letter caused a serious and prolonged breakdown of trust between Britain’s domestic and foreign spy agencies provoked by the Blair government’s support for rendition.

    The letter was discovered by investigators examining whether British intelligence officers should face criminal charges over the rendition of an exiled Libyan opposition leader, Abdul Hakim Belhaj.

    A critic of Muammar Gaddafi, the former Libyan dictator, Belhaj was seized in Bangkok in March, 2004 in a joint UK-US operation, and handed over to the CIA. He alleges the CIA tortured him and injected him with “truth serum” before flying him and his family to Tripoli to be interrogated.

    Abdul Hakim Belhaj, centre, speaks during a press conference in Tripoli in 2012.
    Facebook Twitter Pinterest
    Abdul Hakim Belhaj, centre, speaks during a press conference in Tripoli in 2012. Photograph: Mahmud Turkia/AFP/Getty Images
    According to documents found in Tripoli, five days before he was secretly flown to the Libyan capital, MI6 gave Gaddafi’s intelligence agency the French and Moroccan aliases used by Belhaj.

    MI6 also provided the Libyans with the intelligence that allowed the CIA to kidnap him and take him to Tripoli.

    Belhaj told the Guardian that British intelligence officers were among the first to interrogate him in Tripoli. He said he was “very surprised that the British got involved in what was a very painful period in my life”.

    “I wasn’t allowed a bath for three years and I didn’t see the sun for one year,” he told the Guardian. “They hung me from the wall and kept me in an isolation cell. I was regularly tortured.”

    The secret role played by MI6 was revealed after the fall of Gaddafi, when documents were found in ransacked offices of his intelligence chief, Moussa Koussa.

    One, dated 18 March 2004 was a note from Sir Mark Allen, then head of counter-terrorism at MI6, to Moussa Koussa. It said: “I congratulate you on the safe arrival of Abu Abd Allah Sadiq [Abdul-Hakim Belhaj]. This was the least we could do for you and for Libya to demonstrate the remarkable relationship we have built over the years. I am so glad. I was grateful to you for helping the officer we sent out last week.”

    Allen added: “[Belhaj’s] information on the situation in this country is of urgent importance to us. Amusingly, we got a request from the Americans to channel requests for information from [Belhaj] through the Americans. I have no intention of doing any such thing. The intelligence on [Belhaj] was British. I know I did not pay for the air cargo [Belhaj]. But I feel I have the right to deal with you direct on this and am very grateful for the help you are giving us.”

    Scotland Yard has concluded its investigation into the alleged involvement of intelligence officers and officials in Libyan rendition operations and an announcement about whether or not to prosecute is imminent.

    Whitehall sources have told the Guardian that police and prosecutors have been reviewing the issue for months. They say investigators have been frustrated by the way potentially key witnesses have said they were unable to recall who had authorised British involvement in the rendition programme, who else knew about it, and who knew the precise details of the Belhaj abduction.

    “This is an extremely difficult area for police and prosecutors,” said one source. “The problem is, the CPS cannot bring a charge against a government policy.”

    The letter to Blair sent by Manningham-Buller, who was director general of MI5 from 2002 to 2007, reflected deep divisions within Britain’s intelligence agencies over the methods being used to gather information after the 9/11 attacks on the US.

    Though MI5 has been criticised about some of the tactics used, the letter suggests Britain’s security service had serious misgivings about rendition operations and the torture of suspects.

    The Guardian has been told the MI5 chief was “shocked and appalled” by the treatment of Belhaj and vented her anger at MI6, which was then run by Sir Richard Dearlove.

    “When EMB [Manningham-Buller] found out what had gone on in Libya, she was evidently furious. I have never seen a letter quite like it. There was a serious rift between MI5 and MI6 at the time.”

    She has since said the aim of engaging with Gaddafi to persuade him to abandon his chemical and nuclear weapons programme was not “wrong in principle”.

    However, she added: “There are clearly questions to be answered about the various relationships that developed afterwards and whether the UK supped with a sufficiently long spoon.”

    The police files with the CPS are understood to describe how Belhaj, his pregnant wife, Fatima Bouchar, and children, and Sami al-Saadi and his family were abducted from the far east to Gaddafi’s interrogation and torture cells in Tripoli in 2004.

    The British government paid £2.2m to settle a damages claim brought by al-Saadi and his family. Belhaj has refused to settle unless he receives an apology.

    Jack Straw, who as foreign secretary was responsible for MI6, and Allen have always denied wrongdoing.

    UK government ‘seeking to avoid responsibility’ for renditions
    Read more
    In December 2005, when the first evidence emerged that Britain was colluding in CIA rendition operations, Straw told MPs: “There is simply no truth in the claims that the United Kingdom has been involved in rendition full stop.”

    When the Libyan renditions came to light, Straw said: “No foreign secretary can know all the details of what its intelligence agencies are doing at any one time.”

    He has been interviewed by the police but only as a potential witness. Government officials, insisting on anonymity, said MI6 was following “ministerially authorised government policy”.

    Blair said he did not have “any recollection at all” of the Belhaj rendition.

    The Blair and Straw denials appeared to be contradicted by Dearlove.

    He has said: “It was a political decision, having very significantly disarmed Libya, for the government to cooperate with Libya on Islamist terrorism. The whole relationship was one of serious calculation about where the overall balance of our national interests stood.”

    Neither MI5 nor MI6, nor Manningham-Buller, wanted to make any public comment. Whitehall sources insist the relationship between MI5 and MI6 has now been repaired after a difficult period.

    Belhaj is demanding an apology and an acceptance of British guilt. He has taken his case to the supreme court, which has yet to hand down a judgment.

    Last year, the court was confronted with the prospect of Straw and British intelligence officers deploying the “foreign act of state doctrine” – that is to say, the courts here cannot rule on the case since agents from foreign countries, notably the US and Libya, were involved, and they are granted immunity.

    Section 7 of the 1994 Intelligence Services Act, sometimes described as the “James Bond clause”, protects MI6 officers from prosecution for actions anywhere in the world that would otherwise be illegal. They would be protected as long as their actions were authorised in writing by the secretary of state.

    However, lawyers for Belhaj say many cases involving deportation or asylum seekers, for example, relate to actions of foreign states and that, in any case, torture overrides all legal loopholes.

    An inquiry under Sir Peter Gibson, a retired senior judge, into earlier rendition programmes in which British intelligence was involved, was abandoned because of the new and dramatic evidence about Belhaj’s abduction.

    After insisting that the issues were so serious that it needed a judge-led inquiry rather than one carried out by the parliamentary intelligence and security committee, David Cameron reversed his position. After the Gibson inquiry was dropped, he said the issues should be taken up by the committee after all.

    Dominic Grieve, the former attorney general and now chair of the committee, said shortly after he was appointed last October: “Our longer-term priority is the substantial inquiry into the role of the UK government and security and intelligence agencies in relation to detainee treatment and rendition, where there are still unanswered questions.”

    The Gibson inquiry published a damning interim report before it folded. It concluded that the British government and its intelligence agencies had been involved in rendition operations, in which detainees were kidnapped and flown around the globe, and had interrogated detainees who they knew were being mistreated.

    It said MI6 officers were informed they were under no obligation to report breaches of the Geneva conventions; intelligence officers appear to have taken advantage of the abuse of detainees; and Straw, as foreign secretary, had suggested that the law might be amended to allow suspects to be rendered to the UK.

    It raised 27 questions they said would need to be answered if the full truth about the way in which Britain waged its “war on terror” was to be established.

    The questions include:

    • Did UK intelligence officers turn a blind eye to “specific, inappropriate techniques or threats” used by others and use this to their advantage in interrogations?

    • If so, was there “a deliberate or agreed policy” between UK officers and overseas intelligence officers?

    • Did the government and its agencies become “inappropriately involved in some renditions”?

    • Was there a willingness, “at least at some levels within the agencies, to condone, encourage or take advantage of a rendition operation”?

    Nick Hopkins and Richard Norton-Taylor
    Tuesday 31 May 2016 17.56 BST Last modified on Wednesday 1 June 2016 17.20 BST

    Find this story at 31 May 2016

    © 2016 Guardian News and Media Limited

    UK spy agencies have collected bulk personal data since 1990s, files show Agencies privately concede that ‘intrusive’ practices can invade privacy and that data is gathered on people ‘unlikely to be of interest’

    Van nieuwsblog.burojansen.nl

    Britain’s intelligence agencies have been secretly collecting bulk personal data since the late 1990s and privately admit they have gathered information on people who are “unlikely to be of intelligence or security interest”.

    Disclosure of internal MI5, MI6 and GCHQ documents reveals the agencies’ growing reliance on amassing data as a prime source of intelligence even as they concede that such “intrusive” practices can invade the privacy of individuals.

    A cache of more than 100 memorandums, forms and policy papers, obtained by Privacy International during a legal challenge over the lawfulness of surveillance, demonstrates that collection of bulk data has been going on for longer than previously disclosed while public knowledge of the process was suppressed for more than 15 years.

    The files show that GCHQ, the government’s electronic eavesdropping centre based in Cheltenham, was collecting and developing bulk data sets as early as 1998 under powers granted by section 94 of the 1984 Telecommunications Act.

    The documents offer a unique insight into the way MI5, MI6, and GCHQ go about collecting and storing bulk data on individuals, as well as authorising discovery of journalists’ sources.

    Bulk personal data includes information extracted from passports, travel records, financial data, telephone calls, emails and many other open or covert sources. Often they are “fused” together to help pinpoint suspects.

    The frequency of warnings to intelligence agency staff about the dangers of trespassing on private records is at odds with ministers’ repeated public reassurances that only terrorists and serious criminals are having their personal details compromised.

    For example, a newsletter circulated in September 2011 by the Secret Intelligence Agency (SIS), better known as MI6, cautioned against staff misuse. “We’ve seen a few instances recently of individuals crossing the line with their database use … looking up addresses in order to send birthday cards, checking passport details to organise personal travel, checking details of family members for personal convenience,” it says.

    “Another area of concern is the use of the database as a ‘convenient way’ to check the personal details of colleagues when filling out service forms on their behalf. Please remember that every search has the potential to invade the privacy of individuals, including individuals who are not the main subject of your search, so please make sure you always have a business need to conduct that search and that the search is proportionate to the level of intrusion involved.” Better where possible to use “less intrusive” means, it adds.

    Theresa May unveils UK surveillance measures in wake of Snowden claims
    Read more
    There has been disciplinary action. Between 2014 and 2016, two MI5 and three MI6 officers were disciplined for mishandling bulk personal data. Last year, it was reported that a member of GCHQ’s staff had been sacked for making unauthorised searches.

    The papers show that data handling errors remain a problem. Government lawyers have admitted in responses to Privacy International that between 1 June 2014 and 9 February this year, “47 instances of non-compliance either with the MI5 closed section 94 handling arrangements or internal guidance or the communications data code of practice were detected.” Four errors involved “necessity and proportionality” issues; 43 related to mistransposed digits, material that did not relate to the subject of investigation or duplicated requests.

    Another MI5 file notes that datasets “contain personal data about individuals, the majority of whom are unlikely to be of intelligence or security interest”.

    The documents have been disclosed before a trial due later this summer at the investigatory powers tribunal, which hears complaints about state-authorised surveillance and the intelligence agencies. IPT sessions hear secret evidence behind closed doors.

    Release of these internal records follows admissions by David Cameron and by parliament’s intelligence and security committee (ISC) last year in the wake of revelations by the US whistleblower Edward Snowden.

    The most recent documents refer to a “more onerous authorisation process” after the prime minister’s avowal of the “use of bulk personal data”. They provide fresh detail of what is happening in the intelligence agencies.

    Web and phone companies are required to retain data for official access for 12 months, but the intelligence agency documents make clear that acquired bulk data sets can be held far longer.

    An MI5 memorandum says retention of “low intrusion” material needs to be reviewed only every two years. Some key words are missing from the memo, but it adds: “In MI5, a maximum retention period [redaction] is applied to [bulk personal data]. This can be increased in exceptional circumstances via a policy waiver. This waiver must be authorised by a senior MI5 official and agreed by the BPDRP [bulk data retention review panel] but shall be subject to a detailed review.”

    Bulk personal data is exchanged with “foreign agencies”, presumably mainly those from other countries in the UK’s traditional “Five Eyes” alliance – the USA, Canada, Australia and New Zealand.

    European court to consider legality of UK surveillance laws
    Read more
    The documents do not specify every type of information exploited but give examples and broad categories: population data and passports, travel records, financial data and communications information. “Some of this data is publicly available, some of it is purchased and some of it is acquired covertly in accordance with SIS statutory functions,” according to an MI6 note.

    Monetary information is held. “The fact that [MI5] holds bulk financial, albeit anonymised data is assessed to be a high corporate risk since there is no public expectation that the service will hold or have access to this data in bulk. Were it to become widely known that the service held this data, the media response would most likely be unfavourable and probably inaccurate.

    “In some cases, it may be necessary for the relevant team to approach the data provider to examine whether any unnecessary/extraneous parts of the dataset can be removed prior to acquisition. Such extraneous data might include large numbers of minors, details of earnings or medical information.”
    Death provides no escape. “Policy and processes in relation to bulk personal data is the same for both the living and the dead,” a combined agencies memo records.

    Each intelligence service has its own database, it appears from the documents. For MI5, storage of bulk data is at their London HQ, Thames House. “In order to ensure the security and integrity of the datasets that the service relies upon for its enhanced analytical capabilities and to reassure data providers that their data will be handled securely, it is essential that the necessary physical controls are in place to mitigate unauthorised access to, or loss of, this information during transportation to and subsequent storage in Thames House.”

    The justification for assembling such sophisticated databases, according to an MI5 document, is that it speeds up the process of detecting suspects. “By integrating bulk data [redaction] with information about individual subjects of interest from other sources of intelligence (liaison relationships, agent reporting, intercept, eavesdropping, surveillance) and from ‘fusing’ different data-sets in order to identify common links, we can better understand target networks, locations and behaviours, enabling a greater depth and breadth of target coverage.

    “The fragmentary nature of many intelligence leads and the magnitude of the threat all mean that there is currently no effective method of resolving identities in a timely fashion without using bulk data.”

    The standard MI5 form for acquisition of bulk data requires agency staff to a tick box if it holds sensitive personal data such as “biometric, financial, medical, racial or ethnic origin, religious, journalistic, political, legal, sexual or criminal activity” and membership of a trade union. MI5 officers also need to explain why acquisition is “necessary and proportionate”.

    The documents show how alert the agencies are to their legal obligations. They refer to the agencies’ “ethics team”, the need for “proportionality” and “necessity”. One note stresses that GCHQ employees’ conditions of employment state that “unauthorised entry to computer records may constitute gross misconduct”.

    But the papers also reveal how much latitude the law – notably Ripa, the Telecommunications Act, and the Data Protection Act – in practice gives them.

    Investigatory powers bill: the key points
    Read more
    The documents include for the first time certificates under section 28 of the Data Protection Act – signed by David Blunkett and Jack Straw in 2001 when they were home and foreign secretary respectively – which provided secrecy about authorised bulk data interceptions under section 94 of the Telecommunications Act. The existence of such directions were not disclosed until last year.

    The quantity of information the agencies have been forced to release suggests their long-established position of “neither confirming nor denying” any operational details may be crumbling at the edges.

    In parliamentary debate over the investigatory powers bill, the government has argued that the security services only conduct targeted searches of data under legal warrants in pursuit of terrorist or criminal activity and that bulk interception is necessary as a first step in that process.

    Millie Graham Wood, a legal officer at Privacy International, said: “The information revealed by this disclosure shows the staggering extent to which the intelligence agencies hoover up our data.

    “This highly sensitive information about us is vulnerable to attack from hackers, foreign governments and criminals. The agencies have been doing this for 15 years in secret and are now quietly trying to put these powers on the statute book for the first time in the investigatory powers bill, which is currently being debated in parliament. These documents reveal a lack of openness and transparency with the public about these staggering powers and a failure to subject them to effective parliamentary scrutiny.”

    A Home Office spokesman said: “Bulk powers have been essential to the security and intelligence agencies over the last decade and will be increasingly important in the future.

    “The acquisition and use of bulk provides vital and unique intelligence that the security and intelligence agencies cannot obtain by any other means. The security and intelligence agencies use the same techniques that modern businesses increasingly rely on to analyse data in order to overcome the most significant national security challenges.”

    Owen Bowcott and Richard Norton-Taylor
    Thursday 21 April 2016 00.01 BST Last modified on Saturday 7 May 2016 15.01 BST
    Find this story at 21 April 2016

    © 2016 Guardian News and Media Limited

    ‘Jihadi John’ case raises questions about UK counter-terrorism strategy (2015)

    Van nieuwsblog.burojansen.nl

    Emails released by CAGE revealed how MI5 repeatedly tried to recruit Mohammed Emwazi as an informant and put him on a terror watchlist to stop him leaving Britain

    The identifying of “Jihadi John”, a masked militant who has beheaded and tortured hostages held by the Islamic State in Syria, as 26-year-old British national, Mohammed Emwazi, has ignited a debate about the young recruit’s life, identity and path to Islamist militancy.

    Observers have pointed to Emwazi’s privileged upbringing – Emwazi came from a “well-to-do family,” growing up in West London and graduating from college with a degree in computer programming, according to the Washington Post – as proof that poverty did not fuel his radicalism.

    Jihadi John is middle class & educated, demonstrates again that radicalisation is not necessarily driven by poverty or social deprivation.

    — Shiraz Maher (@ShirazMaher) February 26, 2015
    Less attention has been paid to the alleged interactions between Emwazi and the British security services and how, if at all, these may have impacted on the young militant.

    Emails exchanged between Emwazi and Asim Qureshi, director of CAGE, a group which primarily lobbies on behalf of detainees held on terrorism charges, suggest that, before he travelled to Syria in 2012, Emwazi had several encounters with British authorities.

    In Amsterdam in 2009 an officer from MI5, Britain’s domestic security agency, tried to recruit Emwazi after accusing him and two others of trying to reach Somalia, where the militant group al-Shabab is based, according to emails he sent to Qureshi.

    “Listen Mohammed: You’ve got the whole world in front of you; you’re 21 years old; you just finished Uni – why don’t you work for us?” Emwazi recalled an MI5 officer asking him in Amsterdam’s airport in a June 2010 email he sent to Qureshi.

    CAGE has been accused of sympathising with some of the foreign fighters it is regularly in contact with.

    Qureshi, a graduate of the London School of Economics, has taken part in rallies by Islamist groups in the UK who call for “jihad” in Chechyna and Iraq.

    He told Middle East Eye he had met with Emwazi in the fall of 2009 shortly after he returned to the UK to discuss what had happened.

    “Mohammed was angry about the way he had been treated, he felt they (MI5) had bullied and disrespected him,” Qureshi said.

    In 2010 counterterrorism officials in Britain detained Emwazi again – fingerprinting him and searching his belongings – and later preventing him from travelling to Kuwait, his birthplace, where he had landed a job working for a computer company.

    “I had a job waiting for me and marriage to get started,” Emwazi wrote in a June 2010 e-mail to Qureshi. But now “I feel like a prisoner, only not in a cage, in London. A person imprisoned & controlled by security service men, stopping me from living my new life in my birthplace & country, Kuwait.”

    Qureshi said he last heard from Emwazi in January 2012.

    “Mohammed was harassed repeatedly by MI5 from the summer of 2010 until 2013. He told me he was once strangled by an officer at Heathrow airport during interrogation,” said Qureshi.

    Qureshi said that Emwazi, who has been described by those who knew him as “polite with a penchant for wearing stylish clothes while adhering to the tenets of his Islamic faith,” had used “every means possible” to try and change his personal situation.

    “Suffocating domestic policies aimed at turning a person into an informant but which prevent a person from fulfilling their basic life needs would have left a lasting impression on Emwazi,” said Qureshi.

    “When are we going to finally learn that when we treat people as if they’re outsiders they will look for belonging elsewhere?”

    We have an entire system of injustice that allows peoples lives to be ruined. Security services create suspect communities #MohammedEmwazi

    — CAGE (@UK_CAGE) February 26, 2015
    Analysts have dismissed CAGE’s assertion that the security services had a role in Emwazi’s radicalisation.

    “I think it’s a bit rich that Jihadi John has decided to go to Syria and participate in this conflict because of some interaction with the security services,” Shiraz Maher, a senior fellow at the International Centre for the Study of Radicalisation and Political Violence, told the Telegraph. “As if he (Jihadi John) is resolved of all responsibility, as if he is not a salient individual capable of making his own decisions.”

    Haras Rafiq, managing director of the anti-radicalisation think-tank the Quilliam Foundation, called the claim that Britain was in anyway to blame “rubbish.”

    “It’s not the British or Kuwaitis fault. It is his fault and the people who radicalised him. Jihadi John is a cold-hearted killer,” he said.

    Moazzam Begg, a British-Pakistani citizen and former Guantanamo Bay detainee, said that British security forces were not to blame but that their increasingly intrusive strategies had contributed to a “climate of fear and alienation” amongst Muslims in Britain.

    “It’s not an excuse, it’s part of an explanation why this man must have felt greatly alienated,” said Begg.

    “Scores and scores have been harassed, stopped whenever they travel, approached by security services … There are people who feel they are stuck, they have nowhere to turn to, it’s crucial we get this point across, some of us have had our lives completely destroyed.”

    Begg said the British government was still refusing to engage with the idea that British policies, foreign and domestic, might be influencing potential jihadists.

    “When people get alienated, they feel unwelcome and afraid … I feel that way all the time, I’ve been arrested, I’ve had my house turned upside down, I’ve been prosecuted and made to feel like I don’t belong here. If I was to leave tomorrow for Syria would it be right to say that the security services drove me away?”

    Thursday 26 February 2015 22:48 UTC
    Last update: Tuesday 3 March 2015 22:30 UTC

    Find this story at 26 February 2015

    © Middle East Eye 2014

    Revealed: How torture was used to foil al-Qaeda 2010 plot to bomb two airliners 17 minutes before explosion (2015)

    Van nieuwsblog.burojansen.nl

    Exclusive: Information from terror suspects about 2010 plot was used in a ‘Jack Bauer real-time operation’

    The former head of MI6 has revealed that torture “does produce intelligence”

    The former head of MI6 has said torturing suspected terrorists produces “useful information”, as The Independent on Sunday reveals that “real-time” intelligence understood to have been obtained by torture in Saudi Arabia helped to thwart a terrorist bombing on British soil.

    In his first interview since stepping down from Secret Intelligence Service in January, Sir John Sawers told the BBC yesterday that torture “does produce intelligence” and security services “set aside the use of torture… because it is against the values” of British society, not because it doesn’t work in the short term. Sir John defended the security services against accusations they had played a role in the radicalising of British Muslims, including Mohammed Emwazi, who it is claimed is the extremist responsible for the murder of hostages in Syria.

    The IoS can reveal details of a dramatic “Jack Bauer real-time operation” to foil an al-Qaeda plot to bring down two airliners in 2010. According to a well-place intelligence source, the discovery of a printer cartridge bomb on a UPS cargo aircraft at East Midlands airport was possible only because two British government officials in Saudi Arabia were in “immediate communication” with a team reportedly using torture to interrogate an al-Qaeda operative as part of “ticking bomb scenario” operation.

    4-John-Sawers-AFPGet.jpg
    Sir John Sawers has advised increasing defence spending to counter the security threat posed by Russian aggression (AFP/Getty)
    The terror plot was to use cartridge bombs to bring down two aircraft over the eastern United States. However, British authorities intercepted the first device at the cargo airport hub after what they described as a “tip-off” from Saudi Arabia. A second device was intercepted aboard a freight plane in Dubai; both aircraft had started their trips in Yemen.

    The IoS understands there was a frantic search prompted by “two or three” calls to Saudi Arabia after the tip-off, with security services battling to find the device. French security sources revealed the device was within 17 minutes of detonating when bomb disposal teams disarmed it.

    One intelligence source said: “The people in London went back on the phone two or three times to where the interrogation was taking place in Riyadh to find out specifically where the bomb was hidden. There were two Britons there, in immediate communication with where the interrogation was taking place, and as soon as anything happened, they were in touch with the UK. It was all done in real time.”

    There is growing frustration on the part of some UK security officials at Britain’s lack of candour about aspects of intelligence work. “There is a lack of understanding in that most people, if they knew about a ticking bomb scenario, would say torture was defensible, yet we insist on saying ‘we never do it’. Yet we are very happy beneficiaries of it,” one official said.

    CIA torture report: The 10 most harrowing stories
    10
    show all

    The human rights group Cage said the use of torture by MI5 and MI6 allegedly played a role in radicalising young British Muslims, including Michael Adebolajo, convicted of murdering soldier Lee Rigby in London in 2013. In the interview, Sir John said blaming the security services for radicalisation was “specious” and offered a vigorous defence of the methods used by MI5 and MI6. He said torture had been used for “thousands of years in order to extract useful information”.

    He said: “The whole problem about torture and maltreatment is sadly is that it does produce intelligence. And that’s why in a civilised society like ours we have to set aside certain methods, even though they might be effective in the short term. In the longer term they are very counterproductive; they are undermining the values of our society.”

    Shami Chakrabarti, the director of campaign group Liberty, said: “That is a low ebb, even for a senior spook in this country. After 9/11, I could have predicted internment without charge or trial. I could predict more invasions of privacy and blanket surveillance, but the one thing I could never have predicted is in 2015 we would be having to talk about torture in the UK.”

    4-lee-Rigby-memorial-get.jpg
    Floral tributes to Fusilier Lee Rigby at the spot where he was killed (Getty)
    According to a source close to the East Midlands bomb operation, the British officials “would have made sure they were not actually in the room” where the torture was allegedly taking place, but there was “no way” the intelligence that thwarted the bombing “wasn’t procured under duress”. “It is a fair inference to say he was being tortured. He wasn’t volunteering the information, that’s for sure,” the source said. “Of course we use intelligence from torture. We take it from wherever we can get it, but we are never, ever going to say ‘we don’t want that’. Or ask too many questions about where it has come from. It is the difference between intelligence and evidence.”

    Earlier this month, in what aides confirmed as a reference to the plot, Prime Minister David Cameron alluded to a “piece of information” from Saudi Arabia that “saved potentially hundreds of lives”.

    While in office Sir John described torture as “illegal and abhorrent”, but in 2010 said the security services faced “real, constant operational dilemmas” to avoid using information which has been gathered by torture. Two year later, he admitted British agents went “close to the line” when questioning alleged terrorists.

    4-Shami-Chakrabarti-TP.jpg
    Shami Chakrabarti is shocked that in 2015 “we would be having to talk about torture in the UK.” (Teri Pengilley)
    However, senior Tories said the case raised serious issues. Dominic Grieve, the Conservative former attorney general, said: “History shows us that torture can work but that it also often results in completely misleading information. It’s utterly unlawful, totally repugnant, and contrary to our national practices.”

    Andrew Tyrie MP, chair of the Parliamentary all-party group on rendition, said: “Allegations of British complicity in rendition, torture and kidnap just keep coming. The case for an independent judge-led inquiry into them has been overwhelming for years.”

    There are growing calls backing Mr Tyrie’s long-held argument that the next chair of the parliamentary Intelligence and Security Committee (ISC) be elected by MPs and not the Prime Minister.

    Social media and terrorist threats

    Facebook, Twitter and other technology firms have been savaged by a former spy chief for refusing to “fulfil their responsibilities” by protecting people from terrorists.

    Sir John Sawers, the former head of MI6, told Radio 4’s Today programme that the leaks by Edward Snowden had “driven a wedge” between the security services and social media companies which had hampered counter-terrorism efforts.

    His comments were echoed by the shadow Home Secretary, Yvette Cooper, who said social media firms “can’t just stand back and ignore” evidence of their users engaging in extremist activity.

    Sir John said: “Before the Snowden leaks took place, there was a good working relationship between technology companies and the intelligence agencies that kept us all safe. That has now gone down to the absolute legal minimum.

    4-Edward-Snowden-AP.jpg
    Edward Snowden’s revelations sparked outrage about the scope of government snooping (AP)
    We cannot just leave the security of society to the intelligence agencies. Technology companies have to find a way whereby they can fulfil their responsibilities and play their part.

    “They need to have mechanisms whereby they can identify this dangerous activity, and they are sitting on a mine of data which they use extensively for commercial purposes, but which they are not allowing to be used for purposes of public good like national security.”

    Ms Cooper told The IoS: “At the moment, some of the online social media organisations will do more around child abuse than on counter-terror or terrorist threats. I don’t think people can just stand back and ignore it.”

    Jamie Merrill, James Hanning, Mark Leftly, Nick Clark @Jamie_Merrill Sunday 1 March 2015

    Find this story at 1 March 2015

    Copyright http://www.independent.co.uk/

    The “Torture Works” Story (2015)

    Van nieuwsblog.burojansen.nl

    After Adam Goldman exposed the identity of Jihadi John, ISIL’s executioner, as Mohammed Emwazi, it set off an interesting response in Britain.

    CagePrisoners — the advocacy organization for detainees — revealed details of how MI5 had tried to recruit Emwazi and, when he refused, had repeatedly harassed him and his family and prevented him from working a job in Kuwait (where he was born).

    While that certainly doesn’t excuse beheadings, it does raise questions about how the intelligence services track those it has identified as potential recruits and/or threats.

    And seemingly in response to those questions, the former head of MI6 has come forward to say that torture has worked in a ticking time bomb scenario — that of the toner cartridge plot in 2010.

    In his first interview since stepping down from Secret Intelligence Service in January, Sir John Sawers

    …defended the security services against accusations they had played a role in the radicalising of British Muslims, including Mohammed Emwazi, who it is claimed is the extremist responsible for the murder of hostages in Syria.

    The IoS can reveal details of a dramatic “Jack Bauer real-time operation” to foil an al-Qaeda plot to bring down two airliners in 2010. According to a well-place intelligence source, the discovery of a printer cartridge bomb on a UPS cargo aircraft at East Midlands airport was possible only because two British government officials in Saudi Arabia were in “immediate communication” with a team reportedly using torture to interrogate an al-Qaeda operative as part of “ticking bomb scenario” operation.

    The terror plot was to use cartridge bombs to bring down two aircraft over the eastern United States. However, British authorities intercepted the first device at the cargo airport hub after what they described as a “tip-off” from Saudi Arabia. A second device was intercepted aboard a freight plane in Dubai; both aircraft had started their trips in Yemen.

    The IoS understands there was a frantic search prompted by “two or three” calls to Saudi Arabia after the tip-off, with security services battling to find the device. French security sources revealed the device was within 17 minutes of detonating when bomb disposal teams disarmed it.

    One intelligence source said: “The people in London went back on the phone two or three times to where the interrogation was taking place in Riyadh to find out specifically where the bomb was hidden. There were two Britons there, in immediate communication with where the interrogation was taking place, and as soon as anything happened, they were in touch with the UK. It was all done in real time.”

    At the time, multiple sources on the Saudi peninsula revealed that authorities learned of this plot — and therefore learned about the bombs — from an apparent double agent(and former Gitmo detainee), Jabir al-Fayfi, who had left AQAP and alerted the Saudis to the plot. If so, it would mean what was learned from torture (if this account can be trusted) was the precise location of the explosives in planes that boxes that had already been isolated.

    that may mean this “success” prevented nothing more than an explosion in a controlled situation, because it had already been tipped by a double agent who presumably didn’t need to be tortured to share the information he had been sent in to obtain.

    The toner cartridge story significantly resembles the UndieBomb 2.0 plot, which was not only tipped by a double agent, but propagated by it …in that case, the double agent came not via Gitmo and Saudi “deradicalization,” but via MI5, via a recruitment effort very like what MI5 used with Emwazi.

    Indeed, it is not unreasonable to imagine that Emwazi knew that double agent

    the treatment of a range of people implicated in Yemeni and/or Somali networks (MI5 accused Emwazi of wanting to travel to the latter) derives from the growing awareness among networks who have tried to be recruited who else might have been recruited.

    Which might be one reason to tie all this in with “successful torture” — partly a distraction, partly an attempt to defer attention from a network that is growing out of control

    2015-03-01 / N/A / www.emptywheel.net

    Find this story at 1 March 2015

    © 2016 INFOSOURCES

    << oudere artikelen  nieuwere artikelen >>