Police criticised and ridiculed over attempt to spy on students and protestersNovember 27, 2013
Secret footage has revealed how a policeman tried to recruit an activist to feed him information about the political activities of students and other campaigners
Police chiefs have received a hefty dose of criticism, and ridicule, since it was revealed that one of their officers attempted to persuade an activist to spy on Cambridge University students.
As the Guardian disclosed here yesterday, a policeman approached a young activist and tried to recruit him as an informant.
Instead, the activist decided to expose the surveillance with the help of a concealed camera.
He recorded a meeting with the officer who said he wanted information about students, groups such as UK Uncut and Unite Against Fascism, and anti-fracking demonstrators.
A series of clips from the secret footage can be seen here, here, here, here and here.
Cambridge University did not want to comment, saying that it was a matter for the police. Cambridgeshire Police has only said :”Officers use covert tactics to gather intelligence, in accordance with the law, to assist in the prevention and detection of criminal activity.”
Today my colleague Hugh Muir takes an acerbic look at how “the secret snoopy state seeks to monitor the legitimate activity of those who might ask questions of it.”
Here’s a selection of what others have said.
The Cambridge University Student Union said they were “alarmed” and found it “absurd”.
They added :”Tactics such as these are not only intrusive, they also waste time targeting groups which are involved in making important and positive change in our society. We condemn the actions of the police in this matter and hope the Government will look critically at the use of surveillance measures by UK security forces.”
Cambridge Defend Education, an anti-cuts campaign named as a potential target of the infiltration, said :”The police will go to any lengths to gain ‘intelligence’ on activist groups, including deceiving women into long-term intimate relationships. It is telling that the police regard their activities as completely legitimate and legal, reflecting their crucial role in enforcing austerity policies through both violent and covert repression of those who oppose them.”
Rachel Wenstone, deputy president of the National Union of Students, said : “This revelation is an absolute scandal. This is yet another example of the questionable tactics that undercover police officers have taken in recent years to infiltrate campaign groups and extract information.We now need to know just how widespread this practice is.”
She added : “To group the activities of hardworking students’ unions within the same realm as those of the English Defence League is grossly offensive.”
The covertly-recorded footage had shown that the police officer also wanted information about the EDL, but recognised that the activist was on the wrong side of the political divide to provide those details.
Nick Pickles, director of Big Brother Watch, condemned the infiltration of “anti-fracking or educational campaign groups, where there is zero suspicion of any wrongdoing” as “a gross abuse of surveillance powers.”
“Coming after attempts to discredit the family of Stephen Lawrence and undercover officers fathering children with activists this episode makes clear why the police should not be able to approve their own undercover surveillance operations. Judicial oversight is essential if these kinds of abuses are to be prevented.
“Were it not such a stark reminder of the weak oversight of police intelligence operations you’d be forgiven for thinking this was the plot for a student film, albeit inspired more by David Brent than James Bond.”
“There should be a full, independent inquiry into the activities of this unit and I will be writing to the Independent Police Complaints Commission to ask that they investigate.”
Jules Carey, a solicitor at Tuckers’ law firm representing several campaigners taking action against the Metropolitan Police over the alleged behaviour of undercover officers, said of Cambridgeshire Police: “The force has clearly lost its way. There can be no justification in a democracy for attempting to deploy informants into student groups and protest organisations. The force should be seeking to uphold the fundamental right to protest, not taking cynical steps to undermine it”.
Isabella Sankey, director of policy for human rights campaigners Liberty, said: “After the scandalous infiltration of grieving families and environmental movements, police now set their sights on student activism.
“That any group which dares to dissent is apparently fair game should alarm anyone committed to proportionate policing and democracy itself. Proper judicial checks on police surveillance are badly overdue – Parliament must take responsibility and act.”
Find this story at 15 November 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
‘Gaan jullie stenen gooien?’ Inlichtingenoperatie rondom studentenprotestNovember 27, 2013
Dat studenten actie voeren tegen aangekondigde bezuinigingen op het onderwijs is van alle tijden. Daar is niets staatsondermijnend aan. Des te meer opmerkelijk dat diverse actieve studenten gedurende de acties en betogingen door de Regionale Inlichtingendienst en geheime dienst AIVD benaderd zijn met de vraag informant te worden.
‘Gaan jullie stenen gooien?’
Eind 2009 stak er langzaam een storm van protest op tegen de bezuinigingen in het onderwijs. Al jaren wordt er zowel binnen de politiek als vanuit wetenschappelijke hoek geroepen dat er geïnvesteerd moet worden om het Nederlandse onderwijs op peil te houden. De regering van CDA en VVD met gedoogpartner PVV vindt echter dat ook het onderwijs moet korten in verband met de algemene economische malaise. De studentenbonden, maar ook docenten keerden zich tegen het beleid van staatssecretaris Zijlstra van het ministerie van Onderwijs, Cultuur en Wetenschap (OCW).
Naast de ‘officiële’ organen van studenten (LSVB en IOS) en de jongerenorganisaties van enkele politieke partijen (Dwars en Rood) ontstond er een keur aan actiegroepen. Verspreid over het land richtten studenten clubs op als de Kritische Studenten Utrecht (KSU), Kritische Studenten Nijmegen Arnhem (KSNA), Kritische Studenten Twente (KST), Professor Protest (Amsterdam), SACU (Studenten Actie Comité Utrecht), Onderwijs is een Recht (OIER, Landelijk) en de comités SOS Nijmegen en SOS Amsterdam.
Actiegolf
Vanaf april 2010 tot de zomer van 2011 spoelde een golf aan acties over het land. Ludieke acties op straat of in universiteiten, bezettingen van hogescholen en faculteiten en demonstraties in verschillende steden. In het najaar van 2010 nam het protest in omvang toe en in januari 2011 demonstreerden ruim 10.000 studenten tegen de bezuinigingen.
Doel van de acties was van meet af aan duidelijk: geen kortingen op het onderwijs, zeker in een tijd dat de werkloosheid toeneemt. Ook al leefde er groot ongenoegen over het kabinet en gedoogpartner PVV, de regering omverwerpen was nooit een doelstelling. Oppositiepartijen en universiteits- en schoolbesturen verzetten zich samen met de studenten.
Nu lopen ludieke acties, bezettingen en demonstraties wel eens uit de hand, maar zoals onderzoek van Buro Jansen & Janssen naar demonstratierecht in Den Haag heeft uitgewezen, gebeurt dit zelden. Als er al ongeregeldheden plaats vinden, zijn lang niet altijd de actievoerders de schuldigen. Veelal is het ook te wijten aan het optreden van de politie. Bij grote demonstraties is vaak ook een overmacht aan mobiele eenheid aanwezig. De laatste jaren blijven ernstige rellen dan ook uit.
Begin 2011, op het hoogtepunt van de protestgolf, deed zich echter iets geks voor. Op de ochtend van vrijdag 21 januari meldde VVD-burgemeester Van Aartsen aan de NOS dat ‘de gemeente Den Haag aanwijzingen had dat radicalen de studentendemonstratie van vandaag willen verstoren’. Van Aartsen zei dat de politie die aanwijzingen baseerde op informatie afkomstig van ‘open en gesloten bronnen’.
Tijdens die demonstratie vonden er enkele schermutselingen plaats, maar of daar de ‘radicalen’ bij betrokken waren waar Van Aartsen eerder die dag op doelde, bleef onduidelijk. De open bronnen zouden websites, pamfletten en allerlei bladen zijn. Bij gesloten bronnen kan het gaan om telefoon en internet taps, observaties, maar ook informanten en infiltranten.
Zoals verwacht vond er een relletje plaats op het Plein voor het Tweede Kamergebouw en op het Malieveld. De politie meldde dat een deel van de aangehouden jongeren deel uit zou maken van radicale groeperingen. Volgens burgemeester Van Aartsen waren de arrestanten leden van de linkse groep Anti-Fascistische Aktie, zo meldde de NOS die avond.
Radicalen
Volgens de demonstranten liepen er tijdens de betoging veel agenten in burger mee en was de ME dreigend aanwezig. Dit kan het gevolg zijn geweest van de dreigende taal van de burgemeester. De ‘radicalen’ moesten per slot van rekening in de gaten worden gehouden. Van de 27 verdachten (cijfers van de politie) werden er nog op dezelfde dag 22 vrijgelaten.
Vijf verdachten werden maandag 24 januari voorgeleid. Volgens het openbaar ministerie bevonden zich hieronder ‘enkele niet-studenten’. Het zou gaan om een 27-jarige man uit Spanje, een 22-jarige man uit Haarlem, een 21-jarige Amsterdammer, een 26-jarige inwoner van Wassenaar en een 18-jarige Delftenaar.
Het OM maakte niet duidelijk wie nu wel of niet student was. Een HBO-student Arts and Sciences kreeg 8 weken onvoorwaardelijk opgelegd, een student politicologie en geschiedenis 80 uur werkstraf, een bouwkundestudent 40 uur werkstraf en een student toerisme een boete van 500 euro.
Alle verdachten en advocaten spraken van excessief politiegeweld. “De ME mishandelde vrouwen en kinderen” en “ik smeet vrijdag een aantal stenen, nee, geen bakstenen, naar de ME, omdat het geweld dat de politie gebruikte me diep schokte.” De rechter moest toegeven dat het optreden van de politie “niet de schoonheidsprijs verdiende.”
De veroordeelden waren allemaal studenten, zelfs de Spanjaard. Waarom logen burgemeester, politie en OM zowel voor als na de demonstratie over ‘radicalen’? Bespeelden zij de media om zo studenten in een verkeerd daglicht te plaatsen? En waar kwamen die radicalen plotseling vandaan? Na de demonstratie waren de radicalen volgens de burgemeester deelnemers aan de actiegroep AFA. Welke kennis had de politie en vanwaar werd die ingezet?
De gebeurtenissen rondom de demonstratie van 21 januari richtte de aandacht op iets dat al maanden aan de gang was. Vanaf het begin van de studentenprotesten is de overheid bezig geweest om het verzet in kaart te brengen, studenten te benaderen, informanten te werven, te infiltreren en zicht te krijgen op verschillende groepen. Niet de Landelijke Studenten Vakbond (LSVb) of het Interstedelijk Studenten Overleg (IOS) zouden een gevaar vormen, maar andere ‘radicalere’ studentikoze actiegroepen.
Benadering
In april en mei 2010 werd ‘Marcel’ gebeld door een man die zei dat hij van de recherche was en zichzelf Veerkamp noemde. Van welke afdeling en in welke hoedanigheid de beambte contact opnam, vertelde hij niet. Veerkamp werkt echter voor de Regionale Inlichtingendienst Utrecht, zoals uit een andere benadering blijkt. (zie Observant 58, Voor de RID is Griekenland ook een gevaar). De ‘rechercheur’ wilde graag geregeld contact met Marcel.
Marcel is student en actief voor het Studenten Actie Comité Utrecht (SACU) dat nauw samenwerkt met de Kritische Studenten Utrecht (KSU). Beide actiegroepen richten zich op de bezuinigingen op het onderwijs, maar plaatsen die tevens in maatschappelijk perspectief. Naast bezettingen, demonstraties en acties organiseerden ze ook debatten, lezingen en discussies. De kritische studentengroepen hielden een weblog bij met verslagen, agenda en discussie, een open structuur.
De man van de ‘recherche’ wilde van Marcel uit eerste hand weten wat de Utrechtse studenten de komende tijd gingen doen. “Zij wilden graag weten wat ze van ons konden verwachten”, vat Marcel het telefonische onderhoud samen. Marcel vond het nogal vreemd dat de man hem benaderde. Voor demonstraties werd openlijk opgeroepen en de groep meldde deze zelfs bij de politie aan. Waarom zou hij dan achter de rug om van andere studenten met deze man gaan praten?
Al snel werd duidelijk waar het de man om te doen was. Tijdens een van de twee gesprekken vroeg hij Marcel of ze van plan waren om stenen te gaan gooien tijdens studentendemonstraties. Marcel was nogal overrompeld door deze vraag, het leek of de politie er op zat te wachten. Alsof er een behoefte bestond van de zijde van de overheid om de studenten te criminaliseren.
AFA
Waarom wordt een student in Utrecht benaderd met de vraag of de studenten stenen zouden gaan gooien? Als Marcel de enige benaderde actievoerder was geweest dan is de conclusie simpel. De man die hem belde is wellicht werkzaam voor de Regionale Inlichtingendienst (RID) en was op zoek naar een contact binnen de kritische studentengroepen met het oog op mogelijke toekomstige ongeregeldheden. RID’ers hebben zo ook contacten met voetbalsupporters, zoals die van FC Utrecht.
Hoewel het personeel van de RID professionals zijn in het misleiden van mensen, kan de opmerking betreffende ‘stenen gooien’ een verspreking zijn geweest. De benaderde Marcel is echter geen uitzondering. ‘Peter’ werd in een eerder stadium gebeld door iemand van de overheid. Hij is student in Amsterdam en was actief voor de actiegroep Professor Protest. Het is niet duidelijk of de man die hem benaderde dezelfde persoon is geweest die Marcel heeft gebeld. Peter werd gevraagd om als informant te gaan werken. Hij voelde daar niets voor en verbrak de verbinding.
De combinatie van verschillende benaderingen, het bestempelen van elementen bij een studentendemonstratie als zijnde ‘radicaal’ en het benoemen van de ‘linkse groep Anti-Fascistische Aktie’ is te toevallig. In het deelrapport Ideologische Misdaad uit 2005 en 2007 van de KLPD worden deelnemers van AFA expliciet genoemd als ideologische misdadigers, mensen die worden verdacht van het plegen van een misdaad uit ideologische, politieke motieven.
Zodra activisten van AFA door politie worden gezien als ideologische misdadigers en door het landelijk parket gelijk worden gesteld aan roof misdadigers (Strategienota aandachtsgebieden 2005 – 2010) dan is een inlichtingenoperatie gericht op studenten een logisch uitvloeisel indien AFA-activisten ook student zijn en actief binnen die groepen. Daarbij passen benaderingen, infiltratie, aftappen, observaties en andere geheime methoden. Kritische studentengroepen plaatsen de strijd tegen de bezuinigingen van het kabinet in een breder perspectief.
Actieve studenten zijn soms ook politiek actief of strijden voor bijvoorbeeld dierenrechten, ondemocratisch Europa of bijeenkomsten van de G8 of G20. Het optreden van de overheid in deze doet sterk denken aan de inlichtingenoperatie van de BVD rond de Amsterdamse studentenbond ASVA in de jaren ’60 en ’70. Het verschil leek dat Marcel en Peter niet door de inlichtingendienst (de AIVD) zijn benaderd, maar door de ‘recherche’. De recherche zou dan misschien de Nationale Recherche zijn geweest vanwege de ‘ideologische misdaad’.
Geheime dienst
Nu is de wijze waarop prioriteiten gesteld worden aan het werk van politie en parket onderhevig aan politieke druk. Prioriteiten veranderen jaarlijks, afhankelijk van gevoerde discussies in de Tweede Kamer en de doelstellingen van een individuele minister. Het is echter moeilijk voor te stellen dat studentenprotesten plotseling als een belangrijk strategiepunt zijn benoemd voor de Nationale Recherche. Beleid verandert meestal traag, het duurt een tijd voordat het opsporingsapparaat zich gaat richten op een andere prioriteit.
Niet de Nationale Recherche zat dan ook achter de studenten aan, maar de geheime dienst. De benadering van ‘Karin’ onderstreept dit. Zij werd benaderd door iemand van het ministerie van Binnenlandse Zaken en Koninkrijksrelaties, het ministerie dat verantwoordelijk is voor het functioneren van de AIVD. Marcel en Peter zijn waarschijnlijk benaderd door functionarissen van de Regionale Inlichtingendiensten van Amsterdam en Utrecht.
Probleem is dat inlichtingenfunctionarissen meestal niet te koop lopen met hun naam en het werk dat ze verrichten. Indien je als burger zelf niet vraagt met wie je van doen hebt, kunnen zij niet de beleefdheid opbrengen om duidelijk aan te geven dat zij voor een inlichtingendienst werken.
Karin is student aan de Universiteit van Amsterdam (UvA). Zij is sinds eind 2010 betrokken bij het studentenverzet. In februari 2011 bezette zij samen met andere studenten het Bungehuis van de UvA. Aan de actiegroep waar zij deel van uitmaakte, Professor Protest, nam ook Peter deel.
Op 20 april 2011 werd Karin gebeld door een man die zich voorstelde als ‘Ivo Kersting’ (of Kertjens of Kerstman of Kerstland) van het ministerie van Binnenlandse Zaken en Koninkrijkrelaties. Haar mobiele nummer was niet gebruikt als perstelefoon dus Ivo moet haar nummer via het Centraal Informatiepunt Onderzoek Telecommunicatie (CIOT) hebben verkregen.
Ivo belde vanuit Amsterdam met nummerherkenning en sprak Karin met haar voornaam aan. Zij was nogal overrompeld door het telefoontje. Hij vroeg of hij op een gelegen tijdstip belde waarop zij ontkennend antwoordde. Hij kon haar over een uur terugbellen, maar zei niet waarover. Karin vroeg het nog, maar Ivo zei, “nee, over een uur hoor je dat wel”.
Een uur later hing hij weer aan de lijn, nu zonder achternaam. “Hallo, weer met Ivo, van Binnenlandse Zaken. Wij zijn de studentenbeweging in kaart aan het brengen. Jij bent toch woordvoerder geweest van de Bungehuis bezetting? Je bent ons positief opgevallen, en je zou ons erg helpen als je met ons rond de tafel komt zitten om wat te debatteren over de studentenbeweging.”
Ivo heeft gedurende de telefoongesprekken op geen enkele manier uitgelegd wat voor functie hij op het ‘ministerie’ vervulde. Karin antwoordde dat ze geen tijd had en niet meer actief betrokken ws bij de studentenprotesten. Ivo leek een beetje van zijn stuk gebracht door haar resolute antwoord. “Oh, dat is jammer je zou ons echt enorm kunnen helpen, kan ik je niet overhalen?”, probeerde hij nog. Toen Karin ontkennend antwoordde, gooide hij zonder gedag te zeggen de hoorn op de haak.
Intimiderend
Medewerkers van de inlichtingendienst hebben de neiging zich boven de burger, de samenleving te plaatsen. Ze hebben toegang tot allerlei persoonlijke informatie waardoor mensen die benaderd worden zich erg geïntimideerd voelen. Karin vond de gesprekken met Ivo Kersting vervelend en intimiderend. Hij bleef aandringen, draaien, geveinsd vriendelijk doen en doordrammen terwijl zij toch duidelijk was met haar ontkenning.
Ivo belde namelijk na een paar minuten weer terug. Hij verontschuldigde zich niet dat hij zo onbeschoft de hoorn op de haak had gegooid, maar zei meteen dat ze geld kreeg voor deelname aan het gesprek. Hoewel Karin opnieuw zei niet mee te willen werken, bleef de functionaris aanhouden. “We kunnen ook in Amsterdam afspreken. Ben je in Amsterdam? Je woont toch in Amsterdam? Ik ben nu met een collega in de buurt dus dan zouden we even kunnen spreken?”
Blijkbaar wisten ze meer van haar dan ze hadden laten doorschemeren. Karin wees de agenten opnieuw af, maar op het drammerige af bleef Ivo aanhouden. “Anders spreken we af dat jij bepaalt waar en wanneer je af wilt spreken. Je zou ons echt enorm kunnen helpen.” De druk werd opgevoerd. Karin moest zich schuldig gaan voelen. Zij wilde niet meewerken terwijl Ivo en zijn collega zo redelijk waren.
Dat waren ze echter niet. Ze intimideerden haar en toonden geen respect voor haar standpunt. “Weet je wat, ik overval je nu natuurlijk. Misschien kan ik je anders volgende week bellen”, zei Ivo alsof hij haar ontkenning helemaal niet had gehoord. Opnieuw voor de tiende keer antwoordde Karin dat ze niet wilde afspreken, geen tijd en zin had.
Karin was overrompeld, maar was nee blijven zeggen. Achteraf realiseert zij zich dat ze blij was dat ze wist dat ze het volste recht had om te weigeren mee te werken. Na een spervuur aan vragen te hebben overleefd en geschrokken te zijn van de behandeling, bleef er alleen maar boosheid bij haar hangen. “Het is eigenlijk politie van de ergste soort omdat ze zich niet eens voordoen als politie, en het laten lijken alsof je gewoon een gezellig kopje koffie gaat drinken”, vat ze het maanden later samen.
“Veel studenten die benaderd worden zullen dusdanig geïntimideerd zijn dat ze gaan praten omdat ze niet durven te weigeren. Anderen zullen denken dat het om een gezellige discussie of om een debat gaat”, concludeert Karin. De geheim agenten gaven haar ook die indruk. “Ze deden alsof het heel erg zou helpen als ik met ze zou gaan debatteren over de studentenbeweging, alsof zij invloed hadden op de besluitvorming rondom de bezuinigingen”, voegt ze nog toe. Karin is er van overtuigd dat er zeker studenten zijn geweest die op het aanbod zijn ingegaan en met Ivo en zijn collega of andere functionarissen hebben gesproken.
Persoonsdossiers
Naast Marcel, Peter en Karin zijn er ook andere mensen benaderd vanaf het najaar van 2010 tot en met de zomer van 2011. Waarom wordt een inlichtingendienst ingezet tegen een groep studenten die protesteert tegen de bezuinigingen op het onderwijs? Niet om rellen te voorkomen, zoals bij voetbalsupporters. Bij risicowedstrijden communiceert de RID vooral met de burgemeester en met de driehoek over mogelijke ongeregeldheden, niet met de inlichtingendienst.
Dat er een uitgebreidere inlichtingenoperatie rondom de studentenprotesten op touw is gezet, maken de eerste stukken duidelijk die via de Wet openbaarheid van Bestuur (WoB) en de Wet op de Inlichtingen- en Veiligheidsdiensten (WIV) zijn verkregen. De RID van de regiopolitie Haaglanden heeft op 27 januari 2011 een nabeschouwing van de studentendemonstratie opgesteld voor het Algemeen Commandant van de Staf grootschalig en bijzonder optreden (AC SGBO).
Of dit rapport alleen naar de algemeen commandant is gegaan, valt te betwijfelen. Op 21 maart 2011 schrijft rapporteur ‘R: 15:’ van de RID Haaglanden het verstrekkingrapport 1414/11 aan de AIVD. Het rapport gaat over een studentendemonstratie van 25 maart 2011. Er wordt in gemeld wie de organisator was van de betoging, de route en het aantal te verwachten demonstranten. Onduidelijk is of er delen van het rapport zijn achtergehouden.
Evenmin duidelijk is hoelang de overheid studenten al in kaart aan het brengen is. Duidelijk is wel dat er persoonsdossiers zijn samengesteld van individuele actievoerders. Op basis van die dossiers is de claim van burgemeester Van Aartsen, de politie en het Openbaar Ministerie rond de demonstratie van 21 januari 2011 te begrijpen. Of er provocateurs van politie of inlichtingendienst, mensen die aanzetten tot geweld, tussen de demonstrerende studenten rond hebben gelopen, is niet duidelijk. Wel waren er veel agenten in burger op de been en de ME trad onnodig hard op.
Marcel, Peter en Karin zijn fictieve namen.
Find this story at 26 maart 2013
Police tried to spy on Cambridge students, secret footage showsNovember 27, 2013
Officer is filmed attempting to persuade activist in his 20s to become informant targeting ‘student-union type stuff’
Police sought to launch a secret operation to spy on the political activities of students at Cambridge University, a covertly recorded film reveals.
An officer monitoring political campaigners attempted to persuade an activist in his 20s to become an informant and feed him information about students and other protesters in return for money.
But instead the activist wore a hidden camera to record a meeting with the officer and expose the surveillance of undergraduates and others at the 800-year-old institution.
The officer, who is part of a covert unit, is filmed saying the police need informants like him to collect information about student protests as it is “impossible” to infiltrate their own officers into the university.
The Guardian is not disclosing the name of the Cambridgeshire officer and will call him Peter Smith. He asks the man who he is trying to recruit to target “student-union type stuff” and says that would be of interest because “the things they discuss can have an impact on community issues”.
Smith wanted the activist to name students who were going on protests, list the vehicles they travelled in to demonstrations, and identify leaders of protests. He also asked the activist to search Facebook for the latest information about protests that were being planned.
The other proposed targets of the surveillance include UK Uncut, the campaign against tax avoidance and government cuts, Unite Against Fascism and environmentalists. The Cambridgeshire police initially insisted that there were implications for “national security” but later dropped this argument when challenged.
At another point, the activist asked whether a group known as Cambridge Defend Education, which has protested against tuition fees and education cuts, would be of interest. Smith replied: “That’s the sort of thing that we would be looking for. Again, basic sort of stuff. It’s all the internet. When they have meetings and they are discussing what they are going to do, that’s when we’ll say: ‘Will you go along?'”
Cambridge Defend Education describes itself as being “mostly students and academics from Cambridge University”.
Rachel Wenstone, deputy president of the National Union of Students, said: “This is yet another example of the questionable tactics that undercover police officers have taken in recent years to infiltrate campaign groups and extract information.”
Julian Huppert, the Liberal Democrat MP for Cambridge, tweeted: “I’m shocked by this – seems wholly inappropriate.” Cambridge University did not comment, saying it was a matter for the police.
Cambridgeshire police said: “Officers use covert tactics to gather intelligence, in accordance with the law, to assist in the prevention and detection of criminal activity.”
The disclosures follow prolonged criticism of the police over their secret deployment of long-term undercover officers in political groups since 1968. Police chiefs have been accused of unjustifiably infiltrating and disrupting political groups that use non-violent methods to promote their aims.
Another technique for gathering intelligence on campaigners has been to convince activists to become paid informants and pass on details of future protests and prominent campaigners. The number of informants in political groups, according to police sources, runs into the hundreds.
The covert film sheds light on the rarely visible world of informants, illuminating how the police recruit and task them. The activist, who does not want to be named and has been given the pseudonym John Armstrong, was rung on his mobile out of blue at the beginning of October by the police officer.
Smith said he worked for the police and asked him if he was willing to come to a police station in Cambridge to help him with a matter that he did not disclose.
According to Armstrong, Smith had chosen him because he had been active in environmental and anti-nuclear groups and had been arrested three times on demonstrations, although not charged. He has also lived in Cambridge for many years.
Afterwards, Armstrong contacted the Guardian as he did not want to become an informant. He agreed to wear a concealed camera to record the contents of his second meeting with Smith.
During this meeting, Smith suggested that he wanted Armstrong to start by providing information about local groups in Cambridge, before progressing on to national campaigns.
“Let’s keep it small, you know little things that go on, little meetings that happen where they are going to discuss different issues in Cambridge, whether it be, such as at the university or those sorts of things,” the officer is recorded as saying. When Armstrong said he had been involved in a student-organised occupation of Cambridge University in a protest against tuition fees three years ago and asked if Smith would have been interested in that, Smith said yes. “Again, it’s those sorts of things. You know, what is the feeling of people, if you are inside.”
The young man then asked if it would have been difficult for the police to send their own officers into the occupation, to which Smith replied: “We can’t do it. It’s impossible. That’s why we need to work with people.” Armstrong has not been a student at Cambridge, although many of his friends are at the university.
When contacted by the Guardian, a Cambridgeshire police spokesperson said: “Officers use covert tactics to gather intelligence, in accordance with the law, to assist in the prevention and detection of criminal activity.” They declined to give any details of the unit Smith works for.
Smith outlined what information Armstrong would be required to slip him. “It will be a case of you going to meetings, say, I don’t know, UK Uncut, student … something like that, how many people were there, who was the main speaker, who was giving the talks, what was your assessment of the talk, was it a case of – were they trying to cause problems or were they trying to help people, you know, those sort of things.”
Smith also said he wanted Armstrong to collect information about Cambridge campaigners who were planning to go to protests in other parts of the country. “That’s where the names come in. Because what I will want to know is – OK, who’s going, do they plan on a peaceful protest which is absolutely fine, how they are going to go, as in what vehicles they are going to use, index numbers.”
He goes on to say: “So you will tell me, for example, there’s 50 people going from Cambridge University, these are the vehicles they are travelling in and they are going as a peaceful protest?”
Smith outlined how the information gathered by Armstrong would be funnelled to the police officers in charge of policing the demonstration: “The reason I am asking those questions is because it gives the officers or whoever’s looking after it on that side of things, as in at the protest, an idea of how many people are going to attend, where they are coming from, how many vehicles are going to turn up, so they can put measures in place to keep them off the road and things. It’s not because we want to target people and round them all up and arrest them.”
Smith also suggested that Armstrong use Facebook to find information about groups, adding: “It is easier to ask people like yourself to give us updates … It’s all about us doing things legally … We don’t hack into people’s accounts so then we would ask you for updates.”
The officer also suggested the man he hoped to recruit would be paid expenses or other sums. “You might go to a UK Uncut or Unite Against Fascism meeting one evening, you might get say £30 just for your time and effort for doing that. That’s the sort of thing you are looking at.”
As Smith sought to convince Armstrong to sign up, he also advised him not to “think too deeply” about informing on his fellow campaigners as he might “tie himself up in knots”.
Rob Evans and Mustafa Khalili
The Guardian, Thursday 14 November 2013 13.42 GMT
Find this story at 14 November 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Spooky Business: A New Report on Corporate Espionage Against Non-profitsNovember 27, 2013
Giant corporations are employing highly unethical or illegal tools of espionage against nonprofit organizations with near impunity, according to a new report by Essential Information. The report, titled Spooky Business, documents how corporations hire shady investigative firms staffed with former employees of the Central Intelligence Agency (CIA), National Security Agency (NSA), US military, Federal Bureau of Investigations (FBI), Secret Service and local police departments to target nonprofit organizations.
“Corporate espionage against nonprofit organizations is an egregious abuse of corporate power that is subverting democracy,” said Gary Ruskin, author of Spooky Business. “Who will rein in the forces of corporate lawlessness as they bear down upon nonprofit defenders of justice?”
Many of the world’s largest corporations and their trade associations — including the U.S. Chamber of Commerce, Walmart, Monsanto, Bank of America, Dow Chemical, Kraft, Coca-Cola, Chevron, Burger King, McDonald’s, Shell, BP, BAE, Sasol, Brown & Williamson and E.ON – have been linked to espionage or planned espionage against nonprofit organizations, activists and whistleblowers.
Many different types of nonprofit organizations have been targeted with corporate espionage, including environmental, anti-war, public interest, consumer, food safety, pesticide reform, nursing home reform, gun control, social justice, animal rights and arms control groups.
Corporations and their trade associations have been linked to a wide variety of espionage tactics against nonprofit organizations. The most prevalent tactic appears to be infiltration by posing a volunteer or journalist, to obtain information from a nonprofit. But corporations have been linked to many other human, physical and electronic espionage tactics against nonprofits. Many of these tactics are either highly unethical or illegal.
Founded in 1982 by Ralph Nader, Essential Information is a Washington, DC-based nonprofit, tax-exempt organization. It is involved in a variety of projects to promote corporate accountability, a more just economy, public health and a sustainable planet. It has published a bi-monthly magazine, books and reports, sponsored conferences, provided writers with grants to pursue investigations, published daily news summaries, operated clearinghouses that disseminate information to grassroots organizations in the United States and developing countries worldwide, and has hosted scores of conferences focusing on government and corporate accountability.
November 20, 2013 · by editor · in Corporate Espionage
Find the report at 20 November 2013
© 2013 Center for Corporate Policy
Spooky Business: U.S. Corporations Enlist Ex-Intelligence Agents to Spy on Nonprofit Groups (2013)November 27, 2013
A new report details how corporations are increasingly spying on nonprofit groups they regard as potential threats. The corporate watchdog organization Essential Information found a diverse groups of nonprofits have been targeted with espionage, including environmental, antiwar, public interest, consumer safety, pesticide reform, gun control, social justice, animal rights and arms control groups. The corporations carrying out the spying include the U.S. Chamber of Commerce, Wal-Mart, Monsanto, Bank of America, Dow Chemical, Kraft, Coca-Cola, Chevron, Burger King, McDonald’s, Shell, BP, and others. According to the report, these corporations employ former CIA, National Security Agency and FBI agents to engage in private surveillance work, which is often illegal in nature but rarely — if ever — prosecuted. We’re joined by Gary Ruskin, author of the report, “Spooky Business: Corporate Espionage Against Nonprofit Organizations,” and director of the Center for Corporate Policy, a project of Essential Information.
Click here to watch part 2 of this interview.
Transcript
This is a rush transcript. Copy may not be in its final form.
AMY GOODMAN: As we turn to a new report detailing how corporations are increasingly spying on nonprofit groups that they regard as potential threats. The report’s called, “Spooky Business: Corporate Espionage Against Nonprofit Organizations.” It was released by the corporate watch group Essential Information. The report found a diverse group of nonprofits have been targeted with espionage, including environmental, antiwar, public interest, consumer safety, pesticide reform, gun control, social justice, animal rights, and arms control groups. The corporations carrying out the spying include the U.S. Chamber of Commerce, Wal-Mart, Monsanto, Bank of America, Dow Chemical, Kraft, Coca-Cola, Chevron, Burger King, McDonald’s, Shell, BP, and others. According to the report, these corporations employ former CIA, NSA and FBI agents to engage in private surveillance work which is often illegal in nature but rarely, if ever, prosecuted. For more we go to California where we’re joined by the report’s author, Gary Ruskin. He is the director of the Center for Corporate Policy, a project of Essential Information. Gary, Welcome back to Democracy Now! Explain what you found.
GARY RUSKIN: Thanks for having me on the show again, Amy. Yeah, we found a tremendous diversity of corporate espionage being conducted against a wide variety of civic groups across the country and the U.K., the case in Ecuador and in France as well. So what we found was a tremendous variety of use of different types of espionage tactics from dumpster diving to hiring investigators to pose as journalists or volunteers, to electronic espionage, information warfare, information operations hacking, electronic surveillance. And so this appears to be a growing phenomenon both here in the United States and maybe in other parts of the world as well. But our report is an effort to document something that’s very hard to know very much about. We aggregated 30 different cases of corporate espionage to try to talk about them, but really, each of the cases we have very fragmentary information. And so it’s hard to say — we have a, we have a part of an iceberg whether it’s the tip of the iceberg or the tippy tip of the iceberg, we don’t really know.
AMY GOODMAN: Gary, let’s got to — I want to go to 2010; Greenpeace files a federal lawsuit against Dow Chemical and Sasol North America for engaging in corporate espionage. The lawsuit alleged corporate spies stole thousands of confidential documents from Greenpeace, including campaign plans, employee records; phone records, donor and media lists. Democracy Now! spoke to Charlie Cray, the senior researcher with Greenpeace USA at the time. He explained what happened.
CHARLIE CRAY: BBI, the defunct private investigation firm hired subcontractors including off-duty police officers who went through Greenpeace’s trash to find useful documents on a regular basis. Over two years they did this almost twice a week on average. They also used subcontractors who had colleagues who attempted to infiltrate Greenpeace as volunteers. They cased the Greenpeace office looking for we don’t know what, but probably doing advanced scouting for people who would then intrude upon the property. We found a list of door codes, we found a folder that said “wiretap info,” which was empty. We know this company has sub-contracted with a company called Net Safe, which is a company that was made of former NSA officials skilled in computer hacking and things like that. So we really don’t know the full extent of this, but what we’ve seen is incredibly shocking. And our goal is to bring this out into the light of day and to stop it if it’s still going on.”
AMY GOODMAN: That was Charlie Cray, senior researcher with Greenpeace USA. Gary Ruskin, if you could responded to that and then talk about Wal-Mart and Up Against the Wall, the nonprofit organization?
GARY RUSKIN: The Greenpeace example is a great example of what corporate America can bring to bear, the lawlessness that they can bring to bear on nonprofit organizations like Greenpeace, like Peta, like Knowledge Ecology International, on Public Citizen and others. This was a tremendously diverse and powerful campaign of espionage that they targeted Greenpeace with. And so, you know, there are so many other examples in the report, but you mentioned Wal-Mart has a very large internal security operation and so we know of a case, for example, where they planted essentially a person with a bug in a meeting of people organizing about Wal-Mart and then as well they had a van that was able to surveil some other activities, protest activities as well. There are so many stories we can tell from the report. Another famous one was the largest operated nuclear power plants in the world; Electricite de France, caught with a copy of a Greenpeace hard drive on one of its contractor’s computers because they’d hacked into Greenpeace France. So there just so many stories we can tell.
AMY GOODMAN: So how does it go from spying to interrupting the activity of these organizations? And also if you could also talk about the spying on Occupy Wall Street.
GARY RUSKIN: Sure. Well, what we found in some of the cases is there are spies that actually, you know, actively participate in an organization. For example, one of the most famous cases was a woman who’s real name was Mary Lou Sapone, who went by a Mary McFate and was very active in gun control movement for quite a long time and ran for the National Board of Directors of a prominent gun control organization and worked with the Brady Campaign like. She was totally a spy. Another example was there was —
AMY GOODMAN: A spy for?
GARY RUSKIN: A spy probably for the NRA. And then there are other pretty well-known examples, like for example, there was a former congressman the late Congressmen Henry Hyde was also a bank director at a bank, he didn’t pay — the bank went belly up and he was the only bank director who did not pay the settlement for the bank going defunct. And he had a lawyer dispatch a journalist or someone who posed as a journalist to get information from the guy who uncovered so much of this Ron Dueling [SP].
AMY GOODMAN: Well Gary Ruskin, we are going to continue covering this issue, were going do part 2 of the interview and post it online at democracynow.org. Gary Ruskin is Director of The Center for Corporate Policy, a project of Essential Information. We’ll link to the report “Spooky Business: Corporate Espionage Against Nonprofit Organizations.”
The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.
Monday, November 25, 2013
Find this story at 25 November 2013
Vuilnis van milieugroepen gebruikt door grote bedrijvenNovember 27, 2013
Worden Greenpeace, Milieudefensie en andere milieuorganisaties in Nederland in de gaten gehouden door de bedrijven die zij kritisch volgen? Duidelijke aanwijzingen zijn er niet, maar de Amerikaanse praktijk van de jaren negentig die James Ridgeway in het maanblad Motherjones schetst, plaatst vraagtekens bij deze betrekkelijke rust. Het verhaal van Ridgeway is een moderne variant van de oud papier-affaire die Buro Jansen & Janssen in 1994 onthulde. Marcel Paul Knotter haalde toen
jarenlang oud papier op bij verschillende actiegroepen. Het papier was zogenaamd bestemd voor een school, maar in werkelijkheid bracht hij het naar het kantoor van ABC in Vinkeveen. ABC was het particuliere recherchebureau van Peter Siebelt, die de informatie regelmatig deelde met de Telegraaf. In het Amerikaanse verhaal gaat het om Beckett Brown International (BBI), in 2000 omgedoopt tot S2i. BBI, werkzaam van 1995 tot en met 2001, was een maatje groter dan ABC. Het bedrijf kon tot zijn klantenkring the Carlyle Group, the National Rifle Assocoation, Wal-Mart, maar ook grote public-relations bedrijven zoals Ketchum en Nichols-Dezenhall Communications rekenen. Ketchum is een internationaal pr bedrijf en heeft in Nederland als zakelijke partner Winkelman en Van Hessen. Ridgeway sprak uitgebreid met de gedesillusioneerde investeerder John C. Dodd III die hem ook verschillende interne documenten van BBI overhandigde.
Het verhaal van Beckett Brown International begint in 1994 in Easton, Maryland, de Verenigde Staten. Beckett is werkzaam in de adviseringsbranche en introduceert Dodd aan een voormalig medewerker van de geheime dienst Paul Radowski en later nog aan Joseph A. Masonis en een expert in explosieven George Ferris. Het bedrijf Beckett Brown International, vernoemd naar Richard Beckett en Sam Brown, de advocaat van het bedrijf, gaat officieel in augustus 1995 van start met Radowski, Masonis en Ferris als medewerkers. BBI is een allround beveiligingsbedrijf. Het verzorgt in 1997 de beveiliging van de inauguratie van Bill Clinton en heeft in het begin klanten als Phillip Morris. In 1998 telt het bedrijf 22 medewerkers waaronder David Bresset, Phil Giraldi en Vincent Cannistraro drie voormalige CIA officieren. Cannistraro was voormalig hoofd van het Contra-terreur-centrum van de CIA en in de jaren tachtig verantwoordelijk voor de Amerikaanse steun aan de Contra’s.
Giraldi verliet in 1999 het bedrijf dat toen al met onconventionele middelen zijn pijlen op Greenpeace had gericht. De vuilnis werd doorzocht en infiltranten werden ingezet. In september 2000 vindt het Taco Bell schandaal plaats. GE Food Alert, een coalitie tegen gentechnologie, had al in juli dat jaar ontdekt dat genetisch gemanipuleerde maïs die niet voor de consumptie geschikt was in voedsel terecht was gekomen. BBI wordt door het pr bedrijf Ketchum ingeschakeld om uit te zoeken welke informatie verschillende actiegroepen hebben. BBI doet een poging om de vuilnis van het Center for Food Safety, Friends of the Earth en GE Food Alert te bemachtigen. Bij de eerste groep wordt ook een poging tot infiltratie gedaan. De operatie wordt door Jay Bly, ook een voormalig geheimedienst-man, vanuit BBI gecoördineerd. Tim Ward, een voormalig politieagent uit Maryland, staat ook op de loonlijst en verzorgt de contacten met lokale politiemensen die soms wat bijklussen voor BBI. Citaat uit een email van Bly aan Ward: ‘I got hold of Jim Daron [a Washington police officer working for BBI] yesterday. He was supposed to do Vermont Ave and Penn Ave SE last night. I have not heard from him today …’
Of de vuilnis operatie deze keer succesvol was wordt niet duidelijk uit de email die Ridgeway boven tafel kreeg. Beckett Brown is er in het verleden wel in geslaagd de notulen van een strategie-bijeenkomst van het GE food netwerk aan Ketchum te overhandigen. In 1999 stelt BBI daartoe het rapport ‘Intelligence Analysis for Dow Global Trends Tracking Team’ op. De praktijk van ‘dumpster diving’ zoals de Amerikanen het vuilnis-kijken voor informatie noemen was niet volledig onbekend bij de leiding van het bedrijf. David Queen, vice -president van BBI, schrijft in 1998 een memo aan Radowski over vuilnis-doorzoeken. De voormalige aanklager uit Pennsylvania memoreert dat dit doorzoeken enkele problematische kanten heeft waartoe BBI buiten het bedrijf advies dient in te winnen met het oog op mogelijke gerechtelijke stappen tegen het bedrijf.
Een schrale troost voor de milieubeweging is dat Beckett Brown International geen scrupules lijkt te kennen en het vuil van wie dan ook doorzoekt. In combinatie met een ander pr bedrijf, Nichols-Dezenhall Communications, dat werkzaam is voor Nestle, wordt een poging gedaan de vuilnis van de concurrent van Nestle, Whetstone Chocolates, te bemachtigen.
Greenpeace leek het hoofddoel van de vuilnis-operatie met betrekking tot milieuorganisaties. Jennifer Trapnell, een ex-vriendin van Tim Ward vertelt Ridgeway over enkele nachtelijke operaties. Doel was niet zozeer de strategie met betrekking tot een campagne te bemachtigen, maar zowel de lopende zaken als de organisatiestructuur in beeld te brengen. Financiële rapporten, veiligheidsinstructies van het Greenpeace kantoor en de toegangscodes voor het kantoor waren in het bezit van BBI. Hoewel Greenpeace ruime ervaring heeft met inbraken en infiltratie door pr bedrijven was de observatie door BBI niet opgevallen.
Een van de BBi-projecten waarbij ook een infiltrant is ingezet is de campagne van Greenpeace in samenwerking met lokale milieuorganisaties rond ‘cancer alley’ in Louisiana. Het traject langs de Mississippi River van Baton Rouge tot New Orleans is een industrieterrein waar onder andere Shell is gevestigd. De milieubeweging heeft het de bijnaam ‘cancer alley’ gegeven, maar de bedrijven, waaronder Shell, betwisten het gevaar van de locatie. BBI verzamelde voor de pr bedrijven Ketchum en Nichols-Dezenhall Communications informatie, maar trachtte ook tweespalt te zaaien in de campagne van lokale milieugroepen en Greenpeace met de inzet van infiltrant Mary Lou Sapone. Sapone infiltreerde de milieugroep CLEAN in Louisiana en gaf informatie door aan BBI. Sapone was al eerder actief als infiltrant in de jaren tachtig. Voor Perceptions International infiltreerde ze toen in een dierenrechtengroep in Connecticut.
Infiltratie was naast het vuilnisdoorzoeken voor informatie een gebruikelijke werkwijze van BBI. In 1996 en 1997 werd een infiltrant ingezet om het verzet van een lokale actiegroep in Noord California tegen een vuilstortplaats in kaart te brengen voor het bedrijf Browning-Ferris Industries dat de stortplaats wilde exploiteren.
Een ander bedrijf, Condea Vista, maakte ook gebruik van de diensten van BBI. Investeerder Dodd kwam het bedrijf tegen in het omvangrijke archief dat hij na de beëindiging van Beckett Brown International opsloeg. Bij het doorlezen van dit archief kwam hij stukken tegen die de naam ‘Lakes Charles project’ droegen. Eind jaren negentig was Condea Vista verwikkeld in een juridisch gevecht met werknemers die het bedrijf aanklaagden wegens ziekte ten gevolge van lekkage van pijpleidingen. Ook werden er campagnes gevoerd door milieu-activisten tegen de vervuiling van Lake Charles in Louisiana. Condea Vista huurde het pr bedrijf Nichols-Dezenhall in dat op zijn beurt BBI weer inschakelde. Bij de vervuiling draait het om een 40 jaar oude pijpleiding die door het bedrijf is gebruikt om erg giftige stoffen te transporteren. Van de vele miljoenen tonnen chemische stoffen die door lekkage in het milieu zijn terecht gekomen heeft het bedrijf maar een fractie opgeruimd. In een gerechtelijke procedure van enkele zieke werknemers tegen Condea Vista trad advocaat Tom Filo op. Filo vertelt Ridgeway dat tijdens de zaak tegen het bedrijf verschillende keren in zijn kantoor was ingebroken. Een keer reageerde hij op het alarm en vond politieagenten in zijn kantoor, die de voordeur hadden opengebroken en het alarm hadden uitgezet. ‘Weird shit was going on back then,’ vat hij de gebeurtenissen samen. Dodd nodigde Filo uit om het archief door te kijken. Filo vond vertrouwelijke documenten zoals medische rapportages van werknemers, die volgens hem alleen gestolen konden zijn. Naast inbraken, observaties van lokale milieuactivisten maakt BBI ook gebruik van informanten. Opnieuw komt de naam op van Mary Lou Sapone, maar er was ook een andere infiltrant. Sapone huurde een schoolmeester in die actief werd in CLEAN (Calcasieu League for Environmental Action Now) en in korte tijd mee ging doen aan allerlei belangrijke vergaderingen. Jay Bly was direct bij het Lakes Charles project betrokken door bijvoorbeeld de observatie van Greenpeace medewerker Beth Zilbert. Bly rapporteerde aan Tim Ward over de activiteiten van BBI in deze zaak. Perry R. Sanders, een andere advocaat die zieke werknemers vertegenwoordigt, heeft een getuigenverklaring van Bly en Ward waarin beide mannen bekennen voor Condea Vista in Lake Charles en Washington DC te hebben gewerkt. Tevens bekenden beiden dat het bedrijf op de hoogte was van hun activiteiten, maar ze wilden niet in detail treden.
Greenpeace onderzoekt de juridische mogelijkheden om de bedrijven die BBI hebben ingehuurd aan te klagen. Het archief van Dodd wordt doorgespit om te doorgronden hoe diep de campagnes van Greenpeace geïnfiltreerd waren. De indruk bestaat dat BBI niet alleen de vuilnis van Greenpeace doorzocht, maar ook andere middelen gebruikte. In het archief van Dodd werden lijsten van donateurs en allerlei persoonlijke gegevens over de werknemers gevonden.
De hoofdrolspelers in de spionage-operatie van BBI zijn nog steeds actief in de wereld van de ‘beveiliging’. Tim Ward heeft een eigen bedrijf Chesapeake Strategies en Jay Bly werkt voor hem. Het bedrijf beveiligt ook onderzoeksinstituten tegen dierenrechten-activisten. Joseph Masonis werkt voor Annapolis Group een bedrijf dat trots is op zijn 45-jarige ervaring met de United States Secret Service. Richard Beckett leidt het bedrijf Global Security Services dat naast intelligence services en paramilitaire operaties ook senator Barack Obama beveiligd heeft.
Investeerder John C. Dodd III heeft dozen vol administratie van Beckett Brown International en S2i gered van de vernietiging. Hij wil graag getuigen voor het Amerikaanse Congres of welke instantie dan ook over de vuile praktijken van het bedrijf dat hij mogelijk heeft gemaakt, maar niemand heeft hem nog uitgenodigd.
Find this story at 1 June 2008
Greenpeace Sues Chemical Companies for Corporate Espionage (2010)November 27, 2013
Greenpeace has filed a lawsuit against two major chemical companies and their PR firms for corporate espionage. The complaint alleges that Dow Chemical and Sasol — formerly CONDEA Vista — hired private investigators to spy on Greenpeace in the late 1990s. The charges of espionage center on surveillance of the Greenpeace office in Washington, D.C., and the infiltration of a community group in St. Charles, Louisiana, that was working with Greenpeace on dioxin contamination. Greenpeace accuses the corporations of engaging in this level of surveillance “with the intention of preempting, blunting, or thwarting” the organization’s environmental advocacy campaigns. For more on this story, we speak with Greenpeace USA senior researcher Charlie Cray. Dow Chemical declined to comment on the lawsuit. [includes rush transcript]
Transcript
This is a rush transcript. Copy may not be in its final form.
JUAN GONZALEZ: Greenpeace has filed a federal lawsuit against Dow Chemical and Sasol North America for engaging in corporate espionage. Also named in the suit are the public relations firms Dezenhall Resources and Ketchum and the now-defunct firm Beckett Brown International. The lawsuit alleges that corporate spies stole thousands of confidential documents from Greenpeace, including campaign plans, employee records, phone records, and donor and media lists.
AMY GOODMAN: For more on the lawsuit, we’re joined now from Washington, D.C. by Greenpeace senior researcher Charlie Cray.
Charlie Cray, you’re talking about corporations that infiltrated Greenpeace around the country and stole all these documents. Explain exactly what happened.
CHARLIE CRAY: Well, Dow Chemical and Sasol Resources, which used to be CONDEA Vista, are two large chemical companies that Greenpeace was campaigning against for their emissions of dioxin and other pollutants. And Dow had these public relations companies — these two companies did — that went to this firm, this former Secret Service, FBI, NSA people, who in turn pilfered Greenpeace documents, intruded on Greenpeace property, surveilled individuals, intercepted electronic communications, and it went on and on.
And after this company fell apart, the former owner, who was left holding the bag, called a reporter, Jim Ridgeway, who published a story in Mother Jones in April of 2008, revealing some of these activities. When we read that, we launched an investigation. We collected as much evidence as we can, and we filed suit here in the District of Columbia on Monday. People can find the complaint at spygate.org, spygate.org, as well as a fraction of the supporting evidence. I mean, we have seen essentially a company that will — and the charges are laid out in the case — trespass, intrusion and RICO, which is, you know, conspiring to create an enterprise to commit illegal acts and the sharing of information among all these parties. And, you know, we’re going to take this issue to court, because we feel we have a very strong case against all these entities.
AMY GOODMAN: Talk about how it all happened. I mean, this is massive, and it goes well beyond Greenpeace, when you look at these companies infiltrating your organization. Give examples for us.
CHARLIE CRAY: Well, BBI, the defunct private investigation firm, hired subcontractors, including off-duty police officers, who went through Greenpeace’s trash to find useful documents on a regular basis over two years. They did this almost twice a week on average. They also used subcontractors who had colleagues who attempted to infiltrate Greenpeace as volunteers. They cased the Greenpeace office, looking for we don’t know what, but probably doing advance scouting for people who would then intrude upon the property. We found a list of door codes. We found a folder that said “wiretap info,” which was empty. We know this company has subtracted with a company called NetSafe, which is a company that was made of former NSA officials skilled in computer hacking and things like that. So, we really don’t know the full extent of this, but what we’ve seen is incredibly shocking. And our goal is to bring this out into the light of day and to stop it if it’s still going on.
JUAN GONZALEZ: Now, in some cases, they actually — in one case that was reported, they actually used a Washington, D.C. police officer to assist them in this, and they were gathering credit card information, Social Security numbers of Greenpeace employees, as well?
CHARLIE CRAY: We found that — we found that information. We found campaign plans. We found media plans, lists of media. You can imagine what a company like Dow can do with that kind of information, preempting Greenpeace strategies and so forth. And it wasn’t just Dow. There were dozens of companies that were clients of both these PR firms and the investigative firm.
AMY GOODMAN: Charlie Cray, we want to thank you for being with us. And as Jim Ridgeway reported — and he’s the one who exposed GM spying on Ralph Nader decades ago, that was exposed in Congress, and there was a big settlement for Ralph Nader — he also reported spying targeted Friends of the Earth, GE Food Alert, the Center for Food Security, Fenton Communications. Charlie, thanks for being with us. Greenpeace is his organization. We’ll be covering Greenpeace and many other organizations from around the world as we broadcast from Cancún, Mexico, all next week at the U.N. global warming summit.
The original content of this program is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. Please attribute legal copies of this work to democracynow.org. Some of the work(s) that this program incorporates, however, may be separately licensed. For further information or additional permissions, contact us.
Friday, December 3, 2010
Find this story at 3 December 2010
Greenwald’s Interpretation of BOUNDLESSINFORMANT NSA Documents Is Oftentimes WrongNovember 26, 2013
For those of us who know something about the National Security Agency (NSA) and who have at the same time been closely following the drip-drop page-at-a-time disclosures of NSA documents by Glenn Greenwald and Laura Poitras, this has been an enormously frustrating time. Many of the recent headlines in the newspapers, especially in Europe, promise much, but when you do a tear-down analysis of the contents there is very little of substance there that we did not already know. Last week’s expose by the Dutch newspaper NRC Handelsblad was just such an example, where with one single example everything that the newspaper claimed was brand new had (in fact) been published 17 years earlier by Dutch historian Dr. Cees Wiebes. Ah, what we do to sell newspapers.
There should also be tighter fact-checking by the newspapers of their interpretation of the information that they are being spoon-fed before they rush to print.
For instance, over the past month or so we have been fed once-a-week articles from newspapers France, Germany, Spain, Norway and now the Netherlands (does anyone see a pattern here) all based on a single NSA document from the agency’s BOUNDLESSINFORMANT database of metadata intercepts for a 30-day period from December 2012 to January 2013. The newspaper headlines all have claimed that the BOUNDLESSINFORMANT revealed that NSA was intercepting the telephone and internet communications of these countries. But an analysis of the SIGINT Activity Designators (SIGADs) listed in these documents reveals that NSA was not intercepting these communications, but rather the host nation intelligence services – to whit the BND in Germany, DGSE in France, the FE in Norway and the MIVD in the Netherlands. These agencies have secretly been proving this metadata material to NSA, although it is not known for how long.
There are other factual problems with the interpretation that has been placed on these documents. It really would be nice if the individuals using these materials do a little research into NSA operational procedures before leaping to conclusions lest they be further embarrassed in the future by mistakes such as this.
I am not the only person who has noted some of these glaring mistakes being made by the authors of the recent newspaper articles based on the BOUNDLESSINFORMANT document. Here is an insightful study done by a Dutch analyst who has been closely following the materials being leaked:
Screenshots from BOUNDLESSINFORMANT can be misleading
electrospaces.blogspot.nl
November 23, 2013
Over the last months, a number of European newspapers published screenshots from an NSA tool codenamed BOUNDLESSINFORMANT, which were said to show the number of data that NSA collected from those countries.
Most recently, a dispute about the numbers mentioned in a screenshot about Norway urged Snowden-journalist Glenn Greenwald to publish a similar screenshot about Afghanistan. But as this article will show, Greenwald’s interpretation of the latter was wrong, which also raises new questions about how to make sense out of the screenshots about other countries.
Norway vs Afghanistan
On November 19, the website of the Norwegian tabloid Dagbladet published a BOUNDLESSINFORMANT screenshot which, according to the paper, showed that NSA apparently monitored 33 million Norwegian phone calls (although actually, the NSA tool only presents metadata).
The report by Dagbladet was almost immediatly corrected by the Norwegian military intelligence agency Etteretningstjenesten (or E-tjenesten), which said that they collected the data “to support Norwegian military operations in conflict areas abroad, or connected to the fight against terrorism, also abroad” and that “this was not data collection from Norway against Norway, but Norwegian data collection that is shared with the Americans”.
Earlier, a very similar explanation was given about the data from France, Spain and Germany. They too were said to be collected by French, Spanish and German intelligence agencies outside their borders, like in war zones, and then shared with NSA. Director Alexander added that these data were from a system that contained phone records collected by the US and NATO countries “in defense of our countries and in support of military operations”.
Glenn Greenwald strongly contradicted this explanation in an article written for Dagbladet on November 22. In trying to prove his argument, he also released a screenshot from BOUNDLESSINFORMANT about Afghanistan (shown down below) and explained it as follows:
“What it shows is that the NSA collects on average of 1.2-1.5 million calls per day from that country: a small subset of the total collected by the NSA for Spain (4 million/day) and Norway (1.2 million).
Clearly, the NSA counts the communications it collects from Afghanistan in the slide labeled «Afghanistan» — not the slides labeled «Spain» or «Norway». Moreover, it is impossible that the slide labeled «Spain» and the slide labeled «Norway» only show communications collected from Afghanistan because the total collected from Afghanistan is so much less than the total collected from Spain and Norway.”
Global overview
But Greenwald apparently forgot some documents he released earlier:
Last September, the Indian paper The Hindu published three less known versions of the BOUNDLESSINFORMANT global overview page, showing the total amounts of data sorted in three different ways: Aggregate, DNI and DNR. Each results in a slightly different top 5 of countries, which is also reflected in the colors of the heat map.
In the overall (aggregated) counting, Afghanistan is in the second place, with a total amount of over 2 billion internet records (DNI) and almost 22 billion telephony records (DNR) counted:
The screenshot about Afghanistan published by Greenwald only shows information about some 35 million telephony (DNR) records, collected by a facility only known by its SIGAD US-962A5 and processed or analysed by DRTBox. This number is just a tiny fraction of the billions of data from both internet and telephone communications from Afghanistan as listed in the global overview.
Differences
With these big differences, it’s clear that this screenshot about Afghanistan is not showing all data which NSA collected from that country, not even all telephony data. The most likely option is that it only shows metadata from telephone communications intercepted by the facility designated US-962A5.
That fits the fact that this SIGAD denotes a sub- or even sub-sub-facility of US-962, which means there are more locations under this collection program. Afghanistan is undoubtedly being monitored by numerous SIGINT collection stations and facilities, so seeing only one SIGAD in this screenshot proves that it can never show the whole collection from that country.
This makes that Greenwald’s argument against the data being collected abroad is not valid anymore (although there maybe other arguments against it). Glenn Greenwald was asked via Twitter to comment on the findings of this article, but there was no reaction.
More questions
The new insight about the Afghanistan data means that the interpretation of the screenshots about other countries can be wrong too. Especially those showing only one collection facility, like France, Spain and Norway (and maybe also Italy and The Netherlands), might not be showing information about that specific country, but maybe only about the specific intercept location.
This also leads to other questions, like: are this really screenshots (why is there no classification marking)? Are they part of other documents or did Snowden himself made them? And how did he make the selection: by country, by facility, or otherwise?
There are many questions about NSA capabilities and operations which Snowden cannot answer, but he can answer how exactly he got to these documents and what their proper context is. Maybe Glenn Greenwald also knows more about this, and if so, it’s about time to tell that part of the story too.
Matthew M. Aid is the author of Intel Wars: The Secret History of the Fight Against Terror (January 2012) and The Secret Sentry, the definitive history of the National Security Agency. He is a leading intelligence historian and expert on the NSA, and a regular commentator on intelligence matters for the New York Times, the Financial Times, the National Journal, the Associated Press, CBS News, National Public Radio (NPR) and many others. He lives in Washington, DC.
November 24, 2013
Find this story at 24 November 2013
NRC over NSANovember 26, 2013
Een van de elementen op de kaart van de NRC van zaterdag zijn de rode stippen die de vestigingen van SCS aangeven. Dat bestand is hetzelfde als dat van de kaart in Spiegel, waarvan een ongecensureerde versie beschikbaar is bij Cryptome.
Die kaart is uit augustus 2010. Als je de kaarten naast elkaar legt kom je een eind bij het vaststellen welke plaatsen NRC zwart heeft gemaakt. Wat betreft Europa kom je dan bijv. op het rijtje Bakoe, Kiev, Madrid , Moskou en
Tblisi.
x-keyscore servers op Cryptome
SCS sites op Cryptome
NRC driver 1
Europeans Shared Spy Data With U.S.; Phone Records Collected Were Handed Over to Americans to Help Protect Allied Troops in War ZonesNovember 26, 2013
Millions of phone records at the center of a firestorm in Europe over spying by the National Security Agency were secretly supplied to the U.S. by European intelligence services—not collected by the NSA, upending a furor that cast a pall over trans-Atlantic relations.
Widespread electronic spying that ignited a political firestorm in Europe was conducted by French and European intelligence services and not by the National Security Agency, as was widely reported in recent days. Adam Entous reports on the News Hub. Photo: AP.
The revelations suggest a greater level of European involvement in global surveillance, in conjunction at times with the NSA. The disclosures also put European leaders who loudly protested reports of the NSA’s spying in a difficult spot, showing how their spy agencies aided the Americans.
The phone records collected by the Europeans—in war zones and other areas outside their borders—were shared with the NSA as part of efforts to help protect American and allied troops and civilians, U.S. officials said.
European leaders remain chagrined over revelations that the U.S. was spying on dozens of world leaders, including close allies in Europe. The new disclosures were separate from those programs.
But they nevertheless underline the complexities of intelligence relationships, and how the U.S. and its allies cooperate in some ways and compete in others.
More
NSA Said to View 23 Countries Closer U.S. Intelligence Partners Than Israel
Senate to Review All U.S. Spying
Spying Revelations Add Hurdle to U.S.-EU Trade Talks
Germany Warns of Repercussions from U.S. Spying
Obama Unaware as NSA Spied on World Leaders
“That the evil NSA and the wicked U.S. were the only ones engaged in this gross violation of international norms—that was the fairy tale,” said James Lewis, a former State Department official, now a technology-policy specialist at the Center for Strategic and International Studies. “It was never true. The U.S’s behavior wasn’t outside the norm. It is the norm.”
Consecutive reports in French, Spanish and Italian newspapers over the past week sparked a frenzy of finger-pointing by European politicians. The reports were based on documents leaked by former NSA contractor Edward Snowden and purportedly showed the extent to which the NSA sweeps up phone records in those countries.
France’s Le Monde said the documents showed that more than 70 million French phone records between early December 2012 and early January 2013 were collected by the NSA, prompting Paris to lodge a protest with the U.S. In Spain, El Mundo reported that it had seen NSA documents that showed the U.S. spy agency had intercepted 60.5 million Spanish phone calls during the same time period.
U.S. officials initially responded to the reports by branding them as inaccurate, without specifying how. On Tuesday, The Wall Street Journal reported that the data cited by the European news reports wasn’t collected by the NSA, but by its European partners.
U.S. officials said the data was provided to the NSA under long-standing intelligence sharing arrangements.
In a congressional hearing Tuesday, the National Security Agency director, Gen. Keith Alexander, confirmed the broad outlines of the Journal report, saying that the specific documents released by Mr. Snowden didn’t represent data collected by the NSA or any other U.S. agency and didn’t include records from calls within those countries.
Phone Trouble
Politicians have reacted to recent disclosures about U.S. surveillance programs based on leaks from former National Security Agency contractor Edward Snowden.
View Graphics
He said the data—displayed in computer-screen shots—were instead from a system that contained phone records collected by the U.S. and North Atlantic Treaty Organization countries “in defense of our countries and in support of military operations.”
He said the conclusion that the U.S. collected the data “is false. And it’s false that it was collected on European citizens. It was neither.”
The U.S. until now had been silent about the role of European partners in these collection efforts so as to protect the relationships.
French officials declined to comment.
A Spanish official said that Spain’s intelligence collaboration with the NSA has been limited to theaters of operations in Mali, Afghanistan and certain international operations against jihadist groups. The so-called metadata published in El Mundo was gathered during these operations, not in Spain.
The Italian Embassy in Washington didn’t immediately respond to a request for comment.
The revelations that the phone data were collected by European intelligence services rather than NSA could spark a backlash against the same politicians who had been pointing their fingers at the U.S.—although that response could be tempered by assurances that the data were collected abroad and not domestically.
A U.S. analysis of the document published by Le Monde concluded the phone records the French had collected were actually from outside of France, then were shared with the U.S. The data don’t show that the French spied on their own people inside France.
U.S. intelligence officials said they hadn’t seen the documents cited by El Mundo, but that the data appear to come from similar information the NSA obtained from Spanish intelligence agencies documenting their collection efforts abroad.
At Tuesday’s House Intelligence Committee hearing, lawmakers also pressed Gen. Alexander and the Director of National Intelligence James Clapper on the NSA’s tapping of world leaders’ phone conversations, including German Chancellor Angela Merkel.
Asked whether U.S. allies spy on the U.S., Mr. Clapper said, “Absolutely.”
Rep. Adam Schiff (D., Calif.) asked why Congress hadn’t been informed when U.S. spies tapped a world leader’s telephone. Mr. Clapper said Congress isn’t told about each and every “selector,” the intelligence term for a phone number or other information that would identify an espionage target.
“Not all selectors are equal,” Mr. Schiff responded, especially “when the selector is the chancellor of an allied nation.”
The Wall Street Journal reported Monday that President Barack Obama didn’t know about NSA’s tapping of Ms. Merkel’s phone—which stretched back as far as 2002—until a review this summer turned it up.
Mr. Clapper said that intelligence agencies follow the priorities set by the president and key departments, but they don’t necessarily provide top officials with details on how each requirement is being fulfilled.
The White House does, however, see the final product, he said.
Reporting to policy makers on the “plans and intentions” of world leaders is a standard request to intelligence agencies like the NSA, Mr. Clapper said. The best way to understand a foreign leader’s intentions, he said, is to obtain that person’s communications.
Privately, some intelligence officials disputed claims that the president and top White House officials were unaware of how such information is obtained.
“If there’s an intelligence report that says the leader of this country is likely to say X or Y, where do you think that comes from?” the official said.
The House Intelligence Committee chairman, Rep. Mike Rogers (R., Mich.) remained a staunch defender of the NSA’s operations.
“I am a little concerned about where we are—that we’ve decided that we’re going to name our intelligence services at the earliest opportunity as the bad guys in the process of trying to collect information lawfully and legally, with the most oversight that I’ve ever seen,” he said. “We’re the only intelligence service in the world that is forced to go to a court before they even collect on foreign intelligence operations, which is shocking to me.”
—Christopher Bjork in Madrid and Stacy Meichtry in Paris contributed to this article.
By Adam Entous and Siobhan Gorman connect
Updated Oct. 29, 2013 7:31 p.m. ET
Find this story at 29 October 2013
©2013 Dow Jones & Company, Inc.
Europe shared spy data with US; Europe spy services ‘shared phone data’November 26, 2013
The NSA says European spy services shared phone data with it, and reports alleging otherwise are ‘false’.
MILLIONS of phone records at the centre of a firestorm in Europe over spying by the National Security Agency were secretly supplied to the US by European intelligence services – not collected by the NSA, upending a furore that cast a pall over trans-Atlantic relations.
The revelations suggest a greater level of European involvement in global surveillance, in conjunction at times with the NSA. The disclosures also put European leaders who loudly protested reports of the NSA’s spying in a difficult spot, showing how their spy agencies aided the Americans.
The phone records collected by the Europeans – in war zones and other areas outside their borders – were shared with the NSA as part of efforts to help protect American and allied troops and civilians, US officials said.
European leaders remain chagrined over revelations that the US was spying on dozens of world leaders, including close allies in Europe.
The new disclosures were separate from those programs, but they underline the complexities of intelligence relationships, and how the US and its allies co-operate in some ways and compete in others.
“That the evil NSA and the wicked US were the only ones engaged in this gross violation of international norms -that was the fairy tale,” said James Lewis, a former State Department official, now a technology-policy specialist at the Centre for Strategic and International Studies.
“It was never true. The US’s behaviour wasn’t outside the norm. It is the norm.”
Consecutive reports in French, Spanish and Italian newspapers over the past week sparked a frenzy of finger-pointing by European politicians. The reports were based on documents leaked by former NSA contractor Edward Snowden and purportedly showed the extent to which the NSA sweeps up phone records in those countries.
France’s Le Monde said the documents showed that more than 70 million French phone records between early December last year and early January this year were collected by the NSA, prompting Paris to lodge a protest with the US. In Spain, El Mundo reported that it had seen NSA documents that showed the US spy agency had intercepted 60.5 million Spanish phone calls during the same time period.
US officials initially responded to the reports by branding them as inaccurate, without specifying how. Late yesterday, The Wall Street Journal reported that the data cited by the European news reports wasn’t collected by the NSA but by its European partners.
US officials said the data was provided to the NSA under long-standing intelligence sharing arrangements.
Hours later, in a congressional hearing, the National Security Agency director, General Keith Alexander, confirmed the broad outlines of the Journal report, saying the specific documents released by Mr Snowden didn’t represent data collected by the NSA or any other US agency and didn’t include records from calls within those countries.
He said the data, displayed in computer-screen shots, was instead from a system that contained phone records collected by the US and NATO countries “in defence of our countries and in support of military operations”.
He said conclusions the US collected the data were “false. And it’s false that it was collected on European citizens. It was neither.”
The US until now had been silent about the role of European partners in these collection efforts to protect the relationships. French officials declined to comment.
A Spanish official said Spain’s intelligence collaboration with the NSA has been limited to theatres of operations in Afghanistan, Mali and international operations against jihadist groups. The data published in El Mundo was gathered during these operations, not in Spain.
At yesterday’s house intelligence committee hearing, politicians pressed General Alexander and Director of National Intelligence James Clapper on the NSA’s tapping of world leaders’ phone conversations, including the German Chancellor, Angela Merkel.
Asked whether US allies spy on the US, Mr Clapper said: “Absolutely.”
Democrat congressman Adam Schiff asked why congress had not been informed when US spies tapped a world leader’s telephone.
Mr Clapper said congress wasn’t told about each and every “selector”, the intelligence term for a phone number or other information that would identify an espionage target.
“Not all selectors are equal,” Mr Schiff responded, especially “when the selector is the chancellor of an allied nation.”
Mr Clapper said intelligence agencies followed the priorities set by the President and key departments, but did not necessarily provide top officials with details on how each requirement was being fulfilled.
The White House did, however, see the final product, he said.
Reporting to policymakers on the “plans and intentions” of world leaders was a standard request to intelligence agencies such as the NSA, Mr Clapper said, and the best way to understand a foreign leader’s intentions was to obtain their communications.
Privately, some intelligence officials disputed claims that the President and top White House officials were unaware of how such information was obtained.
“If there’s an intelligence report that says the leader of this country is likely to say X or Y, where do you think that comes from?” the official said
Adam Entous and Siobhan Gorman
The Wall Street Journal
October 31, 2013 12:00AM
Find this story at 31 October 2013
© www.theaustralian.com.au
NSA spy row: France and Spain ‘shared phone data’ with USNovember 26, 2013
Spain and France’s intelligence agencies carried out collection of phone records and shared them with NSA, agency says
European intelligence agencies and not American spies were responsible for the mass collection of phone records which sparked outrage in France and Spain, the US has claimed.
General Keith Alexander, the head of the National Security Agency, said reports that the US had collected millions of Spanish and French phone records were “absolutely false”.
“To be perfectly clear, this is not information that we collected on European citizens,” Gen Alexander said when asked about the reports, which were based on classified documents leaked by Edward Snowden, the former NSA contractor.
Shortly before the NSA chief appeared before a Congressional committee, US officials briefed the Wall Street Journal that in fact Spain and France’s own intelligence agencies had carried out the surveillance and then shared their findings with the NSA.
The anonymous officials claimed that the monitored calls were not even made within Spanish and French borders and could be surveillance carried on outside of Europe.
Related Articles
GCHQ monitors luxury hotel bookings made by foreign diplomats 17 Nov 2013
US spy chief defends spying on foreign leaders 30 Oct 2013
Germany, France and Spain ‘were all spying on citizens’ 01 Nov 2013
Anger in France over claims that NSA spied on politicians, business leaders as well as terrorists 21 Oct 2013
NSA spying: US should not be collecting calls on allies, says top senator 28 Oct 2013
Russia ‘spied on G20 leaders with USB sticks’ 29 Oct 2013
In an aggressive rebuttal of the reports in the French paper Le Monde and the Spanish El Mundo, Gen Alexander said “they and the person who stole the classified data [Mr Snowden] do not understand what they were looking at” when they published slides from an NSA document.
The US push back came as President Barack Obama was said to be on the verge of ordering a halt to spying on the heads of allied governments.
The White House said it was looking at all US spy activities in the wake of leaks by Mr Snowden but was putting a “special emphasis on whether we have the appropriate posture when it comes to heads of state”.
Mr Obama was reported to have already halted eavesdropping at UN’s headquarters in New York.
German officials said that while the White House’s public statements had become more conciliatory there remained deep wariness and that little progress had been made behind closed doors in formalising an American commitment to curb spying.
“An agreement that you feel might be broken at any time is not worth very much,” one diplomat told The Telegraph.
“We need to re-establish trust and then come to some kind of understanding comparable to the [no spy agreement] the US has with other English speaking countries.”
Despite the relatively close US-German relations, the White House is reluctant to be drawn into any formal agreement and especially resistant to demands that a no-spy deal be expanded to cover all 28 EU member states.
Viviane Reding, vice-president of the European Commission and EU justice commissioner, warned that the spying row could spill over and damage talks on a free-trade agreement between the EU and US.
“Friends and partners do not spy on each other,” she said in a speech in Washington. “For ambitious and complex negotiations to succeed there needs to be trust among the negotiating partners. It is urgent and essential that our US partners take clear action to rebuild trust.”
A spokesman for the US trade negotiators said it would be “unfortunate to let these issues – however important – distract us” from reaching a deal vital to freeing up transatlantic trade worth $3.3 billion dollars (£2bn) a day.
James Clapper, America’s top national intelligence, told a Congressional hearing yesterday the US does not “spy indiscriminately on the citizens of any country”.
“We do not spy on anyone except for valid foreign intelligence purposes, and we only work within the law,” Mr Clapper said. “To be sure on occasions we’ve made mistakes, some quite significant, but these are usually caused by human error or technical problems.”
Pressure from European leaders was added to as some of the US intelligence community’s key Congressional allies balked at the scale of surveillance on friendly governments.
Dianne Feinstein, the chair of powerful Senate intelligence committee, said she was “totally opposed” to tapping allied leaders and called for a wide-ranging Senate review of the activities of US spy agencies.
“I do not believe the United States should be collecting phone calls or emails of friendly presidents and prime ministers,” she said.
John Boehner, the Republican speaker of the house and a traditional hawk on national security, said US spy policy was “imbalanced” and backed calls for a review.
Mr Boehner has previously been a staunch advocate of the NSA and faced down a July rebellion by libertarian Republicans who tried to pass a law significantly curbing the agency’s power.
By Raf Sanchez, Peter Foster in Washington
8:35PM GMT 29 Oct 2013
Find this story at 29 October 2013
© Copyright of Telegraph Media Group Limited 2013
‘We didn’t spy on the Europeans, their OWN governments did’, says NSA (but still no apology for tapping German chancellor Merkel’s phone)November 26, 2013
Gen. Keith Alexander, the National Security Agency director, says foreign governments spied on their own people and shared data with the U.S.
The NSA had been accused of snooping on 130.5 million phone calls in France and Spain, and keeping computerized records
Sen. Dianne Feinstein said newspapers in Europe ‘got it all wrong’
Alexander’s denial will fall heavily on the fugitive leaker Edward Snowden and his journalist cohorts, whom the NSA chief said ‘did not understand what they were looking at’
The National Security Agency’s director flatly denied as ‘completely false’ claims that U.S. intelligence agencies monitored tens of millions of phone calls in France and Spain during a month-long period beginning in late 2012.
Gen. Keith Alexander contradicted the news reports that said his NSA had collected data about the calls and stored it as part of a wide-ranging surveillance program, saying that the journalists who wrote them misinterpreted documents stolen by the fugitive leaker Edward Snowden.
And a key Democratic senator added that European papers that leveled the allegations ‘got it all wrong’ with respect to at least two countries – saying that it was those nations’ intelligence services that collected the data and shared it with their U.S. counterparts as part of the global war on terror.
Protests: (Left to right) NSA Deputy Director Chris Inglis, NSA Director General Keith Alexander and DNI James Clapper look on as a protestor disrupts the Capitol Hill hearing
National Security Agency Director Gen. Keith Alexander testified Tuesday that the governments of France and Spain conducted surveillance on their own citizens’ phone conversations, and then shared the intelligence data with the U.S.
On Monday newspapers in three countries published computer-screen images, reportedly provided by Snowden, showing what appeared to be data hoovered up by the United States from European citizens’ phone calls.
But Alexander testified in a House Intelligence Committee hearing that ‘those screenshots that show – or lead people to believe – that we, the NSA, or the U.S., collect that information is false.’
‘The assertions by reporters in France, Spain and Italy that NSA collected tens of millions of phone calls are completely false,’ Alexander said.
According to the French newspaper Le Monde and the Spanish daily El Mundo, the NSA had collected the records of at least 70 million phone calls in France and another 60.5 million in Spain between December and January.
Italy’s L’Espresso magazine also alleged, with help from Snowden, that the U.S. was engaged in persistent monitoring of Italy’s telecommunications networks.
General Alexander denied it all.
‘To be perfectly clear, this is not information that we collected on European citizens. It represents information that we and our NATO allies have collected in defense of our countries and in support of military operations.’
Reporters, he added, ‘cite as evidence screen shots of the results of a web tool used for data management purposes, but both they and the person who stole the classified data did not understand what they were looking at.’
President Barack Obama said he is instituting a complete review of U.S. intelligence procedures in the wake of stinging allegations that the NSA has been peeping on foreign leaders through their phones and email accounts
California Democratic Sen. Dianne Feinstein, who chairs the Senate Intelligence Committee, said Tuesday that ‘the papers got it all wrong on the two programs, France and Germany.’
‘This was not the United States collecting on France and Germany. This was France and Germany collecting. And it had nothing to do with their citizens, it had to do with collecting in NATO areas of war, like Afghanistan.’
Feinstein on Monday called for a complete review of all the U.S. intelligence community’s spying programs, saying that ‘Congress needs to know exactly what our intelligence community is doing.’
In the weekend’s other intelligence bombshell, the U.S. stood accused of snooping on German Chancellor Angela Merkel’s cell phone and spying on Mexican President Felipe Calderon’s private emails.
But Director of National Intelligence James Clapper told the committee that spying on foreign leaders is nothing new.
‘That’s a hardy perennial,’ he said, ‘and as long as I’ve been in the intelligence business, 50 years, leadership intentions, in whatever form that’s expressed, is kind of a basic tenet of what we are to collect and analyze.’
‘It’s one of the first things I learned in intel school in 1963,’ he assured the members of Congress, saying that the U.S. routinely spies on foreign leaders to ascertain their intentions, ‘no matter what level you’re talking about. That can be military leaders as well.’
Clapper hinted that committee members had been briefed on such programs, saying that in cases where the NSA is surveilling foreign leaders, ‘that should be reported to the committee … in considerable detail’ as a ‘significant’ intelligence activity over which Congress has oversight.’
He added that ‘we do only what the policymakers, writ large, have actually asked us to do.’
Republican committee chair Mike Rogers of Michigan began the hearing by acknowledging that ‘every nation collects foreign intelligence’ and ‘that is not unique to the United States’.
Clapper pleaded with the panel to think carefully before restricting the government’s ability to collect foreign intelligence, warning that they would be ‘incurring greater risks’ from overseas adversaries.
Gen. Alexander dispensed with his prepared statement and spoke ‘from the heart,’ saying that his agency would rather ‘take the beatings’ from reporters and the public ‘than … give up a program’ that would prevent a future attack on the nation.
The Wall Street Journal reported Tuesday afternoon that other U.S. officials had confirmed Alexander’s version of events, and that the electronic spying in France and Spain was carried out by those nations’ governments.
The resulting phone records, they said, were then shared with the NSA as part of a program aimed at keeping U.S. military personnel and civilians safe in areas of military conflict.
None of the nations involved would speak to the Journal about their own level of involvement in a scandal that initially touched only the U.S., but which now promises to embroil intelligence services on a global scale.
By David Martosko, U.s. Political Editor
PUBLISHED: 21:45 GMT, 29 October 2013 | UPDATED: 10:59 GMT, 30 October 2013
Find this story at 29 October 2013
© Associated Newspapers Ltd
NSA Powerpoint Slides on BOUNDLESSINFORMANTNovember 26, 2013
These 4 slides are from the powerpoint “BOUNDLESSINFORMANT: Describing Mission Capabilities from Metadata Records.” They include the cover page and pages 3, 5, and 6 of the presentation. The powerpoint, leaked to the Guardian newspaper’s Glenn Greenwald by Edward Snowden, was first released by the Guardian newspaper on June 8, 2013 at this web page: http://www.guardian.co.uk/world/interactive/2013/jun/08/nsa-boundless-informant-data-mining-slides
Also included with this collection is a “heat map” of parts of the world most subject to surveillance by Boundless Informant. This image was embedded in the Guardian’s story, which described Boundless Informant as “the NSA’s secret tool to track global surveillance data,” which collected “almost 3 billion pieces of intelligence from US computer networks over a 30-day period ending in March 2013.” http://www.theguardian.com/world/2013/jun/08/nsa-boundless-informant-global-datamining
UNCLASSIFIED//FOR OFFICIAL USE ONLY
BOUNDLESSINFORMANT – Frequently Asked Questions
09-06-2012
(U/FOUO) Questions
1) What is BOUNDLESSINFORMANT! What is its purpose?
2) Who are the intended users of the tool?
3) What are the different views?
4) Where do you get your data?
5) Do you have all the data? What data is missing?
6) Why are you showing metadata record counts versus content?
7) Do you distinguish between sustained collect and survey collect?
8) What is the technical architecture for the tool?
9) What are some upcoming features/enhancements?
1 0) How are new features or views requested and prioritized?
1 1) Why are record counts different from other tools like ASDF and What’s On Cover?
12) Why is the tool NOFORN? Is there a releasable version?
13) How do you compile your record counts for each country?
Note: This document is a work-in-progress and will be updated frequently as additional
questions and guidance are provided.
1) (U) What is BOUNDLESSINFORMANT? What is its purpose?
(U//FOUO) BOUNDLESSINFORMANT is a GAO prototype tool for a self-documenting SIGINT
system. The purpose of the tool is to fundamentally shift the manner in which GAO describes its
collection posture. BOUNDLESSINFORMANT provides the ability to dynamically describe GAO’s
collection capabilities (through metadata record counts) with no human intervention and graphically
display the information in a map view, bar chart, or simple table. Prior to
BOUNDLESSINFORMANT, the method for understanding the collection capabilities of GAO’s
assets involved ad hoc surveying of repositories, sites, developers, and/or programs and offices. By
extracting information from every DNI and DNR metadata record, the tool is able to create a near real-
time snapshot of GAO’s collection capability at any given moment. The tool allows users to select a
country on a map and view the metadata volume and select details about the collection against that
country. The tool also allows users to view high level metrics by organization and then drill down to a
more actionable level – down to the program and cover term.
Sample Use Cases
• (U//FOUO) How many records are collected for an organizational unit (e.g. FORNSAT)?
• (U//FOUO) How many records (and what type) are collected against a particular country?
• (U//FOUO) Are there any visible trends for the collection?
• (U//FOUO) What assets collect against a specific country? What type of collection?
• (U//FOUO) What is the field of view for a specific site? What countriees does it collect
against? What type of collection?
2) (U) Who are the intended users of the tool?
• (U//FOUO) Mission and collection managers seeking to understand output characteristics
of a site based on what is being ingested into downstream repositories. .
(U//FOUO) Strategic Managers seeking to understand top level metrics at the
organization/office level or seeking to answer data calls on NSA collection capability.
BOUNDLESSINFORMANT – FAQ Page 1 o:
UNCLASSIFIED//FOR OFFICIAL USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE ONLY
BOUNDLESSINFORMANT – Frequently Asked Questions
09-06-2012
• (U//FOUO) Analysts looking for additional sites to task for coverage of a particular
technology within a specific country.
3) What are the different views?
(U//FOUO) Map View – The Map View is designed to allow users to view overall DNI, DNR, or
aggregated collection posture of the agency or a site. Clicking on a country will show the collection
posture (record counts, type of collection, and contributing SIGADs or sites) against that particular
country in addition to providing a graphical display of record count trends. In order to bin the records
into a country, a normalized phone number (DNR) or an administrative region atom (DNI) must be
populated within the record. Clicking on a site (within the Site Specific view) will show the viewshed
for that site – what countries the site collects against.
(U//FOUO) Org View – The Organization View is designed to allow users to view the metadata record
counts by organizational structure (i.e. GAO – SSO – RAM-A – SPINNERET) all the way down to the
cover term. Since it’s not necessary to have a normalized number or administrative region populated,
the numbers in the Org View will be higher than the numbers in the Map View.
(U//FOUO) Similarity View – The Similarity View is currently a placeholder view for an upcoming
feature that will graphically display sites that are similar in nature. This can be used to identify areas
for a de-duplication effort or to inform analysts of additional SIGADs to task for queries (similar to
Amazon’s “if you like this item, you’ll also like these” feature).
4) (U) Where do you get your data?
(U//FOUO) BOUNDLESSINFORMANT extracts metadata records from GM-PLACE post-
FALLOUT (DNI ingest processor) and post-TUSKATTIRE (DNR ingest processor). The records are
enriched with organization information (e.g. SSO, FORNSAT) and cover term. Every valid DNI and
DNR metadata record is aggregated to provide a count at the appropriate level. See the different views
question above for additional information.
5) (U) Do you have all the data? What data is missing?
• (U//FOUO) The tool resides on GM-PLACE which is only accredited up to TS//SI//NOFORN.
Therefore, the tool does not contain ECI or FISA data.
• (U//FOUO) The Map View only shows counts for records with a valid normalized number
(DNR) or administrative region atom (DNI).
• (U//FOUO) Only metadata records that are sent back to NSA-W through FASCIA or
FALLOUT are counted. Therefore, programs with a distributed data distribution system (e.g.
MUSCULAR and Terrestrial RF) are not currently counted.
• (U//FOUO) Only SIGINT records are currently counted. There are no ELINT or other “INT”
records included.
6) (U) Why are you showing metadata record counts versus content?
(U//FOUO)
7) (U ) Do you distin g uish between sustained collect and survey collect?
(U//FOUO) The tool currently makes no distinction between sustained collect and survey collect. This
feature is on the roadmap.
BOUNDLESSINFORMANT – FAQ Page 2 o:
UNCLASSIFIED//FOR OFFICIAL USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE ONLY
BOUNDLESSINFORMANT – Frequently Asked Questions
09-06-2012
8) What is the technical architecture for the tool?
Click here for a graphical view of the tool’s architecture
(U//FOUO) DNI metadata (ASDF), DNR metadata (FASCIA) delivered to Hadoop
Distributed File System (HDFS) on GM-PLACE
(U//FOUO) Use Java MapReduce job to transform/filter and enrich FASCIA/ASDF data with
business logic to assign organization rules to data
(U//FOUO) Bulk import of DNI/DNR data (serialized Google Protobuf objects) into
Cloudbase (enabled by custom aggregators)
(U//FOUO) Use Java web app (hosted via Tomcat) on MachineShop (formerly Turkey Tower)
to query Cloudbase
(U//FOUO) GUI triggers queries to CloudBase – GXT (ExtGWT)
9) What are some upcoming features/enhancements?
• (U//FOUO) Add technology type (e.g. JUGGERNAUT, LOPER) to provide additional
granularity in the numbers
(U//FOUO) Add additional details to the Differential view
(U//FOUO) Refine the Site Specific view
(U//FOUO) Include CASN information
(U//FOUO) Add ability to export data behind any view (pddg,sigad,sysid,casn,tech,count)
(U//FOUO) Add in selected (vs. unselected) data indicators
(U//FOUO) Include filter for sustained versus survey collection
10) How are new features or views requested and prioritized?
(U//FOUO) The team uses Flawmill to accept user requests for additional functionality or
enhancements. Users are also allowed to vote on which functionality or enhancements are most
important to them (as well as add comments). The BOUNDLESSINFORMANT team will periodically
review all requests and triage according to level of effort (Easy, Medium, Hard) and mission impact
(High, Medium, Low). The team will review the queue with the project champion and government
steering committee to be added onto the BOUNDLESSINFORMANT roadmap.
1 1) Why are record counts different from other tools like ASDF and What’s On
Cover?
(U//FOUO) There are a number of reasons why record counts may vary. The purpose of the tool is to
provide
BOUNDLESSINFORMANT – FAQ
Page 3 o:
UNCLASSIFIED//FOR OFFICIAL USE ONLY
July 13, 2012
Find this story at txt
Find this story at jpeg
Find this story at pdf
Order of Battle of the CIA-NSA Special Collection Service (SCS)November 26, 2013
The following page from an August 13, 2010 NSA powerpoint presentation on the joint CIA-NSA clandestine SIGINT unit known as the Special Collection Service (SCS) appeared on the Der Spiegel website last week. It has since be replaced by a heavily redacted version of the same page which deletes the locations of all SCS listening posts outside of Europe.
The page shows the locations of all SCS listening posts around the world as of August 2010, of which 74 were active, 3 were listed as being dormant, 14 were unmanned remote controlled stations, three sites were then being surveyed, and two were listed as being “technical support activities.”
In Europe, SCS sites were located at Athens and embassy annex, Baku, Berlin, Budapest, RAF Croughton (UK), Frankfurt, Geneva, Kiev, Madrid, Milan, Moscow and embassy annex, Paris, Prague, Pristina, Rome, Sarajevo, Sofia, Tblisi, Tirana, Vienna and embassy annex, and Zagreb.
In Asia SCS were located at Bangkok and PSA, Beijing, Chengdu, Chiang Mai, Hong Kong, Jakarta, Kuala Lumpur, Manila, Phnom Penh, Rangoon, Shanghai, and Taipei.
In the Middle East and North Africa (MENA) region, SCS sites were located at Abu Dhabi, Algiers, Amman, Amarah, Ankara, Baghdad and embassy annex, Basrah, Beirut, Benghazi, Cairo, Damascus, Istanbul, Jeddah, Khartoum, Kirkuk, Kuwait City, Manama, Mosul, Riyadh, Sana’a, Sulaymaniyah, Talil(?), “Tehran-in-Exile”, and Tripoli.
In South Asia, SCS sites were located at one site illegible, Islamabad, Herat, Kabul and embassy annex, Karachi, Lahore, New Delhi, and Peshawar.
In Africa, SCS sites were located inside the U.S. embassies in Abuja, Addis Ababa, Bamako, Lagos, Nairobi, Monrovia, Kinshasa, Lusaka, and Luanda.
In Central America and the Caribbean, SCS sites were located at Guadalajara, Guatemala City, Havana, Hermosillo, Managua, Mexico City, Monterrey, Panama City, San Jose, and Tegucigalpa.
And in South America, SCS sites were located in Brasilia, Bogota, Caracas, La Paz, Merida and Quito.
Any corrections to the above would be gratefully received.
Matthew M. Aid is the author of Intel Wars: The Secret History of the Fight Against Terror (January 2012) and The Secret Sentry, the definitive history of the National Security Agency. He is a leading intelligence historian and expert on the NSA, and a regular commentator on intelligence matters for the New York Times, the Financial Times, the National Journal, the Associated Press, CBS News, National Public Radio (NPR) and many others. He lives in Washington, DC.
October 28, 2013
Find this story at 28 October 2013
Der Spiegel pdf
Der Spiegel unredacted image
<< oudere artikelen nieuwere artikelen >>