Over 3,000 US prisoners serving life without parole for non-violent crimesNovember 21, 2013
ACLU report chronicles thousands of lives ruined by life sentences for crimes such as shoplifting or possession of a crack pipe
65% of the prisoners identified nationwide by the ACLU are African American. In Louisiana, that proportion rises to 91%. Photograph: Peter Macdiarmid/Getty Images
At about 12.40pm on 2 January 1996, Timothy Jackson took a jacket from the Maison Blanche department store in New Orleans, draped it over his arm, and walked out of the store without paying for it. When he was accosted by a security guard, Jackson said: “I just needed another jacket, man.”
A few months later Jackson was convicted of shoplifting and sent to Angola prison in Louisiana. That was 16 years ago. Today he is still incarcerated in Angola, and will stay there for the rest of his natural life having been condemned to die in jail. All for the theft of a jacket, worth $159.
Jackson, 53, is one of 3,281 prisoners in America serving life sentences with no chance of parole for non-violent crimes. Some, like him, were given the most extreme punishment short of execution for shoplifting; one was condemned to die in prison for siphoning petrol from a truck; another for stealing tools from a tool shed; yet another for attempting to cash a stolen cheque.
“It has been very hard for me,” Jackson wrote to the American Civil Liberties Union (ACLU) as part of its new report on life without parole for non-violent offenders. “I know that for my crime I had to do some time, but a life sentence for a jacket value at $159. I have met people here whose crimes are a lot badder with way less time.”
Senior officials at Angola prison refused to allow the Guardian to speak to Jackson, on grounds that it might upset his victims – even though his crime was victim-less. But his sister Loretta Lumar did speak to the Guardian. She said that the last time she talked by phone with her brother he had expressed despair. “He told me, ‘Sister, this has really broke my back. I’m ready to come out.’”
Lumar said that she found her brother’s sentence incomprehensible. “This doesn’t make sense to me. I know people who have killed people, and they get a lesser sentence. That doesn’t make sense to me right there. You can take a life and get 15 or 16 years. He takes a jacket worth $159 and will stay in jail forever. He didn’t kill the jacket!”
The ACLU’s report, A Living Death, chronicles the thousands of lives ruined and families destroyed by the modern phenomenon of sentencing people to die behind bars for non-violent offences. It notes that contrary to the expectation that such a harsh penalty would be meted out only to the most serious offenders, people have been caught in this brutal trap for sometimes the most petty causes.
Ronald Washington, 48, is also serving life without parole in Angola, in his case for shoplifting two Michael Jordan jerseys from a Foot Action sportswear store in Shreveport, Louisiana, in 2004. Washington insisted at trial that the jerseys were reduced in a sale to $45 each – which meant that their combined value was below the $100 needed to classify the theft as a felony; the prosecution disagreed, claiming they were on sale for $60 each, thus surpassing the $100 felony minimum and opening him up to a sentence of life without parole.
“I felt as though somebody had just taken the life out of my body,” Washington wrote to the ACLU about the moment he learnt his fate. “I seriously felt rejected, neglected, stabbed right through my heart.”
He added: “It’s a very lonely world, seems that nobody cares. You’re never ever returning back into society. And whatever you had or established, its now useless, because you’re being buried alive at slow pace.”
Louisiana, where both Washington and Jackson are held, is one of nine states where prisoners are serving life without parole sentences for non-violent offences (other states with high numbers are Alabama, Florida, Mississippi, Oklahoma and South Carolina). An overwhelming proportion of those sentences – as many as 98% in Louisiana – were mandatory: in other words judges had no discretion but to impose the swingeing penalties.
The warden of Angola prison, Burl Cain, has spoken out in forthright terms against a system that mandates punishment without any chance of rehabilitation. He told the ACLU: “It’s ridiculous, because the name of our business is ‘corrections’ – to correct deviant behaviour. If I’m a successful warden and I do my job and we correct the deviant behaviour, then we should have a parole hearing. I need to keep predators in these big old prisons, not dying old men.”
The toll is not confined to the state level: most of those non-violent inmates held on life without parole sentences were given their punishments by the federal government. More than 2,000 of the 3,281 individuals tracked down on these sentences by the ACLU are being held in the federal system. Overall, the ACLU has calculated that taxpayers pay an additional $1.8bn to keep the prisoners locked up for the rest of their lives.
Timothy Jackson, in an old license photograph. Photograph: Jackson family
‘It doesn’t have to be this way’
Until the early 1970s, life without parole sentences were virtually unknown. But they exploded as part of what the ACLU calls America’s “late-twentieth-century obsession with mass incarceration and extreme, inhumane penalties.”
The report’s author Jennifer Turner states that today, the US is “virtually alone in its willingness to sentence non-violent offenders to die behind bars.” Life without parole for non-violent sentences has been ruled a violation of human rights by the European Court of Human Rights. The UK is one of only two countries in Europe that still metes out the penalty at all, and even then only in 49 cases of murder.
Even within America’s starkly racially-charged penal system, the disparities in non-violent life without parole are stunning. About 65% of the prisoners identified nationwide by the ACLU are African American. In Louisiana, that proportion rises to 91%, including Jackson and Washington who are both black.
The US has the highest incarceration rate in the world, with 2.3 million people now in custody, with the war on drugs acting as the overriding push-factor. Of the prisoners serving life without parole for non-violent offences nationwide, the ACLU estimates that almost 80% were for drug-related crimes.
Again, the offences involved can be startlingly petty. Drug cases itemised in the report include a man sentenced to die in prison for having been found in possession of a crack pipe; an offender with a bottle cap that contained a trace of heroin that was too small to measure; a prisoner arrested with a trace amount of cocaine in their pocket too tiny to see with the naked eye; a man who acted as a go-between in a sale to an undercover police officer of marijuana – street value $10.
Drugs are present in the background of Timothy Jackson’s case too. He was high when he went to the Maison Blanche store, and he says that as a result he shoplifted “without thinking”. Paradoxically, like many of the other prisoners on similar penalties, the first time he was offered drug treatment was after he had already been condemned to spend the rest of his life in jail.
The theft of the $159 jacket, taken in isolation, carries today a six-month jail term. It was combined at Jackson’s sentencing hearing with his previous convictions – all for non-violent crimes including a robbery in which he took $216 – that brought him under Louisiana’s brutal “four-strikes” law by which it became mandatory for him to be locked up and the key thrown away.
The ACLU concludes that it does not have to be this way – suitable alternatives are readily at hand, including shorter prison terms and the provision of drug treatment and mental health services. The organisation calls on Congress, the Obama administration and state legislatures to end the imposition of mandatory life without parole for non-violent offenders and to require re-sentencing hearings for all those already caught in this judicial black hole.
A few months after Timothy Jackson was put away for life, a Louisiana appeals court reviewed the case and found it “excessive”, “inappropriate” and “a prime example of an unjust result”. Describing Jackson as a “petty thief”, the court threw out the sentence.
The following year, in 1998, the state’s supreme court gave a final ruling. “This sentence is constitutionally excessive in that it is grossly out of proportion to the seriousness of the offence,” concluded Judge Bernette Johnson. However, she found that the state’s four strikes law that mandates life without parole could only be overturned in rare instances, and as a result she reinstated the sentence – putting Jackson back inside his cell until the day he dies.
“I am much older and I have learned a lot about myself,” Jackson wrote to the ACLU from that cell. “I am sorry for the crime that I did, and I am a changed man.”
Jackson expressed a hope that he would be granted his freedom when he was still young enough to make something of his life and “help others”. But, barring a reform of the law, the day of his release will never come.
Ed Pilkington in New York
theguardian.com, Wednesday 13 November 2013 05.00 GMT
Find this story at 13 November 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Jeremy Hammond: FBI directed my attacks on foreign government sitesNovember 21, 2013
Anonymous hacktivist told court FBI informant and fellow hacker Sabu supplied him with list of countries vulnerable to cyber-attack
Hammond said: ‘I took responsibility by pleading guilty, but when will the government be made to answer for its crimes?’ Photograph: Michael Gottschalk/AFP
The Anonymous hacktivist sentenced on Friday to 10 years in federal prison for his role in releasing thousands of emails from the private intelligence firm Stratfor has told a Manhattan court that he was directed by an FBI informant to break into the official websites of several governments around the world.
Jeremy Hammond, 28, told a federal court for the southern district of New York that a fellow hacker who went under the internet pseudonym “Sabu” had supplied him with lists of websites that were vulnerable to attack, including those of many foreign countries. The defendant mentioned specifically Brazil, Iran and Turkey before being stopped by judge Loretta Preska, who had ruled previously that the names of all the countries involved should be redacted to retain their secrecy.
Within a couple of hours of the hearing, the three countries had been identified publicly by Forbes, the Huffington Post and Twitter feeds serving more than a million followers. “I broke into numerous sites and handed over passwords and backdoors that enabled Sabu – and by extension his FBI handlers – to control these targets,” Hammond told the court.
The 28-year-old hacker has floated the theory in the past that he was used as part of an effective private army by the FBI to target vulnerable foreign government websites, using the informant Sabu – real name Hector Xavier Monsegur – as a go-between. Sabu, who was a leading figure in the Anonymous-affiliated hacking group LulzSec, was turned by the FBI into one of its primary informants on the hacker world after he was arrested in 2011, about six months before the Stratfor website was breached.
Referring to the hacking of foreign government websites, Hammond said that in one instance, he and Sabu provided details on how to crack into the websites of one particular unidentified country to other hackers who then went on to deface and destroy those websites. “I don’t know how other information I provided to [Sabu] may have been used, but I think the government’s collection and use of this data needs to be investigated,” he told the court
He added: “The government celebrates my conviction and imprisonment, hoping that it will close the door on the full story. I took responsibility for my actions, by pleading guilty, but when will the government be made to answer for its crimes?”
Hammond’s 10-year federal prison service makes it one of the longest punishments dished out for criminal hacking offences in US history. It joins a lengthening line of long jail terms imposed on hackers and whistleblowers as part of the US authorities’ attempt to contain data security of government agencies and corporations in the digital age.
Preska also imposed a three-year period of probationary supervision once Hammond is released from jail that included extraordinary measures designed to prevent him ever hacking again. The terms of the supervision state that when he is out of prison he must: have no contact with “electronic civil disobedience websites or organisations”; have all his internet activity monitored; subject himself to searches of his body, house, car or any other possessions at any time without warrant; and never do anything to hide his identity on the internet.
Hammond’s 10-year sentence was the maximum available to the judge after he pleaded guilty to one count of the Computer Fraud and Abuse Act (CFAA) relating to his December 2011 breach of the website of the Austin, Texas-based private intelligence company Strategic Forecasting, Inc. Delivering the sentence, Preska dismissed the defendant’s explanation of his motivation as one of concern for social justice, saying that he had in fact intended to create “maximum mayhem”. “There is nothing high-minded and public-spirited about causing mayhem,” the judge said.
She quoted from comments made by Hammond under various internet handles at the time of the Stratfor hack in which he had talked about his goal of “destroying the heart, hoping for bankruptcy, collapse”. She criticised what she called his “unrepentant recidivism – he has an almost unbroken record of offences that demonstrate an almost total disrespect for the law.”
Before the sentence came down, Hammond read out an outspoken statement to court in which he said he had been motivated to join the hacker group Anonymous because of a desire to “continue the work of exposing and confronting corruption”. He said he had been “particularly moved by the heroic actions of Chelsea Manning, who had exposed the atrocities committed by US forces in Iraq and Afghanistan. She took an enormous personal risk to leak this information – believing that the public had a right to know and hoping that her disclosures would be a positive step to end these abuses.”
In his own case, he said that as a result of the Stratfor hack, “some of the dangers of the unregulated private intelligence industry are now known. It has been revealed through Wikileaks and other journalists around the world that Stratfor maintained a worldwide network of informants that they used to engage in intrusive and possibly illegal surveillance activities on behalf of large multinational corporations.”
Margaret Kunstler, a prominent member of the Hammond’s defence team, told the Guardian after the sentencing that the maximum punishment was “not a great surprise”. She said that Preska had turned Hammond’s own comments in web chats against him, “but I think she doesn’t understand the language that’s used in chat rooms and the internet – for her to have used such language against him and not understand what his comments meant seemed piggy to say the least.”
• This article was amended on 17 November 2013. An earlier version incorrectly described Margaret Kunstler as Hammond’s lead defence lawyer.
Ed Pilkington in New York
theguardian.com, Friday 15 November 2013 20.22 GMT
Find this story at 15 November 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Jeremy Hammond: Stung or entrapped? The case of the Stratfor hacker raises troubling questions about FBI’s involvement in catching or creating crimeNovember 21, 2013
On the day he learned he was to spend 10 years in federal prison for his involvement in an Anonymous hack, 28-year-old Jeremy Hammond read a statement to the Manhattan court. As well as framing his hacktivism as a public service, aimed at revealing the shadier operations of corporate intelligence firms, Hammond told the court that the FBI had played a significant role in cyberattacks in which he had participated, using infamous Anonymous snitch Sabu to provide information to hackers.
Hammond specifically noted that the FBI informant had provided him with information on vulnerabilities within the official websites of various governments around the world, including Brazil, Syria, Iran and Turkey. (The names of the nations were redacted from the court statement, but soon emerged online.)
Hammond stated: “I broke into numerous sites and handed over passwords and back doors that enabled Sabu — and by extension his FBI handlers — to control these targets … The government celebrates my conviction and imprisonment, hoping that it will close the door on the full story. I took responsibility for my actions, by pleading guilty, but when will the government be made to answer for its crimes?”
The hackivist’s contention here is that the U.S. government used hackers to garner information on, and cyber-advantage over, foreign governments. The hackers were then condemned as criminal, having unwittingly performed services for the U.S. government through illegal hacks. Whether or not the targets provided by Sabu were actually of interest to U.S. national intelligence, or whether they were simply valueless sting bate for hackers is unclear. What is evident, however, is that without government assistance, a number of illegal hacks would not have been carried out as they were. The decades-old question thus arises of when a government sting crosses the boundary into entrapment. In the years since 9/11, little more than a faint line in the sand seems to distinguish (legal) stings and (illegal) entrapment operations by the FBI.
advertisement
The criterion purportedly dividing sting and entrapment operations is weak. An operation counts as a sting (as opposed to entrapment) if it can be shown that a suspect would have carried out the crime, given the chance. It’s a perverse logic of hypotheticals when the government provides all the conditions for a crime to take place (e.g., providing talented hackers with government targets) — conditions that would not have been in place otherwise. A number of recent FBI cases relating to political activism have reeked of entrapment, but have been framed as stings. Recall, for example, the group of young Cleveland anarchists, strung along by an FBI agent into agreeing on a plan to blow up a bridge. The young men were, at every turn, prompted and offered materials by an FBI informant. “The alleged terrorist masterminds end up seeming, when the full story comes out, unable to terrorize their way out of a paper bag without law enforcement tutelage,” noted Rick Perlstein on the case in Rolling Stone last year.
Hammond’s case is different. The 28-year-old is a smart, articulate and experienced activist and hacker. As his guilty plea made clear, he knew what he was doing and he acted in what he felt was the public interest, to expose and hold accountable the private intelligence industry. However, Hammond also engaged in wholly government-prompted hacks and is now being ferociously punished. If it can be shown that the U.S. government used information gathered by hackers on Sabu’s tips, crucial questions arise about why the hackers and not the government agencies that used their skills are being persecuted. If, however, Sabu’s information about foreign government sites’ vulnerabilities were no more than a lure, questions of entrapment should be raised. Either way, as Hammond begins his lengthy federal prison sentence for a nonviolent crime, through which he received no personal enrichment, the FBI’s role in catching the hacktivist deserves greater scrutiny.
monday, Nov 18, 2013 05:51 PM +0100
Natasha Lennard
Find this story at 18 November 2013
© 2013 Salon Media Group, Inc.
Jailed Anonymous hacker Jeremy Hammond: ‘My days of hacking are done’November 21, 2013
Hammond calls his 10-year sentence a ‘vengeful, spiteful act’ by US authorities eager to put a chill on political hacking
‘I knew when I started out with Anonymous that being put in jail and having a lengthy sentence was a possibility,’ Hammond said. Photo: AP
Jeremy Hammond, the Anonymous hacktivist who released millions of emails relating to the private intelligence firm Stratfor, has denounced his prosecution and lengthy prison sentence as a “vengeful, spiteful act” designed to put a chill on politically-motivated hacking.
Hammond was sentenced on Friday at federal court in Manhattan to the maximum 10 years in jail, plus three years supervised release. He had pleaded guilty to one count under the Computer Fraud and Abuse Act (CFAA) flowing from his 2011 hack of Strategic Forecasting, Inc, known as Stratfor. In an interview with the Guardian in the Metropolitan Correction Center in New York, conducted on Thursday, he said he was resigned to a long prison term which he sees as a conscious attempt by the US authorities to put a chill on political hacking.
He had no doubt that his sentence would be long, describing it as a “vengeful, spiteful act”. He said of his prosecutors: “They have made it clear they are trying to send a message to others who come after me. A lot of it is because they got slapped around, they were embarrassed by Anonymous and they feel that they need to save face.”
Most pointedly, Hammond suggested that the FBI may have manipulated him to carry out hacking attacks on “dozens” of foreign government websites. During his time with Anonymous, the loose collective of hackers working alongside WikiLeaks and other anti-secrecy groups, he was often directed by a individual known pseudonomously on the web as “Sabu”, the leader of the Anonymous-affiliated group Lulzsec, who turned out to be an FBI informant.
Hammond, who is under court orders restricting what he says in public, told the Guardian that Sabu presented him with a list of targets, including many foreign government sites, and encouraged him to break into their computer systems. He said he was not sure whether Sabu was in turn acting on behalf of the FBI or other US government agency, but it was even possible that the FBI was using Sabu’s internet handle directly as contact between the two hackers was always made through cyberspace, never face-to-face.
“It is kind of funny that here they are sentencing me for hacking Stratfor, but at the same time as I was doing that an FBI informant was suggesting to me foreign targets to hit. So you have to wonder how much they really care about protecting the security of websites.”
In the interview, conducted in a secure prison meeting room hours before the 28-year-old Chicagoan was sentenced, he was sanguine about his prospects. “I knew when I started out with Anonymous that being put in jail and having a lengthy sentence was a possibility. Given the nature of the targets I was going after I knew I would upset a lot of powerful people.”
Dressed in a brown prison jump suit, and with a long wispy goatee and moustache (he planned to shave both off before the sentencing hearing), Hammond was scathing about the way the CFAA was being twisted in his view for political ends. “They are widening the definition of what is covered by the Act and using it to target specifically political activists,” he said.
He invoked the memory of Aaron Swartz, the open-data crusader who killed himself in January while awaiting trial under the CFAA for releasing documents from behind the subscription-only paywall of an online research group. “The same beast bit us both,” Hammond said. “They went after Aaron because of his involvement in legitimate political causes – they railroaded charges against him, and look what happened.”
Hammond has been in custody since March 2012 having been arrested in Chicago on suspicion of the Stratfor leak of millions of emails that were eventually released by WikiLeaks as the Global Intelligence Files. His sentence is an indication of the aggression with which prosecutors have been pursuing political hackers in the US – other Anonymous members in Britain involved in the breach of Stratfor were sentenced to much shorter jail terms.
Hammond stressed that he had not benefitted personally in any way from the Stratfor email release, that exposed surveillance by private security firms on activists including Anonymous members themselves, Occupy protesters and campaigners in Bhopal, India involved in the push for compensation for victims of the 1984 industrial catastrophe. “Our main purpose in carrying out the Stratfor hack was to find out what private security and intelligence companies were doing, though none of us had any idea of the scale of it.”
Paradoxically, Hammond insists that he would never have carried out the breach of Stratfor’s computer system had he not been led into doing it by Sabu – real name Hector Xavier Monsegur – the fellow hacker who is himself awaiting sentencing having pleaded guilty to 12 hacking-related criminal charges. “I had never heard of Stratfor until Sabu brought in another hacker who told me about it. Practically, I would never have done the Stratfor hack without Sabu’s involvement.”
Hammond discovered that Monsegur was an FBI informant the day after his own arrest. As he was reading the criminal complaint against him, he saw quotes marked CW for “co-operating witness” that contained details that could only have come from Sabu.
“I felt betrayed, obviously. Though I knew these things happen. What surprised me was that Sabu was involved in so much strategic targeting, in actually identifying targets. He gave me the information on targets.”
Part of Sabu’s interest in him, he now believes, was that Hammond had access to advanced tools including one known as PLESK that allowed him to break into web systems used by large numbers of foreign governments. “The FBI and NSA are clearly able to do their own hacking of other countries. But when a new vulnerability emerges in internet security, sometimes hackers have access to tools that are ahead of them that can be very valuable,” he said.
Looking back on his involvement with anonymous, the Chicagoan said that he had been drawn to work with Anonymous, because he saw it as “a model of resistance – it was decentralised, leaderless.” He grew increasingly political in his hacking focus, partly under the influence of the Occupy movement that began in Wall Street in September 2011 and spread across the country.
Chelsea Manning, the US soldier formerly known as Bradley who leaked a massive trove of state secrets to WikiLeaks now serving a 35-year sentence in military jail, was a major influence on him. Manning showed him that “powerful institutions – whether military or private security firms – are involved in unaccountable activities that the public is totally unaware of that can only be exposed by whistleblowers and hackers”.
Hammond has often described himself as an anarchist. He has a tattoo on his left shoulder of the anarchy symbol with the words: “Freedom, equality, anarchy”. Another tattoo on his left forearm shows the Chinese representation of “leader” or “army”, and a third tattoo on his right forearm is a glider signifying the hacking open-source movement that is drawn from the computer simulation Game of Life .
He says he plans to use his time in prison “reading, writing, working out and playing sports – training myself to become more disciplined so I can be more effective on my release”. As to that release, he says he cannot predict how he will be thinking when he emerges from jail, but doubts that he would go back to hacking. “I think my days of hacking are done. That’s a role for somebody else now,” he said.
Ed Pilkington in New York
theguardian.com, Friday 15 November 2013 17.12 GMT
Find this story at 15 November 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
A Conversation With Jeremy Hammond, American Political Prisoner Sentenced to 10 YearsNovember 21, 2013
Jeremy Hammond, the Chicago activist and hacktivist (an activist who uses computer networks for political
protests and other actions), was sentenced last week to 10 years in prison and three years of supervised release for hacking into the intelligence contractor Strategic Forcasting (or Stratfor) and other government, law enforcement and military suppliers’ websites.
The Stratfor hack resulted in a cache of 5.2 million leaked emails and account information for approximately 860,000 Stratfor subscribers and clients, including information from 60,000 credit cards. To list a few of the many revelations, the emails revealed domestic spying on activists, including Occupy Wall Street; surveillance through persona management programs or fake online personas (“sock puppets”); and attempts to link American activist and journalist Alexa O’Brien to al-Qaeda. The Stratfor hack pullled back the curtain on the ofttimes illegal goings-on in the shadowy world of intelligence contractors.
Mr. Hammond’s supervised release includes limited computer access and prohibits him using encryption and from associating with civil disobedience groups. The ban on encryption shows a fundamental misunderstanding of how the Internet works. Encryption is used in nearly every online transaction, such as email, social networking and online banking. The broad ban on freedom of association raises potential Constitutional issues. At the time of his arrest, Mr. Hammond was working under the banner of AntiSec, an offshoot of the hacktivist collective Anonymous.
Jeremy Hammond, American Political Prisoner, courtesy of @FreeAnons.
The packed courtroom looked more like a church wedding than a sentencing, with dozens of Westpoint cadets on a field trip sitting on the left and Mr. Hammond’s parents, friends and supporters — who caravanned from all over the U.S. to show solidarity for their fallen comrade — sitting on the right. Mr. Hammond, his attorneys, Sarah, Emily and Margaret Kunstler and Susan Kellman faced the stoic Judge Loretta Preska presiding over the solemn ceremony.
On September 10th I visited Jeremy Hammond at Manhattan Correctional Center where he had been incarcerated for 18 months. Mr. Hammond, who was denied bail, was also disallowed all visitors, including family members. I am the first journalist with whom Mr. Hammond met since his arrest in March 2012. This interview was held months before sentencing. At the request of Mr. Hammond’s attorneys, who feared his words would be used at sentencing against him, I delayed publishing.
____________________________
Vivien Lesnik Weisman: You are both a boots on the ground activist and a hacktivist. Can you explain hacktivisim, hacking for political purposes and off line activism?
Jeremy Hammond: Hackers are by nature critical of systems, hacking is activism. The very act of hacking is inherently activist and political.
VLW: How effective is activism without the added thread of technology, or hacktivism, in the modern world? Which is more effective?
JH: Hacking is never going to take the place of grassroots community organizing. They complement each other.
There is more to it of course than hacking. Hacktivism involves online social networking, sharing ideas. Protest is predictable; they know how to contain it. The government knows how to ignore it. Both direct action and civil disobedience are unpredictable. I’m all for it.
I see hacktivism as a direct action tool. Offensive hacking with political intent is really nothing more than one more direct action tool. What you do when you get the information is what determines its efficacy as a direct action tool.
And now because of the state of the world — foreclosures, the wars — hackers are becoming politicized. We break into systems and then movements like Occupy deliver the message. It all works together. There is street protest. There is direct action, and hacking is one more tool.
Subverzo, hacktivist, at post-sentencing rally, Foley Square. Photo credit: Still from The Reality Wars, A.J. Abucay DP
VLW: How did the decision to target the intelligence contractor, Stratfor, come about and what was your involvement?
JH: Another hacker, who has not been indicted and therefore I will not name, brought the vulnerability. He had the credit cards already, before I ever got involved, on the Dec 5th. He chose Stratfor and brought it to us. There were 12 of us in the IRC (chat room) at that time.
Stratfor was chosen by that hacker because Stratfor had targeted Anonymous and specifically #OpCartel (Anonymous action against Mexican drug cartels).
Then the 12 of us in a private IRC channel approved it on the merits, as a meritocracy, the Anon way.
None of the 12 in that chat room that included me and Sabu [hacker leader turned FBI informant] have ever been caught.
Amongst the 12 were not only hackers. Some were social media types who brought attention to the actions.
I did the Stratfor hack all by myself except for the original vulnerability. I was the main hacker in Anti-Sec.
Sabu refers to Hetcor Xavier Monsegur, hacker and leader of LulzSec, an offshoot of Anonymous. LulzSec was an elite hacker collective that obtained notoriety as much for their high profile targets as for their clever self-promotion. Sabu was arrested by the FBI and began working for them that day. The following day he announced the formation of AntiSec, “the biggest unified collective of hackers in history.” Both in private IRC and through his various public Twitter accounts he encouraged hackers to join AntiSec and commit hacking crimes. Many hacktivists and rights organizations see these — including the Statfor hack — as government created crimes given that Sabu was working for his FBI handlers at the time he was inciting hackers to join AntiSec. After Sabu was turned, all of his actions can be seen as government actions. In essence, the name Sabu and the government can be used interchangeably in this context.
He is responsible for the arrests of many Anons including Jeremy Hammond.
Hector Xavier Monsegur Jr, hacker known by his nom de guerre Sabu, FBI informant.
VLW: Did you ever suspect that Sabu was a Fed (FBI informant) before that became public?
JH: I was in a chat room with 12 hackers. Chances are someone in there was a Fed. I don’t work with anyone who has not taken risks alongside me. Sabu had taken risks and hacked himself. Still, I could have done this all on my own. I was the main hacker in Anti-Sec.
VLW: And that hacker who provided the exploits also came with the credit cards? And were the credit cards live?
JH: Yes. The credit cards were live. We all spoke on Dec 6th and planned a coordinated day of action when we would choose charities and use the credit cards to make donations for Christmas to these charities, Christmas donations.
VLW: LulzXmas?
JH: Yes.
Jeremy Hammond is often referred to as a digital Robin Hood for his participation in LulzXmas. Margaret Ratner Kunstler, Hammond’s attorney, clarified that her client did not himself make any donations or use the credit cards. He also did not personally profit from the hacked credit cards.
JH: But our main focus was the emails, to reveal the spying. Stratfor was spying on the world. We revealed the anti-WikiLeaks actions by Stratfor. Stratfor was spying on Occupy Wall Street, WikiLeaks, and Anonymous.
We didn’t even know about the Venezuelan coup discussions proving U.S. involvement in the attempted coup until we saw that in the Strafor emails later.
It was all revealed on WikLeaks but I had moved on. I’d rather be hacking.
[He smiles.]
VLW: There is speculation that the Stratfor hack was designed by the government and carried out by their informant Sabu as an attempt to entrap Julian Assange by getting him to solicit information or even sell him information. Were you aware of such a plan and if so did you make a conscious decision to foil that plan by dumping on the Pirate Bay before the transaction could be completed?
JH: No, that did not happen. Julian Assange and WikiLeaks was not a factor.
In fact, many hacktivists make the claim that the Stratfor hack was designed to entrap Julian Assange. Hammond is not necessarily in a position to know whether that was the case or not.
VLW: Stratfor was notified by the government that they had been penetrated and told to do nothing. Why did they allow Stratfor to be sacrificed?
JH: We do not know to what degree they notified Stratfor. Interesting question, but we don’t know.
VLW: Why did the Stratfor hack take so long to complete? And why destroy the servers?
JH: I had to get to the mail servers. It takes time. We always destroy the servers.
First you deface, then you take the information, then you destroy the server, for the Lulz [for fun], and so they can’t rebuild the system. We don’t want them to rebuild. And to destroy forensic information that could be used to find out who did it and how it was done.
VLW: What are your preferred targets?
JH: My preferred targets are military contractors, military suppliers and law enforcement.
VLW: Intelligence contractors like Stratfor?
JH: Tech intelligence firms are a preferred target. Tech firms — where white hat hackers are paid to target the 99% for their corporate overlord clients.
Chris Hedges, journalist, TruthDig columnist, speaks at Hammond Rally. Photo credit: Still from The Reality Wars, A.J. Abucay DP
Those firms also contain the keys to their corporate clients so there is a big payoff — Endgame Systems and Palantir, for example.
Endgame Systems is the subject of much discussion. Engame Systems is self-described as providing offensive and defensive vulnerability research, mitigation of cyber-threats and cyber operations platforms. It is in the business of selling “zero day exploits.” That is, the vulnerabilities that have not yet been detected. According to a Business Week article, these zero day exploits are militarized and include entire blueprints of the computer systems of airports and other critical infrastructure including that of our western allies for example Paris’s Charles De Gaulle Airport. It is difficult to see how the sale of these exploits makes us more secure.
A package of these zero day exploits can be purchased for 2.5 million dollars a year. The price list was revealed in a cache of emails in the HBGary hack, an earlier Anonymous operation. Endgame weaponry is sold by region — China, the Middle East, Russia, Latin America, and Europe. There are even target packs for European and other allies. That raises the question of whether these exploits are being sold to foreign actors. Even if not sold directly to enemies of the U.S., cyber munitions like conventional arms have a way of showing up in unintended places. Once these exploits are out there they are vulnerable to rouge hackers and rogue states.
JH: White hat hackers are being paid to do supposedly defensive actions but they are offensive. White hat hackers are supposed to identify a vulnerability and then announce. But instead they sell the vulnerability, the exploits. So if you hack for the thrill it’s not ok. But for money, like Endgames, then somehow it is. And instead of going to jail for hacking you get awarded a government contract.
At least, the NSA is supposed to — and that is a big “supposed to” — have some kind of government oversight and again that’s overstated; these government contractors, intel firms and tech firms like Stratfor have no oversight whatsoever. They are not bound by any laws. They are above the law. No FOIA (request for classified or other non-public information from the government under the Freedom Of Information Act) can compel them to reveal what they do. Rogue hackers have better access to vulnerabilities than government hackers.
VLW: That reminds me of The Conscience of a Hacker by the Mentor. Did you read that?
Known as the Hacker Manifesto, it could just be Jeremy Hammond’s ethos.
It reads:
You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it’s for our own good, yet we’re the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like.
My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can’t stop us all… after all, we’re all alike.
JH: From the 90’s? You hate me because I’m better than you are. Yeah, yeah.
[He smiles.]
Citizen journalist/activist and Hammond supporter Tara Jill Livestreams outside the court house. Photo credit: Still from The Reality Wars, A.J. Abucay DP
VLW: What do you think about the new battlefield, or cyberwarfare?
JH: The government calls it cybersecurity, but it’s really offensive hacking not just defensive.
The Department of Defense deals in war and aggression but it is not called Department of War is it? The government calls what they do mitigation of the threat of a cyber offensive. But these are offensive acts. They are acts of war. This is the new terrain. The new battlefield.
The war is on and it’s for the Internet. They spy on us, they spy on others, intellectual property rights wars, censorship….
For example, when encryption first came out PGP (Pretty Good Privacy, the first publicly available encryption software) it was called a munition and they immediately tried to ban it.
Encryption is part of our arsenal. It trumps the surveillance state.
As Mr. Hammond was waiting to be handcuffed in order for me to be escorted out of the small room at Manhattan Correctional Center where Mr. Hammond and I had conversed for over 4 hours, I asked him one last question.
VLW: You want to challenge the political system in the US and the world with technology. Is technology your weapon in the same way rifles were weapons in the past? Are you willing to die for your cause?
Handcuffed and standing before me with the guard awaiting my exit he pondered the question. As the guard ushered me out he responded.
JH: Die for my cause? Yes.
Go to prison, die for my cause… or choose to live a life of submission.
____________________________
Mr. Hammond’s bold and principled stand is sure to inspire others to make a similar choice.
This is part one of a two part article.
I am currently working on The Reality Wars, a feature length documentary about the targeting of activists, hacktivists and journalists by the US government and the nexus between intelligence contractors and the surveillance state. Jeremy Hammond and the Stratfor hack are covered in my film.
Posted: 11/19/2013 10:18 am
Find this story at 19 November 2013
© 2013 TheHuffingtonPost.com, Inc.
Cyber-Activist Jeremy Hammond Sentenced to 10 Years In Prison; The hacker, who pleaded guilty in May, is given the maximum sentence by a federal judgeNovember 21, 2013
Cyber-activist Jeremy Hammond was sentenced to 10 years in federal prison this morning by Judge Loretta A. Preska in a federal courtroom in lower Manhattan for hacking the private intelligence firm Stratfor. When released, Hammond will be placed under supervised control, the terms of which include a prohibition on encryption or attempting to anonymize his identity online.
Hammond has shown a “total lack of respect for the law,” Judge Preska said in her ruling, citing Hammond’s criminal record – which includes a felony conviction for hacking from when he was 19 – and what she called “unrepentant recidivism.” There is a “desperate need to promote respect for the law,” she said, as well as a “need for adequate public deterrence.”
Read ‘Enemy of the State,’ Our 2012 Feature on Jeremy Hammond’s Rise and Fall
As Hammond was led into the courtroom, he looked over the roughly 100 supporters who had shown up, smiled, and said, “What’s up, everybody?” Prior to the verdict, he read from a prepared statement and said it was time for him to step away from hacking as a form of activism, but recognized that tactic’s continuing importance. “Those in power do not want the truth exposed,” Hammond said from the podium, wearing black prison garb. He later stated that the injustices he has fought against “cannot be cured by reform, but by civil disobedience and direct action.” He spoke out against capitalism and a wide range of other social ills, including mass incarceration and crackdowns on protest movements.
The Stratfor hack exposed previously unknown corporate spying on activists and organizers, including PETA and the Yes Men, and was largely constructed by the FBI using an informant named Hector Monsegur, better known by his online alias Sabu. Co-defendants in the U.K. were previously sentenced to relatively lighter terms. Citing Hammond’s record, Judge Preska said “there will not be any unwarranted sentencing disparity” between her ruling and the U.K. court’s decision.
Hammond’s supporters and attorneys had previously called on Judge Preska to recuse herself following the discovery that her husband was a victim of the hack she was charged with ruling on. That motion was denied. (Full disclosure: This reporter previously spoke at a rally calling on Judge Preska to recuse herself.)
Hammond’s defense team repeatedly stressed that their client was motivated by charitable intentions, a fact they said was reflected in his off-line life as well. Hammond has previously volunteered at Chicago soup kitchens, and has tutored fellow inmates in GED training during his incarceration.
Rosemary Nidiry, speaking for the prosecution, painted a picture of a malicious criminal motivated by a desire to create “maximum mayhem,” a phrase Hammond used in a chat log to describe what he hoped would come from the Stratfor hack. Thousands of private credit card numbers were released as a result of the Stratfor hack, which the government argued served no public good.
Sarah Kunstler, a defense attorney for Hammond, takes issue with both the prosecution and judge’s emphasis on the phrase “maximum mayhem” to the exclusion of Hammond’s broader philosophy shows an incomplete picture. “Political change can be disruptive and destructive,” Kunstler says. “That those words exclude political action is inaccurate.”
Many supporters see Hammond’s case as part of a broader trend of the government seeking what they say are disproportionately long sentences for acts that are better understood as civil disobedience than rampant criminality. Aaron Swartz, who faced prosecution under the Computer Fraud and Abuse Act – the same statute used to prosecute Hammond – took his own life last year, after facing possible decades in prison for downloading academic journals from an MIT server. “The tech industry promised open access and democratization,” says Roy Singham, Swartz’s old boss and executive chairman of ThoughtWorks, a software company that advocates for social justice. “What we’ve given the world is surveillance and spying.” Singham says it’s “shameful” that “titans of the tech world” have not supported Hammond.
Following his first conviction for hacking, Hammond said, he struggled with returning to that life, but felt it was his responsibility. That decision ultimately lead to the Stratfor hack. “I had to ask myself, if Chelsea Manning fell into the abysmal nightmare of prison fighting for the truth, could I in good conscience do any less, if I was able?” he said, addressing the court. “I thought the best way to demonstrate solidarity was to continue the work of exposing and confronting corruption.”
by John Knefel
NOVEMBER 15, 2013
Find this story at 15 November 2013
©2013 Rolling Stone
105 Years in Jail for Posting a Link? That’s what Barrett Brown is facing.November 20, 2013
A few months ago [1] I passed along the story of Barrett Brown, a young journalist/activist who relentlessly followed up on documents leaked by Anonymous, was targeted for this by the FBI, and who was eventually harassed enough that he cracked—which took the unfortunate form of recording a YouTube rant promising to “destroy” one of his tormentors.
Brown was indicted for posting the YouTube threats, and there’s no question that it was an ill-advised rant regardless of the FBI instigation. But David Carr follows up with more today. It turns out that only three of the charges against Brown are related to the video. Twelve more are related to a link he posted in a chat room: [2]
In December 2011, approximately five million e-mails from Stratfor Global Intelligence, an intelligence contractor, were hacked by Anonymous and posted on WikiLeaks. The files contained revelations about close and perhaps inappropriate ties between government security agencies and private contractors. In a chat room for Project PM, Mr. Brown posted a link to it.
Among the millions of Stratfor files were data containing credit cards and security codes, part of the vast trove of internal company documents….According to one of the indictments, by linking to the files, Mr. Brown “provided access to data stolen from company Stratfor Global Intelligence to include in excess of 5,000 credit card account numbers, the card holders’ identification information, and the authentication features for the credit cards.”
….But keep in mind that no one has accused Mr. Brown of playing a role in the actual stealing of the data, only of posting a link to the trove of documents….“The YouTube video was a mistake, a big one,” said Gregg Housh, a friend of Mr. Brown’s who first introduced him to the activities of Anonymous. “But it is important to remember that the majority of the 105 years he faces are the result of linking to a file. He did not and has not hacked anything, and the link he posted has been posted by many, many other news organizations.”
This is almost a textbook case of prosecutorial overreach. As Carr points out, the guy who actually stole the Stratfor information is facing a sentence of only ten years. So why is Brown facing 105 years? Certainly not for a video posted while he was in withdrawal from heroin addiction. More likely, it’s because the government considers him a thorn in their side and wants to send a message to anyone else planning to follow in Brown’s footsteps. That just ain’t right. As Carr says, “Punishment needs to fit the crime and in this instance, much of what has Mr. Brown staring at a century behind bars seems on the right side of the law, beginning with the First Amendment of the Constitution.”
Links:
[1] http://www.motherjones.com/kevin-drum/2013/03/barrett-brown-and-fbi
[2] http://www.nytimes.com/2013/09/09/business/media/a-journalist-agitator-facing-prison-over-a-link.html?ref=business&pagewanted=all
By Kevin Drum | Mon Sep. 9, 2013 8:47 AM PDT
Social Title:
105 years in jail for posting a link?
Find this story at 9 September 2013
Copyright ©2013 Mother Jones and the Foundation for National Progress.
Barrett Brown’s Mother Will Be Sentenced TodayNovember 20, 2013
The mother of Anonymous-affiliated activist Barrett Brown, Karen Lancaster McCutchin, will be sentenced today, November 8, the Associated Press reports.
Back in May, she admitted to helping her son hide two laptops from federal agents that were investigating the activist. The laptops were hidden in a kitchen cabinet just as FBI agents were executing a search warrant.
As per the plea agreement, McCutchin faces up to 12 months in prison and a fine of up to $100,000 (€75,000).
In the meantime, the case of Barrett Brown continues. He is accused, among other things, of threatening a federal agent in a video published on YouTube, and posting links to information stolen by Anonymous hackers from the think tank Stratfor.
He faces up to 105 years in prison and substantial fines.
November 8th, 2013, 13:49 GMT · By Eduard Kovacs, November 8, 2013 [AP]
Find this story at 8 November 2013
© 2001 – 2013 Softpedia. All rights reserved.
The Global Intelligence Files – Stratfor Files (2012)November 20, 2013
LONDON—Today, Monday 27 February, WikiLeaks began publishing The Global Intelligence Files – more than five million emails from the Texas-headquartered “global intelligence” company Stratfor. The emails date from between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal’s Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defense Intelligence Agency. The emails show Stratfor’s web of informers, pay-off structure, payment-laundering techniques and psychological methods, for example :
“[Y]ou have to take control of him. Control means financial, sexual or psychological control… This is intended to start our conversation on your next phase” – CEO George Friedman to Stratfor analyst Reva Bhalla on 6 December 2011, on how to exploit an Israeli intelligence informant providing information on the medical condition of the President of Venezuala, Hugo Chavez.
The material contains privileged information about the US government’s attacks against Julian Assange and WikiLeaks and Stratfor’s own attempts to subvert WikiLeaks. There are more than 4,000 emails mentioning WikiLeaks or Julian Assange. The emails also expose the revolving door that operates in private intelligence companies in the United States. Government and diplomatic sources from around the world give Stratfor advance knowledge of global politics and events in exchange for money. The Global Intelligence Files exposes how Stratfor has recruited a global network of informants who are paid via Swiss banks accounts and pre-paid credit cards. Stratfor has a mix of covert and overt informants, which includes government employees, embassy staff and journalists around the world.
The material shows how a private intelligence agency works, and how they target individuals for their corporate and government clients. For example, Stratfor monitored and analysed the online activities of Bhopal activists, including the “Yes Men”, for the US chemical giant Dow Chemical. The activists seek redress for the 1984 Dow Chemical/Union Carbide gas disaster in Bhopal, India. The disaster led to thousands of deaths, injuries in more than half a million people, and lasting environmental damage.
Stratfor has realised that its routine use of secret cash bribes to get information from insiders is risky. In August 2011, Stratfor CEO George Friedman confidentially told his employees : “We are retaining a law firm to create a policy for Stratfor on the Foreign Corrupt Practices Act. I don’t plan to do the perp walk and I don’t want anyone here doing it either.”
Stratfor’s use of insiders for intelligence soon turned into a money-making scheme of questionable legality. The emails show that in 2009 then-Goldman Sachs Managing Director Shea Morenz and Stratfor CEO George Friedman hatched an idea to “utilise the intelligence” it was pulling in from its insider network to start up a captive strategic investment fund. CEO George Friedman explained in a confidential August 2011 document, marked DO NOT SHARE OR DISCUSS : “What StratCap will do is use our Stratfor’s intelligence and analysis to trade in a range of geopolitical instruments, particularly government bonds, currencies and the like”. The emails show that in 2011 Goldman Sach’s Morenz invested “substantially” more than $4million and joined Stratfor’s board of directors. Throughout 2011, a complex offshore share structure extending as far as South Africa was erected, designed to make StratCap appear to be legally independent. But, confidentially, Friedman told StratFor staff : “Do not think of StratCap as an outside organisation. It will be integral… It will be useful to you if, for the sake of convenience, you think of it as another aspect of Stratfor and Shea as another executive in Stratfor… we are already working on mock portfolios and trades”. StratCap is due to launch in 2012.
The Stratfor emails reveal a company that cultivates close ties with US government agencies and employs former US government staff. It is preparing the 3-year Forecast for the Commandant of the US Marine Corps, and it trains US marines and “other government intelligence agencies” in “becoming government Stratfors”. Stratfor’s Vice-President for Intelligence, Fred Burton, was formerly a special agent with the US State Department’s Diplomatic Security Service and was their Deputy Chief of the counterterrorism division. Despite the governmental ties, Stratfor and similar companies operate in complete secrecy with no political oversight or accountability. Stratfor claims that it operates “without ideology, agenda or national bias”, yet the emails reveal private intelligence staff who align themselves closely with US government policies and channel tips to the Mossad – including through an information mule in the Israeli newspaper Haaretz, Yossi Melman, who conspired with Guardian journalist David Leigh to secretly, and in violation of WikiLeaks’ contract with the Guardian, move WikiLeaks US diplomatic cables to Israel.
Ironically, considering the present circumstances, Stratfor was trying to get into what it called the leak-focused “gravy train” that sprung up after WikiLeaks’ Afghanistan disclosures :
“[Is it] possible for us to get some of that ’leak-focused’ gravy train ? This is an obvious fear sale, so that’s a good thing. And we have something to offer that the IT security companies don’t, mainly our focus on counter-intelligence and surveillance that Fred and Stick know better than anyone on the planet… Could we develop some ideas and procedures on the idea of ´leak-focused’ network security that focuses on preventing one’s own employees from leaking sensitive information… In fact, I’m not so sure this is an IT problem that requires an IT solution.”
Like WikiLeaks’ diplomatic cables, much of the significance of the emails will be revealed over the coming weeks, as our coalition and the public search through them and discover connections. Readers will find that whereas large numbers of Stratfor’s subscribers and clients work in the US military and intelligence agencies, Stratfor gave a complimentary membership to the controversial Pakistan general Hamid Gul, former head of Pakistan’s ISI intelligence service, who, according to US diplomatic cables, planned an IED attack on international forces in Afghanistan in 2006. Readers will discover Stratfor’s internal email classification system that codes correspondence according to categories such as ’alpha’, ’tactical’ and ’secure’. The correspondence also contains code names for people of particular interest such as ’Hizzies’ (members of Hezbollah), or ’Adogg’ (Mahmoud Ahmedinejad).
Stratfor did secret deals with dozens of media organisations and journalists – from Reuters to the Kiev Post. The list of Stratfor’s “Confederation Partners”, whom Stratfor internally referred to as its “Confed Fuck House” are included in the release. While it is acceptable for journalists to swap information or be paid by other media organisations, because Stratfor is a private intelligence organisation that services governments and private clients these relationships are corrupt or corrupting.
WikiLeaks has also obtained Stratfor’s list of informants and, in many cases, records of its payoffs, including $1,200 a month paid to the informant “Geronimo” , handled by Stratfor’s Former State Department agent Fred Burton.
WikiLeaks has built an investigative partnership with more than 25 media organisations and activists to inform the public about this huge body of documents. The organisations were provided access to a sophisticated investigative database developed by WikiLeaks and together with WikiLeaks are conducting journalistic evaluations of these emails. Important revelations discovered using this system will appear in the media in the coming weeks, together with the gradual release of the source documents.
END
Public partners in the investigation
Comment
Current WikiLeaks status
How to read the data
Public partners in the investigation:
More than 25 media partners (others will be disclosed after their first publication) :
Al Akhbar – Lebanon – http://english.al-akhbar.com
Al Masry Al Youm – Egypt – http://www.almasry-alyoum.com
Bivol – Bulgaria – http://bivol.bg
CIPER – Chile – http://ciperchile.cl
Dawn Media – Pakistan – http://www.dawn.com
L’Espresso – Italy – http://espresso.repubblica.it
La Repubblica – Italy – http://www.repubblica.it
La Jornada – Mexico – www.jornada.unam.mx/
La Nacion – Costa Rica – http://www.nacion.com
Malaysia Today – Malaysia – www.malaysia-today.net
McClatchy – United States – http://www.mcclatchydc.com
Nawaat – Tunisia – http://nawaat.org
NDR/ARD – Germany – http://www.ndr.de
Owni – France – http://owni.fr
Pagina 12 – Argentina – www.pagina12.com.ar
Plaza Publica – Guatemala – http://plazapublica.com.gt
Publico.es – Spain – www.publico.es
Rolling Stone – United States – http://www.rollingstone.com
Russian Reporter – Russia – http://rusrep.ru
Sunday Star-Times – New Zealand – www.star-times.co.nz
Ta Nea – Greece –- http://www.tanea.gr
Taraf – Turkey – http://www.taraf.com.tr
The Hindu – India – www.thehindu.com
The Yes Men – Bhopal Activists – Global http://theyesmen.org
Comment:
WikiLeaks – Kristinn Hrafnsson, Official WikiLeaks representative, +35 4821 7121
Other comment :
Bhopal Medical Appeal (in UK) – Colin Toogood : colintoogood@bhopal.org / +44 (0) 1273 603278/ +44 (0) 7798 845074
International Campaign for Justice in Bhopal (in India) – Rachna Dhingra : rachnya@gmail.com, +91 98 261 67369
Yes Men – mike@theyesmen.org / +44 (0) 7578 682321 – andy@theyesmen.org, +1-718-208-0684
Privacy International – +44 (0) 20 7242 2836
Twitter tag : #gifiles
CURRENT WIKILEAKS STATUS:
An extrajudicial blockade imposed by VISA, MasterCard, PayPal, Bank of America, and Western Union that is designed to destroy WikiLeaks has been in place since December 2010. The EU Commission is considering whether it will open a formal investigation, but two lawsuits have been filed (http://wikileaks.org/Banking-Blocka…). There are also other ways to donate (https://shop.wikileaks.org/donate). It is legal to donate, including in the United States. The US Treasury has publicly stated that that there are no grounds to place WikiLeaks on a US government blacklist.
WikiLeaks Founder and Publisher Julian Assange has not been charged with any crime in any country. Four prosecutors are currently trying to charge him under the Espionage Act of 1917 before a closed Grand Jury in Virginia, in the United States. Julian Assange has been detained for 447 days (10,728 hours) since Dec 7, 2010, without charge, and he is currently awaiting a decision from the UK Supreme Court on extradition to Sweden (http://www.justiceforassange.com/Su…). The decision is expected in March. The decision on whether he will be onwardly extradited to the US lies in the hands of the Swedish Executive, but Sweden’s Prime Minister Fredrik Reinfeldt has refused to state whether he will protect Assange from a politically motivated extradition to the United States (http://justice4assange.com/US-Extra… ).
The Swedish Foreign Minister Carl Bildt has repeatedly attacked WikiLeaks this week in a bizarre manner (http://ferrada-noli.blogspot.com/20… ).
An alleged WikiLeaks US military source, Bradley Manning, has been in pre-trial detention for 639 days (http://bradleymanning.org/ ). His arraignment took place on 24 February 2012. In December 2011, Manning’s attorney revealed in the preliminary hearing that the US government is attempting to enter a plea deal with Manning in order to “go after” Assange. Manning has 22 charges against him, including violating the Espionage Act of 1917 and aiding the enemy. Manning has deferred entering a plea. Julian Assange and WikiLeaks are legally represented in the Manning hearings by the US Centre for Constitutional Rights (http://ccrjustice.org/ ). WikiLeaks was denied full access to Manning’s hearing after appeal (http://ccrjustice.org/newsroom/pres… ). WikiLeaks put out a statement relating to Manning’s trial ahead of the Article 32 Hearing : (http://www.wikileaks.org/Statement-… ).
The alleged WikiLeaks-supporting hacktivists known as the “PayPal 14” were arrested in 2011 following co-ordinated online demonstrations against the financial services companies that are carrying out the unlawful financial blockade on WikiLeaks (VISA, MasterCard, Paypal, Western Union, Bank of America). They are represented by attorney Stanley Cohen and will go before court in May 2012 (http://www.cyberguerrilla.org/?p=4644 ).
WikiLeaks is about to launch a distributed, encrypted “Facebook for revolutionaries” (https://wlfriends.org/ ).
Julian Assange is currently directing interviews, from house arrest, for a programme on the future of the world that is syndicated to various broadcasters. The first show will be broadcast in March (http://www.wikileaks.org/New-Assang… )
HOW TO READ THE DATA
This is a glossary and information on how to understand the internal terms and codes used by Stratfor in their emails. It is not a complete list. We call on the public to add to this list by tweeting #gifind
To see a list of the terms George Friedman considers useful for his staff to know please download this PDF : The Stratfor Glossary of Useful, Baffling and Strange Intelligence Terms.
OPEN SOURCE VS. “COVERT”
As you browse through the content, you will notice that a large set of it is what is classified as “open source” (subject lines which include [OS]). These are basically email threads that start with someone posting a published and accessible source, such as news sites, and follow with commentary by the staff. In one of the emails, Joseph Nye is referenced saying :
“Open source intelligence is the outer pieces of the jigsaw puzzle, without which one can neither begin nor complete the puzzle”
CODES IN SUBJECT LINES
Many of the emails have codes in the subject lines as well as in the body, to make it easier for the staff to “quickly identify when we need to go back and have a look-see.” [*] :
Examples : INSIGHT – COUNTRY – Subject – SOURCE CODE INSIGHT – CHINA – Trains and planes – CN1000
Please refer to the glossary for the code names of subject and country tags, as well as mailing list names.
SOURCE CODES
A lot of interesting stuff comes from “sources”. Sources are either informal contacts or people they have a formal relationship with. The IDs for sources have the format of CN120 or ME001. In terms of the character part, it refers to a region or a country :
A) Regions ME – Middle East region EU – European Union EE – Eastern Europe LA- South America SA- South Asia
B) Countries or Orgs CN – China PK – Pakistan IN- India ML – Malaysia VN – Vietnam NP- Nepal
US – United States VZ – Venezuela CO- Colombia BR-Brazil NC- Nicaragua MX- Mexico CL/CH- Chile AR- Argentina PY- Paraguay BOL- Bolivia
RU – Russia UA – Ukraine GE – Georgia TJ – Tajikstan MD – Moldova BG -Bulgaria CR/CZ- Czech Republic PT- Portugal
ZA – South Africa AO – Angola SO – Somalia NG- Nigeria CD- DR Congo CI- Cote D’Ivoire ZW- Zimbabwe ZM- Zambia RW- Rwanda KE- Kenya ET- Ethiopia SD -Sudan MA- Morocco SN- Senegal GN- Guinea SL- Sierra Leone
IR – Iran IQ- Iraq IL or IS- Israel SA- Saudi Arabia SY- Syria KU- Kuwait Y or YN – Yemen HZ – Hizbollah TK – Turkey LN- Lebanon LY- Libya UAE- UAE EG- Egypt (etc.)
C) Odd codes OCH – Old China hand, a finance insider. Stick – Scott Stewart, high level employee Z’s – Zetas, Mexican drug gang
INSIGHTS FORMAT
When “insights” are sent, they usually have the following header information :
SOURCE : The ID of the source, say CN123. Sometimes this is left “no source ID” when it’s a new source.
ATTRIBUTION : How the source is to be attributed, i.e. “Source in the pharma distribution industry in China”, Stratfor source, etc.
SOURCE DESCRIPTION : Describes the source, for example : “Source works with Mercator Pharmaceutical Solutions, distributing pharma to developing countries.” These include concrete details on the source for internal consumption so that there’s a better understanding on the source’s background and ability to make assessments on the ground.
PUBLICATION : Yes or No. If the option is yes it doesn’t mean that it would be published, but rather that it _can_ be published.
SOURCE RELIABILITY : A/B
SOURCE RELIABILITY : A-F, A being the best and F being the worst. This grades the turnaround time of this source in responding to requests.
ITEM CREDIBILITY : 1-10, 1 being the best and 10 being the worst (we may change the range here in the future). this changes a lot based on the info provided. 1 is “you can take this to the bank” and 10 would be an example of maybe – “this is a totally ridiculous rumor but something that is spreading on the ground”
SPECIAL HANDLING : often this is “none” but it may be something like, “if you use this we need to be sure not to mention the part about XXX in the publication” or any other special notes
SOURCE HANDLER : the person who can take follow-up questions and communicate with the source.
MAILING LISTS
alpha@stratfor.com Discussions circulated exclusively among analysts, writers and higher-ups, including ’insights’ and discussions about sources and source meetings. secure@stratfor.com Discussions circulated exclusively among analysts and higher-ups, and only for use within continental US (analysts traveling ’overseas’ are removed from the list for the duration of their journey). analysts@stratfor.com – Discussion among analysts only, who manage sources, gather and analyze intelligence. ct@stratfor.com Ongoing discussions to collect and analyze counterterrorism intelligence, circulated among select group of analysts. tactical@statfor.com Non-time sensitive discussions for internal training on technical and tactical matters within field of counterterrorism. intelligence@stratfor.com gvalerts@stratfor.com – Related to Gas ventures clients military@stratfor.com Military list for pre-approved staff africa@stratfor.com eastasia@stratfor.com mesa@stratfor.com Middle East/South Asia list for pre-approved staff. eurasia@stratfor.com os@stratfor.com List with information from the public domain circulated and discussed among all employees. adp@stratfor.com List for ADPs. See Glossary. translations@stratfor.com alerts@stratfor.com responses@stratfor.com dialog-list@stratfor.com
GLOSSARY
a) Industry and other misc. tags :
HUMINT – Human intelligence OSINT- Open source intelligence DATA FLU BIRDFLU ECON TECH ENERGY MINING GV – Gas Venture CT – Counterterrorism G1-G4 B2-B4 S1-S4 MILITARY or MIL PENTAGON AQ- Al Qaeda AQAP – Al Qaeda in the Arabia Peninsula SF- Special Forces CONUS- Continental US
b) Special internal codewords :
Hizzies or HZ – Hizbollah Izzies or IZ – Israel A-dogg – Mahmoud Ahmadinajad, Iranian President Baby bashar – Bashar Al-Assad, Syrian President Uncle Mo – Moammar Gaddhafi ADP- Analyst Development Program. Four-month program at STRATFOR from which candidates— mostly recent college graduates— are selected for hire. Strictly protect and protect – Often mentioned in the ’subject’, means that the source is protected. Played- A term used for procuring sensitive information from sources. E.g. from one of the secure list messages circulating the ’complete scenario for the Israeli team in Centcom’s war game,’ the analyst who procured the data wrote : “I played the head of the Mossad which was great fun.” Excomm- Appears to be ’executive committee’ of STRATFOR.
c) Regions and Orgs
AFRICOM – African countries LATAM – Latin American MERCOSUR NATFA ASEAN APEC FSU – Former Soviet Union countries MESA or MIDDLEEAST – Middle East EASTASIA OPEC EURASIA SA – South Asia FSB- Federal Security Service (Russia)
ATTACHED DOCUMENTS
Attached documents can be searched by Filename or part of the file name. Preliminary searches for filenames using the terms ’lists’, ’source lists’ or ’insight lists’, coupled with the names of source handlers (e.g. Reva for Turkey, Brazil or Venezuela) produced Excel lists of the source names, contact info and source descriptions which correspond to the source codes (e.g. ME1315).
Sourcing Criteria
The following are the proposed criteria for analyzing both sources and insight.
1. Source Timeliness 2. Source Accessibility/Position 3. Source Availability 4. Insight Credibility 5. Insight Uniqueness
Source Timeliness : This is the average grade on how long this particular source turns around tasks and replies to inquiries. It may change but is more of a static indicator.
Source Accessibility : Accessibility weighs the source’s position to have certain knowledge in a particular field. So, for example, if we are looking for energy insight and the source is an official in an energy agency, his or her Accessibility would be ranked higher than if s/he was a banker giving insight on energy. While we would welcome a banker giving his/her insight, a good source may not have a high accessibility ranking if they aren’t in a position to offer reliable insight on a certain topic. The source’s access to decision makers, specific training or education in the desired topic area, specific knowledge of events/situations/incidents can also be considered.
Source Availability : How often can we go to this source ? Are they someone we can tap daily, weekly, monthly, yearly ?
Insight Credibility : This is our assessment of the veracity of the insight offered. Here we need to consider whether or not this is disinformation, speculation, correct data or knowledgeable interpretation. Any bias that the source is displaying or any specific viewpoints or personal background the source is using in the assessment provided should also be considered.
Insight Uniqueness : Is this insight something that could be found in OS ? If it is but the analysis of the information is unique, it would still have a high uniqueness ranking. Or, if it is concrete data, but is something that is only offered to industry insiders, i.e. stats that aren’t published but that aren’t secret, it would still have a high uniqueness score.
Scoring
All of the above factors will be scored on an A-F scale, with A being exemplary and F being useless.
Source Timeliness : A = turnaround within 24 hours B = turnaround within 48 hours C = turnaround within a week D = turnaround within a month F = lucky to receive a reply at all
Source Accessibility : A = Someone with intimate knowledge of the particular insight B = Someone within the industry but whose knowledge of the topic is not exact (e.g. if we were asking someone in the oil industry about natural gas) C = Someone working close to the industry who doesn’t have intimate knowledge of a particular topic but can speak to it intelligently (e.g. a financial consultant asked to gauge the movement of the stock market) D = Someone who may know a country but doesn’t have any concrete insight into a particular topic but can offer rumors and discussions heard on the topic F = Someone who has no knowledge of a particular industry at all
Source Availability : A = Available pretty much whenever B = Can tap around once a week C = Can tap about once a month D = Can tap only several times a year F = Very limited availability
Insight Credibility : A = We can take this information to the bank B = Good insight but maybe not entirely precise C = Insight is only partially true D = There may be some interest in the insight, but it is mostly false or just pure speculation. F = Likely to be disinformation
Insight Uniqueness : A = Can’t be found anywhere else B = Can only be found in limited circles C = Insight can be found in OS, but the source has an interesting take/analysis D = Insight can be found in OS, but still may not be common knowledge F = Insight is accessible in numerous locations
Daily Insight Scoring
SOURCE : code ATTRIBUTION : this is what we should say if we use this info in a publication, e.g. STRATFOR source/source in the medical industry/source on the ground, etc SOURCE DESCRIPTION : this is where we put the more concrete details of the source for our internal consumption so we can better understand the source’s background and ability to make the assessments in the insight. PUBLICATION : Yes or no. If you put yes it doesn’t mean that we will publish it, but only that we can publish it. SOURCE RELIABILITY : A-F. A being the best and F being the worst. This grades the source overall – access to information, timeliness, availability, etc. In short, how good is this source ? ITEM CREDIBILITY : A-F. A = we can take this info to the bank ; B = Good insight but maybe not entirely precise ; C = Insight is only partially true ; D = There may be some interest in the insight, but it is mostly false or just pure speculation ; F = Likely to be disinformation. SPECIAL HANDLING : often this is “none” but it may be something like, “if you use this we need to be sure not to mention the part about XXX in thepublication” or any other special notes SOURCE HANDLER : the person who can take follow-up questions and communicate with the source.
Lead journalist: Sarah Harrison
Find this story at 27 February 2012
Outsourcing intelligence sinks Germany further into U.S.’s pocketNovember 20, 2013
When a private company is granted a government contract, it’s a stamp of approval. What about the flipside? What does it say when the government—say, the German government—does business with companies involved in abduction and torture? What does it say when German ministries share IT servicers with the CIA and the NSA? And what does it mean for Germany that those same agencies are involved in projects concerning top-secret material including ID cards, firearms registries and emails in the capitol?
NDR (the German public radio and television broadcaster) and Süddeutsche Zeitung (SZ, Germany’s leading broadsheet newspaper) are proving that these aren’t just hypothetical questions. Especially when it comes to spying, security and an American contractor called Computer Sciences Corporation, the CSC.
Khaled el-Masri sits blindfolded in a container in Kabul. His hands are tied and he can hear a plane engine. It’s a white gulfstream jet. It’s May 28, 2004 and el-Masri has lived through hell. For five months he was tortured while in U.S. custody. He was beaten and humiliated. He received enemas and had to wear diapers. He was drugged and interrogated repeatedly. All this is public knowledge. It eventually became clear—even to the CIA—that they had the wrong man; el-Masri was innocent.
That’s where the CSC comes in.
The CIA had had good experiences with the company for years, as one of its largest private contractors. The mission: the unrightfully detained prisoners should be unobtrusively removed from Afghanistan. So, the CSC subcontracted a company with a jet. Records from July 2, 2004 show that the CSC paid $11,048.94 to have el-Masri picked up in Kabul, flown in handcuffs to Albania and once there driven to some hinterland and dropped-off. Mission accomplished.
Everyone knows about the el-Masri case, but it doesn’t stop the contracts from coming in. The German government continues to give work to the CSC. In the past five years German ministries have given over 100 contracts to the CSC and its subsidiaries. Since 2009 alone, the CSC has earned €25.5 million, some $34.5 million. And since 1990, it’s earned almost €300 million, some $405 million, from its German contracts.
We paid a visit to the German headquarters at 1 Abraham Lincoln Park in Wiesbaden, Germany. It’s a modern building made of grey concrete, a little metal and a lot of glass. The receptionists are friendly, but will they talk? No one here wants to talk.
The German branch of the CSC was incorporated in 1970. On the CSC’s homepage it states vaguely that the company is a world leader in providing “technology enabled business solutions and services”.
In fact, the CSC is a massive company with at least 11 subsidiaries in 16 locations in Germany alone. It’s no coincidence that these locations are often close to U.S. military bases. The CSC and its subsidiaries are part of a secret industry, the military intelligence industry. And they do the work traditionally reserved for the military and intelligence agencies, but for cheaper and under much less scrutiny.
Related branches in this industry include security servicers, such as Blackwater (now going by the name Academi). Blackwater is now being legally charged for a massacre in Iraq. And then there’s Caci, whose specialists were allegedly involved in Abu Ghraib and the ‘enhanced interrogation’ methods used there.
German CSC operations refuse to be tarnished by their bad reputation in the Middle East. Every year German companies including Allianz, BASF, Commerzbank and Dailmer pay for their services. Mostly they pay for IT consulting. But some German ministries who are among their regular costumers request more than IT help.
The CSC’s annual report says nothing abduction. (They don’t advertise that on their homepage either.) For that kind of information you have to read investigative reports or human rights organization statements.
And the Ministry of the Interior is quick to say: “Neither the federal government nor the Office of Procurement know of any allegations against the U.S. parent company of CSC Germany.”
The first report of the CSC’s involvement in extraordinary rendition flights came out in 2005 in the Boston Globe and then again in 2011 in the Guardian. Since then at least 22 subsequent contracts have been signed, among them a contract to begin a national arms registry.
After the abduction and torture of el-Masri, in 2006, the CSC sold its subsidiary Dyncorp. But the CSC remains more involved than ever in American intelligence operations. Thus, the company was part of a consortium that was awarded the so-called Trailblazer project by the NSA. The contract was to build a giant data vacuum, which would have dwarfed the later-developed PRISM program whistleblower Edward Snowden revealed to the world. The program ran over budget, failed and was cancelled altogether. But the CSC continued to be granted contracts.
Basically, the CSC is like the IT department for the entire U.S. intelligence apparatus. And this is the company that has been handling German information at the highest of levels security for years.
A few examples? The CSC tested the controversial Trojan horse spyware for the Federal Criminal Police Office. It helped the Justice Department implement electronic federal court recordkeeping. It has received several contracts to encrypt government communications.
Should Germany be putting so much trust in the CSC, when the company’s more important partner is the U.S. intelligence apparatus?
The Federal Ministry of the Interior who awards the framework agreements assures us, “usually there is a clause in the contracts prohibiting confidential information be passed onto third parties.”
Somehow, that’s not very assuring.
By Christian Fuchs, John Goetz, Frederik Obermaier and Bastian Obermayer
November 16, 2013 12:55 pm CET
Find this story at 16 November 2013
Copyright © Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH
Vermorzelt door geheimdienstenNovember 20, 2013
Eigenrichting in de oorlog tegen de ‘terreur
In de zogenaamde oorlog tegen het terrorisme zijn de missers allang geen uitzondering meer. Precisie bombardementen die burgers doden, willekeurige arrestaties, ‘verdwijningen’ en andere praktijken die doen denken aan de donkere dagen in Latijns Amerika maken stelselmatig deel uit van deze ‘oorlog’. Alles in dienst van het grotere goed, de bescherming van de Westerse heilstaat. Wie is er echter nog veilig. Het verhaal van Khaled el-Masri toont aan dat medewerkers van inlichtingendiensten en leger kunnen opereren met medeweten van hun superieuren. Vervolging en straf zullen ze niet snel oplopen. Het slachtoffer Khaled el-Masri, een Duits Staatsburger, wordt dubbel gestraft.
Verdwijning
Op 31 december 2003 wordt Khaled el-Masri bij de grensplaats Tabanovce (Kumanovo) tussen Servië en Macedonië aangehouden en overgebracht naar een kamer in hotel Skopski Merak in Skopje. De aanhouding wordt uitgevoerd door de State Security and Counterintelligence Directorate (UBK) van Macedonië. Verschillende leden van de UDBK staan op de loonlijst van de CIA (Central Intelligence Agency). Na de arrestatie door de UBK wordt hij eerst door de agenten van de UBK ondervraagd over al Qaida, al Haramain, de Moslimbroeders en enkele andere terroristische organisaties. De aandacht van de ondervragers gaat vooral uit naar het dorp Kondovo waar een islamitische school gevestigd is die volgens de UBK als dekmatel van al Qaida fungeert. Masri ontkent alles en zegt dat hij een reis heeft geboekt naar Skopje met het reisbureau Touring/Ulm. Hij is vanuit Ulm/Neu Ulm zijn woonplaats met de bus onderweg naar Macedonië.
De agenten van de UBK dragen Masri over aan de CIA die hem 23 dagen in de hotelkamer vasthouden. In de hotelkamer wordt hij ondervraagd in het Engels, een taal die hij niet helemaal begrijpt. De vragen gaan in tegenstelling tot de verhoren door de UBK over Neu Ulm. Over zijn kennissen, wie zijn moskee, the Ulm Multicultural Center and Mosque (Multi-Kultur-Haus), bezoeken, over contacten in Noorwegen en over een bijeenkomst in Jalalabad, Afghanistan waar Masri aanwezig zou zijn geweest. Masri ontkent elke betrokkenheid en wil een advocaat of een medewerker van de Duitse ambassade in Macedonië spreken. Uiteindelijk zeggen zijn ondervragers dat hij naar Duitsland wordt teruggebracht.
Dhr. el-Masri wordt echter op 23 januari 2004 met een Boeing 737-7ET met serienummer N313P (nu N4476S) overgebracht van Skopje naar Kabul. Het vliegtuig staat op naam van Premier Executive Transport Services, een bedrijf uit Massachusetts in de Verenigde Staten. De ‘schuilnamen’ van de piloten zijn door het Duitse programma Panorama onthult en later door de Los Angeles Times aangevuld met de echte namen van de piloten. Het gaat om Harry Kirk Elarbee (alias Kirk James Bird), Eric Robert Hume (alias Eric Matthew Fain) en James Kovalesky (alias James Richard Fairing). Zij werken voor Aero Contractors, een bedrijf dat waarschijnlijk de voortzetting is van Air America. Het laatste bedrijf was actief tot in de jaren zeventig als geheime vliegtuigmaatschappij van de CIA.
De N313P zou volgens de Spaanse autoriteiten op 22 januari 2004 vanuit Algiers naar de luchthaven Son Sant Joan op het eiland Mallorca zijn gevlogen. De volgende dag heeft het koers gezet naar Skopje, Macedonië. Dhr. Masri heeft in zijn Duitse paspoort een stempel van vertrek uit Macedonië van Skopje airport (LWSK vliegveldcode). De Minister van Binnenlandse Zaken van Macedonië beweert later het tegendeel. Volgens hem is Masri niet vertrokken van het vliegveld, maar is hij bij de grensplaats Blace met Kosovo het land verlaten. De N313P vliegt via Bagdad (ORBI) naar Kabul (OAKB). In Bagdad wordt er bijgetankt.
In Kabul wordt Masri opgesloten in de “Salt Pit” een verlaten steenfabriek in de buurt van Kabul die door de CIA wordt gebruikt om ‘high-level teror suspects’ vast te houden. Tijdens zijn verblijf wordt hij ondervraagd door mannen met bivakmutsen. In maart 2004 begint Masri samen met enkele andere gevangenen een hongerstaking. Na 27 dagen krijgt hij bezoek van twee niet gemaskerde Amerikanen, de Amerikaanse gevangenisdirecteur en de ‘Boss’, een Amerikaanse hoge officier. Zij geven toe dat hij niet opgesloten hoort te zijn, maar kunnen hem niet vrijlaten zonder toestemming van Washington. Dhr. el-Masri krijgt ook nog bezoek van een man die zich voorstelt als ‘Sam’. ‘Sam’ is de eerste Duitssprekende persoon die Masri tijdens zijn gevangenschap ontmoet. De man stelt echter dezelfde vragen over extremisten in Neu Ulm. ‘Sam’ bezoekt Masri nog drie maal in de ‘Salt Pit’ en begeleid hem in het vliegtuig terug naar Europa.
Op 28 mei 2004 keert een Gulfstream (GLF3) met registratienummer N982RK terug van Kabul naar een militair vliegveld in Kosovo. Dhr. Khaled el-Masri bevindt zich in het vliegtuig. Na de landing wordt Masri, nog steeds geblinddoekt, in een auto gezet en op een verlaten landweg afgezet.
Tijdens zijn verblijf in Skopje en in Kabul wordt dhr. el-Masri mishandeld, gemarteld en ondervraagd. Er wordt geen aanklacht tegen hem ingediend en er volgt geen rechtzaak. Na vijf maanden wordt de man op straat gezet. Terug in Ulm/Neu Ulm ontdekt hij dat zijn vrouw en kinderen verhuist zijn. Zij hebben Duitsland verlaten toen el-Masri niet van vakantie was teruggekeerd en wonen in Libanon. Drie jaar later zonder steun van de Duitse en Amerikaanse overheid draait Masri door. Hij bespuugt een verkoopster in een winkel, slaat een leraar van een bijscholingsinstituut in elkaar en zet een filiaal van de winkelketen Metro in brand. Masri belandt in een psychiatrisch ziekenhuis.
Inlichtingen
Na zijn terugkeer naar Duitsland probeerde dhr. Masri zijn onschuld aan te tonen en de zaak te onderzoeken. Al snel wordt duidelijk dat de Amerikaanse overheid in het geheel niet meewerkt. Het duurt tot december 2005 voordat van officiële zijde enige erkenning komt van de ontvoering van Masri. Daarvoor, begin 2005, berichtten eerst de New York Times, de Süddeutsche Zeitung en het ZDF programma frontal 21 over de verdwijning van Masri. Bij de berichtgeving over het zogenaamde Rendition programma speelt Masri een belangrijke rol. Zijn verhaal is goed gedocumenteerd.
Als eind november 2005 voor het bezoek van de Amerikaanse minister van Buitenlandse Zaken, Rice, de Washington Post een gedetailleerde reconstructie van het verhaal Masri publiceert lijkt de zaak rond. De Amerikanen zeggen dat de verdwijning van dhr. el-Masri een vergissing was. Er zou sprake zijn van een persoonsverwisseling. De persoon die de CIA wilde ontvoeren zou Khaled al-Masri heten en niet el-Masri. Waarom Masri dan zo lang moest worden vastgehouden, gemarteld en ondervraagd wordt geweten aan het feit dat de CIA geloofde dat het paspoort van Masri vals was. Eén letter verschil en de verdenking van een vals paspoort waren de aanleiding voor een vijf maanden brute behandeling door ’s werelds meest geavanceerde geheime dienst, de CIA? De media accepteerden de knieval. De cowboy mentaliteit van Bush en de strijd tegen de terreur deden de rest. Een vergissing is menselijk. Vergissingen die geen uitzondering zijn zoals wij al eerder schreven in relatie tot rendition en de terreurlijsten van de Verenigde Staten, Verenigde Naties en de Europese Unie.
In het artikel van de Washington Post zegt Rice echter ook dat zij de toenmalige Duitse minister van Binnenlandse Zaken Otto Schily over Khaled el-Masri in 2004 al had ingelicht en dat de Amerikanen de zaak stil wilden houden. Masri was zwijggeld geboden door de CIA. Het politieke gedraai kan beginnen. Schily ontkent in eerste instantie dat hij in 2004 iets van de zaak Masri wist. Later geeft hij toe dat in een gesprek met de Amerikaanse ambassadeur in Duitsland, Daniel Coats, in 2004 de zaak is besproken, maar dat hem op het hart is gedrukt het niet verder te vertellen, zo verklaart Schily. De huidige minister van Buitenlandse Zaken en voormalig chef van de kanselarij in de regering Schroder, Frank-Walter Steinmeier, komt door het gesprek tussen Schily en Coats in het nauw. Als chef van de kanselarij moet hij van de inhoud van het gesprek op de hoogte zijn geweest. Hetzelfde geldt voor de voormalig minister van Buitenlandse Zaken Joschka Fischer. Er ontstaat een schijngevecht tussen Duitsland en de Verenigde Staten. De Duitse justitie vaardigt een arrestatiebevel uit tegen dertien personen die betrokken zijn geweest bij de ontvoering van Masri. In september 2007 wordt duidelijk dat Duitsland het verzoek tot uitlevering van de dertien verdachten in de zaak Masri intrekt. Ondertussen waren er al diverse rechtzaken in de Verenigde Staten door Masri en zijn advocaat gestart. De rechtbanken oordelen keer op keer dat zij de zaak niet in behandeling nemen met het oog op nationale veiligheid en de bescherming van staatsgeheimen. Khaled el-Masri vangt bot en belandt in het gekkenhuis.
Onschuld?
De zaak Khaled el-Masri is exemplarisch voor de oorlog tegen het terrorisme. De Amerikanen marcheren als een olifant over de wereld in de hoop zogenaamde terroristen te doden, te arresteren, te martelen en te verhoren. Mensenrechten zijn allang bijzaak in deze oorlog die sterk lijkt op de wijze waarop de Verenigde Staten in de jaren zeventig en tachtig in Latijns Amerika hebben geopereerd. Abu Ghraib, Guantánamo, Fallujah, standrechtelijke executies, precisie bombardementen die trouwerijen raken en verdwijningen zijn geen uitzondering, maar regel. De Europese Unie lijkt steeds de gematigde kracht. Het opgeheven vingertje, uitgebreide discussies over wel of niet blijven in Irak of Afghanistan. Opbouwen of vechten. Het genuanceerde standpunt komt uit de Europese Unie lijkt de boodschap. De zaak Khaled el-Masri maakt echter iets anders duidelijk.
De Amerikaanse minister van Buitenlandse Zaken, Rice, gaf aan dat er overleg was geweest tussen haar toenmalige ambtsgenoot Otto Schily en de Amerikaanse ambassadeur. Dit gebeurde vlak na de vrijlating van Masri in Albanië in mei 2004. De Amerikaanse overheid toonde zich niet erg bereidwillig stukken over te dragen, maar hetzelfde geldt voor de Duitse overheid. Dat Duitsland dieper in het verhaal Masri zat werd in juni 2006 duidelijk. Een agent van de Bundesnachrichtendienst (BND), de Duitse CIA, weet zich tijdens de ondervraging voor de parlementaire onderzoekscommissie naar de rol BND bij de oorlog in Irak te herinneren dat in januari 2004 een onbekende hem over de arrestatie van een Duitse staatburger vertelde. De ontmoeting met de onbekende vond plaats in de kantine van de Duitse Ambassade in Skopje, Macedonië. De New York Times weet te melden dat de autoriteiten in Macedonië de Duitse ambassade in januari 2004 hebben ingelicht over de arrestatie en overdracht aan de Amerikanen van dhr. El-Masri. Het blijft onduidelijk waarom de Duitse autoriteiten zich niet om el-Masri hebben bekommerd. Onmacht, vergeetachtigheid, onwil?
Opzet?
Het tijdstip van de Duitse medeweten schuift steeds verder op. In september 2003 begint de politie in Baden-Württemberg met het filmen van de ingang van het Ulm Multicultural Center and Mosque (multi-kultur-haus), de enige moskee voor moslims in de wijde omgeving. Dit is bekend geworden via de regionale media doordat de politie gebruik maakte van een privé CB frequentie (het ouderwetse bakkie). El-Masri moet zijn opgevallen, hoewel hij niet een speciale bezoeker was, kwam hij toch regelmatig voor het vrijdag gebed in de moskee.
De observatie en het overleg met de autoriteiten in Macedonië op de Duitse ambassade moet betekenen dat de Bundesnachrichtendienst meer wist over Khaled el-Masri dan tot nu toe door de verschillende ministers en ex-ministers wordt toegegeven. Is de verdwijning van Masri dan misschien met medeweten van de Duitsers gebeurd? Hebben die een oogje dichtgeknepen en geen vragen gesteld nadat het bekend was geworden? Of was het een samenwerking tussen de Duitsers en de Amerikanen? Het lijkt erop dat Khaled el-Masri op een lijst stond van mogelijke verdachten van terrorisme. In zo’n geval ben je, je leven niet meer zeker en wordt de rechtstaat opzij gezet. De Duitsers wilden echter schone handen pretenderen, de Amerikanen met hun lange historie van low intensity warfare in Indo China, Latijns Amerika, Afrika en Centraal Azië maakt het allemaal niet uit. De grote vraag is dan natuurlijk of Masri op een lijst stond?
Ulm/Neu Ulm lijkt niet het toonbeeld van het centrum van het islamitisch radicalisme. Volgens geheime diensten is het dat echter wel en speelde het een centrale rol in de zogenaamde islamitische Jihad. Het Multi-Kultur-Haus in Ulm werd om die reden op 28 december 2005 op last van het Beierse ministerie van Binnenlandse Zaken gesloten. Wat was er aan de hand?
Volgens zowel de Amerikaanse CIA en de Duitse BND hebben verschillende terroristen Ulm bezocht. Mohammed Atta, veronderstelde leider van de aanslagen van 11 september 2001, en Said Bahaji, de logistieke leider van de aanslagen van 11 september, zouden op bezoek zijn geweest in het Kultur-Haus en bij de in Ulm woonachtige chirurg el-A. Dit is door een taxi chauffeur uit Ulm in oktober 2006 aan het Duitse tijdschrift Der Stern en het Ard-magazine Report Mainz vertelt. Volgens beide media bevestigen bronnen binnen het Landeskriminalamt (LKA) de verklaring van de chauffeur. El-A., die nu in Sudan zou verblijven, zou contact onderhouden met Mamdouh Mahmud Salim de ‘boekhouder’ van al Qaida. Mohammed Atta lijkt vele levens te hebben gehad en overal op te duiken, zijn plotselinge aanwezigheid in Ulm, waarschijnlijk voor 11 september 2001 blijft onduidelijk. Wel verklaart het de vragen van de CIA agenten in Kabul aan Khaled el-Masri. Naast Ulm ondervroegen ze hem ook over de Hamburgse cel.
Ook aanwezig in het Multi-Kultur-Haus zou Reda Seyam zijn. Hij wordt in verband gebracht met de aanslagen in Bali van oktober 2002, maar is daarvoor nooit aangeklaagd. Zijn ex-vrouw heeft een boek over hem geschreven, onder de titel ‘Mundtot, Ich war die Frau eine Gotteskriegers’, waarin ze hem afschilderd als jihad strijder. In dit gezelschap zou el-Masri zich hebben begeven en met hem vele andere bezoekers van het Kultur-Haus. Waarom is Masri uitgekozen? Dacht de CIA dat hij op weg was naar Irak, Afghanistan, Tsjetsjenië of een andere conflicthaard? Of dachten ze dat hij meer wist en meer betrokken was? Of hoopten ze hem te kunnen werven als informant?
De interesse van de CIA in de islamitische scène in Ulm gaat terug naar 11 september 2001. Naar alle waarschijnlijkheid zijn de Duitsers bij die interesse betrokken. Een vreemd incident in Ulm in april 2003 maakt die voorkennis van de Duitsers duidelijk. Een echtpaar krijgt begin april bezoek van een man die volgens het echtpaar een Amerikaans accent heeft. De man zegt van de politie te zijn maar identificeert zich niet als zodanig. Hij wil het huis aan de overkant observeren. Overrompelt door het gedrag van de man laten ze de zwaar gewapende man binnen, maar bellen later wel de politie om uit te zoeken wat er aan de hand is. De Duitse politie komt enkele dagen later ook observeren, maar reppen met geen woord over de Duitser met het Amerikaanse accent. Voor het echtpaar is tot dan toe niet duidelijk waarom het huis aan de overkant moet worden geobserveerd. Uiteindelijk horen ze dat aan de overkant de weduwe woont van een man die in Tsjetsjenië aan de zijde van het verzet bij gevechten is omgekomen. Herhaaldelijk verzoeken van het echtpaar om foto’s te worden getoond van de zwaar bewapende Duitser met een Amerikaans accent hebben tot nu toe niets opgeleverd. Naar alle waarschijnlijkheid was de observatie een Duits Amerikaanse samenwerking.
Khaled el-Masri woonde niet bij de weduwe in huis. Dat kan niet de aanleiding voor zijn verdwijning zijn geweest. Hij is in de ‘Salt Pit’ in Kabul wel naar Tsjetsjeense contacten gevraagd. Ook door de Duits sprekende agent die Masri naar Albanië terug escorteerde. ‘Sam’ zoals hij zichzelf noemde is of als CIA agent werkzaam geweest op de Amerikaanse ambassade in Duitsland en nu woonachtig in de Verenigde Staten zoals dhet Duitse tijdschrift der Stern beweert of een medewerker van het Bundeskriminalamt zoals andere bronnen beweren. In het eerste geval zou het om Tomas V. gaan die door journalisten van der Stern in Mclean, Virginia (Verenigde Staten) is bezocht. In het tweede geval zou het om Gerhard Lehman gaan een BKA beambte.
Welke ‘Sam’ het ook is, de aanwijzingen dat Duitsland betrokken is geweest bij de ‘verdwijning’ van Khaled el-Masri zijn sterk. De Duits Amerikaanse samenwerking is ook formeel geregeld via de aanwezigheid van Duitse verbindingsofficieren op het Amerikaanse hoofdkwartier van EUCOM in Stuttgart-Vaihingen. De zaak el-Masri staat in het verlengde van de steun van Duitsland aan Amerika in de oorlog in Irak. Voor de buitenwacht leek Duitsland fel tegenstander, maar in werkelijkheid ondersteunden de Duitsers de invasie met inlichtingen en manschappen.
Het ARD magazine Report Mainz schrijft op basis van een geheim BKA dossier dat Masri contacten had binnen de radicaal islamitische wereld. Zoals aangegeven bezocht hij de moskee die blijkbaar gezien werd als het centrum van islamitische Jihad in Zuid Duitsland. Is dat dan de reden om iemand te doen verdwijnen, te mishandelen, te martelen en bruut te ondervragen? Is dat de Westerse heilstaat die wij moeten verdedigen? Ook al zou Masri verdachte contacten hebben gehad, dan nog geldt ook voor hem dat iemand onschuldig is tenzij het tegendeel is bewezen. Ambtenaren in de dienst van de Duitse staat die willens en wetens hun mond hebben gehouden lijken zich even weinig te bekommeren om de rechtstaat als de CIA agenten die Masri uiteindelijk hebben doen verdwijnen en die daarvoor niet berecht kunnen worden. Hoeveel meer mensen zijn er verdwenen? Of is iedereen bang om gek te worden net als Masri? Khaled el-Masri heeft geluk gehad. Wat als hij voor het instappen in het vliegveld in Skopje ja had gezegd op de vraag ben je lid van al Qaida? Na 23 dagen had hij nog de helderheid van geest om nee te zeggen en ja tegen terugkeer naar Duitsland. Want dat was de deal die hem was geboden. Lidmaatschap bekennen en vrijlating, alsof geheime diensten op hun woord moeten worden geloofd. Net als in de jaren zeventig en tachtig toen de Amerikanen zich misdroegen in Latijns Amerika houdt Europa zich nu ook stil. Onderzoekscommissies ten spijt, wordt ook hier de rechtstaat terzijde geschoven als er een verdenking van terrorisme is.
Find this story at 29 November 2007
Lloyds owns stake in US firm accused over CIA torture flightsNovember 20, 2013
Banking group, which has £8.5m slice of CSC, is under pressure along with other City investors from human rights charity
Computer Sciences Corporation, according to Reprieve, organised a flight that took Khaled al-Masri, a German mistakenly imprisoned by the CIA, from a secret detention centre in Afghanistan to Albania in 2004. Photograph: Thomas Kienzle/AP
Lloyds Banking Group has become embroiled in a row over its investment in a company accused of involvement in the rendition of terror suspects on behalf of the CIA.
Lloyds, which is just under 40% owned by the taxpayer, is one of a number of leading City institutions under fire for investing in US giant Computer Sciences Corporation (CSC), which is accused of helping to organise covert US government flights of terror suspects to Guantánamo Bay and other clandestine “black sites” around the world.
Reprieve, the legal human rights charity run by the British lawyer Clive Stafford Smith, alleges that during the flights, suspects – some of whom were later proved innocent – were “stripped, dressed in a diaper and tracksuit, goggles and earphones, and had their hands and feet shackled”. Once delivered to the clandestine locations, they were subjected to beatings and sleep deprivation and forced into stress positions, a report from the International Committee of the Red Cross says.
CSC, which is facing a backlash for allegedly botching its handling of a £3bn contract to upgrade the NHS IT system, has refused to comment on claims it was involved in rendition. It has also refused to sign a Reprieve pledge to “never knowingly facilitate torture” in the future. The claims about its involvement in rendition flights have not been confirmed.
Reprieve has written to CSC investors to ask them to put pressure on the company to take a public stand against torture.
Some of the City’s biggest institutions, including Lloyds and insurer Aviva, have demanded that CSC immediately address allegations that it played a part in arranging extraordinary rendition flights.
Aviva, which holds a small stake in CSC via US tracker funds, said it had written to CSC’s executives to demand an investigation. The insurer said it would take further action if it was confirmed that CSC was linked to torture. “Aviva is of course concerned by the allegations made against CSC,” said a spokesman. “We are a signatory to the United Nations global compact, and support human rights principles, as outlined in the United Nations Universal Declaration of Human Rights. It is not yet clear that CSC is directly complicit in the activities outlined and we have written to the company seeking clarification. We will investigate these allegations further and take action as appropriate.”
Lloyds said it was taking the allegations seriously and had launched its own investigation. A spokesman said: “Our policy is clear, we will not support companies whose ongoing business activities are illegal in the UK and breach the requirements of international conventions as ratified by the UK government. We are not aware of evidence that CSC is currently committed to activities inconsistent with our policy.”
Lloyds holds an £8.5m stake in CSC via its Scottish Widows funds that track the S&P 500 index of America’s biggest companies.
HSBC, another investor, said that it was not aware of evidence that CSC was breaching its ethical investment code.
CSC’s alleged involvement with rendition came about after it purchased DynCorp, which was involved in hundreds of prisoner transfer flights, in 2003. While CSC went on to sell DynCorp in 2005, Reprieve alleges that CSC continued to be involved in the supervision of rendition flights until the end of 2006.
None of CSC’s top 10 shareholders, including fund managers Dodge & Cox, Fidelity, Blackrock and Guggenheim Capital, a fund manager founded by a grandson of philanthropist Solomon Guggenheim, responded to the allegations made in a letter from Reprieve. Norway’s sovereign wealth fund is also an investor.
One of the biggest investors, which declined to be identified due to its policy of refusing to comment on investment decisions, said its executives were “extremely concerned” about CSC’s alleged links to torture, and managers raised their concerns with CSC as soon as it was made aware of the allegations by the Guardian.
Reprieve’s legal director, Cori Crider, said: “CSC evidently thinks it’s fine to profit from kidnap and torture as long as their shareholders are happy. It is now up to those shareholders, including British banks, pension funds and UK government [via Lloyds], to show this isn’t the case. These institutions must insist that CSC take their ethical concerns seriously. Alternatively, they can vote with their feet.”
Crider told investors that Reprieve had obtained an invoice indicating CSC organised a flight that took Khaled al-Masri, a German citizen mistakenly imprisoned by the CIA, from a secret detention centre in Afghanistan to Albania in May 2004. The charity said in its letter: “Having belatedly concluded after months of torture and interrogation that they had imprisoned the wrong man, the CIA, acting through CSC, arranged for Richmor Aviation jet N982RK to transfer Mr al-Masri from an Afghan ‘black site’ to a remote roadside in Albania.”
In a letter to Reprieve, Helaine Elderkin, CSC’s vice-president and senior deputy general counsel, said: “CSC’s board of directors … have a corporate responsibility programme that fosters CSC’s growth by promoting and increasing the value of the company to its shareholders, clients, communities and employees.”
Lisa Nandy, the Labour MP who chairs the all-party parliamentary group on international corporate responsibility, also called on CSC’s biggest investors to hold the company to account. “Investors have a unique responsibility to hold businesses accountable for their ethical conduct, particularly in relation to human rights. Corporates should conduct due diligence down their supply chains to protect human rights, working under the assumption that business should do no harm. Those that refuse to do so should have investment withdrawn,” she said.
“The UK must take the lead in this area and ensure its institutional investors, many of which are using pension funds to allow grievous abuse, are asking tough questions at board level, demanding changes in behaviour and a corporate policy to uphold human rights.”
CSC is being sued by some of its investors in relation to its £3bn contract to upgrade NHS computer systems.
Rupert Neate
The Guardian, Sunday 6 May 2012 19.18 BST
Find this story at 6 May 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Dubioser Partner der RegierungNovember 20, 2013
Entführen für die CIA, spionieren für die NSA? Die Firma CSC kennt wenig Skrupel. Auf ihrer Kundenliste steht auch die Bundesregierung. Die weiß angeblich von nichts.
Keine Frage, ein Auftrag der Bundesregierung schmückt jede Firma. Aber wie ist es andersherum? Kann, darf, soll die Berliner Regierung mit jeder beliebigen Firma ins Geschäft kommen? Sicher nicht – so viel ist einfach zu beantworten; dafür gibt es unzählige Regeln, fast alle beschäftigen sich mit formalen Dingen.
Und was ist mit den moralischen? Sollte eine deutsche Bundesregierung beispielsweise Geschäfte mit einer Firma eingehen, die in Entführungen, in Folterungen verwickelt ist? Sollten sich deutsche Ministerien etwa einen IT-Dienstleister teilen mit CIA, NSA und anderen amerikanischen Geheimdiensten, zumal wenn es um sensible Aufgaben geht, um Personalausweise, Waffenregister und die E-Mail-Sicherheit im Berliner Regierungsviertel?
Recherchen von NDR und Süddeutscher Zeitung belegen, dass beides der Fall gewesen ist beziehungsweise noch immer ist. Es geht um Geschäftsbeziehungen zu einer Firma namens Computer Sciences Corporation, kurz CSC.
Khaled el-Masri sitzt mit verbundenen Augen und gefesselten Händen in einem Container in Kabul, als er die Motorengeräusche eines landenden Flugzeugs hört, eines weißen Gulfstream-Jets. Es ist der 28. Mai 2004, und el-Masri hat die Hölle hinter sich. Fünf Monate lang war er in US-Gefangenschaft gefoltert worden, im berüchtigten “Salt Pit”-Gefängnis in Afghanistan. Er war geschlagen worden und erniedrigt, vielfach, er hat Einläufe bekommen und Windeln tragen müssen, er ist unter Drogen gesetzt und immer wieder verhört worden. Alles bekannt, alles oft berichtet. Auch, dass den CIA-Leuten irgendwann klar wurde: Sie hatten den Falschen. El-Masri war unschuldig. An dieser Stelle kam CSC ins Spiel.
Die CIA-Leute hatten mit der Firma über Jahre gute Erfahrungen gemacht, sie ist einer der größten Auftragnehmer von Amerikas Geheimdiensten. Die Aufgabe: Der falsche Gefangene sollte unauffällig aus Afghanistan herausgeschafft werden. Das Unternehmen beauftragte dafür seinerseits ein Subunternehmen mit dem Flug – laut Rechnung vom 2. Juni 2004 gegen 11048,94 Dollar – und so wurde al-Masri mit jenem weißen Jet in Kabul abgeholt, gefesselt nach Albanien geflogen, dort in ein Auto umgeladen und im Hinterland ausgesetzt. Mission erfüllt.
Schon zu dieser Zeit machte auch die Bundesregierung mit CSC Geschäfte, und sie tut es bis heute – obwohl die Rolle von CSC im Fall el-Masri ihr bekannt sein müsste. Über 100 Aufträge haben deutsche Ministerien in den vergangenen fünf Jahren an die CSC und seine Tochterfirmen vergeben. Allein seit 2009 erhielt CSC für die Aufträge 25,5 Millionen Euro, von 1990 bis heute sind es fast 300 Millionen Euro.
Besuch in der deutschen Firmenzentrale im Abraham-Lincoln-Park 1 in Wiesbaden. Ein moderner Bau, grauer Sichtbeton, wenig Metall, viel Glas. Steril, kühl, sachlich. Die Angestellten am Empfang sind höflich, aber reden? Reden will hier niemand. Den deutschen Ableger der 1959 in den USA gegründeten Firma gibt es seit 1970. Auf der Homepage heißt es nur vage, das Unternehmen sei weltweit führend in “IT-gestützten Businesslösungen und Dienstleistungen”.
Tatsächlich ist die CSC ein großes Unternehmen, allein in Deutschland gibt es mindestens elf Tochtergesellschaften an insgesamt 16 Standorten. Auffallend oft residieren sie in der Nähe von US-Militärstützpunkten. Kein Zufall. Die CSC und ihre Tochterfirmen sind Teil jenes verschwiegenen Wirtschaftszweigs, der für Militär und Geheimdienste günstig und unsichtbar Arbeiten erledigt. Andere in der Branche sind die Sicherheitsdienstleister von Blackwater (die sich heute Academi nennen), denen im Irak Massaker angelastet werden. Oder Caci, deren Spezialisten angeblich in Abu Ghraib beteiligt waren, wenn es um verschärfte Verhöre ging.
Die deutschen Geschäfte der CSC werden durch den schlechten Ruf im Nahen Osten nicht getrübt: Jedes Jahr überweisen deutsche Firmen wie Allianz, BASF, Commerzbank, Daimler und Deutsche Bahn Millionen. Meist geht es um technische Fragen, um Beratung. Aber zum Kundenstamm zählen auch Ministerien: Mit der Firma CSC Deutschland Solutions GmbH, in deren Aufsichtsrat auch ein ehemaliger CDU-Bundestagsabgeordneter sitzt, wurden innerhalb der vergangenen fünf Jahre durch das Beschaffungsamt des Bundesinnenministeriums insgesamt drei Rahmenverträge geschlossen, die wiederum Grundlage für Einzelaufträge verschiedener Bundesministerien waren.
Im Geschäftsbericht der CSC ist von Entführungsflügen nichts zu finden, auch nicht auf deren Homepage. Dafür muss man schon Untersuchungsberichte lesen oder Reports von Menschenrechtsorganisationen. Was das Bundesinnenministerium indessen nicht zu tun scheint: “Weder dem Bundesverwaltungsamt noch dem Beschaffungsamt waren bei Abschluss der Verträge mit der CSC Deutschland Solutions GmbH Vorwürfe gegen den US-amerikanischen Mutterkonzern bekannt,” sagt ein Sprecher. Den ersten Bericht über die Beteiligung der CSC an CIA-Entführungsflügen gab es 2005 im Boston Globe, 2011 folgte der Guardian. Danach wurden von deutschen Ministerien noch mindestens 22 Verträge abgeschlossen, etwa über Beratungsleistungen bei der Einführung eines Nationalen Waffenregisters.
Zwar hat die CSC ihre Tochterfirma Dyncorp, die einst Khaled el-Masris Verschleppung organisierte, schon 2005* verkauft – dennoch war die CSC auch danach noch immer oder noch viel mehr in amerikanische Geheimdienstaktivitäten involviert. So war die Firma Teil jenes Konsortiums, das den Zuschlag für das sogenannte Trailblazer-Programm der NSA erhielt: Dabei sollte ein gigantischer Datenstaubsauger entwickelt werden, gegen den das durch Edward Snowden öffentlich gewordene Spionageprogramm Prism beinahe niedlich wirken würde. Das Projekt wurde schließlich eingestellt, doch Aufträge bekam die CSC weiterhin. Im Grunde ist das Unternehmen so etwas wie die EDV-Abteilung der US-Geheimdienste. Und ausgerechnet diese Firma wird von deutschen Behörden seit Jahren mit Aufträgen bedacht, die enorm sensibel sind.
Ein paar Beispiele? Die CSC testete den umstrittenen Staatstrojaner des Bundeskriminalamts. Das Unternehmen half dem Justizministerium bei der Einführung der elektronischen Akte für Bundesgerichte. Die CSC erhielt mehrere Aufträge, die mit der verschlüsselten Kommunikation der Regierung zu tun haben. Die CSC beriet das Innenministerium bei der Einführung des elektronischen Passes. Sie ist involviert in das Projekt De-Mail, dessen Ziel der sichere Mailverkehr ist – oder sein sollte. Sollte man solche Aufträge einer Firma überantworten, die im US-Geheimdienst im Zweifel möglicherweise den wichtigeren Partner sieht?
Das zuständige Bundesinnenministerium lässt ausrichten, die Rahmenverträge enthielten “in der Regel Klauseln, nach denen es untersagt ist, bei der Vertragserfüllung zur Kenntnis erlangte vertrauliche Daten an Dritte weiterzuleiten”.
*Anmerkung der Redaktion: In einer früheren Version hieß es, CSC habe Dyncorp 2006 verkauft. Es war 2005.
16. November 2013 08:00 Deutsche Aufträge für CSC
Von Christian Fuchs, John Goetz, Frederik Obermaier und Bastian Obermayer
Find this story at 16 November 2013
Copyright: Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH
Deutschland vergibt Aufträge an US-SpionagefirmaNovember 20, 2013
Der Konzern steht dem Geheimdienst NSA nahe. Trotzdem beschäftigt die Bundesregierung seit Jahren das umstrittene Computerunternehmen CSC. Es arbeitet für Ministerien und Behörden und hat Zugriff auf hochsensible Daten.
Die Bundesregierung macht umstrittene Geschäfte mit einem US-amerikanischen Spionage-Dienstleister. Dieser erhält dadurch Zugriff auf eine ganze Reihe hochsensibler Daten. Mehr als 100 Aufträge haben deutsche Ministerien nach Recherchen der Süddeutschen Zeitung und des Norddeutschen Rundfunks in den vergangenen fünf Jahren an deutsche Tochterfirmen der Computer Sciences Corporation (CSC) vergeben. Das US-Unternehmen gilt als einer der wichtigsten Partner der amerikanischen Geheimdienste und war in der Vergangenheit unter anderem an der Entwicklung von Spähprogrammen für die NSA beteiligt. Außerdem war eine Tochter der CSC 2004 in die Verschleppung des Deutschen Khaled el-Masri durch die CIA verwickelt.
Seit 2009 erhielten die deutschen CSC-Ableger Staatsaufträge in Höhe von 25,5 Millionen Euro. Die Firma testete dafür unter anderem den Staatstrojaner des Bundeskriminalamts und unterstützte das Justizministerium bei der Einführung der elektronischen Akte für Bundesgerichte. Des Weiteren erhielt die CSC Aufträge, die mit dem sogenannten Regierungsnetz zu tun haben, über das die verschlüsselte Kommunikation von Ministerien und Behörden läuft. Die CSC beriet außerdem das Innenministerium bei der Einführung des elektronischen Passes und ist involviert in das Projekt De-Mail, dessen Ziel der sichere Mailverkehr ist. Alles heikle Aufträge.
“Wir wissen jetzt ja leider, dass viele US-Firmen sehr eng mit der NSA kooperieren, da scheint blindes Vertrauen äußerst unangebracht”, sagt der Ex-Hacker und IT-Sicherheitsexperte Sandro Gaycken, der auch die Bundesregierung berät. Die CSC selbst teilte mit, “aus Gründen des Vertrauensschutzes” keine Auskunft über öffentliche Auftraggeber zu geben.
Das Unternehmen ist Teil der amerikanischen Schattenarmee von Privatfirmen, die für Militär und Geheimdienste günstig und unsichtbar Arbeit erledigen. So gehörte das Unternehmen zu einem Konsortium, das den Zuschlag für das sogenannte Trailblazer-Projekt der NSA bekommen hatte: Dabei sollte ein Spähprogramm ähnlich dem jüngst bekannt gewordenen Programm Prism entwickelt werden.
Die problematischen Verwicklungen sind teils seit Jahren bekannt – jedoch angeblich nicht dem Bundesinnenministerium, das die Rahmenverträge mit der CSC geschlossen hat. Das Ministerium habe dazu keine “eigenen Erkenntnisse”, teilte ein Sprecher mit. Mitarbeiter externer Unternehmen müssten sich einer Sicherheitsprüfung unterziehen, bevor sie mit einer “sicherheitsempfindlichen Tätigkeit” betraut würden. Im Übrigen enthielten die Rahmenverträge “in der Regel” Klauseln, nach denen es untersagt ist, “vertrauliche Daten an Dritte weiterzuleiten”.
Thomas Drake, ein ehemaliger hochrangiger Mitarbeiter des US-Geheimdienstes NSA, hält derartige Klauseln für “naiv”. Er sagt: “Wenn es um eine Firma geht, die in der US-Geheimdienstbranche und speziell bei der NSA eine solch große Rolle spielt und dort so viel Unterstützung bekommt, dann würde ich den Worten eines Vertrags nicht trauen.”
15. November 2013 19:00 CSC-Konzern
Von Christian Fuchs, John Goetz, Frederik Obermaier und Bastian Obermayer
Find this story at 15 November 2013
Copyright: Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH
Was Spionagefirmen in Deutschland für die USA treibenNovember 20, 2013
Die US-Geheimdienste sammeln so viele Daten, dass sie alleine nicht hinterherkommen. Deswegen mieten sie Zusatzkräfte bei privaten Dienstleistern. Die arbeiten wie Spione – auch in Deutschland.
Ein einfacher Miet-Hacker kostet die US-Regierung 117,99 Dollar die Stunde. Sollte er noch etwas mehr können – die US-Firma MacAulay Brown bewirbt auf ihrer Internetseite Computerspezialisten von “Level 1” bis “Level 4” -, dann wird es teurer: bis zu 187,30 Dollar die Stunde. Und das sind schon die reduzierten Preise für Regierungsaufträge, heißt es in einem Prospekt im Internet (hier als PDF).
Die USA spionieren auf der ganzen Welt, und der Staat allein kommt nicht mehr hinterher, alle Informationen zu verarbeiten. Deswegen setzen Militär und Geheimdienste auf private Firmen, die ihnen zuliefern, auf sogenannte Contractors. Ein Milliardenmarkt. Große Konzerne wie CSC, L-3 Communications, SAIC und Booz Allen Hamilton haben Zehntausende Mitarbeiter. Die Firmen pflegen die Computer der US-Truppen, warten die Datenbanken der Geheimdienste, sortieren Unterlagen. Und manchmal schicken sie “Analysten”: Mitarbeiter, die die nackten Informationen der Geheimdienste für Einsatzbesprechungen zusammenfassen. Alle wichtigen Contractors haben auch Aufträge in Deutschland.
Datenbank-Recherche
Alle Geheimdienst-Aufträge an Privatfirmen in Deutschland
Was treiben die USA in Deutschland? Antworten finden sich auch in einer offiziellen US-Datenbank. Hier finden Sie alle Verträge für Geheimdienstarbeiten in Deutschland.
Die Bundesrepublik ist einer der wichtigsten Stützpunkte der USA, allein im Fiskaljahr 2012 haben sie hier drei Milliarden Dollar ausgegeben. Mehr als im Irak, und auch mehr als in Südkorea – wo die US-Armee tatsächlich einem Feind im Norden gegenübersteht. Von Deutschland aus kämpfen die USA gegen einen Feind, der weit weg ist: Wenn in Somalia US-Drohnen vermeintliche Terroristen beschießen, läuft das über Stuttgart, wo das Hauptquartier für US-Afrika-Missionen sitzt. Auch im Drohnenkrieg sind private Firmen beteiligt, deren Mitarbeiter warten die Fluggeräte, sie kalibrieren die Laser, sie sammeln die Informationen zur Zielerfassung.
Den größten Umsatz mit Analysten auf deutschem Boden verbucht die Firma SOS International, kurz SOSi, an die bislang 61 Millionen Dollar geflossen sind – so steht es in der US-Datenbank für Staatsaufträge. Gerade sucht SOSi neue Mitarbeiter für den Standort Darmstadt. Es geht um die Auswertung von Geo-Daten: Wer ist wann wo? Auf welcher Straße fährt der Mensch in Somalia, der vielleicht ein Terrorist ist, immer abends nach Hause? Informationen, die für tödliche Drohnenschläge verwendet werden können. Geospatial-Analysten verwandeln die Signale der Satelliten in bunte Bilder – und finden darin die Zielperson. Die Konsequenzen zieht der US-Militärapparat.
(Foto: Screenshot exelisvis.com)
Wie sehr die USA in Deutschland auf die privaten Helfer setzen, zeigt ein Auftrag an die Firma Caci aus dem Jahr 2009. Der US-Konzern bekam fast 40 Millionen Dollar, um SIGINT-Analysten nach Deutschland zu schicken. SIGINT steht für Signals Intelligence: Informationen, die Geheimdienste im Internet gesammelt haben. Dabei ist Caci nicht irgendein Unternehmen. Ihre Mitarbeiter waren 2003 als Befrager im US-Gefängnis Abu Ghraib im Irak eingesetzt, aus dem später die Bilder eines Folterskandals um die Welt gingen: Nackte Häftlinge, aufgestapelt zu menschlichen Pyramiden, angeleint wie Hunde und selbst nach ihrem Tod noch misshandelt – fotografiert von grinsenden US-Soldaten und ihren Helfern. Zwei Untersuchungsberichte der US-Armee kamen später zu dem Schluss, dass Caci-Leute an Misshandlungen beteiligt waren. Caci bestreitet das.
Die Episode zeigt: Die Contractors stecken tief drin in Amerikas schmutzigen Kriegen. Jeder fünfte Geheimdienstmitarbeiter ist in Wahrheit bei einer privaten Firma angestellt. Das geht aus den geheimen Budgetplänen der US-Geheimdienste hervor, die dank des Whistleblowers Edward Snowden öffentlich wurden. Snowden ist der wohl berühmteste Ex-Angestellte eines Contractors, bis Juni arbeitete er als Systemadministrator für Booz Allen Hamilton. Der Konzern übernimmt viele IT-Jobs für US-Behörden, so hatte Snowden Zugriff auf hochsensible Unterlagen, die streng geheime Operationen von amerikanischen und britischen Geheimdiensten belegen – obwohl er nicht einmal direkt bei einem US-Geheimdienst arbeitete. Viele Contractors haben Zugriff auf das Allerheiligste. Auf die vom Geheimdienst gesammelten Daten, und auf die interne Kommunikation.
Genau diese Aufgaben sorgen auch für hohe Umsätze in Deutschland. Caci und der Konkurrent SAIC haben zusammen hierzulande in den vergangenen Jahren Hunderte Millionen Dollar umgesetzt. Der Konzern suchte noch vor Kurzem in Stellenausschreibungen Entwickler für das Programm XKeyscore. Nachdem der Guardian enthüllt hatte, dass der US-Geheimdienst NSA damit Bewegungen im Internet von E-Mails bis Facebook-Chats live verfolgen kann, gingen die Gesuche offline. Eine SAIC-Sprecherin betonte, dieses Geschäft sei in dem im September abgespaltenen Unternehmen Leidos aufgegangen. Weitere Fragen ließ sie unbeantwortet.
Die CIA beteiligt sich sogar über eine eigene Investmentfirma names In-Q-Tel an Start-ups, um später deren Technologie nutzen zu können. Auch personell sind die beiden Welten verbunden: Der oberste US-Geheimdienstdirektor James R. Clapper war erst Chef des Militärgeheimdienstes DIA, dann beim Contractor Booz Allen Hamilton und kehrte schließlich in den Staatsdienst zurück – er soll die Arbeit aller US-Nachrichtendienste koordinieren. Arbeit, die oft privatisiert wird, wovon Unternehmen wie sein ehemaliger Arbeitgeber profitieren.
Die Beziehungen zwischen Privatfirmen und dem Staat sind so eng, dass Contractors Büros in US-Militärbasen beziehen. Für MacAulay Brown saß bis vor einem Jahr ein Mitarbeiter auf dem Gelände des Dagger-Complexes in Griesheim. Der Standort gilt als Brückenkopf der NSA. Der Mitarbeiter von MacAulay Brown hatte die gleiche Telefonnummer wie die dort stationierten Truppen und eine eigene Durchwahl. Als gehörte er dazu.
Ein Soldat vor einer sogenannten “Shadow”-Drohne in der US-Basis in Vilseck-Grafenwöhr (Foto: REUTERS)
16. November 2013 11:31 Amerikanische Auftragnehmer
Von Bastian Brinkmann,Oliver Hollenstein und Antonius Kempmann
Find this story at 16 November 2013
Copyright: Süddeutsche Zeitung Digitale Medien GmbH / Süddeutsche Zeitung GmbH
<< oudere artikelen nieuwere artikelen >>