Private firms selling mass surveillance systems around world, documents showNovember 20, 2013
One Dubai-based firm offers DIY system similar to GCHQ’s Tempora programme, which taps fibre-optic cables
Advanced Middle East Systems has been offering a device called Cerebro, which taps information from fibre-optic cables carrying internet traffic. Photograph: Corbis
Private firms are selling spying tools and mass surveillance technologies to developing countries with promises that “off the shelf” equipment will allow them to snoop on millions of emails, text messages and phone calls, according to a cache of documents published on Monday.
The papers show how firms, including dozens from Britain, tout the capabilities at private trade fairs aimed at offering nations in Africa, Asia and the Middle East the kind of powerful capabilities that are usually associated with government agencies such as GCHQ and its US counterpart, the National Security Agency.
The market has raised concerns among human rights groups and ministers, who are poised to announce new rules about the sale of such equipment from Britain.
“The government agrees that further regulation is necessary,” a spokesman for the Department for Business, Innovation and Skills said. “These products have legitimate uses … but we recognise that they may also be used to conduct espionage.”
The documents are included in an online database compiled by the research watchdog Privacy International, which has spent four years gathering 1,203 brochures and sales pitches used at conventions in Dubai, Prague, Brasilia, Washington, Kuala Lumpur, Paris and London. Analysts posed as potential buyers to gain access to the private fairs.
The database, called the Surveillance Industry Index, shows how firms from the UK, Israel, Germany, France and the US offer governments a range of systems that allow them to secretly hack into internet cables carrying email and phone traffic.
The index has details from 338 companies, including 77 from the UK, offering a total of 97 different technologies.
One firm says its “massive passive monitoring” equipment can “capture up to 1bn intercepts a day”. Some offer cameras hidden in cola cans, bricks or children’s carseats, while one manufacturer turns cars or vans into surveillance control centres.
There is nothing illegal about selling such equipment, and the companies say the new technologies are there to help governments defeat terrorism and crime.
But human rights and privacy campaigners are alarmed at the sophistication of the systems, and worry that unscrupulous regimes could use them as tools to spy on dissidents and critics.
Libya’s former leader Muammar Gaddafi is known to have used off-the-shelf surveillance equipment to clamp down on opposition leaders.
Privacy International believes UK firms should now be subject to the same strict export licence rules faced by arms manufacturers.
“There is a culture of impunity permeating across the private surveillance market, given that there are no strict export controls on the sale of this technology, as there are on the sale of conventional weapons,” said Matthew Rice, research consultant with Privacy International.
“This market profits off the suffering of people around the world, yet it lacks any sort of effective oversight or accountability.
“This lack of regulation has allowed companies to export surveillance technology to countries that use their newly acquired surveillance capability to spy on human rights activists, journalists and political movements.”
Privacy International hopes the Surveillance Industry Index will give academics, politicians and campaigners a chance to look at the type of surveillance technologies now available in the hope of sparking a debate about improved regulation.
The documents include a brochure from a company called Advanced Middle East Systems (AMES), based in Dubai. It has been offering a device called Cerebro – a DIY system similar to the Tempora programme run by GCHQ – that taps information from fibre-optic cables carrying internet traffic.
AMES describes Cerebro as a “core technology designed to monitor and analyse in real time communications … including SMS (texting), GSM (mobile calls), billing data, emails, conversations, webmail, chat sessions and social networks.”
The company brochure makes clear this is done by attaching probes to internet cables. “No co-operation with the providers is required,” it adds.
“Cerebro is designed to store several billions of records – metadata and/or communication contents. At any time the investigators can follow the live activity of their target with advanced targeting criteria (email addresses, phone numbers, key words),” says the brochure.
AMES refused to comment after being contacted by the Guardian, but said it followed similar protocols to other surveillance companies. “We don’t want to interact with the press,” said a spokesman.
Another firm selling similar equipment is VASTech, based in South Africa, which has a system called Zebra. Potential buyers are told it has been designed to help “government security agencies face huge challenges in their combat against crime and terrorism”.
VASTech says Zebra offers “access to high volumes of information generated via telecommunication services for the purposes of analysis and investigation”.
It has been designed to “intercept all content and metadata of voice, SMS, email and fax communications on the connected network, creating a rich repository of information”.
A spokesman for the company said: “VASTech produces products for governmental law enforcement agencies. These products have the primary goal of reducing specifically cross-border crimes such as child pornography, human trafficking, drug smuggling, weapon smuggling, money laundering, corruption and terrorist activities. We compete internationally and openly against several suppliers of similar systems.
“We only supply legal governments, which are not subjected to international sanctions. Should their status change in this regard, we hold the right to withdraw our supplies and support unilaterally.”
Ann McKechin, a Labour member of the arms export control committee, said: “Obviously we are concerned about how our government provides licences, given these new types of technology.
“Software technology is now becoming a very large component of our total exports and how we police it before it gets out of country will become an increasingly difficult question and I think the government has to review its processes to consider whether they are fit for the task.”
She said the Department for Business, Innovation and Skills, which has responsibility for granting export licences, had to ensure it has the skills and knowledge to assess new technologies, particularly if they were being sold to “countries of concern”.
“The knowledge of staff which maybe more geared to more traditional types of weaponry,” she added.
A business department spokesperson said: “The government agrees that further regulation is necessary. These products have legitimate uses in defending networks and tracking and disrupting criminals, but we recognise that they may also be used to conduct espionage.
“Given the international nature of this problem we believe that an internationally agreed solution will be the most effective response. That is why the UK is leading international efforts to agree export controls on specific technologies of concern.
“We expect to be able to announce real progress in this area in early December.”
What’s on offer
Some companies offer a range of spy equipment that would not look out of place in a James Bond film
Spy vans
Ordinary vans, cars and motorbikes can be customised to offer everything a spy could need. Tiny cameras and microphones are hidden in wing mirrors, headlights and even the makers’ logo. Vehicles can also be fitted with the latest mass surveillance technology, allowing them to intercept, assess and store a range of digital communications from the surrounding area.
Hidden cameras
The range of objects that can hide high-quality cameras and recording equipment appears almost limitless; from a box of tissues giving a 360-degree view of the room, to a child’s car seat, a brick and a key fob. Remote controls allow cameras to follow targets as they move around a room and have a powerful zoom to give high definition close-ups.
Recorders
As with cameras recording equipment is getting more sophisticated and more ubiquitous. From cigarette lighters to pens their are limitless ways to listen in on other people’s conversations. One firm offers a special strap microphone that straps to the wearer’s would be spies’ back and records conversations going on directly behind them. According to the brochure: “[This] is ideal because people in a crowd think that someone with their back turned can’t hear their conversation.. Operatives can work much closer to their target.”
Handheld ‘biometric cameras’
This system, made by a UK firm, is currently being used by British forces in Afghanistan to help troops identify potential terrorists. The brochure for the Mobile Biometric Platform says: “Innocent civilian or Insurgent? Not Certain? Our systems are.” It adds: “The MBP is tailored for military use and enables biometric enrolment and identification of finger, face and iris against on board watchlists in real time from live or forensic data.”
Mobile phone locators
It is now possible, from a single laptop computer, to locate where a mobile phone is calling from anywhere in the world, with an accuracy of between 200 metres and a mile. This is not done by attaching probes, and it is not limited to the area where the laptop is working from. The “cross border” system means it is now theoretically possible to locate a mobile phone call from a town abroad from a laptop in London.
Nick Hopkins and Matthew Taylor
The Guardian, Monday 18 November 2013 21.42 GMT
Find this story at 18 November 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Documents reveal NSA’s extensive involvement in targeted killing programNovember 20, 2013
It was an innocuous e-mail, one of millions sent every day by spouses with updates on the situation at home. But this one was of particular interest to the National Security Agency and contained clues that put the sender’s husband in the crosshairs of a CIA drone.
Days later, Hassan Ghul — an associate of Osama bin Laden who provided a critical piece of intelligence that helped the CIA find the al-Qaeda leader — was killed by a drone strike in Pakistan’s tribal belt.
The U.S. government has never publicly acknowledged killing Ghul. But documents provided to The Washington Post by former NSA contractor Edward Snowden confirm his demise in October 2012 and reveal the agency’s extensive involvement in the targeted killing program that has served as a centerpiece of President Obama’s counterterrorism strategy.
An al-Qaeda operative who had a knack for surfacing at dramatic moments in the post-Sept. 11 story line, Ghul was an emissary to Iraq for the terrorist group at the height of that war. He was captured in 2004 and helped expose bin Laden’s courier network before spending two years at a secret CIA prison. Then, in 2006, the United States delivered him to his native Pakistan, where he was released and returned to the al-Qaeda fold.
But beyond filling in gaps about Ghul, the documents provide the most detailed account of the intricate collaboration between the CIA and the NSA in the drone campaign.
The Post is withholding many details about those missions, at the request of U.S. intelligence officials who cited potential damage to ongoing operations and national security.
The NSA is “focused on discovering and developing intelligence about valid foreign intelligence targets,” an NSA spokeswoman said in a statement provided to The Post on Wednesday, adding that the agency’s operations “protect the nation and its interests from threats such as terrorism and the proliferation of weapons of mass destruction.”
In the search for targets, the NSA has draped a surveillance blanket over dozens of square miles of northwest Pakistan. In Ghul’s case, the agency deployed an arsenal of cyber-espionage tools, secretly seizing control of laptops, siphoning audio files and other messages, and tracking radio transmissions to determine where Ghul might “bed down.”
The e-mail from Ghul’s wife “about her current living conditions” contained enough detail to confirm the coordinates of that household, according to a document summarizing the mission. “This information enabled a capture/kill operation against an individual believed to be Hassan Ghul on October 1,” it said.
The file is part of a collection of records in the Snowden trove that make clear that the drone campaign — often depicted as the CIA’s exclusive domain — relies heavily on the NSA’s ability to vacuum up enormous quantities of e-mail, phone calls and other fragments of signals intelligence, or SIGINT.
To handle the expanding workload, the NSA created a secret unit known as the Counter-Terrorism Mission Aligned Cell, or CT MAC, to concentrate the agency’s vast resources on hard-to-find terrorism targets. The unit spent a year tracking Ghul and his courier network, tunneling into an array of systems and devices, before he was killed. Without those penetrations, the document concluded, “this opportunity would not have been possible.”
At a time when the NSA is facing intense criticism for gathering data on Americans, the drone files may bolster the agency’s case that its resources are focused on fighting terrorism and supporting U.S. operations overseas.
“Ours is a noble cause,” NSA Director Keith B. Alexander said during a public event last month. “Our job is to defend this nation and to protect our civil liberties and privacy.”
The documents do not explain how the Ghul e-mail was obtained or whether it was intercepted using legal authorities that have emerged as a source of controversy in recent months and enable the NSA to compel technology giants including Microsoft and Google to turn over information about their users. Nor is there a reference to another NSA program facing scrutiny after Snowden’s leaks, its metadata collection of numbers dialed by nearly every person in the United States.
To the contrary, the records indicate that the agency depends heavily on highly targeted network penetrations to gather information that wouldn’t otherwise be trapped in surveillance nets that it has set at key Internet gateways.
The new documents are self-congratulatory in tone, drafted to tout the NSA’s counterterrorism capabilities. One is titled “CT MAC Hassan Gul Success.” The files make no mention of other agencies’ roles in a drone program that escalated dramatically in 2009 and 2010 before tapering off in recent years.
Even so, former CIA officials said the files are an accurate reflection of the NSA’s contribution to finding targets in a campaign that has killed more than 3,000 people, including thousands of alleged militants and hundreds of civilians, in Pakistan, according to independent surveys. The officials said the agency has assigned senior analysts to the CIA’s Counterterrorism Center, and deployed others to work alongside CIA counterparts at almost every major U.S. embassy or military base overseas.
“NSA threw the kitchen sink at the FATA,” said a former U.S. intelligence official with experience in Afghanistan and Pakistan, referring to the Federally Administered Tribal Areas, the region in northwest Pakistan where al-Qaeda’s leadership is based.
NSA employees rarely ventured beyond the security gates of the U.S. Embassy in Islamabad, officials said. Surveillance operations that required placing a device or sensor near an al-Qaeda compound were handled by the CIA’s Information Operations Center, which specializes in high-tech devices and “close-in” surveillance work.
“But if you wanted huge coverage of the FATA, NSA had 10 times the manpower, 20 times the budget and 100 times the brainpower,” the former intelligence official said, comparing the surveillance resources of the NSA to the smaller capabilities of the agency’s IOC. The two agencies are the largest in the U.S. intelligence community, with budgets last year of $14.7 billion for the CIA and $10.8 billion for the NSA. “We provided the map,” the former official said, “and they just filled in the pieces.”
In broad terms, the NSA relies on increasingly sophisticated versions of online attacks that are well-known among security experts. Many rely on software implants developed by the agency’s Tailored Access Operations division with code-names such as UNITEDRAKE and VALIDATOR. In other cases, the agency runs “man-in-the-middle” attacks in which it positions itself unnoticed midstream between computers communicating with one another, diverting files for real-time alerts and longer-term analysis in data repositories.
Through these and other tactics, the NSA is able to extract vast quantities of digital information, including audio files, imagery and keystroke logs. The operations amount to silent raids on suspected safe houses and often are carried out by experts sitting behind desks thousands of miles from their targets.
The reach of the NSA’s Tailored Access Operations division extends far beyond Pakistan. Other documents describe efforts to tunnel into systems used by al-Qaeda affiliates in Yemen and Africa, each breach exposing other corridors.
An operation against a suspected facilitator for al-Qaeda’s branch in Yemen led to a trove of files that could be used to “help NSA map out the movement of terrorists and aspiring extremists between Yemen, Syria, Turkey, Egypt, Libya and Iran,” according to the documents. “This may enable NSA to better flag the movement of these individuals” to allied security services that “can put individuals on no-fly lists or monitor them once in country.”
A single penetration yielded 90 encrypted al-Qaeda documents, 16 encryption keys, 30 unencrypted messages as well as “thousands” of chat logs, according to an inventory described in one of the Snowden documents.
The operations are so easy, in some cases, that the NSA is able to start downloading data in less time than it takes the targeted machine to boot up. Last year, a user account on a social media Web site provided an instant portal to an al-Qaeda operative’s hard drive. “Within minutes, we successfully exploited the target,” the document said.
The hunt for Ghul followed a more elaborate path.
Ghul, who is listed in other documents as Mustafa Haji Muhammad Khan, had surfaced on U.S. radar as early as 2003, when an al-Qaeda detainee disclosed that Ghul escorted one of the intended hijackers to a Pakistani safe house a year before the Sept. 11, 2001, attacks.
A trusted facilitator and courier, Ghul was dispatched to Iraq in 2003 to deliver a message to Abu Musab al-Zarqawi, the al-Qaeda firebrand who angered the network’s leaders in Pakistan by launching attacks that often slaughtered innocent Muslims.
When Ghul made another attempt to enter Iraq in 2004, he was detained by Kurdish authorities in an operation directed by the CIA. Almost immediately, Ghul provided a piece of intelligence that would prove more consequential than he may have anticipated: He disclosed that bin Laden relied on a trusted courier known as al-Kuwaiti.
The ripples from that revelation wouldn’t subside for years. The CIA went on to determine the true identity of al-Kuwaiti and followed him to a heavily fortified compound in Abbottabad, Pakistan, where bin Laden was killed in 2011.
Because of the courier tip, Ghul became an unwitting figure in the contentious debate over CIA interrogation measures. He was held at a CIA black site in Eastern Europe, according to declassified Justice Department memos, where he was slapped and subjected to stress positions and sleep deprivation to break his will.
Defenders of the interrogation program have cited Ghul’s courier disclosure as evidence that the agency’s interrogation program was crucial to getting bin Laden. But others, including former CIA operatives directly involved in Ghul’s case, said that he identified the courier while he was being interrogated by Kurdish authorities, who posed questions scripted by CIA analysts in the background.
The debate resurfaced amid the release of the movie “Zero Dark Thirty” last year, in which a detainee’s slip after a brutal interrogation sequence is depicted as a breakthrough in the bin Laden hunt. Ghul’s case also has been explored in detail in a 6,000-page investigation of the CIA interrogation program by the Senate Intelligence Committee that has yet to be released.
Sen. Dianne Feinstein (D-Calif.), the chairman of the panel, sought to settle the Ghul debate in a statement last year that alluded to his role but didn’t mention him by name.
“The CIA detainee who provided the most significant information about the courier provided the information prior to being subjected to coercive interrogation techniques,” Feinstein said in the statement, which was signed by Sen. Carl Levin (D-Mich.).
The George W. Bush administration’s decision to close the secret CIA prisons in 2006 set off a scramble to place prisoners whom the agency did not regard as dangerous or valuable enough to transfer to Guantanamo Bay. Ghul was not among the original 14 high-value CIA detainees sent to the U.S. installation in Cuba. Instead, he was turned over to the CIA’s counterpart in Pakistan, with ostensible assurances that he would remain in custody.
A year later, Ghul was released. There was no public explanation from Pakistani authorities. CIA officials have noted that Ghul had ties to Lashkar-e-Taiba, a militant group supported by Pakistan’s intelligence service. By 2007, he had returned to al-Qaeda’s stronghold in Waziristan.
In 2011, the Treasury Department named Ghul a target of U.S. counterterrorism sanctions. Since his release, the department said, he had helped al-Qaeda reestablish logistics networks, enabling al-Qaeda to move people and money in and out of the country. The NSA document described Ghul as al-Qaeda’s chief of military operations and detailed a broad surveillance effort to find him.
“The most critical piece” came with a discovery that “provided a vector” for compounds used by Ghul, the document said. After months of investigation, and surveillance by CIA drones, the e-mail from his wife erased any remaining doubt.
Even after Ghul was killed in Mir Ali, the NSA’s role in the drone strike wasn’t done. Although the attack was aimed at “an individual believed to be” the correct target, the outcome wasn’t certain until later when, “through SIGINT, it was confirmed that Hassan Ghul was in fact killed.”
By Greg Miller, Julie Tate and Barton Gellman, Published: October 17
Find this story at 17 October 2013
© The Washington Post Company
‘Back in the business of killing’November 13, 2013
Ever since September 11, the US – with the help of the CIA – has been carrying out a secret war that defies imagination, says New York Times reporter Mark Mazzetti. And it’s not just Washington giving the green light.
The campaign against America’s enemies is silent and precise. Commanders fight without troops. They operate from CIA headquarters in Langley, Virginia – their “troops” in front of computer screens in Nevada or New Mexico. Their weapons are unmanned drones.
“The CIA, over the last 12 years, has very much been back in the business of killing,” said Pulitzer Prize winner Mark Mazzetti in an interview with DW. “Since the September 11 attacks, the CIA has gradually transformed into very much of a paramilitary organization.”
Mark Mazzetti also broke news of the CIA’s destruction of interrogation tapes in 2007
Just released in Germany, “The Way of the Knife: The CIA, a Secret Army, and a War at the Ends of the Earth” contains evidence gathered by the New York Times journalist via interviews with intelligence operatives and politicians. Mazzetti speaks of a military complex catalysed by developments in drone technology.
“It’s the military, it’s the spy services, it’s private companies that have in many ways created this new state where they can carry out these secret missions and secret eavesdropping,” he said.
Blurred boundaries
The new procedural structures followed in the wake of the terror attacks on New York’s World Trade Center and Pentagon which resulted in more than 3,000 deaths. Anti-terrorism legislation enacted under President George W. Bush, Mazzetti says, circumvented earlier prohibitions on targeted killings.
“There’s a whole new world that has emerged since the Spetember 11 attacks,” he said.
Borders between the army and secret service became blurred. Roughly 60 percent of the CIA’s current staff was hired after the 2001 terror attacks. Many of those hires have a simple task: hunting and killing people.
Bush’s successor, Barack Obama, further pursued that policy – with the help of, among other things, a secret agreement with the Pakistani government. Local tribal areas in Pakistan were considered sanctuaries for Taliban fighters in Afghanistan. Since 2004, drones have been flying over such areas and firing rockets at the homes, vehicles and territories of supposed Islamists. Publicly, the Pakistani government has reacted with protests to violations of its sovereign territory. Quietly, Mazzetti says, Pakistan might have endorsed them.
“There are suspicions that privately, they have been giving their approval for the strikes,” he said, “because the US has also gone after enemies of Pakistan.” One example was Taliban leader Nek Mohammed. He became the first official target of CIA drone strikes in Pakistan and his death, Mazzetti says, was a precondition for the US to receive flyover rights for further strikes.
In Yemen, August 2013 saw four strikes in three days, leaving fifteen dead
Drone missions were then expanded – to Yemen as well as Somalia. Resulting mishaps are greeted by silence in Washington. Its successes are celebrated in the media.
Carte blanche from Washington
In certain countries, Washington has given the CIA complete control over drone operations.
“In Pakistan, for instance, the CIA really has the authority to target individuals or groups of individuals without asking the White House’s permission,” Mazzetti said. In countries like Yemen, he added, President Obama has insisted that the White House have more control over the kill list. Those operations are first reviewed by task forces within the White House.
Less controversial are attacks on individuals who have been clearly identified. In “signature attacks,” however, that is not the case.
“Signature strikes are based on patterns of activities. In other words, they look on the ground. They don’t know specifically who these people are, but they suspect they’re doing suspicious activities – they might be trying to cross the border into Afghanistan,” Mazzetti said. “[The CIA] has the authority to carry out a strike.”
Such attacks are controversial – particularly due to the increase in civilian casualties. One of the more notorious cases occurred in March 2011 in Pakistan. More than 40 civilians were killed during a drone attack on a suspected Taliban meeting in North Waziristan, an area considered by the Pakistani government to have been “Talibanized.” The meeting turned out to be an open-air tribal gathering.
Further developments
Over time, Pakistan’s government began turning away from the attacks it once invited. Protests against America’s “killer drones” took place both outside the government and within it.
Only in Pakistan did Obama score lower than presidential candidate Mitt Romney in a pre-election, worldwide survey
Pakistani authorities refer to the latest UN figures citing 330 drone attacks. Approximately 2,200 people are thought to have been killed in those attacks, but according to the Bureau of Investigative Journalism, an independent journalist network based in London, the figures are far higher. Among those killed, 400 were civilians, according to official statements from Pakistan. Another 200 were considered “non-combatants.” The UN has called on the US to release its own statistics on civilian casualties resulting from drone strikes.
“President Obama has indicated, although he doesn’t say it publicly, that these strikes in Pakistan will continue as long as there are American troops in Afghanistan. So that should be at least another year,” Mazzetti said.
It’s a policy Obama will have to clarify with Pakistani Prime Minister Nawaz Sharif, who will be visiting the White House on Wednesday (23.10.2013). It will be equally difficult, Mazzetti says, for the US government to justify arguments against other countries’ use of military drones. In China or Russia, for example, the technology for unmanned warfare is already readily available.
Soon to be weaponized?
For Mazzetti, the idea of the world turning into a “silent battlefield” is as frightening as the role drones might play in day-to-day America in the future.
With police already utilizing drones for criminal investigations, the journalist and author believes that in just five-to-10 years, weaponized drones will be used for domestic crime-fighting.
Date 22.10.2013
Author Antje Passenheim, Washington / cd
Editor Rob Mudge
Find this story at 22 October 2013
© 2013 Deutsche Welle
Meet the Private Companies Helping Cops Spy on ProtestersNovember 13, 2013
Promotional materials for private spy companies show that mass surveillance technology is being sold to police departments as a way to monitor dissent
The documents leaked to media outlets by former NSA contractor Edward Snowden this year have brought national intelligence gathering and surveillance operations under a level of scrutiny not seen in decades. Often left out of this conversation, though, is the massive private surveillance industry that provides services to law enforcement, defense agencies and corporations in the U.S. and abroad – a sprawling constellation of companies and municipalities. “It’s a circle where everyone [in these industries] is benefitting,” says Eric King, lead researcher of watchdog group Privacy International. “Everyone gets more powerful, and richer.”
Promotional materials for numerous private spy companies boast of how law enforcement organizations can use their products to monitor people at protests or other large crowds – including by keeping tabs on individual people’s social media presence. Kenneth Lipp, a journalist who attended the International Association of Chiefs of Police conference in Philadelphia from October 19th to 23rd, tells Rolling Stone that monitoring Twitter and Facebook was a main theme of the week. “Social media was the buzzword,” says Lipp. He says much of the discussion seemed to be aimed at designing policies that wouldn’t trigger potentially limiting court cases: “They want to avoid a warrant standard.”
While the specifics of which police departments utilize what surveillance technologies is often unclear, there is evidence to suggest that use of mass surveillance against individuals not under direct investigation is common. “The default is mass surveillance, the same as NSA’s ‘collect it all’ mindset,” says King. “There’s not a single company that if you installed their product, [it] would comply with what anyone without a security clearance would think is appropriate, lawful use.”
The YouTube page for a company called NICE, for instance, features a highly produced video showing how its products can be used in the event of a protest. “The NICE video analytic suite alerts on an unusually high occupancy level in a city center,” a narrator says as the camera zooms in on people chanting and holding signs that read “clean air” and “stop it now.” The video then shows authorities redirecting traffic to avoid a bottleneck, and promises that all audio and video from the event will be captured and processed almost immediately. “The entire event is then reconstructed on a chronological timeline, based on all multimedia sources,” says the narrator. According to an interview with the head of NICE’s security division published in Israel Gateway, NICE systems are used by New Jersey Transit and at the Statue of Liberty, though it isn’t clear if they are the same products shown in the video.
“Thousands of customers worldwide use NICE Security solutions to keep people safe and protect property,” says Sara Preto, a spokesperson for NICE. She declined to confirm any specific clients, but added: “We work with law enforcement and other government agencies within the framework of all relevant and national laws.”
Another program, made by Bright Planet and called BlueJay, is billed in a brochure to law enforcement as a “Twitter crime scanner.” BlueJay allows cops to covertly monitor accounts and hashtags; three that Bright Planet touts in promotional material are #gunfire, #meth, and #protest. In another promotional document, the company says BlueJay can “monitor large public events, social unrest, gang communications, and criminally predicated individuals,” as well as “track department mentions.” Bright Planet did not respond to a request for comment.
A third company, 3i:Mind, lays out a scenario for a potential law enforcement client that begins: “Perhaps you are tracking an upcoming political rally.” It continues:
Once you set up the OpenMIND™ system to profile and monitor the rally, it will search the web for the event on web pages, social networking sites, blogs, forums and so forth, looking for information about the nature of the rally (e.g. peaceful, violent, participant demographics), try to identify both online and physical world activist leaders and collect information about them, monitor the event in real-time and alert you on user-defined critical developments.
The scenario concludes: “Your insight is distributed to the local police force warning them that the political rally may turn violent and potentially thwarting the violence before it occurs.” The 3i:Mind website gives no clues at to which governments or corporations use their products, and public information on the company is limited, though they have reportedly shown their product at various trade shows and police conferences. The company didn’t respond to a request for comment.
Other companies are less upfront about how their products can be used to monitor social unrest. A product that will be familiar to anyone who attended an Occupy Wall Street protest in or around New York’s Zuccotti Park is SkyWatch, by FLIR, pointed out to Rolling Stone by Lipp, the journalist who attended the police conference. SkyWatch is a mobile tower in the form of a two-person cab that can be raised two stories high to provide “an array of surveillance options,” according to a promotional brochure. Those options include cameras and radar, as well as “customizable” options. The brochure says SkyWatch is perfect for “fluid operations whether on the front lines or at a hometown event.” As of this writing, the NYPD still has a SkyWatch deployed in a corner of Zuccotti Park, where Occupy activists were evicted by the police nearly two years ago.
These promotional materials, taken together, paint a picture not only of local police forces becoming increasingly militarized, but also suggest departments are venturing into intelligence-gathering operations that may go well beyond traditional law enforcement mandates. “Two things make today’s surveillance particularly dangerous: the flood of ‘homeland security’ dollars (in the hundreds of millions) to state and local police for the purchase of spying technologies, and the fact that spook technology is outpacing privacy law,” says Kade Crockford, director of the Massachusetts ACLU’s technology for liberty program and the writer of the PrivacySOS blog, which covers these issues closely. “Flush with fancy new equipment, police turn to communities they have long spied on and infiltrated: low-income and communities of color, and dissident communities.”
Many of the legal questions surrounding these kinds of police tactics remain unsettled, according to Faiza Patel, co-director of the Liberty and National Security program at New York University Law School’s Brennan Center for Justice. Information that is publicly available, like tweets and Facebook posts, is generally not protected by the Fourth Amendment, though legal questions may arise if that information is aggregated on a large scale – especially if that collection is based on political, religious or ethnic grounds. “This information can be useful, but it can also be used in ways that violate the Constitution,” says Patel. “The question is: what are [police departments] using it for?”
Rolling Stone contacted police departments for the cities of New York City, Los Angeles, Chicago, Philadelphia and Washington D.C. for comment on this story.
“The Philadelphia Police Department has their own cameras,” says that force’s spokesperson Jillian Russell. “The department does not have private surveillance companies monitor crime.” She directed follow-up questions about software used to process big data to a deputy mayor’s office, who didn’t return a phone call asking for comment.
When asked if the LAPD uses programs to monitor protesters, a media relations email account sent an unsigned message that simply read: “We are not aware of this.”
The other police departments did not respond to requests for comment.
By JOHN KNEFEL
October 24, 2013 3:16 PM ET
Find this story at 24 October 2013
Copyright ©2013 Rolling Stone
Eskom apologises for spying on NGOsNovember 13, 2013
Nongovernmental organisations (NGO) GroundWork, Earthlife Africa and Greenpeace Africa have agreed to rejoin State-owned power utility Eskom’s NGO forum after the parastatal acknowledged that an investigation into its now-terminated contract with intelligence support services company Swartberg revealed that the firm was “spying” on the environmental groups.
Eskom said in a statement on Monday that security management at the Medupi coal-fired power station, in Limpopo, had entered into the contract with Swartberg to “ensure protection of the Medupi site and to better anticipate threats to personnel and property”, following civil unrest at Medupi in May 2011.
However, following media reports that Swartberg was gathering intelligence from the three organisations, the NGO forum members suspended their participation in February, calling for an investigation by the energy provider.
After terminating the contract with Swartberg, Eskom commissioned independent legal firm Bowman Gilfillan to initiate an investigation, which revealed “concerns” about the way in which the contract was managed.
After disclosing the extent, process and outcome of the investigation to the three affected NGOs, Eskom CEO Brian Dames said the use of private companies to gather intelligence from stakeholders was “unacceptable” and “not how Eskom does business”.
“To the extent that this may have happened as a consequence, even if unintended, is regrettable and Eskom apologises for this,’’ he commented.
The NGOs said in a statement that they believed their key demand for a full internal investigation and a public apology had been met.
“We, therefore, think it is in order to return to the stakeholder forum, where we will continue to engage and, where necessary, challenge Eskom on its energy choices,” they stated.
Eskom said it had, since the outcome of the investigation, taken steps to strengthen internal controls and brought the matter to the attention of the South African Police Service to determine whether any laws were contravened, and if any further action was required.
The group said it would also implement the recommendations made following the investigation, including pursuing disciplinary action against individuals who did not comply with Eskom policies.
Published 11 Nov 2013
Article by: Natalie Greve
Find this story at 11 November 2013
Copyright © Creamer Media (Pty) Ltd
Oil Espionage; How the NSA and GCHQ Spied on OPECNovember 13, 2013
America’s NSA and Britain’s GCHQ are both spying on the OPEC oil cartel, documents from whistleblower Edward Snowden reveal. The security of the global energy supply is one of the most important issues for the intelligence agencies.
Documents disclosed by whistleblower Edward Snowden reveal that both America’s National Security Agency (NSA) and Britain’s Government Communications Headquarters (GCHQ) have infiltrated the computer network of the the Organization of the Petroleum Exporting Countries (OPEC).
In January 2008, the NSA department in charge of energy issues reported it had accomplished its mission. Intelligence information about individual petroleum-exporting countries had existed before then, but now the NSA had managed, for the first time, to infiltrate OPEC in its entirety.
OPEC, founded in 1960, has its headquarters in a box-like building in Vienna. Its main objective is to control the global oil market, and to keep prices high. The 12 member states include Saudi Arabia, Venezuela, Iran and Iraq.
A Treasure Trove of Information
When the NSA used the Internet to infiltrate OPEC’s computers, its analysts discovered an internal study in the OPEC Research Division. It stated that OPEC officials were trying to cast the blame for high oil prices on speculators. A look at files in the OPEC legal department revealed how the organization was preparing itself for an antitrust suit in the United States. And a review of the section reserved for the OPEC secretary general documented that the Saudis were using underhanded tactics, even within the organization. According to the NSA analysts, Riyadh had tried to keep an increase in oil production a secret for as long as possible.
Saudi Arabia’s OPEC governor is also on the list of individuals targeted for surveillance, for which the NSA had secured approval from the secret Foreign Intelligence Surveillance Court. The documents show how careful the Americans were to suspend their surveillance when the Saudi visited the United States. But as soon as he had returned to Riyadh, the NSA analysts began infiltrating his communications once again.
Praise from Department of Energy
According to a 2010 report, one of the analysts’ conclusions was that the Saudis had released incorrect oil production figures. The typical “customers” for such information were the CIA, the US State Department and the Department of Energy, which promptly praised the NSA for confirming what it had suspected for years.
The British, who also targeted OPEC’s Vienna headquarters, were at least as successful as the NSA. A secret GCHQ document dating from 2010 states that the agency had traditionally had “poor access” to OPEC. But that year, after a long period of meticulous work, it had managed to infiltrate the computers of nine OPEC employees by using the “Quantum Insert” method, which then creates a gateway to gain access into OPEC’s computer system. GCHQ analysts were even able to acquire administrator privileges for the OPEC network and gain access to two secret servers containing “many documents of interest.”
OPEC appears in the “National Intelligence Priorities Framework,” which the White House issues to the US intelligence community. Although the organization is still listed as an intelligence target in the April 2013 list, it is no longer a high-priority target. Now that the United States is less dependent on Saudi petroleum, thanks to fracking and new oil discoveries, the fact that OPEC is not identified as a top priority anymore indicates that interest in the organization has declined.
11/11/2013 12:05 AM
By SPIEGEL Staff
Find this story at 11 November 2013
© SPIEGEL ONLINE 2013
Australian spy agency helped BHP negotiate trade dealsNovember 13, 2013
An apology is the least Indonesia can expect from Australia following revelations of electronic spying, according to Greens Senator Scott Ludlam.
BHP was among the companies helped by Australian spy agencies as they negotiated trade deals with Japan, a former Australian Secret Intelligence Service officer says.
A former diplomat has also confirmed Australian intelligence agencies have long targeted Japanese companies. Writing in The Japan Times, Professor Gregory Clark said Australian companies were beneficiaries of intelligence operations.
“In Australia, favoured firms getting spy material on Japanese contract policies and other business negotiations used to joke how [it had] ‘fallen off the back of a truck’,” Professor Clark wrote.
“BHP knew we were giving them secret intelligence. They lapped it up.”
Business information is a main target for [intelligence] agencies, he said. “The targeting is also highly corrupting since the information can be passed on selectively to co-operative firms – often firms that provide employment and cover for spy operatives.”
Professor Clark’s observations are supported by a former Australian Secret Intelligence Service officer who said that commercial information became a priority after the global economic turmoil of the 1970s.
“Suddenly [the Australian government] wanted to know what the demand would be for Australian iron ore and other commodities, and just what price the Japanese were prepared to pay for steel,” the former intelligence officer said.
“We gave market information [to] major companies like BHP which were helpful to us, and officers at overseas stations would trade snippets with some of their commercial contacts … BHP knew we were giving them secret intelligence. They lapped it up.”
The former spy says informal exchanges with business executives were continuing when he retired in the 1990s. More recently, US diplomatic cables obtained by WikiLeaks and published by Fairfax Media in 2011 revealed former BHP Billiton chief executive Marius Kloppers privately offered “to trade confidences” with US officials about China.
”Kloppers has a keen interest in learning everything he can about the Chinese and is not shy about asking us for our impressions,” US Consul-General Michael Thurston reported to Washington in 2009. BHP declined to comment at the time.
The US and Britain have repeatedly denied charges of economic espionage following the disclosures of US intelligence contractor Edward Snowden. Australia says it is longstanding policy not to comment on intelligence matters.
Australian National University international relations expert Dr Michael McKinley said: ”While most countries might have suspicions … the revelation of economic espionage has the potential to be highly embarrassing.”
Professor Clark also highlights the potential for secret intelligence to harm diplomatic relations.
After leaving the Australian foreign service in the mid 1960s because of his opposition to Australia’s participation in the Vietnam War, Professor Clark pursued a distinguished academic career in Japan.
However as an Australian Government consultant he was also involved in policy making on Australian-Japanese relations in 1974-76.
In his memoirs, Professor Clark recalls how “a piece of phoney information from an incompetent ASIS spy in Tokyo desperate to impress superiors” was used by conservative Canberra bureaucrats to stall trade negotiations with Japan during the Whitlam Labor Government.
“[E]ven when it is clear that the information is unreliable and the spies are out of control, it is hard for anyone to complain or disagree,” he says.
November 7, 2013
Philip Dorling
Find this story at 7 November 2013
Copyright © 2013 Fairfax Media
CSEC and Brazil: “Whose interests are being served”? (2013)November 13, 2013
Amusing to see both NaPo and the G&M hosting remarks from former CSIS deputy director Ray Boisvert dismissing the recent Snowden/Greenwald docs which revealed CSEC spied on Brazil’s Mines and Energy Ministry.
Snowden was present at the Five Eyes conference where the CSEC presentation on their Olympia spying program on Brazil took place.
Boisvert in both papers:
“We were all too busy chasing bad guys who can actually kill people. The idea that we spend a lot of time, or any time at all, on a country like Brazil is pretty low margin stuff, not likely to happen.”
The docs probably only represent “a war gaming exercise,” says Boisvert:
“They have to do paper exercises and say, ‘OK, let’s say our target in counter-terrorism lives in Mali and we have to go up against the Malian telecommunications system.’ They’ll go look at another country and say, ‘OK, well they have a similar network so let’s do a paper exercise and say ‘what do we need?’” he said. ‘I think that’s all this was.’”
Because when you’re “busy chasing bad guys who can actually kill people” and stuff, naturally your anti-terrorism war games will entail a cyber-espionage program searching for corporate secrets in a country where 40 of your own country’s mining corporations are operating.
Wouldn’t have anything to do with looking for info on Brazil wanting to block a Canadian mining company from opening the largest open pit gold mine in Brazil, would it? Brazilian prosecutors say the company has failed to study the impact on local Indian communities and has advertised on its own website “plans to build a mine twice the size of the project first described in an environmental assessment it gave state officials.”
Ok, foreign media. The Guardian, today:
Canadian spies met with energy firms, documents reveal
“The Canadian government agency that allegedly hacked into the Brazilian mining and energy ministry has participated in secret meetings in Ottawa where Canadian security agencies briefed energy corporations.
According to freedom of information documents obtained by the Guardian, the meetings – conducted twice a year since 2005 – involved federal ministries, spy and police agencies, and representatives from scores of companies who obtained high-level security clearance.
Meetings were officially billed to discuss ‘threats’ to energy infrastructure but also covered ‘challenges to energy projects from environmental groups,’ ‘cyber security initiatives’ and ‘economic and corporate espionage.’
The documents – heavily redacted agendas – do not indicate that any international espionage was shared by CSEC officials, but the meetings were an opportunity for government agencies and companies to develop ‘ongoing trusting relations’ that would help them exchange information ‘off the record,’ wrote an official from the Natural Resources ministry in 2010.”
Thank you, Enbridge, for providing the snacks for the one in May 2013.
“Keith Stewart, an energy policy analyst with Greenpeace Canada, said: ‘There seems to be no limit to what the Harper government will do to help their friends in the oil and mining industries. They’ve muzzled scientists, gutted environmental laws, reneged on our international climate commitments, labelled environmental critics as criminals and traitors, and have now been caught engaging in economic espionage in a friendly country. Canadians, and our allies, have a right to ask who exactly is receiving the gathered intelligence and whose interests are being served.’”
Good question. And did no Canadian media request these same FOIs?
You know, I think I blogged about government security briefings to energy companies a few years ago — I’ll see if I can find it.
Meanwhile, would be interesting to hear Boisvert’s explanation as to why the CSEC logo appeared on another NSA doc about intercepting phone calls and emails of ministers and diplomats at the 2009 G20 summit in London.
More “paper exercises”? Filling in an empty spot on the page while chasing bad guys?
And re the recent NSA spying on Brazil PM Dilma Rousseff and the state oil company Petrobras: Did CSEC help out its Five Eyes partner there too?
Back in 1983, CSEC spied on two of Margaret Thatcher’s cabinet ministers on behalf of Thatcher and Britain’s spy agency GCHQ, so this wouldn’t exactly be new territory for CSEC.
Fun fact : The annual report on CSEC produced by its independent watchdog commissioner must first be vetted by CSEC “for national security reasons” before it can be released.
P.S. I pillaged the CSEC slide at top from Lux ex Umbra, where you can view the rest of them.
Posted by admin on October 10, 2013 · Leave a Comment
By Alison@Creekside
Find this story at 10 October 2013
Copyright © 2013
Trade Secrets : Is the U.S.’s most advanced surveillance system feeding economic intelligence to American businesses? (1999)November 13, 2013
No one is surprised that the United States uses sophisticated electronic spying techniques against its enemies. But Europeans are increasingly worried about allegations that the U.S. uses those same techniques to gather economic intelligence about its allies.
The most extensive claims yet came this spring in a report written for the European Parliament. The report says that the U.S.
National Security Agency, through an electronic surveillance system called Echelon, routinely tracks telephone, fax, and e-mail transmissions from around the world and passes on useful corporate intelligence to American companies.
Among the allegations: that the NSA fed information to Boeing and McDonnell Douglas enabling the companies to beat out European Airbus Industrie for a $ 6 billion contract; and that Raytheon received information that helped it win a $ 1.3 billion contract to provide radar to Brazil, edging out the French company Thomson-CSF. These claims follow previous allegations that the NSA supplied U.S. automakers with information that helped improve their competitiveness with the Japanese (see “Company Spies,” May/June 1994).
Is there truth to these allegations? The NSA is among the most secretive of U.S. intelligence agencies and won’t say much beyond the fact that its mission is “foreign signals intelligence.” The companies involved all refused to comment.
“Since the NSA’s collection capabilities are so grotesquely powerful, it’s difficult to know what’s going on over there,” says John Pike, an analyst at the watchdog group Federation of American Scientists, who has tracked the NSA for years.
This much is known: The NSA owns one of the largest collections of supercomputers in the world, and it’s an open secret–as documented in the European Parliament report–that Echelon vacuums up massive amounts of data from communications satellites and the Internet and then uses its computers to winnow it down. The system scans communications for keywords–“bomb,” for instance–that might tip off analysts to an interesting topic.
Fueling allegations of corporate espionage is the fact that defense contractors and U.S. intelligence agencies are linked extensively through business relationships. Raytheon, for instance, has large contracts to service NSA equipment, according to the European report.
Englishman Glyn Ford, the European Parliament member who initiated the study, wants the NSA to come clean about its activities in Europe. And the Europeans have some leverage on this issue, if they decide to use it. In a drive to improve surveillance, the United States is pressuring European governments to make telephone companies build eavesdropping capabilities into their new systems. But if that’s what the U.S. wants, says Ford, it’s going to have to be open about what information it’s collecting: “If we are going to leave the keys under the doormat for the United States, we want a guarantee that they’re not going to steal the family silver,” he says.
In the meantime, congressional critics have started to wonder if all that high-powered eavesdropping is limited to overseas snooping. In April, Bob Barr (R-Ga.), a member of the House Government Reform Committee, said he was worried by reports that the NSA was engaged in illicit domestic spying.
“We don’t have any direct evidence from the NSA, since they’ve refused to provide any reports, even when asked by the House Intelligence Committee,” Barr says. “But if in fact the NSA is pulling two million transmissions an hour off of these satellites, I don’t think there’s any way they have of limiting them to non-U.S. citizens.”
Last May, after the NSA stonewalled requests to discuss the issue, Congress amended the intelligence appropriations bill to require the agency to submit a report to Congress. (The bill is still in a conference committee.) And the NSA will face more questions when the Government Reform Committee holds hearings on Echelon and other surveillance programs.
“We ought to prevent any agency from the dragnet approach–where they throw out a net and drag anything in,” Barr says.
Kurt Kleiner
Mother Jones November 1, 1999
Find this story at 1 November 2013
Copyright ©2013 Mother Jones and the Foundation for National Progress.
Moscow Denies U.S.-Based Diplomat Sought Young SpiesNovember 13, 2013
Moscow has angrily denied that one of its diplomats in Washington tried to recruit young Americans to spy for Russian intelligence agencies, calling the allegations a “horror story” reminiscent of the Cold War.
The spy flap centering around the 59-year-old head of a Kremlin-funded cultural exchange program raises the specter of a new dispute rocking already stormy relations between Russia and the U.S.
The FBI is investigating whether Yury Zaitsev, head of the Russian Center for Science and Culture, is a Russian intelligence officer who arranged all-expense-paid trips to Russia aimed at grooming young Americans, including students, political aides, nonprofit sector workers and business executives, according to Mother Jones magazine, which first broke the story.
The Russian Embassy in Washington and Zaitsev himself rejected the allegations and expressed concern that unknown people were trying to ruin efforts by Presidents Barack Obama and Vladimir Putin to mend and expand ties.
“It’s a shame that Russian-American relations periodically echo the Cold War,” Zaitsev, who refused to speak to Mother Jones on the issue, said late Wednesday in an interview with state news agency Itar-Tass. “Someone apparently wants to see the Iron Curtain fall between our two countries once again.”
“This kind of horror story very much resembles the Cold War era,” embassy spokesman Yevgeny Khorishko said in a statement released to Russian media. “A blunt attempt is being made to distort and discredit the activities of the Russian cultural center, which focuses on developing trust and cooperation between our two countries and people.”
He warned that “somebody intends to torpedo” a goal set by Obama and Putin at a Group of Eight summit in June to expand direct contracts between Americans and Russians so as to raise relations to a new level.
But Khorishko vowed that Moscow would not be deterred by the spy allegations. ”The Russian cultural center has been working to expand contacts and improve understanding between Russian and American citizens and will continue to do this work,” he said.
The Russian center is housed in a 1895 mansion purchased by Moscow in 1957. (rccusa.org)
Mother Jones and other U.S. media reported that FBI officials had met with people who traveled to Moscow and St. Petersburg on trips organized by the Russian cultural center and quizzed them on whether Zaitsev worked for Russian intelligence and whether any attempts had been made to recruit them during their stay. The media reports, citing trip participants, said all had denied that the Russians had sought to recruit them.
The FBI refused to comment on whether it had opened an investigation into Zaitsev.
Zaitsev has diplomatic immunity, so U.S. prosecutors could not press charges against him if the FBI were to conclude that he broke the law. But the State Department could withdraw his immunity, forcing the Russian Foreign Ministry to recall him to Moscow.
The cultural center has brought 128 Americans on “short-term, fact-finding trips” to Russia since the exchange program was created under a presidential decree in 2011, according to program information on the center’s website. The global program, which seeks participants aged 25 to 35, has also invited 1,219 people from other countries, including 283 from Europe, 157 from Asia and the Middle East, 29 from Africa and South America and 750 from other former Soviet republics.
About 25 people participated in each trip from the U.S., and they stayed at five-star hotels and met with senior politicians like the mayors of Moscow and St. Petersburg and Federation Council Deputy Speaker Alexander Torshin, Mother Jones said.
Zaitsev, a St. Petersburg native, said in the interview that trip participants were being targeted in a “witch hunt” rooted in a U.S. fear of Russia. “I think it is simply unacceptable that they are ordered to tell what, why, how and why,” he said.
In a reminder of lingering suspicions in both countries, Zaitsev pointed out that the U.S. government also organizes exchange programs that bring young Russians to the United States, and he insisted that his program was as transparent as any of those. “All of the information about our programs and projects is publicly available on our website,” he said.
Zaitsev’s path to Washington is not clear from his organization’s website. He received a doctorate in economics from the Leningrad Technological Institute in 1980 and then worked in several government-run student organizations until the Soviet collapse, according to his online biography. He worked in unspecified “leadership positions in private companies” from 1992 until he was appointed head of the cultural center in July 2010. He is married and has one adult son.
The center’s second floor has a space library focusing on Russian-U.S. cooperation. (rccusa.org)
But Zaitsev faces a formidable task. Relations between the Russia and the U.S. have soured since Putin returned to the presidency last year, with Washington deploring a Kremlin crackdown on the opposition and a ban on U.S. parents adopting Russian children. Moscow for its part has assailed the U.S. Magnitsky blacklist of Russian officials accused of human rights violations.
The tensions have cast a shadow over yearlong events mean to celebrate the 80th anniversary of diplomatic relations.
The Russian cultural center, also known as Rossotrudnichestvo, is “the official home of Russian culture in the United States” and was created in 2001 under a bilateral agreement aimed at fostering relations, according to its website.
It is housed in a 1895 mansion located 20 minutes by foot from the White House that the Soviet government bought in 1957 and used for the embassy’s consular services for 40 years.
The first floor contains the Moscow Room, decorated in cream and gold leaf and with paintings of the Bolshoi Theater, the Kremlin, Moscow State University and Christ the Savior Cathedral; as well as the Hall of Mirrors, with two gala portraits of Peter the Great and Catherine the Great; and the Russian-American Room, with a colorful panorama depicting key moments in Russian-American relations.
The second floor hosts the Pushkin Library, with more than 2,000 books, 300 movies on video and DVD and more than 100 audiobooks; a space library focusing on Russian-U.S. cooperation in space exploration; and classrooms offering Russian-language lessons.
The third floor contains two guest rooms, while the basement has a kitchen that prepares meals for the center’s receptions and offers classes on Russian cuisine.
25 October 2013 | Issue 5242
By Andrew McChesney
Find this story at 25 October 2013
© Copyright 1992-2013. The Moscow Times.
Head of D.C.-based Russian cultural center being investigated as possible spyNovember 13, 2013
The FBI is investigating whether the U.S.-based director of a Russian government-run cultural exchange program was clandestinely recruiting Americans as possible intelligence assets, according to law enforcement officials.
FBI agents have been interviewing Americans who participated in the Rossotrudnichestvo exchange program run by Yury Zaytsev, who also heads the Russian Center for Science and Culture in Washington. For the past 12 years, the program has paid for about 130 Americans to visit Russia.
Latest from National Security
Senior Navy civilians investigated in alleged fraud
Craig Whitlock 2:27 AM ET
Court records show $1.6 million was paid to an auto mechanic who produced rifle silencers for $8,000.
Two admirals face inquiry in Navy bribery scheme
Craig Whitlock NOV 9
The Navy put the pair, including its top intelligence official, on leave and suspended their access to classified material.
After teenager flees to Syria, family fights to bring him back
Michael Birnbaum and Souad Mekhennet NOV 12
A Muslim family living in Germany “kidnaps” the youth, who had jihadi aspirations, close to Syria’s border.
NSA Secrets
Full coverage of the revelations and debate surrounding National Security Agency surveillance programs.
FBI spokeswoman Amy Thoreson declined to comment on whether there was an investigation or to discuss the bureau’s role. A woman who answered the phone at the cultural center said that neither Zaytsev nor the center would comment.
“We know that the boys and girls are speaking,” said the woman, referring to the young Americans who participated in the program and have been interviewed by the FBI. “There are many. But we shall not put out a comment.”
“We are clean and transparent, friendly and true,” said the woman, who did not give her name or title.
The center, at Phelps Place in the Kalorama neighborhood of northwest Washington, offers language lessons and cultural programs, according to its Web site.
A spokesman for the Russian Embassy in Washington denied that the cultural center was involved in the recruitment of spies.
“All such ‘scaring information’ very much resembles Cold War era,” the spokesman, Yevgeniy Khorishko, said in an e-mail. He added that such allegations were being leveled only to “distort and to blacken activities of the Russian Cultural Center.”
The FBI investigation of Zaytsev was first reported by Mother Jones magazine on its Web site.
Law enforcement officials said the FBI is investigating whether Zaytsev and Rossotrudnichestvo have used trips to Russia to recruit Americans. Rossotrudnichestvo paid for all their expenses, including meals, travel, visa fees and lodging. Most of the trips involved about 25 participants, who sometimes stayed in luxury hotels and met with Russian government officials.
Zaytsev did not go on the exchange trips, said one law enforcement official, but he created files on some of the participants, allegedly to cultivate them as future intelligence assets. Law enforcement officials would not comment on whether the FBI has any evidence that Zaytsev was successful in recruiting any assets.
As part of their probe, FBI special agents are trying to interview the Americans who participated in the program, including graduate students, business executives, political aides and nonprofit workers. Rossotrudnichestvo also has cultural exchanges for young people in Europe, Africa, Latin America and Asia.
Richard Portwood, the executive director of the Center for American-Russian Engagement of Emerging Leaders and a participant in the cultural exchange program, said he was interviewed by the FBI this month and was told that Zaytsev was a foreign intelligence officer.
“These revelations came as a total surprise,” Portwood said in a statement. “My sincere hope is that Mr. Zaytsev’s alleged activities do not prevent U.S.-Russia cultural exchanges in the future.”
Portwood, 27, a graduate student at Georgetown University’s School of Foreign Service, said in a telephone interview that he took two trips to Russia through the exchange program, each lasting a little more than a week, in December 2011 and in June 2012. He said the FBI wanted to know what he and others traveling with him did on the trips, whom they met with and whether they saw anything suspicious. Portwood said the trips did not raise any suspicions. But he added: “Cold War spy games have existed for decades between the U.S. and Russia. We’re not naive to that history.”
Zaytsev, who is on a State Department list of foreign mission staff, has diplomatic immunity, according to an administration official. The United States could revoke his immunity, which would force him to return to Russia, a law enforcement official said.
By Sari Horwitz, Published: October 23 E-mail the writer
Nick Anderson contributed to this report.
Find this story at 23 October 2013
© 1996-2013 The Washington Post
FBI Probing Whether Russia Used Cultural Junkets to Recruit American Intelligence AssetsNovember 13, 2013
Did a senior Russian embassy officer set up exchange trips to Moscow to cultivate young, up-and-coming Americans as Russian intelligence assets?
On September 30, Richard Portwood, a 27-year-old Georgetown University graduate student, received a phone call from an FBI agent who said the bureau wanted to meet with him urgently. Portwood didn’t know why the FBI would have any interest in him, but two days later he sat down with a pair of agents at a coffee shop near his apartment. They told him they suspected that Yury Zaytsev, the US director of a Russian government-run cultural exchange program that Portwood had participated in, was a spy.
Since 2001, Zaytsev’s organization, Rossotrudnichestvo, has footed the bill for about 130 young Americans—including political aides, nonprofit advocates, and business executives—to visit Russia. Along with Portwood, Mother Jones has spoken to two other Rossotrudnichestvo participants who were questioned by the FBI about Zaytsev, who also heads the Russian Cultural Center in Washington.
Yury Zaytsev, a Russian diplomat. Multiple sources tell us he is the subject of an extensive FBI investigation. Rossotrudnichestvo
The FBI agents “have been very up front about” their investigation into whether Zaytsev is a Russian intelligence agent, says a 24-year-old nonprofit worker whom the FBI has interviewed twice and who asked not to be identified. The FBI agents, according to this source, said, “We’re investigating Yury for spying activities. We just want to know what interactions you’ve had with him.” The nonprofit worker was shocked. Zaytsev, he says, is “what you imagine when you imagine a Russian diplomat. He’s fairly stoic, tall, pale.” Zaytsev did not travel on the exchange trips he helped arrange, and his contact with the Americans who went on these trips was limited.
The agents who interviewed the Rossotrudnichestvo participants did not tell them what evidence they possessed to support their suspicions. FBI spokeswoman Amy Thoreson declined to confirm or deny the existence of an investigation into Zaytsev or answer any questions about FBI actions regarding the Russian. (The FBI did not ask Mother Jones to withhold this story.) But based on what the bureau’s agents said during the interviews, the Americans who were questioned concluded the FBI suspects that Zaytsev and Rossotrudnichestvo have used the all-expenses-paid trips to Russia in an effort to cultivate young Americans as intelligence assets. (An asset could be someone who actually works with an intelligence service to gather information, or merely a contact who provides information, opinions, or gossip, not realizing it is being collected by an intelligence officer.) The nonprofit worker says the FBI agents told him that Zaytsev had identified him as a potential asset. Zaytsev or his associates, the agents said, had begun to build a file on the nonprofit worker and at least one other Rossotrudnichestvo participant who had been an adviser to an American governor.
Advertise on MotherJones.com
Many countries—including the United States—place spies abroad under diplomatic cover, and it’s common for law enforcement agencies to keep a close eye on foreign diplomats who might be engaged in espionage. The Americans interviewed by the FBI say the agents did not indicate whether they believed Zaytsev had succeeded in developing Americans as assets.
The FBI appears to be mounting an extensive investigation of Zaytsev. The three Americans interviewed by the FBI say the agents told them the bureau is trying to interview every American who has attended these trips. The nonprofit worker says that FBI agents went so far as to contact a married couple, who are Rossotrudnichestvo alums, while they were vacationing in Japan. He says the agents told him they were also scouring flight manifests associated with Rossotrudnichestvo trips for names that showed up repeatedly and could be Zaytsev collaborators.
All three former participants describe their Rossotrudnichestvo experience as a typical cultural exchange program, albeit a ritzy one. The organization paid for meals, travel, lodging, and every other expense associated with the trip, down to the visa fee. During the St. Petersburg leg of a June 2012 trip, participants stayed at the Sokos Hotel Palace Bridge, a luxury hotel that has hosted delegations for the G8 and G20 summits. Participants on that trip met with the governors of Moscow and St. Petersburg and with Aleksander Torshin, a high-ranking member of Vladimir Putin’s United Russia party. Since 2011, Rossotrudnichestvo has organized six trips. Most included about 25 people, although roughly 50 visited Russia during the group’s first trip in December 2011.
The application process for this exchange program is simple. The application form calls for basic personal details—including the applicant’s place of work and job title—copies of the applicant’s passport, and a one-page letter “briefly outlining why you should be selected, why you are interested and what interests you have in collaboration with Russia.” Applicants tend to find the program through referrals. (Portwood has referred about 50 people to Rossotrudnichestvo. To his knowledge, Rossotrudnichestvo never denied any applicants.) The group also offers similar exchanges to young professionals in Asia, Latin America, Africa, and Europe.
When I called the Russian Cultural Center last week, Zaytsev answered. He declined to answer questions about the FBI’s investigation on the phone, but he eagerly invited me to visit him at the center two days later. “I welcome any questions you have for me,” he said. When I arrived, though, Galina Komissarova, a center employee, asked me to leave, saying I hadn’t sent questions in advance as Zaytsev had requested. (He hadn’t.) Komissarova would not disclose her title or role at the center. “I just clean,” she said sternly, showing me the door. I discovered later that Komissarova is Zaytsev’s wife.
Since then, Zaytsev has not replied to written questions or returned repeated phone calls.
A State Department spokeswoman confirms that Zaytsev is on a list of foreign mission staff who have diplomatic immunity. If it chose to, the United States could revoke his immunity, forcing Russia to call him home.
Portwood, who attended Rossotrudnichestvo trips in 2011 and 2012, and the other Americans questioned by the FBI were asked a similar set of questions. The agents wanted to know how they had heard about the exchange program and where in Russia they traveled. They also asked whether participants had encountered any anti-American sentiment on their trip, were offered jobs, or had suspicious interactions with Rossotrudnichestvo afterward. Portwood and the two other participants said they answered “no” to these questions.
According to three Rossotrudnichestvo alums, Zaytsev displayed no suspicious behavior and none developed an ongoing relationship with him after their excursion. For most Rossotrudnichestvo participants, they say, Zaytsev was merely the name on the congratulatory letter they received when they were accepted into the exchange program.
The third participant who spoke to Mother Jones about the exchange program, a 26-year-old resident of Washington, DC, is not surprised by the FBI’s allegations—and doesn’t care whether he was targeted as a possible intelligence asset. “There’s not a single American diplomat anywhere in the American sphere of influence who doesn’t have an open line of communication with the CIA. … [What Zaytsev is doing] is not something that every other single [foreign] cultural center in DC isn’t also doing,” he says. “And that doesn’t bother me. I don’t have a security clearance. I don’t work for an elected official. I run a social enterprise that has absolutely nothing to do with US-Russia relations.”
Rossotrudnichestvo’s most recent Russia trip was scheduled for mid-October and it’s unclear whether or not it went forward as planned. After he was questioned by the FBI, Portwood emailed people he had earlier referred to the organization to inform them of what he learned. His email read, in part: “The FBI disclosed to me that Yury Zaytsev is a Russian Foreign Intelligence officer and a professional spy, acting as the Director of the Russian Cultural Center in Washington, D.C.…only so that he can maintain a residence here in the United States. In fact, the FBI alleges that part of Mr. Zaytsev’s mission is sending young professionals from the United States to Russia as part of a cultural program wherein participants are evaluated and/or assessed for Russian counterintelligence purposes.”
Portwood was disappointed to learn the exchange program may have been a cover for Russian intelligence work. “It passed the smell test,” he says. “But I guess Russia’s Russia, you know?”
UPDATE, 6:00 p.m. EDT, Wednesday October 23: The Russian Embassy provided the following statement in an email to Mother Jones:
All such “scaring information” very much resembles Cold War era. A blunt tentative is made to distort and to blacken activities of the Russian Cultural Center in DC, which are aimed at developing mutual trust and cooperation between our peoples and countries. As a matter of fact, somebody intends to torpedo the guidelines of the Russian and U.S. Presidents, whose Joint Statement in Lough Erne emphasizes the importance of “expanding direct contracts between Americans and Russians that will serve to strengthen mutual understanding and trust and make it possible to raise U.S.-Russian relations to a qualitatively new level”.
Russian Cultural Center has been working to expand contacts and better understanding between Russian and American citizens and will continue this work.
—By Molly Redden
| Wed Oct. 23, 2013 3:00 AM PDT | UPDATED Wed Oct. 23, 2013 3:00 PM PDT
Find this story at 23 October 2013
Copyright ©2013 Mother Jones and the Foundation for National Progress.
KGB ‘recruited’ two politicians as agentsNovember 11, 2013
KGB station chief Ivan Stenin (right) and his successor, Geronty Lazovik, in Canberra in 1971.
A KGB officer ran two Australian federal parliamentarians as Soviet agents in the 1970s, according to a confidential account of ASIO counter-espionage operations during the Cold War.
ASIO also tried to persuade a Russian military intelligence officer to defect by offering him treatment in the US for his stomach cancer.
In an unusually candid document obtained by Fairfax Media, a former senior ASIO officer lists known Soviet intelligence officers in Australia and reveals numerous details of ASIO’s counter-espionage efforts. Much of the information remains classified.
The account by the former counter-espionage specialist confirms that Soviet intelligence was very active in Australia throughout the Cold War and that ASIO’s counter-espionage efforts had only limited success.
Advertisement
The document reveals ASIO’s bid in the 1970s to induce a senior military intelligence officer, Yuriy Ivanovich Stepanenko, to defect.
ASIO offered the Russian, who had stomach cancer, ”the best facilities in the world” at Johns Hopkins Hospital in Baltimore ”if he wanted to jump”.
According to the former ASIO officer, the Russian was “tempted but didn’t live much longer”.
The document also details how ASIO’s bugging operations revealed in the late 1960s and early 1970s that KGB officer Vladimir Aleksandrovich Aleksyev was “running two Australian politicians as agents, using tradecraft of a fairly high order”.
Aleksyev was followed by Vladimir Yevgenyevich Tulayev, “a hard-eyed, well-dressed thug” who, according to declassified ASIO documents, was also “aggressively involved in intelligence operations in Australia”.
Geronty Lazovik, another “definite agent runner”, was much more urbane and developed a wide range of contacts across Federal Parliament by targeting Labor politicians, staffers and lobbyists. However, ASIO director-general Peter Barbour delayed recommending that Tulayev and Lazovik be expelled before the 1972 federal election for fear of triggering political controversy.
Declassified documents show that after the election the new Labor prime minister, Gough Whitlam, was concerned about ASIO’s investigations causing diplomatic embarrassment. Neither KGB officer was expelled and the government suspended ASIO’s phone taps on the Soviet embassy.
Lazovik was reportedly later awarded a medal for his work in Australia. The award was for “allegedly recruiting a top agent in ASIO, Defence or [the Department of Foreign Affairs]”, according to the former ASIO officer.
The document also sheds light on the 1983 Combe-Ivanov affair in which the Hawke Labor government blackballed former Labor national secretary and political lobbyist David Combe because of his involvement with KGB officer Valery Ivanov, who was expelled from Australia.
The former ASIO officer says that Ivanov recruited a cipher clerk in the Indonesian embassy and that ASIO approached the Indonesians to agree to “a joint operation running the cipher clerk back against Ivanov”. However, the proposed double-agent operation had to aborted because of Ivanov’s expulsion.
“The farewell party for Ivanov was bugged and revealing. He had been roundly castigated by [fellow KGB officer] Koshlyakov for going too far, too soon, and wasn’t very happy at that,” the former ASIO officer says.
October 14, 2013
Philip Dorling
Find this story at 14 October 2013
Copyright © 2013 Fairfax Media
Embassy Row: Charges of U.S. spying erupt in AsiaNovember 11, 2013
The U.S. spying scandal is spreading to Asia, where the foreign ministers of Malaysia and Indonesia have chastised American diplomats and publicly denounced the National Security Agency.
Malaysian Foreign Minister Anifah Aman also complained to Australian diplomats after reports that Australian intelligence agencies were cooperating with the NSA.
The Sydney Morning Herald last week reported that the U.S. embassies in Cambodia, Indonesia, Malaysia, Myanmar and Thailand are engaged in electronic surveillance of the governments in those South Asian nations.
Mr. Aman on Friday summoned Lee McClenny, the deputy ambassador at the U.S. Embassy in Malaysia, and Miles Kupa, the Australian ambassador in Kuala Lumpur. Mr. McClenny represented U.S. Ambassador Joseph Y. Yun, who was out of town.
The foreign minister delivered protest notes to each diplomat “in response to the alleged spying activities carried out by the two embassies” in the Malaysian capital.
In Indonesia, Foreign Minister Marty Natalegawa last week complained to Kristen F. Bauer, who has been acting U.S. ambassador since Ambassador ScotMarciel left Jakarta in July.
“Indonesia cannot accept and protests strongly over the report about wiretapping facilities at the U.S. Embassy in Jakarta,” the foreign minister told reporters.
PLAYING BALL
President Obama stepped up to the plate to reward a loyal political supporter who once played outfield for his favorite baseball team, the Chicago White Sox.
Mr. Obama last week nominated Mark D. Gilbert to serve as ambassador to New Zealand.
Mr. Gilbert, who spent only 11 days in the major leagues during the 1985 season, is believed to be the only former professional baseball player to be nominated for such a high rank in the U.S. diplomatic service.
“Baseball is America’s pastime, so what better way to represent the United States overseas than with someone who began his career as a major league baseball player?” State Department spokeswoman Marie Harf told The Associated Press.
Mr. Gilbert, a 57-year-old bank executive and former Obama fundraiser, played in only seven games for the White Sox before he was sent back to a minor league team in Buffalo, N.Y. He also served two terms as deputy finance chairman of the Democratic National Committee.
By James Morrison
The Washington Times
Sunday, November 3, 2013
Find this story at 3 November 2013
© Copyright 2013 The Washington Times, LLC.
Listening post revealed on Cocos IslandsNovember 11, 2013
Australia’s electronic spy agency is intercepting Indonesian naval and military communications through a secret radio listening post on the remote Cocos Islands.
According to former defence officials, the Defence Signals Directorate runs the signals interception and monitoring base on Australia’s Indian Ocean territory, 1100 kilometres south-west of Java.
Along with the better-known Shoal Bay Receiving Station near Darwin, the previously unreported Cocos Island facility forms a key part of Australia’s signals intelligence efforts targeting Indonesia.
Known locally as ”the house without windows”, it includes radio monitoring and direction-finding equipment and a satellite ground station. But the station is of little help in combating people smuggling, according to the former intelligence officers.
The station has never been publicly acknowledged by the government, nor previously reported in the media, despite operating for more than two decades.
The Defence Department would not comment, and said only that it hosts ”a communications station” that formed part of the wider defence communications network.
But former defence officers have confirmed that the station is a Defence Signals Directorate facility devoted to maritime and military surveillance, especially Indonesian naval, air force and military communications.
Google Earth imagery of the property, discreetly placed amid coconut palm groves on the south-east part of West Island, shows four cleared areas each with radio mast sets, including a 44-metre-wide ”circularly disposed antenna array” for high-frequency and very high-frequency radio direction finding.
Australian National University intelligence expert Des Ball said the facility was operated remotely from the Defence Signals Directorate headquarters at Russel Hill, in Canberra. Intercepted signals are encrypted and relayed to Canberra.
He said preparations for the Cocos station began in the late 1980s, and involved a highly secretive signals intelligence group, the Royal Australian Air Force’s No. 3 Telecommunications Unit.
In the face of what it described as ”extremely challenging logistics”, an Adelaide-based company, Australian Satellite Communication, then installed a communications satellite earth station at the facility.
The Cocos Island signals intelligence station forms part of broad Australian espionage efforts directed at the Indonesian government.
As reported by Fairfax Media on Thursday, these programs include a covert Defence Signals Directorate surveillance facility at the Australian embassy in Jakarta. One former defence intelligence officer said Australia’s monitoring of Indonesian communications was ”very effective” and allowed assessments of the seriousness of Indonesian efforts to combat people smuggling.
But the former intelligence officer said the Cocos and Shoal Bay facilities were of ”limited utility” in finding vessels carrying asylum seekers that avoided using radios or satellite phones until they contacted the Australian Maritime Safety Authority.
Richard Tanter, of the Nautilus Institute of Security and Sustainability, said the Cocos Islands station was likely to be intercepting increasing volumes of naval and military communications.
”With the increasing Australian and US interest in the Indian Ocean region, it is likely to become more important,” he said.
Date: November 01 2013
Philip Dorling
Find this story at 1 November 2013
Copyright © 2013
Fairfax Media
<< oudere artikelen nieuwere artikelen >>