• Buro Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, de overheid in Nederland en Europa kritisch volgt. Een grond-rechten kollektief dat al 30 jaar publiceert over uitbreiding van repressieve wetgeving, publiek-private samenwerking, bevoegdheden, overheids-optreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Pfc. Bradley E. Manning’s Statement for the Providence Inquiry

    For more information on the lack of public and press access to United States v. Pfc. Manning, visit the Center for Constitutional Rights, which filed a petition requesting the Army Court of Criminal Appeals (ACCA) “to order the Judge to grant the public and press access to the government’s motion papers, the court’s own orders, and transcripts of proceedings, none of which have been made public to date.”

    The statement below was read by Private First Class Bradley E. Manning at the providence inquiry for his formal plea of guilty to one specification under Article 92 with a substituted time frame for the offense, and nine specifications for lesser included offenses under Article 134. He pled not guilty to 12 other specifications. This transcript was taken by journalist Alexa O’Brien at the Article 39(a) session of United States v. Pfc. Bradley Manning on February 28, 2013 at Fort Meade, MD, USA.

    UPDATE

    Judge Lind: Pfc. Manning you may read your statement.

    Pfc. Bradley Manning: Yes, your Honor. I wrote this statement in the confinement facility. Start now. The following facts are provided in support of the providence inquiry for my court martial, United States v. Pfc. Bradley E. Manning.

    Personal Facts.

    I am a twenty-five year old Private First Class in the United States Army currently assigned to Headquarters and Headquarters Company, HHC, US Army Garrison (USAG), Joint Base Myer, Henderson Hall, Fort Meyer, Virginia.

    My [exodus?] assignment I was assigned to HHC, 2nd Brigade Combat Team, 10th Mountain Division at Fort Drum, NY. My primary military occupational specialty or MOS is 35 Foxtrot intelligence analyst. I entered active duty status on 2 October 2007. I enlisted with the hope of obtaining both real world experience and earning benefits under the GI Bill for college opportunities.

    Facts regarding my position as an intelligence analyst.

    In order to enlist in the Army I took the Standard Armed Services Aptitude Battery or [ASVAB?]. My score on this battery was high enough for me to qualify for any enlisted MOS position. My recruiter informed me that I should select an MOS that complimented my interests outside the military. In response, I told him that I was interested in geopolitical matters and information technology. He suggested that I consider becoming an intelligence analyst.

    After researching the intelligence analyst position, I agreed that this would be a good fit for me. In particular, I enjoyed the fact that an analyst could use information derived from a variety of sources to create work products that informed the command of its available choices for determining the best course of action or COA’s. Although the MOS required working knowledge of computers, it primarily required me to consider how raw information can be combined with other available intelligence sources in order to create products that assisted the command in its situational awareness or SA.

    I accessed that my natural interest in geopolitical affairs and my computer skills would make me an excellent intelligence analyst. After enlisting I reported to the Fort Meade military entrance processing station on 1 October 2007. I then traveled to and reported at Fort Leonard Wood, Missouri on 2 October 2007 to begin basic combat training or BCT.

    Once at Fort Leonard Wood I quickly realized that I was neither physically nor mentally prepared for the requirements of basic training. My BCT experience lasted six months instead of the normal ten weeks. Due to medical issues, I was placed on a hold status. A physical examination indicated that I sustained injuries to my right soldier and left foot.

    Due to those injuries I was unable to continue ‘basic’. During medical hold, I was informed that I may be out processed from the Army, however, I resisted being chaptered out because I felt that I could overcome my medical issues and continue to serve. On 2[8 or 20?] January 2008, I returned to basic combat training. This time I was better prepared and I completed training on 2 April 2008.

    I then reported for the MOS specific Advanced Individual Training or AIT on 7 April 2008. AIT was an enjoyable experience for me. Unlike basic training where I felt different from the other soldiers, I fit in and did well. I preferred the mental challenges of reviewing a large amount of information from various sources and trying to create useful or actionable products. I especially enjoyed the practice of analysis through the use of computer applications and methods that I was familiar with.

    I graduated from AIT on 16 August 2008 and reported to my first duty station, Fort Drum, NY on 28 August 2008. As an analyst, Significant Activities or SigActs were a frequent source of information for me to use in creating work products. I started working extensively with SigActs early after my arrival at Fort Drum. My computer background allowed me to use the tools of organic to the Distributed Common Ground System-Army or D6-A computers to create polished work products for the 2nd Brigade Combat Team chain of command.

    The non-commissioned officer in charge, or NCOIC, of the S2 section, then Master Sergeant David P. Adkins recognized my skills and potential and tasked me to work on a tool abandoned by a previously assigned analyst, the incident tracker. The incident tracker was viewed as a back up to the Combined Information Data Network Exchange or CIDNE and as a unit, historical reference to work with.

    In the months preceding my upcoming deployment, I worked on creating a new version of the incident tracker and used SigActs to populate it. The SigActs I used were from Afghanistan, because at the time our unit was scheduled to deploy to the Logar and Wardak Provinces of Afghanistan. Later my unit was reassigned to deploy to Eastern Baghdad, Iraq. At that point, I removed the Afghanistan SigActs and switched to Iraq SigActs.

    As and analyst I viewed the SigActs as historical data. I believed this view is shared by other all-source analysts as well. SigActs give a first look impression of a specific or isolated event. This event can be an improvised explosive device attack or IED, small arms fire engagement or SAF, engagement with a hostile force, or any other event a specific unit documented and recorded in real time.

    In my perspective the information contained within a single SigAct or group of SigActs is not very sensitive. The events encapsulated within most SigActs involve either enemy engagements or causalities. Most of this information is publicly reported by the public affairs office or PAO, embedded media pools, or host nation (HN) media.

    As I started working with SigActs I felt they were similar to a daily journal or log that a person may keep. They capture what happens on a particular day in time. They are created immediately after the event, and are potentially updated over a period of hours until final version is published on the Combined Information Data Network Exchange. Each unit has its own Standard Operating Procedure or SOP for reporting and recording SigActs. The SOP may differ between reporting in a particular deployment and reporting in garrison.

    In garrison, a SigAct normally involves personnel issues such as driving under the influence or DUI incidents or an automobile accident involving the death or serious injury of a soldier. The reports starts at the company level and goes up to the battalion, brigade, and even up to the division level.

    In deployed environment a unit may observe or participate in an event and a platoon leader or platoon sergeant may report the event as a SigAct to the company headquarters and through the radio transmission operator or RTO. The commander or RTO will then forward the report to the battalion battle captain or battle non-commissioned officer or NCO. Once the battalion battle captain or battle NCO receives the report they will either (1) notify the battalion operations officer or S3; (2) conduct an action, such as launching a quick reaction force; or (3) record the event and report– and further report it up the chain of command to the brigade.

    The reporting of each event is done by radio or over the Secret Internet Protocol Router Network or SIPRNet, normally by an assigned soldier, usually junior enlisted E-4 and below. Once the SigAct is recorded, the SigAct is further sent up the chain of command. At each level, additional information can either be added or corrected as needed. Normally within 24 to 48 hours, the updating and reporting or a particular SigAct is complete. Eventually all reports and SigActs go through the chain of command from brigade to division and division to corps. At corps level the SigAct is finalized and [missed word].

    The CIDNE system contains a database that is used by thousands of Department of Defense– DoD personnel– including soldiers, civilians, and contractors support. It was the United States Central Command or CENTCOM reporting tool for operational reporting in Iraq and Afghanistan. Two separate but similar databases were maintained for each theater– CIDNE-I for Iraq and CIDNE-A for Afghanistan. Each database encompasses over a hundred types of reports and other historical information for access. They contain millions of vetted and finalized directories including operational intelligence reporting.

    CIDNE was created to collect and analyze battle-space data to provide daily operational and Intelligence Community (IC) reporting relevant to a commander’s daily decision making process. The CIDNE-I and CIDNE-A databases contain reporting and analysis fields for multiple disciplines including Human Intelligence or HUMINT reports, Psychological Operations or PSYOP reports, Engagement reports, Counter Improvised Explosive Device or CIED reports, SigAct reports, Targeting reports, Social and Cultural reports, Civil Affairs reports, and Human Terrain reporting.

    As an intelligence analyst, I had unlimited access to the CIDNE-I and CIDNE-A databases and the information contained within them. Although each table within the database is important, I primarily dealt with HUMINT reports, SigAct reports, and Counter IED reports, because these reports were used to create a work product I was required to published as an analyst.

    In working on an assignment I looked anywhere and everywhere for information. As an all-source analyst, this was something that was expected. The D6-A systems had databases built in, and I utilized them on a daily basis. This simply was– the search tools available on the D6-A systems on SIPRNet such as Query Tree and the DoD and Intellink search engines.

    Primarily, I utilized the CIDNE database using the historical and HUMINT reporting to conduct my analysis and provide a back up for my work product. I did statistical analysis on historical data including SigActs to back up analysis that were based on HUMINT reporting and produce charts, graphs, and tables. I also created maps and charts to conduct predictive analysis based on statistical trends. The SigAct reporting provided a reference point for what occurred and provided myself and other analysts with the information to conclude possible outcome.

    Although SigAct reporting is sensitive at the time of their creation, their sensitivity normally dissipates within 48 to 72 hours as the information is either publicly released or the unit involved is no longer in the area and not in danger.

    It is my understanding that the SigAct reports remain classified only because they are maintained within CIDNE– because it is only accessible on SIPRnet. Everything on CIDNE-I and CIDNE-A to include SigAct reporting was treated as classified information.

    Facts regarding the storage of SigAct Reports.

    As part of my training at Fort Drum, I was instructed to ensure that I create back ups of my work product. The need to create back ups was particularly acute given the relative instability and reliability of the computer systems we used in the field during deployment. These computer systems included both organic and theater provided equipment (TPE) D6-A machines.

    The organic D6-A machines we brought with us into the field on our deployment were Dell [missed word] laptops and the TPE D6-A machines were Alienware brand laptops. The [M90?] D6-A laptops were the preferred machine to use as they were slightly faster and had fewer problems with dust and temperature than the theater provided Alienware laptops. I used several D6-A machines during the deployment due to various technical problems with the laptops.

    With these issues several analysts lost information, but I never lost information due to the multiple backups I created. I attempted to backup as much relevant information as possible. I would save the information so that I or another analyst could quickly access it whenever a machine crashed, SIPRnet connectivity was down, or I forgot where the data was stored.

    When backing up information I would do one or all of the following things based on my training:

    [(1)] Physical back up. I tried to keep physical back up copies of information on paper so that the information could be grabbed quickly. Also, it was easier to brief from hard copies of research and HUMINT reports.

    (2) Local drive back up. I tried to sort out information I deemed relevant and keep complete copies of the information on each of the computers I used in the Temporary Sensitive Compartmented Information Facility or T-SCIF, including my primary and secondary D6-A machines. This was stored under my user profile on the desktop.

    [(3)] Shared drive backup. Each analyst had access to a ‘T’ drive– what we called ‘T’ drive shared across the SIPRnet. It allowed others to access information that was stored on it. S6 operated the ‘T’ drive.

    [(4)] Compact disk rewritable or CD-RW back up. For larger datasets I saved the information onto a re-writable disk, labeled the disks, and stored them in the conference room of the T-SCIF. This redundancy permitted us the ability to not worry about information loss. If the system crashed, I could easily pull the information from a my secondary computer, the ‘T’ drive, or one of the CD-RWs.

    If another analyst wanted to access my data, but I was unavailable she could find my published products directory on the ‘T’ drive or on the CD-RWs. I sorted all of my products or research by date, time, and group; and updated the information on each of the storage methods to ensure that the latest information was available to them.

    During the deployment I had several of the D6-A machines crash on me. Whenever one of the a computer crashed, I usually lost information but the redundancy method ensured my ability to quickly restore old backup data and add my current information to the machine when it was repaired or replaced.

    I stored the backup CD-RW with larger datasets in the conference room of the T-SCIF or next to my workstation. I marked the CD-RWs based on the classification level and its content. Unclassified CD-RWs were only labeled with the content type and not marked with classification markings. Early on in the deployment, I only saved and stored the SigActs that were within or near our operational environment.

    Later I thought it would be easier to just to save all of the SigActs onto a CD-RW. The process would not take very long to complete and so I downloaded the SigActs from CIDNE-I onto a CD-RW. After finishing with CIDNE-I, I did the same with CIDNE-A. By retrieving the CIDNE-I and CIDNE-A SigActs I was able to retrieve the information whenever I needed it, and not rely upon the unreliable and slow SIPRnet connectivity needed to pull. Instead, I could just find the CD-RW and open up a pre-loaded spreadsheet.

    This process began in late December 2009 and continued through early January 2010. I could quickly export one month of the SigAct data at a time and download in the background as I did other tasks.

    The process took approximately a week for each table. After downloading the SigAct tables, I periodically updated them, by pulling only the most recent SigActs and simply copying them and pasting them into the database saved on the CD-RW. I never hid the fact that I had downloaded copies of both the SigAct tables from CIDNE-I and CIDNE-A. They were stored on appropriately labeled and marked CD-RWs, stored in the open.

    I viewed the saved copies of the CIDNE-I and CIDNE-A SigAct tables as being for both for my use and the use of anyone within the S2 section during the SIPRnet connectivity issues.

    In addition to the SigAct tables, I had a large repository of HUMINT reports and Counter IED reports downloaded from CIDNE-I. These contained reports that were relevant to the area in and around our operational environment in Eastern Baghdad and the Diyala Province of Iraq.

    In order to compress the data to fit onto a CD-RW, I used a compression algorithm called ‘bzip2’. The program used to compress the data is called ‘WinRAR’. WinRAR is an application that is free, and can be easily downloaded from the internet via the Non-Secure Internet Relay Protocol Network or NIPRnet. I downloaded WinRAR on NIPRnet and transferred it to the D6-A machine user profile desktop using a CD-RW. I did not try to hide the fact that I was downloading WinRAR onto my SIPRnet D6-A machine or computer.

    With the assistance of the bzip2 compression algorithm using the WinRAR program, I was able to fit all of the SigActs onto a single CD-RW and relevant HUMINT and Counter IED reports onto a separate CD-RW.

    Facts regarding my knowledge of the WikiLeaks Organization or WLO.

    I first became vaguely aware of the WLO during my AIT at Fort Huachuca, Arizona, although I did not fully pay attention until the WLO released purported Short Messaging System or SMS messages from 11 September 2001 on 25 November 2009. At that time references to the release and the WLO website showed up in my daily Google news open source search for information related to US foreign policy.

    The stories were about how WLO published about approximately 500,000 messages. I then reviewed the messages myself and realized that the posted messages were very likely real given the sheer volume and detail of the content.

    After this, I began conducting research on WLO. I conducted searches on both NIPRnet and SIPRnet on WLO beginning in late November 2009 and early December 2009. At this time I also began to routinely monitor the WLO website. In response to one of my searches in December 2009, I found the United States Army Counter Intelligence Center or USACIC report on the WikiLeaks organization. After reviewing the report, I believed that this report was possibly the one that my AIT referenced in early 2008.

    I may or may not have saved the report on my D6-A workstation. I know I reviewed the document on other occasions throughout early 2010, and saved it on both my primary and secondary laptops. After reviewing the report, I continued doing research on WLO. However, based upon my open-source collection, I discovered information that contradicted the 2008 USACIC report including information that indicated that similar to other press agencies, WLO seemed to be dedicated to exposing illegal activities and corruption.

    WLO received numerous award and recognition for its reporting activities. Also, in reviewing the WLO website, I found information regarding US military SOPs for Camp Delta at Guantanamo Bay, Cuba and information on the then outdated rules of engagement for ROE in Iraq for cross-border pursuits of former members of Saddam Hussein [missed word] government.

    After seeing the information available on the WLO website, I continued following it and collecting open source information from it. During this time period, I followed several organizations and groups including wire press agencies such as the Associated Press and Reuters and private intelligence agencies including Strategic Forecasting or Stratfor. This practice was something I was trained to do during AIT, and was something that good analysts were expected to do.

    During the searches of WLO, I found several pieces of information that I found useful in my work product– in my work as an analyst, specifically I recall WLO publishing documents related to weapons trafficking between two nations that affected my OP. I integrated this information into one or more of my work products.

    In addition to visiting the WLO website, I began following WLO using Instant Relay Chat or IRC Client called ‘XChat’ sometime in early January 2010.

    IRC is a protocol for real time internet communications by messaging and conferencing, colloquially referred to as chat rooms or chats. The IRC chat rooms are designed for group communication discussion forums. Each IRC chat room is called a channel– similar to a television where you can tune in or follow a channel– so long as it is open and does not require an invite.

    Once you joining a specific IRC conversation, other users in the conversation can see that you have joined the room. On the Internet there are millions of different IRC channels across several services. Channel topics span a range of topics covering all kinds of interests and hobbies. The primary reason for following WLO on IRC was curiosity– particularly in regards to how and why they obtained the SMS messages referenced above. I believed that collecting information on the WLO would assist me in this goal.

    Initially I simply observed the IRC conversations. I wanted to know how the organization was structured, and how they obtained their data. The conversations I viewed were usually technical in nature but sometimes switched to a lively debate on issues the particular individual may have felt strongly about.

    Over a period of time I became more involved in these discussions especially when conversations turned to geopolitical events and information technology topics, such as networking and encryption methods. Based on these observations, I would describe the WL organization as almost academic in nature. In addition to the WLO conversations, I participated in numerous other IRC channels across at least three different networks. The other IRC channels I participated in normally dealt with technical topics including with Linux and Berkley Secure Distribution BSD operating systems or OS’s, networking, encryption algorithms and techniques, and other more political topics, such as politics and [missed word].

    I normally engaged in multiple IRC conversations simultaneously– mostly publicly, but often privately. The XChat client enabled me to manage these multiple conversations across different channels and servers. The screen for XChat was often busy, but its screens enabled me to see when something was interesting. I would then select the conversation and either observe or participate.

    I really enjoyed the IRC conversations pertaining to and involving the WLO, however, at some point in late February or early March of 2010, the WLO IRC channel was no longer accessible. Instead, regular participants of this channel switched to using the Jabber server. Jabber is another internet communication [missed word] similar but more sophisticated than IRC.

    The IRC and Jabber conversations, allowed me to feel connected to others even when alone. They helped me pass the time and keep motivated throughout the deployment.

    Facts regarding the unauthorized storage and disclosure of the SigActs.

    As indicated above I created copies of the CIDNE-I and CIDNE-A SigAct tables as part of the process of backing up information. At the time I did so, I did not intend to use this information for any purpose other than for back up. However, I later decided to release this information publicly. At that time, I believe and still believe that these tables are two of the most significant documents of our time.

    On 8 January 2010, I collected the CD-RW I stored in the conference room of the T-SCIF and placed it into the cargo pocket of my ACU or Army Combat Uniform. At the end of my shift, I took the CD-RW out of the T-SCIF and brought it to my Containerized Housing Unit of CHU. I copied the data onto my personal laptop. Later at the beginning of my shift, I returned the CD-RW back to the conference room of the T-SCIF. At the time I saved the SigActs to my laptop, I planned to take them with me on mid-tour leave and decide what to do with them.

    At some point prior to my mid-tour leave, I transferred the information from my computer to a Secure Digital memory card from for my digital camera. The SD card for the camera also worked on my computer and allowed me to store the SigAct tables in a secure manner for transport.

    I began mid-tour leave on 23 January 2010, flying from Atlanta, Georgia to Reagan National Airport in Virginia. I arrived at the home of my aunt, Debra M. Van Alstyne, in Potomac, Maryland and quickly got into contact with my then boyfriend, Tyler R. Watkins. Tyler, then a student at Brandeis University in Waltham, Massachusetts, and I made plans for me to visit him [the] Boston, Massachusetts area.

    I was excited to see Tyler and planned on talking to Tyler about where our relationship was going and about my time in Iraq. However, when I arrived in the Boston area Tyler and I seemed to become distant. He did not seem very excited about my return from Iraq. I tried talking to him about our relationship but he refused to make any plans.

    I also tried to raising the topic of releasing the CIDNE-I and CIDNE-A SigAct tables to the public. I asked Tyler hypothetical questions about what he would do if he had documents that he thought the public needed access to. Tyler really didn’t really have a specific answer for me. He tried to answer the questions and be supportive, but seemed confused by the question in this and its context.

    I then tried to be more specific, but he asked too many questions. Rather than try to explain my dilemma, I decided to just to drop the conversation. After a few days in Waltham, I began to feel really bad feeling that I was over staying my welcome, and I returned to Maryland. I spent the remainder of my time on leave in the Washington, DC area.

    During this time a blizzard bombarded the mid-atlantic, and I spent a significant period of time essentially stuck in my aunt’s house in Maryland. I began to think about what I knew and the information I still had in my possession. For me, the SigActs represented the on the ground reality of both the conflicts in Iraq and Afghanistan.

    I felt that we were risking so much for people that seemed unwilling to cooperate with us, leading to frustration and anger on both sides. I began to become depressed with the situation that we found ourselves increasingly mired in year after year. The SigActs documented this in great detail and provide a context of what we were seeing on the ground.

    In attempting to conduct counter-terrorism or CT and counter-insurgency COIN operations we became obsessed with capturing and killing human targets on lists and not being suspicious of and avoiding cooperation with our Host Nation partners, and ignoring the second and third order effects of accomplishing short-term goals and missions. I believe that if the general public, especially the American public, had access to the information contained within the CIDNE-I and CIDNE-A tables this could spark a domestic debate on the role of the military and our foreign policy in general as well as it related to Iraq and Afghanistan.

    I also believed the detailed analysis of the data over a long period of time by different sectors of society might cause society to reevaluate the need or even the desire to even to engage in counterterrorism and counterinsurgency operations that ignore the complex dynamics of the people living in the effected environment everyday.

    At my aunt’s house I debated what I should do with the SigActs– in particular whether I should hold on to them– or expose them through a press agency. At this point I decided that it made sense to try to expose the SigAct tables to an American newspaper. I first called my local newspaper, The Washington Post, and spoke with a woman saying that she was a reporter. I asked her if The Washington Post would be interested in receiving information that would have enormous value to the American public.

    Although we spoke for about five minutes concerning the general nature of what I possessed, I do not believe she took me seriously. She informed me that The Washington Post would possibly be interested, but that such decisions were made only after seeing the information I was referring to and after consideration by the senior editors.

    I then decided to contact the largest and most popular newspaper, The New York Times. I called the public editor number on The New York Times website. The phone rang and was answered by a machine. I went through the menu to the section for news tips. I was routed to an answering machine. I left a message stating I had access to information about Iraq and Afghanistan that I believed was very important. However, despite leaving my Skype phone number and personal email address, I never received a reply from The New York Times.

    I also briefly considered dropping into the office for the Political Commentary blog, Politico, however the weather conditions during my leave hampered my efforts to travel. After these failed efforts I had ultimately decided to submit the materials to the WLO. I was not sure if the WLO would actually publish these the SigAct tables [missed a few words]. I was also concerned that they might not be noticed by the American media. However, based upon what I read about the WLO through my research described above, this seemed to be the best medium for publishing this information to the world within my reach.

    At my aunt’s house I joined in on an IRC conversation and stated I had information that needed to be shared with the world. I wrote that the information would help document the true cost of the wars in Iraq and Afghanistan. One of the individuals in the IRC asked me to describe the information. However, before I could describe the information another individual pointed me to the link for the WLO website’s online submission system. After ending my IRC connection, I considered my options one more time. Ultimately, I felt that the right thing to do was to release the SigActs.

    On 3 February 2010, I visited the WLO website on my computer and clicked on the submit documents link. Next I found the submit your information online link and elected to submit the SigActs via the onion router or TOR anonymizing network by a special link. TOR is a system intended to provide anonymity online. The software routes internet traffic through a network of servers and other TOR clients in order to conceal the user’s location and identity.

    I was familiar with TOR and had it previously installed on a computer to anonymously monitor the social media websites of militia groups operating within central Iraq. I followed the prompts and attached the compressed data files of CIDNE-I and CIDNE-A SigActs. I attached a text file I drafted while preparing to provide the documents to The Washington Post. It provided rough guidelines saying ‘It’s already been sanitized of any source identifying information. You might need to sit on this information– perhaps 90 to 100 days to figure out how best to release such a large amount of data and to protect its source. This is possibly one of the more significant documents of our time removing the fog of war and revealing the true nature of twenty-first century asymmetric warfare. Have a good day.’

    After sending this, I left the SD card in a camera case at my aunt’s house in the event I needed it again in the future. I returned from mid-tour leave on 11 February 2010. Although the information had not yet been publicly published by the WLO, I felt this sense of relief by them having it. I felt I had accomplished something that allowed me to have a clear conscience based upon what I had seen and read about and knew were happening in both Iraq and Afghanistan everyday.

    Facts regarding the unauthorized storage and disclosure of 10 Reykjavik 13.

    I first became aware of the diplomatic cables during my training period in AIT. I later learned about the Department of State or DoS Net-centric Diplomacy NCD portal from the 2/10 Brigade Combat Team S2, Captain Steven Lim. Captain Lim sent a section wide email to the other analysts and officers in late December 2009 containing the SIPRnet link to the portal along with the instructions to look at the cables contained within them and to incorporate them into our work product.

    Shortly after this I also noticed the diplomatic cables were being reported to in products from the corps level US Forces Iraq or USF-I. Based upon Captain Lim’s direction to become familiar with its contents, I read virtually every published cable concerning Iraq.

    I also began scanning the database and reading other random cables that piqued my curiosity. It was around this time– in early to mid-January of 2010, that I began searching the database for information on Iceland. I became interested in Iceland due to the IRC conversations I viewed in the WLO channel discussing an issue called Icesave. At this time I was not very familiar with the topic, but it seemed to be a big issue for those participating in the conversation. This is when I decided to investigate and conduct a few searches on Iceland and find out more.

    At the time, I did not find anything discussing the Icesave issue either directly or indirectly. I then conducted an open source search for Icesave. I then learned that Iceland was involved in a dispute with the United Kingdom and the Netherlands concerning the financial collapse of one or more of Iceland’s banks. According to open source reporting much of the public controversy involved the United Kingdom’s use of anti-terrorism legislation against Iceland in order to freeze Icelandic access assets for payment of the guarantees for UK depositors that lost money.

    Shortly after returning from mid-tour leave, I returned to the Net Centric Diplomacy portal to search for information on Iceland and Icesave as the topic had not abated on the WLO IRC channel. To my surprise, on 14 February 2010, I found the cable 10 Reykjavik 13, which referenced the Icesave issue directly.

    The cable published on 13 January 2010 was just over two pages in length. I read the cable and quickly concluded that Iceland was essentially being bullied diplomatically by two larger European powers. It appeared to me that Iceland was out viable options and was coming to the US for assistance. Despite the quiet request for assistance, it did not appear that we were going to do anything.

    From my perspective it appeared that we were not getting involved due to the lack of long term geopolitical benefit to do so. After digesting the contents of 10 Reykjavik 13 I debated on whether this was something I should send to the WLO. At this point the WLO had not published or acknowledged receipt of the CIDNE-I and CIDNE-A SigAct tables. Despite not knowing that if the SigActs were a priority for the WLO, I decided the cable was something that would be important and I felt that I would I might be able to right a wrong by having them publish this document. I burned the information onto a CD-RW on 15 February 2010, took it to my CHU, and saved it onto my personal laptop.

    I navigated to the WLO website via a TOR connection like before and uploaded the document via the secure form. Amazingly, when WLO published 10 Reykjavik 13 within hours, proving that the form worked and that they must have received the SigAct tables.

    Facts regarding the unauthorized storage and disclosure of the 12 July 2007 aerial weapons team or AW team video.

    During the mid-February 2010 time frame the 2nd Brigade Combat Team, 10th Mountain Division targeting analyst , then Specialist Jihrleah W. Showman and others discussed a video that Ms. Showman had found on the ‘T’ drive.

    The video depicted several individuals being engaged by an aerial weapons team. At first I did not consider the video very special, as I have viewed countless other war porn type videos depicting combat. However, the recording of audio comments by the aerial weapons team crew and the second engagement in the video of an unarmed bongo truck troubled me.

    As Showman and a few other analysts and officers in the T-SCIF commented on the video and debated whether the crew violated the rules of engagement or ROE in the second engagement, I shied away from this debate, instead conducting some research on the event. I wanted to learn what happened and whether there was any background to the events of the day that the event occurred, 12 July 2007.

    Using Google I searched for the event by its date by its and general location. I found several news accounts involving two Reuters employees who were killed during the aerial weapon team engagement. Another story explained that Reuters had requested for a copy of the video under the Freedom of Information Act or FOIA. Reuters wanted to view the video in order to be able to understand what had happened and to improve their safety practices in combat zones. A spokesperson for Reuters was quoted saying that the video might help avoid the reoccurrence of the tragedy and believed there was a compelling need for the immediate release of the video.

    Despite the submission of the FOIA request, the news account explained that CENTCOM replied to Reuters stating that they could not give a time frame for considering a FOIA request and that the video might no longer exist. Another story I found written a year later said that even though Reuters was still pursuing their request, they still did not receive a formal response or written determination in accordance with FOIA.

    The fact neither CENTCOM or Multi National Forces Iraq or MNF-I would not voluntarily release the video troubled me further. It was clear to me that the event happened because the aerial weapons team mistakenly identified Reuters employees as a potential threat and that the people in the bongo truck were merely attempting to assist the wounded. The people in the van were not a threat but merely ‘good samaritans’. The most alarming aspect of the video to me, however, was the seemly delightful bloodlust they appeared to have.

    They dehumanized the individuals they were engaging and seemed to not value human life by referring to them as quote “dead bastards” unquote and congratulating each other on the ability to kill in large numbers. At one point in the video there is an individual on the ground attempting to crawl to safety. The individual is seriously wounded. Instead of calling for medical attention to the location, one of the aerial weapons team crew members verbally asks for the wounded person to pick up a weapon so that he can have a reason to engage. For me, this seems similar to a child torturing ants with a magnifying glass.

    While saddened by the aerial weapons team crew’s lack of concern about human life, I was disturbed by the response of the discovery of injured children at the scene. In the video, you can see that the bongo truck driving up to assist the wounded individual. In response the aerial weapons team crew– as soon as the individuals are a threat, they repeatedly request for authorization to fire on the bongo truck and once granted they engage the vehicle at least six times.

    Shortly after the second engagement, a mechanized infantry unit arrives at the scene. Within minutes, the aerial weapons team crew learns that children were in the van and despite the injuries the crew exhibits no remorse. Instead, they downplay the significance of their actions, saying quote “Well, it’s their fault for bringing their kid’s into a battle” unquote.

    The aerial weapons team crew members sound like they lack sympathy for the children or the parents. Later in a particularly disturbing manner, the aerial weapons team crew verbalizes enjoyment at the sight of one of the ground vehicles driving over a body– or one of the bodies. As I continued my research, I found an article discussing the book, The Good Soldiers, written by Washington Post writer David Finkel.

    In Mr. Finkel book, he writes about the aerial weapons team attack. As, I read an online excerpt in Google Books, I followed Mr. Finkel’s account of the event belonging to the video. I quickly realize that Mr. Finkel was quoting, I feel in verbatim, the audio communications of the aerial weapons team crew.

    It is clear to me that Mr. Finkel obtained access and a copy of the video during his tenure as an embedded journalist. I was aghast at Mr. Finkel’s portrayal of the incident. Reading his account, one would believe the engagement was somehow justified as ‘payback’ for an earlier attack that lead to the death of a soldier. Mr. Finkel ends his account of the engagement by discussing how a soldier finds an individual still alive from the attack. He writes that the soldier finds him and sees him gesture with his two forefingers together, a common method in the Middle East to communicate that they are friendly. However, instead of assisting him, the soldier makes an obscene gesture extending his middle finger.

    The individual apparently dies shortly thereafter. Reading this, I can only think of how this person was simply trying to help others, and then he quickly finds he needs help as well. To make matter worse, in the last moments of his life, he continues to express his friendly gesture– his friendly intent– only to find himself receiving this well known gesture of unfriendliness. For me it’s all a big mess, and I am left wondering what these things mean, and how it all fits together , and it burdens me emotionally.

    I saved a copy of the video on my workstation. I searched for and found the rules of engagement, the rules of engagement annexes, and a flow chart from the 2007 time period– as well as an unclassified Rules of Engagement smart card from 2006. On 15 February 2010 I burned these documents onto a CD-RW, the same time I burned the 10 Reykjavik 13 cable onto a CD-RW. At the time, I placed the video and rules for of engagement information onto my personal laptop in my CHU. I planned to keep this information there until I redeployed in Summer of 2010. I planned on providing this to the Reuters office in London to assist them in preventing events such as this in the future.

    However, after the WLO published 10 Reykjavik 13 I altered my plans. I decided to provide the video and the rules of engagement to them so that Reuters would have this information before I re-deployed from Iraq. On about 21 February 2010, I as described above, I used the WLO submission form and uploaded the documents. The WLO released the video on 5 April 2010. After the release, I was concern about the impact of the video and how it would be received by the general public.

    I hoped that the public would be as alarmed as me about the conduct of the aerial weapons team crew members. I wanted the American public to know that not everyone in Iraq and Afghanistan are targets that needed to be neutralized, but rather people who were struggling to live in the pressure cooker environment of what we call asymmetric warfare. After the release I was encouraged by the response in the media and general public, who observed the aerial weapons team video. As I hoped, others were just as troubled– if not more troubled that me by what they saw.

    At this time, I began seeing reports claiming that the Department of Defense and CENTCOM could not confirm the authenticity of the video. Additionally, one of my supervisors, Captain Casey Fulton, stated her belief that the video was not authentic. In her response, I decided to ensure that the authenticity of the video would not be questioned in the future. On 25 February 2010, I emailed Captain Fulton a link to the video that was on our ‘T’ drive, and a copy of the video published by WLO that was collected by the Open Source Center, so she could compare them herself.

    Around this time frame, I burned a second CD-RW containing the aerial weapons team video. In order to made it appear authentic, I placed a classification sticker and wrote Reuters FOIA REQ on its face. I placed the CD-RW in one of my personal CD cases containing a set of ‘Starting Out in Arabic’ CD’s. I planned on mailing out the CD-RW to Reuters after our I re-deployed , so they could have a copy that was unquestionably authentic.

    Almost immediately after submitting the aerial weapons team video and the rules of engagement documents I notified the individuals in the WLO IRC to expect an important submission. I received a response from an individual going by the handle of ‘ox’ ‘office’– at first our conversations were general in nature, but over time as our conversations progressed, I accessed assessed this individual to be an important part of the WLO.

    Due to the strict adherence of anonymity by the WLO, we never exchanged identifying information. However, I believe the individual was likely Mr. Julian Assange [he pronounced it with three syllables], Mr. Daniel Schmidt, or a proxy representative of Mr. Assange and Schmidt.

    As the communications transferred from IRC to the Jabber client, I gave ‘ox’ ‘office’ and later ‘pressassociation’ the name of Nathaniel Frank in my address book, after the author of a book I read in 2009.

    After a period of time, I developed what I felt was a friendly relationship with Nathaniel. Our mutual interest in information technology and politics made our conversations enjoyable. We engaged in conversation often. Sometimes as long as an hour or more. I often looked forward to my conversations with Nathaniel after work.

    The anonymity that was provided by TOR and the Jabber client and the WLO’s policy allowed me to feel I could just be myself, free of the concerns of social labeling and perceptions that are often placed upon me in real life. In real life, I lacked a closed friendship with the people I worked with in my section, the S2 section.

    In my section, the S2 section and supported battalions and the 2nd Brigade Combat Team as a whole. For instance, I lacked close ties with my roommate to his discomfort regarding my perceived sexual orientation. Over the next few months, I stayed in frequent contact with Nathaniel. We conversed on nearly a daily basis and I felt that we were developing a friendship.

    Conversations covered many topics and I enjoyed the ability to talk about pretty much everything anything, and not just the publications that the WLO was working on. In retrospect I realize that that these dynamics were artificial and were valued more by myself than Nathaniel. For me these conversations represented an opportunity to escape from the immense pressures and anxiety that I experienced and built up through out the deployment. It seems that as I tried harder to fit in at work, the more I seemed to alienate my peers and lose the respect, trust, and support I needed.

    Facts regarding the unauthorized storage and disclosure of documents related to the detainments by the Iraqi Federal Police or FP, and the Detainee Assessment Briefs, and the USACIC United States Army Counter Intelligence Center report.

    On 27 February 2010, a report was received from a subordinate battalion. The report described an event in which the Federal Police or FP detained 15 individuals for printing anti-Iraqi literature. On 2 March 2010, I received instructions from an S3 section officer in the 2nd Brigade Combat Team, 10th Mountain Division Tactical Operation Center or TOC to investigate the matter, and figure out who these quote ‘bad guys’ unquote were and how significant this event was for the Federal Police.

    Over the course of my research I found that none of the individuals had previous ties to anti-Iraqi actions or suspected terrorist militia groups. A few hours later, I received several photos from the scene– from the subordinate battalion. They were accidentally sent to an officer on a different team on than the S2 section and she forwarded them to me.

    These photos included picture of the individuals, pallets of unprinted paper and seized copies of the final printed material or the printed document; and a high resolution photo of the printed material itself. I printed up one [missed word] copy of a high resolution photo– I laminated it for ease of use and transfer. I then walked to the TOC and delivered the laminated copy to our category two interpreter.

    She reviewed the information and about a half an hour later delivered a rough written transcript in English to the S2 section. I read the transcript and followed up with her, asking her for her take on the content. She said it was easy for her to transcribe verbatim, since I blew up the photograph and laminated it. She said the general nature of the document was benign. The documentation, as I had sensed as well, was merely a scholarly critique of the then current Iraqi Prime Minister Nouri al-Maliki.

    It detailed corruption within the cabinet of al-Maliki’s government and the financial impact of his corruption on the Iraqi people. After discovering this discrepancy between the Federal Police’s report and the interpreter’s transcript, I forwarded this discovery to the top OIC and the battle NCOIC. The top OIC and the overhearing battle captain informed me that they didn’t need or want to know this information anymore. They told me to quote “drop it” unquote and to just assist them and the Federal Police in finding out, where more of these print shops creating quote “anti-Iraqi literature” unquote.

    I couldn’t believe what I heard and I returned to the T-SCIF and complained to the other analysts and my section NCOIC about what happened. Some were sympathetic, but no one wanted to do anything about it.

    I am the type of person who likes to know how things work. And, as an analyst, this means I always want to figure out the truth. Unlike other analysts in my section or other sections within the 2nd Brigade Combat Team, I was not satisfied with just scratching the surface and producing canned or cookie cutter assessments. I wanted to know why something was the way it was, and what we could to correct or mitigate a situation.

    I knew that if I continued to assist the Baghdad Federal Police in identifying the political opponents of Prime Minister al-Maliki, those people would be arrested and in the custody of the Special Unit of the Baghdad Federal Police and very likely tortured and not seen again for a very long time– if ever.

    Instead of assisting the Special Unit of the Baghdad Federal Police, I decided to take the information and expose it to the WLO, in the hope that before the upcoming 7 March 2010 election, they could generate some immediate press on the issue and prevent this unit of the Federal Police from continuing to crack down on political opponents of al-Maliki.

    On 4 March 2010, I burned the report, the photos, the high resolution copy of the pamphlet, and the interpreter’s hand written transcript onto a CD-RW. I took the CD-RW to my CHU and copied the data onto my personal computer. Unlike the times before, instead of uploading the information through the WLO website’s submission form. I made a Secure File Transfer Protocol or SFTP connection to a file drop box operated by the WLO.

    The drop box contained a folder that allowed me to upload directly into it. Saving files into this directory, allowed anyone with log in access to the server to view and download them. After uploading these files to the WLO, on 5 March 2010, I notified Nathaniel over Jabber. Although sympathetic, he said that the WLO needed more information to confirm the event in order for it to be published or to gain interest in the international media.

    I attempted to provide the specifics, but to my disappointment, the WLO website chose not to publish this information. At the same time, I began sifting through information from the US Southern Command or SOUTHCOM and Joint Task Force Guantanamo, Cuba or JTF-GTMO. The thought occurred to me– although unlikely, that I wouldn’t be surprised if the individuals detainees detained by the Federal Police might be turned over back into US custody– and ending up in the custody of Joint Task Force Guantanamo.

    As I digested through the information on Joint Task Force Guantanamo, I quickly found the Detainee Assessment Briefs or DABs. I previously came across the documents before in 2009 but did not think much about them. However, this time I was more curious in during this search and I found them again.

    The DABs were written in standard DoD memorandum format and addressed the commander US SOUTHCOM. Each memorandum gave basic and background information about a specific detainee held at some point by Joint Task Force Guantanamo. I have always been interested on the issue of the moral efficacy of our actions surrounding Joint Task Force Guantanamo. On the one hand, I have always understood the need to detain and interrogate individuals who might wish to harm the United States and our allies, however, I felt that’s what we were trying to do at Joint Task Force Guantanamo.

    However, the more I became educated on the topic, it seemed that we found ourselves holding an increasing number of individuals indefinitely that we believed or knew to be innocent, low level foot soldiers that did not have useful intelligence and would be released if they were still held in theater.

    I also recall that in early 2009 the, then newly elected president, Barack Obama, stated that he would close Joint Task Force Guantanamo, and that the facility compromised our standing over all, and diminished our quote ‘moral authority’ unquote.

    After familiarizing myself with the Detainee Assessment Briefs, I agree. Reading through the Detainee Assessment Briefs, I noticed that they were not analytical products, instead they contained summaries of tear line versions of interim intelligence reports that were old or unclassified. None of the DABs contained the names of sources or quotes from tactical interrogation reports or TIR’s. Since the DABs were being sent to the US SOUTHCOM commander, I assessed that they were intended to provide a very general background information on each of the detainees and not a detailed assessment.

    In addition to the manner in which the DAB’s were written, I recognized that they were at least several years old, and discussed detainees that were already released from Joint Task Force Guantanamo. Based on this, I determined that the DABs were not very important from either an intelligence or a national security standpoint. On 7 March 2010, during my Jabber conversation with Nathaniel, I asked him if he thought the DABs were of any use to anyone.

    Nathaniel indicated, although he did not believe that they were of political significance, he did believe that they could be used to merge into the general historical account of what occurred at Joint Task Force Guantanamo. He also thought that the DAB’s might be helpful to the legal counsel of those currently and previously held at JTF-GTMO.

    After this discussion, I decided to download the data DABs. I used an application called Wget to download the DABs. I downloaded Wget off of the NIPRnet laptop in the T-SCIF, like other programs. I saved that onto a CD-RW, and placed the executable in my ‘My Documents’ directory on of my user profile, on the D6-A SIPRnet workstation.

    On 7 March 2010, I took the list of links for the Detainee Assessment Briefs, and Wget downloaded them sequentially. I burned the data onto a CD-RW, and took it into my CHU, and copied them to my personal computer. On 8 March 2010, I combined the Detainee Assessment Briefs with the United States Army Counterintelligence Center report on the WLO, into a compressed [missed word] IP or zip file. Zip files contain multiple files which are compressed to reduce their size.

    After creating the zip file, I uploaded the file onto their cloud drop box via Secure File Transfer Protocol. Once these were uploaded, I notified Nathaniel that the information was in the ‘x’ directory, which had been designated for my own use. Earlier that day, I downloaded the USACIC report on WLO.

    As discussed about above, I previously reviewed the report on numerous occasions and although I saved the document onto the work station before, I could not locate it. After I found the document again, I downloaded it to my work station, and saved it onto the same CD-RW as the Detainee Assessment Briefs described above.

    Although my access included a great deal of information, I decided I had nothing else to send to WLO after sending the Detainee Assessment Briefs and the USACIC report. Up to this point I had sent them the following: the CIDNE-I and CIDNE-A SigActs tables; the Reykjavik 13 Department of State Cable; the 12 July 2007 aerial weapons team video and the 2006-2007 rules of engagement documents; the SigAct report and supporting documents concerning the 15 individuals detained by the Baghdad Federal Police; the USSOUTHCOM and Joint Task Force Guantanamo Detainee Assessment Briefs; a USACIC report on the WikiLeaks organization website.

    Over the next few weeks I did not send any additional information to the WLO. I continued to converse with Nathaniel over the Jabber client and in the WLO IRC channel. Although I stopped sending documents to WLO, no one associated with the WLO pressured me into giving more information. The decisions that I made to send documents and information to the WLO and the website were my own decisions, and I take full responsibility for my actions.

    Facts regarding the unauthorized storage and disclosure of other Government documents.

    One 22 March 2010, I downloaded two documents. I found these documents over the course of my normal duties as an analyst. Based on my training and the guidance of my superiors, I look at as much information as possible.

    Doing so provided me with the ability to make connections that others might miss. On several occasions during the month of March, I accessed information from a government entity. I read several documents from a section within this government entity. The content of two of these documents upset me greatly. I had difficulty believing what this section was doing.

    On 22 March 2010, I downloaded the two documents that I found troubling. I compressed them into a zip file named blah.zip and burned them onto a CD-RW. I took the CD-RW to my CHU and saved the file to my personal computer.

    I uploaded the information to the WLO website using the designated prompts.

    Facts regarding the unauthorized storage and disclosure of the Net Centric Diplomacy Department of State cables.

    In late March of 2010, I received a warning over Jabber from Nathaniel, that the WLO website would be publishing the aerial weapons team video. He indicated that the WLO would be very busy and the frequency and intensity of our Jabber conversations decrease significantly. During this time, I had nothing but work to distract me.

    I read more of the diplomatic cables published on the Department of State Net Centric Diplomacy server. With my insatiable curiosity and interest in geopolitics I became fascinated with them. I read not only the cables on Iraq, but also about countries and events that I found interesting.

    The more I read, the more I was fascinated with by the way that we dealt with other nations and organizations. I also began to think that the documented backdoor deals and seemingly criminal activity that didn’t seem characteristic of the de facto leader of the free world.

    Up to this point, during the deployment, I had issues I struggled with and difficulty at work. Of the documents release, the cables were the only one I was not absolutely certain couldn’t harm the United States. I conducted research on the cables published on the Net Centric Diplomacy, as well as how Department of State cables worked in general.

    In particular, I wanted to know how each cable was published on SIRPnet via the Net Centric Diplomacy. As part of my open source research, I found a document published by the Department of State on its official website.

    The document provided guidance on caption markings for individual cables and handling instructions for their distribution. I quickly learned the caption markings clearly detailed the sensitivity level of the Department of State cables. For example, NODIS or No Distribution was used for messages at the highest sensitivity and were only distributed to the authorized recipients.

    The SIPDIS or SIPRnet distribution caption was applied only to recording of other information messages that were deemed appropriate for a release for a wide number of individuals. According to the Department of State guidance for a cable to have the SIPDIS [missed word] caption, it could not include other captions that were intended to limit distribution.

    The SIPDIS caption was only for information that could only be shared with anyone with access to SIPRnet. I was aware that thousands of military personnel, DoD, Department of State, and other civilian agencies had easy access to the tables. The fact that the SIPDIS caption was only for wide distribution made sense to me, given that the vast majority of the Net Centric Diplomacy Cables were not classified.

    The more I read the cables, the more I came to the conclusion that this was the type of information that– that this type of information should become public. I once read a and used a quote on open diplomacy written after the First World War and how the world would be a better place if states would avoid making secret pacts and deals with and against each other.

    I thought these cables were a prime example of a need for a more open diplomacy. Given all of the Department of State cables information that I read, the fact that most of the cables were unclassified, and that all the cables have a SIPDIS caption, I believe that the public release of these cables would not damage the United States; however, I did believe that the cables might be embarrassing, since they represented very honest opinions and statements behind the backs of other nations and organizations.

    In many ways these cables are a catalogue of cliques and gossip. I believed exposing this information might make some within the Department of State and other government entities unhappy. On 22 March 2010, I began downloading a copy of the SIPDIS cables using the program Wget, described above.

    I used instances of the Wget application to download the Net Centric Diplomacy cables in the background. As I worked on my daily tasks, the Net Centric Diplomacy cables were downloaded from 28 March 2010 to 9 April 2010. After downloading the cables, I saved them onto a CD-RW.

    These cables went from the earliest dates in Net Centric Diplomacy to 28 February 2010. I took the CD-RW to my CHU on 10 April 2010. I sorted the cables on my personal computer, compressed them using the bzip2 compression algorithm described above, and uploaded them to the WLO via designated drop box described above.

    On 3 May 2010, I used Wget to download and update of the cables for the months of March 2010 and April 2010 and saved the information onto a zip file and burned it to a CD-RW. I then took the CD-RW to my CHU and saved those to my computer. I later found that the file was corrupted during the transfer. Although I intended to re-save another copy of these cables, I was removed from the T-SCIF on 8 May 2010 after an altercation.

    Facts regarding the unauthorized storage and disclosure of Garani, Farah Province Afghanistan 15-6 Investigation and Videos.

    [NB Pfc. Manning plead ‘not guilty’ to the Specification 11, Charge II for the Garani Video as charged by the government, which alleged as November charge date. Read more here.]

    In late March 2010, I discovered a US CENTCOM directly on a 2009 airstrike in Afghanistan. I was searching CENTCOM for information I could use as an analyst. As described above, this was something that myself and other analysts and officers did on a frequent basis. As I reviewed the documents I recalled the incident and what happened. The airstrike occurred in the Garani village in the Farah Province, Northwestern Afghanistan. It received worldwide press coverage during the time as it was reported that up to 100 to 150 Afghan civilians– mostly women and children– were accidentally killed during the airstrike.

    After going through the report and the [missed word] annexes, I began to review the incident as being similar to the 12 July 2007 aerial weapons team engagements in Iraq. However, this event was noticeably different in that it involved a significantly higher number of individuals, larger aircraft and much heavier munitions. Also, the conclusions of the report are even more disturbing than those of the July 2007 incident.

    I did not see anything in the 15-6 report or its annexes that gave away sensitive information. Rather, the investigation and its conclusions helped explain how this incident occurred, and were– what those involved should have done, and how to avoid an event like this from occurring again.

    After investigating the report and its annexes, I downloaded the 15-6 investigation, PowerPoint presentations, and several other supporting documents to my D6-A workstation. I also downloaded three zip files containing the videos of the incident. I burned this information onto a CD-RW and transferred it to the personal computer in my CHU. I did later that day or the next day– I uploaded the information to the WLO website this time using a new version of the WLO website submission form.

    Unlike other times using the submission form above, I did not activate the TOR anonymizer. Your Honor, this concludes my statement and facts for this providence inquiry.

    __________

    UPDATE: On March 2, 2013, I went through each line of the rush transcript published here on March 1 to check it for accuracy and inadvertent typos or misspellings.

    Since multiple news outlets have printed the rush transcript that was originally published here; every single amendment made during this review– including non-substantive typos– are noted with a strike-through and/or highlighted.

    When I first published the rush transcript of Manning’s statement, I had noted under “Facts regarding the unauthorized storage and disclosure of the 12 July 2007 aerial weapons team or AW team video” that the handle of the individual who Manning said he interacted with was ‘office’ and not ‘ox’.

    When Guardian journalist, Ed Pilkington, approached me to ask for permission to publish the rush transcript on the guardian.co.uk, we had a quick conversation concerning the fact that both he and a Wired journalist had noted the handle was ‘ox’ and not ‘office’.

    Because of the overriding need to publish Manning’s statement as soon as possible, and my being back in Court at Fort Meade during our exchange after having worked through the night to get a rush transcript completed and published, I quickly deferred to consensus and amended ‘office’ to ‘ox’.

    After reviewing my rush transcript line-by-line, however, I stand by my original notation of the handle as ‘office’, and not ‘ox’. I have amended the transcript above to reflect that determination.
    Categories: Bradley Manning, WikiLeaks

    By Alexa O’Brien on February 28, 2013 11:59 AM |

    Find this story at 28 February 2013

    Senior Met officer quizzed by MPs over undercover police – as it happened

    Metropolitan police’s Patricia Gallan gives evidence to MPs following Guardian revelations about undercover policing – along with victims’ lawyers and reporter Paul Lewis

    The identities of an estimated 80 dead children have been used by undercover police. A police operative who used the alias Pete Black to spy on protest groups explains how they did it

    Hello and welcome to live coverage of the Commons home affairs select committee’s hearing into the Guardian’s revelations about undercover policing.

    Patricia Gallan, a deputy assistant commissioner in charge of the Metropolitan police’s investigation into the controversy, faces questions from MPs about the scandal, which this week widened to include the stealing by police of the identities of dead children.

    Before Gallan appears, the public hearing will begin at 3.15pm with evidence from solicitors for women who feel they were duped into having relationships with undercover officers. Eleven women are currently bringing legal action against the Metropolitan police for damages. The lawyers appearing before the committee today are:

    • Harriet Wistrich, solicitor, Birnberg Peirce & Partners
    • Jules Carey, solicitor, Tuckers Solicitors
    • Marian Ellingworth, solicitor, Tuckers Solicitors

    Also speaking will be my colleague Paul Lewis, who along with fellow Guardian reporter Rob Evans two years ago broke the story that led to these hearings when they reported that police officer Mark Kennedy had lived for seven years undercover in the environmental protest movement, establishing sexual relationships with activists during the course of his work. One woman was his girlfriend for six years.

    Lewis and Evans went on to report that, of nine undercover police identified by the Guardian over the past two years, eight were believed to have slept with the people they were spying on. In at least three cases, relationships between police and the women they were spying on resulted in the birth of children.

    Kennedy will also give evidence today – but in private.

    In a further development, this week Lewis and Evans reported that police secretly authorised undercover officers to steal the identities of around 80 dead children over three decades. (Kennedy is not thought to have done this.) In this video, a police operative who used the alias Pete Black to spy on protest groups explains how they did it.

    Keith Vaz, the chair of the home affairs committee, has said he is “shocked” at the “gruesome” practice, and has said the police should inform parents whose children’s identities were used. Scotland Yard has announced an investigation into the controversy, and has said the practice is not “currently” authorised. Lord Macdonald, the former director of public prosecutions, has called for a public inquiry into undercover policing following the revelations.

    We’ll be covering the hearing live here, and you can watch it on the parliament website.
    Updated at 3.21pm GMT
    3.21pm GMT

    The committee seems to be running late – or the live broadcast is not working. Apologies.
    Updated at 3.30pm GMT
    3.36pm GMT

    The live stream has begun. Sorry for the delay.
    3.38pm GMT

    Keith Vaz, the committee chair, says the committee has sat in private to take evidence from witnesses.

    Now the lawyers are here to speak in public.

    He starts with the issue of police using dead children’s identity.

    Lawyer Jules Carey says he has been instructed by one family whose son Rod Richardson’s name was used by an undercover police officer, who infiltrated various political groups.
    Updated at 3.38pm GMT
    3.39pm GMT

    Carey says his client wants to understand why he child’s name was used. He says he is also representing a number of women who are concerned that such operations are still carrying on.

    He says he has submitted a written complaint to the police, which he believes is the complaint that has triggered a police investigation.
    3.40pm GMT

    Vaz asks lawyer Harriet Wistrich if there is any justification for police to use undercover tactics.

    She says there is no justification for them to use sex in their work.

    That is the issues she is concerned with: the “overwhelming damage” that has been caused.

    All the women involved have been “very, very seriously psychologically harmed” as a result of what the police did to them, Wistrich says.

    The police were aware of this, she says.
    3.46pm GMT

    Vaz quotes from Mr Justice Tugendhat’s recent judgment about undercover police, in which the judge used James Bond as context for police using sex during undercover work.

    Wistrich asks what controls we can put on undercover police.

    She says MPs could not have meant sexual relationships to have been part of the Regulation of Investigatory Practices Act.

    Does the law need to be changed, Vaz asks lawyer Marian Ellingworth.

    Ellingworth says sex should not be sanctioned.

    Carey says RIPA cannot approve sexual relationships. The structure of the act does not envisage sexual relationships, he says. The words “personal and other relationships” cannot have been meant to include sex – they are too vague for that.

    You cannot legislate to breach a fundamental right such as “bodily integrity”, Carey says.
    3.49pm GMT

    Tory Lorraine Fullbrook asks what the absolute legal limit should be on undercover police officers’ behaviours.

    Wistrich says you have to completely stop before a sexual relationship.

    Fullbrook tries to pin her down on the “absolute legal limit”, but Wistrich says that depends on the circumstances.

    Vaz says Fullbrook is looking for a list of what is and isn’t acceptable.

    Wistrich says again there are circumstances when different things are acceptable – for example to stop a child trafficking ring.

    Carey says undercover officers shouldn’t be deployed unless it’s necessary and proportionate – political groups wouldn’t be covered, he says.
    3.51pm GMT

    Tory Michael Ellis repeats Tugendhat’s point that undercover policing wouldn’t surprise the public.

    These kind of sexual relationships “probably happen more often to men” than to women, he claims, citing the example of Mata Hari.

    He accuses the lawyers of wanting to tie the police’s hands unreasonably.
    3.54pm GMT

    Wistrich says using sex in this way is massively beyond the bounds of a civilised society.

    Labour’s Bridget Phillipson asks if police were directed to form these relationships or did so of their own volition.

    Ellingworth says the police won’t even confirm that the men in question were undercover officers, let alone say whether they were following orders.

    Wistrich says the police have not yet tried to come up with a circumstance that they say are justified.

    Phillipson asks if female officers have had relationships with men.

    Carey says they are aware of one female officer who has been deployed in this way. None of the lawyers are instructed by males.

    Wistrich says there are always exceptions, but this is really a form of “institutionalised sexism”.

    The impact is massively upon women, she says.
    3.57pm GMT

    Labour’s David Winnick asks if it’s naive to believe the police were not aware sexual relationships were taking place involving undercover officers.

    Wistrich says she believes they were, officially or unofficially.

    Carey says there is a striking similarity in terms of how many of these relationships started and ended. Many of their clients felt these relationships were entered into by design by the officers. That suggests senior officers were aware of it.

    Carey says the public would expect police officers to behave like James Bond if we lived in a world full of Dr Nos. But we don’t, he says.

    There is no necessity for these actions, Carey says.
    3.59pm GMT

    Winnick raises the adopting of the names of dead children. Was this authorised?

    Wistrich says she felt this would have been authorised.

    Winnick asks if the lawyers consider that a particularly despicable act.

    Carey says every aspect of this policing operation is “utterly depraved”. It’s very hard to quantify particular aspects.

    “It’s utterly despicable,” says Wistrich.

    Ellingworth agrees.
    4.02pm GMT

    Labour’s Chris Ruane asks how the police can be held to account here.

    Wistrich says that’s what the lawyers are aiming to do.

    They have met with “a complete barrage of obstacles” from the police. The police have asked for information from them but given none in return.

    Wistrich says she has written to the IPCC, which is supervising an investigation into some of these issues, but got no response.

    Ruane asks what the key questions that need to be answered. Wistrich suggests:

    Why were the police involved in these people’s lives? What information did they gather? How can this be stopped from happening in the future?
    4.05pm GMT

    Carey says the principal question he would ask is whether they have read the nine principles of policing from 1828.

    He reads one out: the police’s actions depend on public approval of those actions.

    They’ve lost public respect through these actions, Carey says.

    Tory Mark Reckless asks whether the deception by the officers means the sex they had with activists was non-consensual.

    Wistrich says that’s a very good point. She’s written to the CPS but got no reply.

    Vaz asks for copies of all these letters.

    Carey says he is representing a client who had a child from one of these relationships.
    Updated at 5.31pm GMT
    4.11pm GMT

    The Guardian’s Paul Lewis takes his seat.

    Vaz asks how Lewis and Rob Evans discovered all this information.

    Lewis says they spoke to police officers while working on a book related to this. He says the police officers were not just using the names of dead children, they were adopting many aspects of that person’s identity.

    Where does the figure of 80 officers using this tactic come from, Vaz asks.

    It’s an estimate, says Lewis. He’d like to hear from the Met police about this. It’s possible it could be fewer or more than 80 officers.

    Carey’s complaint comes from 2003, he says.

    Vaz says it’s a “pretty gruesome practice” and that it must be “heartless and cruel” for the parents not to have been informed.

    Lewis ask if this was limited to the Special Demonstration Squad or was used more widely.
    4.13pm GMT

    Lewis says he has spoken to people whose children’s identities have been used in this way.

    He says the Met police have placed the families of these children at some risk. Other activists could try to track down the undercover officers and seek out the family of the child whose identity was stolen. Far right groups were infiltrated in this way, Lewis says.

    Vaz asks if the Met police have asked Lewis for this information.

    Lewis says he has an obligation to protect his sources. He’s confident that the police know all the children’s identities.
    4.15pm GMT

    Vaz asks him to accept that in some circumstances the police are justified in using undercover agents.

    Lewis says some undercover operations are justified, but raises the issue of proportionality. He mentions far right groups and violent animal rights groups. But in the main we are talking about non-violent activists, he says.
    4.18pm GMT

    Tory Michael Ellis asks if the public have a human right to be protected from crime and suggests senior officers are best-placed to decide when it’s right to use undercover officers.

    He says he agrees with that.

    But he begs to differ that the public would be unsurprised by officers using sex in this way.

    Ellis says it was Tugendhat who said the public would be unsurprised, and he has great experience.

    Lewis says Tugendhat was not referring to the public’s view, but to MPs’ view when they passed the relevant law.
    4.21pm GMT

    Ellis asks if Lewis has heard any account of absence of consent in these sexual relationships – discounting the overall deception.

    Lewis says men and women have had sex with undercover police officers. They may argue that they did not have the necessary information to give informed consent – although Lewis says he doesn’t agree with that.

    He says police say this behaviour was only happening among “bad apples”.

    But he and Evans have identified nine undercover officers, and eight were having sexual relationships with activists. One officer was a woman, he says.

    One undercover policeman told Lewis that of a team of 10 nine were having sexual relationships with activists.

    Fullbrook asks if senior officers knew about this. Lewis says it’s likely. One undercover officer says he was told by a senior officer to use contraception. That implies the senior officer knew.
    4.24pm GMT

    Labour’s Bridget Phillipson says the length of the relationships involved shocked her.

    Lewis says having met the victims he has found it difficult to convey their pain. He suggests the committee’s MPs think about how they would feel if their own partner turned out to be an agent of the state.

    At least four children have been born as a result of these relationships, Lewis says.

    Lewis says he does not believe MPs intended this in the RIPA, and would have used the words “sexual relationships” rather than “personal relationships”, and he certainly does not think they would have imagined children resulting from these relationships.
    4.25pm GMT

    Winnick asks if undercover agents could have done this job without embarking on sexual relationships with activists.

    Lewis says some officers did not do this, so the answer is yes.
    4.28pm GMT

    Was it a rogue operation?

    Lewis says some senior officers were unaware of the existence of the Special Demonstration Squad.

    How can the police clean up this matter and restore confidence?

    Openness and transparency, says Lewis. Over the last two years, the Met police have offered “very little help”.

    We are heavily reliant on sources who have the courage to come forward, Lewis says.

    At some stage the Met police will have to think about the best strategy to regain trust, he says.

    The truth tends to come out eventually, he says.
    4.30pm GMT

    Deputy Assistant Commissioner Patricia Gallan of the Met police takes her place next.
    4.33pm GMT

    Vaz says there will be an open session and then a private session.

    He says he was pretty shocked to learn about the use of dead children’s identities. Was she equally shocked?

    Gallan tries to outline her role instead.

    Vaz insists she answers the question.

    Gallan says we are investigating something that has been going on since 1968 and it is important to understand the context.

    She says she is overseeing the operation examining past practices relating to this.

    She says she does not know if the figure of 80 children’s identities being used is accurate. She knows of two cases. More evidence will probably come to light, but she does not want to prejudge the investigation.

    But she is very concerned at what she has heard, she says.

    That is why the Met have asked the IPCC to supervise.
    4.35pm GMT

    Gallan says it is looking at the activities of the SDS over 40 years.

    There are more than 50,000 documents to sift through and retired officers to speak to. They want to hear from anyone who has any evidence, she says.

    But was she shocked, asks Vaz.

    Gallan says she was “very concerned” because “it is not practice as I know it”.

    That doesn’t sound very condemnatory, Vaz says.

    It isn’t still happening, Gallan says. It has been confined to the SDS and the NPOIU (National Public Order Intelligence Unit).
    4.38pm GMT

    Vaz asks who is dealing with the operational matters regarding undercover policing. The commander of cover policing, Richard Martin, she says.

    Assistant Commissioner Mark Rowley is above him, she says.

    She can’t give a date when the practice of using dead children’s identities stopped, she says. But it is not sanctioned today among the Met or any other police force in the country, she says.

    Should the children’s parents be informed, Vaz asks.

    Gallan says it’s important to find out all the circumstances and whether they are accurate.

    She says ethical and legal issues also need to be considered.

    Would it affect any operatives whose positions would be exposed, she says.

    Vaz says some members of the committee have heard this kind of thing regarding phone-hacking.
    4.39pm GMT

    Vaz stresses that where the police have names and addresses now, they should inform parents now.

    Gallan says she can’t give a blanket yes or no.
    4.42pm GMT

    It has never been practice within most areas of undercover policing to take identities in this way, she says. Only the SDS and National Public Order Intelligence Unit did this.

    Thirty-one staff are working on Operation Hearn, looking into the issue of undercover police regarding the SDS, including 20 police officers.

    The estimated cost to date is £1.25m.

    Vaz says that sounds like a lot of money and a lot of officers, implying that they can probably get through all those 50,000 documents more quickly than they are.

    Vaz asks if when she has completed her operation she will inform the parents.

    Gallan says she needs to consider all the issues and can’t give a yes or no answer.
    4.44pm GMT

    Vaz asks if she would like to apologise for this scandal.

    Gallan says at the appropriate time statements would be made.

    Until she knows all the facts she can’t do anything like that, she says.
    4.46pm GMT

    The admission that a second unit, the NPOIU, has used dead children’s identities is very important, since that unit was only formed in 1999.
    4.48pm GMT

    Vaz asks if the Guardian revelations broke the news to her of the use of children’s identities. She knew of one example in September last year.

    Since then has she informed the parents, Vaz asks. She says she hasn’t and she’ll explain why in closed session.

    Gallan is asked again about apologising. She says there are live proceedings ongoing and the Met police will decide at the end.
    4.49pm GMT

    Michael Ellis asks what rank of officer was in charge of the SDS or the NPOIU.

    Superintendent, Gallan says.

    Were they rogue units?

    Gallan says from what she has seen the practices in place weren’t following national guidelines. We need to get all the evidence, she says, so she doesn’t want to go further than that.
    4.51pm GMT

    Ellis asks if taking children’s identities was not accepted practice even at the time.

    Gallan says it was not standard procedure.

    Ellis says these were unauthorised practices even at the time. He suggests these were rogue units or units operating outside their protocols.

    That’s one of the things we’re investigating, Gallan says.

    A senior officer cannot authorise something that is outside of procedures at the time, Ellis says.
    4.53pm GMT

    Winnick asks if Gallan thinks it was in the public interest for the Guardian to give the names of some of the dead children?

    She says she believes in the free press.

    Has the reputation of the press been harmed?

    Gallan says when used appropriately undercover work is very important, and they are worried about anything that undermines confidence in that.

    Asked the same question again, she says: “I think it is.”

    I’ll take that to be a yes, says Winnick.
    4.55pm GMT

    How far is it possible for undercover work to take place without sexual relationships, Winnick asks.

    Gallan says she doesn’t believe you can authorise such activities, morally.

    If something like that does happen it should be reported immediately.

    Winnick asks if it’s right to assume the officers were not not told to engage in sex.

    Gallan says she might be able to explain that in closed session, but it was not authorised.
    4.59pm GMT

    Metropolitan police commissioner Bernard Hogan-Howe has said it is “almost inevitable” some undercover officers will have sexual relationships in this way although he wouldn’t encourage it, Vaz says. Doesn’t that contradict Gallan’s view?

    Nick Herbert, the policing minister, has said that to ban such actions would provide a ready-made test for the targeted group, Vaz says.

    What is her view?

    Gallan repeats that there is a moral issue. Legally, the law is silent on that, and she will explain that in closed session, she says.

    The Met police does not authorise that conduct, she repeats.

    She says she cannot envisage under any circumstances a commander authorising this kind of behaviour.
    5.02pm GMT

    But was it prohibited, asks Vaz.

    In the closed session, she will explain more, says Gallan.

    Tory James Clappison suggests that some of these relationships went on for so long that senior officers must have known what was happening.

    Vaz says he is disappointed that Gallan has not sent out a message that the Met police is sorry that the practice of using dead children’s identities has taken place.

    Winnick adds that the committee is disappointed.

    Vaz says he is concerned that she has known about one incident since September and still has not got to the bottom of it.

    One of the victims followed the trail and turned up at the house of the dead child’s parents. They weren’t there, but imagine their grief if they had have been, Vaz says.

    Gallan repeats her “concern” and says she is keeping an open mind about the facts.

    It would be inappropriate to rush to make statements in haste, Gallan says.
    5.03pm GMT

    Does she have a timetable for the conclusion of Operation Hearn, Vaz asks.

    Gallan says it would be wrong to put a timescale on it.

    We are determined to go where the evidence takes us, she says.
    5.03pm GMT

    With that the committee goes into closed session.
    5.36pm GMT
    Summary

    Here is a summary of what we have learned from that committee session.

    • The use of dead children’s identities by undercover police officers was not confined to the Special Demonstration Squad, but was also a practice employed by the National Public Order Intelligence Unit, a unit that was only set up in 1999, Deputy Assistant Commissioner Patricia Gallan of the Metropolitan police revealed to the Commons home affairs committee.

    • Gallan knew about one case of a child’s identity being used in this way in September last year. The practice is not sanctioned today among the Met or any other force in the country, she said.

    • Including the case that came to light in September, she knew of only two cases of this happening, she said, and did not know if the Guardian’s estimate of 80 cases was accurate. But she felt that more cases would probably come to light.

    • Keith Vaz, the chair of the committee, said he was “disappointed” that Gallan would not apologise for the police’s actions, saying only that she was “very concerned” at the allegations and wanted to wait until all the facts had been established before rushing to make a statement.

    • Vaz was also extremely concerned that Gallan had not informed the parents in the case discovered in September last year, and wanted her to promise she would inform all the parents involved as soon as possible. Gallan would not agree to this.

    • Police officers having sex with activists in groups they infiltrated was not authorised, and could not justified morally, Gallan said. She could not envisage any circumstances under which a commander would authorise this.

    • She admitted the Metropolitan police’s reputation had been harmed by the scandal.

    • Thirty-one staff are working on Operation Hearn, looking into the issue of undercover police, including 20 police officers. The estimated cost to date is £1.25m.

    • Lawyers for women who feel they were duped into having relationships with undercover officers attacked the practice as being “depraved”, “dispicable” and beyond the bounds of a civilised society. MPs on the committee broadly seemed to agree, although Tory Michael Ellis drew attention to Mr Justice Tugendhat’s contention that such relationships would not surprise the public, accused the lawyers of wanting to tie the police’s hands unreasonable. He asked if the public had a human right to be protected from crime and suggested senior officers were best-placed to decide when it was and was not right to use undercover officers.

    That’s all from me. Thanks for all your comments.
    Next
    Previous
    Blog home
    Related information
    UK news
    Police ·
    Politics
    House of Commons · Keith Vaz ·

    Police must inform parents of children whose IDs were used by spies, says MP

    4 Feb 2013

    Keith Vaz says it would be heartless not to tell affected parents, and asks Theresa May to investigate whether practice was legal

    4 Feb 2013

    Police spy: ‘How we stole dead children’s identities’ – video

    30 Jan 2013

    Chief police officers criticise recruitment and promotion reforms

    30 Jan 2013

    If China lifts its game console ban, what will adults panic about next?

    Should outsiders be allowed fast-track entry into the police?

    30 Jan 2013

    Home secretary Theresa May will today announce plans to allow police forces to recruit senior officers from outside the service, meaning business leaders, for example, could quickly move into top jobs rather than having to start as constables pounding the beat. Many police are opposed. Do you support the move?

    Paul Owen
    guardian.co.uk, Tuesday 5 February 2013 14.17 GMT

    Find this story at 5 February 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Munich Olympics Massacre Officials Ignored Warnings of Terrorist Attack

    Explicit warnings that a terrorist attack might take place at the 1972 Munich Olympics were ignored by German officials, according to previously classified documents seen by SPIEGEL. The new details also reveal efforts to cover up the extent of their failure to stop the brutal murders of Israeli athletes.

    It is no secret that the German authorities’ handling of the massacre of Israeli athletes during the 1972 Munich Olympics was characterized by bumbling and cover-ups. But new documents seen by SPIEGEL reveal that officials concealed even more — and more blatant — errors than previously thought. Indeed, there were even several warnings prior to the Games that an attack was imminent.

    ANZEIGE

    Previously classified documents from investigative officials, embassy dispatches, and cabinet protocols released to SPIEGEL by the Chancellery, Foreign Office and state and federal intelligence agencies have revealed the lengths to which officials went to hide their mistakes.

    In the attack on Sept. 5, 1972, Palestinian terrorists killed 11 members of Israel’s Olympic delegation, along with one German police officer. Five of the eight terrorists from the Palestine Liberation Organization (PLO) terrorist group called “Black September” were also killed during the botched rescue attempt by German police at the Fürstenfeldbruck military airport, where the hostages were being held in two helicopters.

    ‘No Self-Criticism’

    Already on Sept. 7, just one day after the memorial ceremony for the victims took place in Munich’s Olympic Stadium, a Foreign Ministry official told a special sitting of the federal cabinet what would ultimately become the maxim for both Bavarian and West German officials. “Mutual incriminations must be avoided,” a protocol for the meeting reads. “Also, no self-criticism.”

    Just how closely this advice was followed can be seen in documentation from both the federal government and the Bavarian state government, which falsely described the “precision” with which the terrorists carried out their attack. In reality, officials knew that the “Black September” members were actually so poorly prepared that they even had trouble finding hotel rooms in Munich before their attack.

    On the day of the attack, the Palestinians were even known to have gone right past the Israelis’ apartments in the Olympic village, encountering athletes from Hong Kong on an upper level of the building instead. An “analytic evaluation” of the attack by the Munich criminal police later explicitly determined that the terrorists had “conducted no precise reconnaissance” ahead of time.

    But none of these details were revealed to the public. The fact that Bavarian state prosecutors in Munich were pursuing an investigation against police president Manfred Schreiber and his chief of operation on suspicion of negligent manslaughter also wasn’t mentioned in the document.

    Clear Warnings

    Concrete warnings of a potential attack also went unmentioned, despite the fact that they were so clear that their dismissal remains difficult to comprehend. On Aug. 14, 1972, a German embassy officer in Beirut heard that “an incident would be staged by from the Palestinian side during the Olympic Games in Munich.” Four days later, the Foreign Office forwarded the warning to the state intelligence agency in Bavaria, along with the recommendation to “take all possible available security measures” against such an attack.

    Security agencies didn’t even register warnings that appeared in the press. On Sept. 2, three days ahead of the deadly hostage-taking, the Italian publication Gente wrote that terrorists from Black September were planning a “sensational act during the Olympic Games.” Only later — two days after the bloodbath in Munich — was the warning put on record through a tip-off from the Hamburg criminal police.

    Released: July 23, 2012 | 12:20 PM

    Find this story at 23 July 2012

    © SPIEGEL ONLINE 2012

    Iraq abuse inquiry was a ‘cover-up’, whistleblower tells court

    Louise Thomas gives evidence ahead of judicial review into government’s refusal to hold public inquiry into troop abuse claims

    Iraqi prisoners stand behind razor wire. Lawyers say they have received complaints of abuse from more than 1,100 Iraqis. Photograph: Damir Sagolj/AFP/Getty Images

    A former investigator into allegations that British troops abused Iraqi prisoners resigned because she did not want to be implicated in “a cover-up”, the high court has heard.

    Louise Thomas, 45, left the Iraq Historic Allegations Team (IHAT) in July because she thought it was not a genuine investigation but a “face-saving inquiry”, she told the court on Tuesday.

    Her evidence came at a preliminary hearing in advance of a judicial review, expected next month, into the government’s refusal to hold a public inquiry into allegations of mistreatment of Iraqis between 2003 and 2008.

    Lawyers say they have now received complaints of abuse from more than 1,100 Iraqis and that IHAT’s investigations are insufficiently independent because they have been conducted by Royal Military Police (RMP) officers and other members of the armed forces.

    Thomas, whose claims were highlighted by the Guardian in October, is a former police constable who worked for six months with IHAT at its British headquarters in Pewsey, Wiltshire.

    She admitted in court she did have second thoughts at one stage and asked for her job back.

    “After speaking to a few colleagues and realising we could make a difference I asked if I could stay,” she said. “[They] said they would try to change things. It was very frustrating working at IHAT.”

    Thomas denied she was angry when she was refused permission to withdraw her resignation.

    Her job at IHAT had been to review evidence taken from video sessions of recordings of interrogations of Iraqi suspects. One of the exercises was to see how they matched up to standards set by the Istanbul Protocols, which assess methods of torture.

    Thomas alleged that many of the sessions had been misrecorded by earlier forensic investigators.

    But Philip Havers QC, for the Ministry of Defence, accused her of exaggerating the number of misrecordings and said that notebooks showed only seven such alleged occurrences out of 181 videos she had assessed – a rate of 4%.

    Thomas denied she was exaggerating and said other records would show there were more occasions.

    If the high court agrees in January that there should be a full inquiry into the latest allegations of military abuse during the occupation of Iraq, it will be the third such investigation following the Baha Mousa and al-Sweady inquiries.

    Asked by Havers whether she was still saying that “IHAT is not a genuine investigation but merely a face-saving inquiry”, Thomas replied: “Yes, I am.”

    She said she believed IHAT was a “cover-up” and that she had resigned because she no longer wanted to be implicated in it.

    The court was told that the hearing would not identify any of the soldiers who worked for the Joint Forces Interrogation Team (Jfit) in Iraq, any of the military operations involved or any of the Iraqi detainees.

    “The reasons for the redactions is so as not to prejudice the ongoing (IHAT) criminal investigations,” Havers said.

    John Birch, a former RMP officer who has been working with IHAT, said there were seven main strands of investigations being pursued, including a “murder review team” that was looking at Iraqi deaths.

    He acknowledged that tapes from the early years of the occupation before 2005 were still missing. A shortage of digital video tapes meant that some of the later sessions had been recorded over.

    Owen Bowcott, legal affairs correspondent
    The Guardian, Tuesday 11 December 2012 19.44 GMT

    Find this story at 11 December 2012

    © 2012 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    The school that trains cyber spies: U.S. university training students in online espionage for jobs in the NSA and CIA

    University of Tulsa’s Cyber Corps programme is training students to write viruses, hack networks, crack passwords and mine data
    The little known course has been named as one of four ‘centres of excellence’ and places 85 per cent of graduates with the NSA or CIA

    Not your average student: The University of Tulsa is training students in the fundamentals of cyber-espionage, with many taking jobs in the CIA

    A university is offering a two-year course in cyber-espionage, with recruits going on to jobs with the CIA, the National Security Agency and the Secret Service.

    Students at the University of Tulsa, Oklahoma, are learning how to write computer viruses, hack networks, crack passwords and mine data from a range of digital devices.

    The little-known Cyber Corps programme already places 85 per cent of its graduates with the NSA – known to students as ‘the fraternity – or the CIA – which they call ‘the sorority’.

    Sujeet Shenoi, an Indian immigrant to the U.S., founded the programme at Tulsa’s Institute for Information Security in 1998 and continues to lead the teaching, the LA Times reported.

    Students are taught with a mixture of classroom theory and practical field work, he said, with each assigned to a police crime lab on campus to apply their skills to help recover evidence from digital devices.

    ‘I throw them into the deep end,’ Mr Shenoi told the LA Times. ‘And they become fearless.’

    Much of their work involves gathering evidence against paedophiles, with several students having posed as children on the internet to lure predators into stings.

    But his students in 2003 also helped solve a triple murder case by cracking an email account that linked the killer with his victims and, working alongside the Secret Service, they have developed new techniques for extracting data from damged smartphones, GPS devices and other digital devices.

    The NSA in May named Tulsa as one of four centres of academic excellence in cyber operations, alongside Northeastern University in Boston, the Naval Postgraduate School in Monterey, California, and Dakota State University in Madison, South Dakota.

    Neal Ziring, a senior NSA official who visited the school recently, told LA Times: ‘Tulsa students show up to NSA with a lot of highly relevant hands-on experience.

    ‘There are very few schools that are like Tulsa in terms of having participation with law enforcement, with industry, with government.’

    Centre of excellence: Tulsa was in May named by the NSA alongside four other schools as important centres for training cyber-security operatives
    WIRETAPPING THE INTERNET

    New eavesdropping technology could allow government agencies to ‘silently record’ conversations on internet chat services like Skype in real time.

    Until now, so called voice over internet protocol (VoIP) services have been difficult for police to tap into, because of the way they send information over the web.

    The services convert analogue audio signals into digital data packets, which are then sent in a way that is costly and complex for third parties to intercept.

    But now a California businessman has obtained a patent for a ‘legal intercept’ technology he says ‘would allow governments to “silently record” VoIP communications’.

    Dennis Chang, president of VoIP-PAL, an chat service similar to Skype, claims his system would allow authorities to identify and monitor suspects merely by accessing their username and subscriber data.

    Applicants to Tulsa’s programme, who have ranged in age from 17 to 63, must be U.S. citizens eligible for security clearance of ‘top secret’ or higher.

    Many are military veterans or others looking to start second careers, usually people who are working towards degrees in computer science, engineering, law or business.

    By Damien Gayle

    PUBLISHED: 09:41 GMT, 26 November 2012 | UPDATED: 14:15 GMT, 26 November 2012

    Find this story at 26 November 2012

    Published by Associated Newspapers Ltd

    Part of the Daily Mail, The Mail on Sunday & Metro Media Group
    © Associated Newspapers Ltd

    Intrigue in Lebanon: Was Murdered Intelligence Chief a Hero or Double Agent?

    In mid-October, a massive car bomb killed Wissam al-Hassan in downtown Beirut. The intelligence chief was buried as a hero and praised by the West for his help in investigating the 2005 assassination of former Prime Minister Rafik Hariri. Or was he a double agent, possibly also active sometimes for the Syrians?

    It’s a story of personal oaths of allegiance and clan loyalties, a story of war, betrayal and deceit, a story that could only be written about the Middle East. At the story’s center stand four men and two murders.

    Rafik Hariri, a business tycoon worth billions, helped rebuild Lebanon after its bloody 15-year civil war. He was an important political leader of the country’s Sunnis and Lebanon’s prime minister for roughly a decade. In October 2004, he resigned to protest the string-pulling exerted by neighboring Syria and Hezbollah, the Lebanon-based Shiite militia bankrolled by Damascus. A few months later, on Valentine’s Day 2005, Hariri would die in a massive roadside bombing attack.

    Saad Hariri, Rafik’s 42-year-old son and political heir, swore that he would get to the bottom of the murder and even availed himself of foreign assistance to do so. In 2007, the United Nations decided to set up a Special Tribunal for Lebanon (STL). The tribunal has been operating from its headquarters near The Hague, in the Netherlands, since the spring of 2009. The younger Hariri came to be known as one of the leaders of the Cedar Revolution, which succeeded in driving almost all Syrian troops out of the country. Saad Hariri would serve as Lebanon’s prime minister from 2009 until 2011, when his coalition government collapsed. These days, he leads his opposition movement in exile from Paris.

    Hassan Nasrallah, the 52-year-old head of Hezbollah, has oscillated between suppressed and open hostility with the Hariris. In addition to overseeing a militia that is stronger than Lebanon’s army, Nasrallah commands a powerful political organization. At the moment, his party essentially controls the government in Beirut, and he views himself as the only force fighting against “Zionist occupiers.” He also sees the STL as little more than an “American-Israeli conspiracy.”

    And then there is Wissam al-Hassan, who is currently the main protagonist in this great game.

    An Inside Job?

    Al-Hassan was born in 1965 near Tripoli, Lebanon, into a Sunni clan that has enjoyed close ties with the Hariris. He became a member of Rafik Hariri’s security detail, eventually advancing to become his head bodyguard. Al-Hassan had taken off Feb. 14, 2005, the day that a massive car bomb exploded while Rafik Hariri’s motorcade was driving by, claiming at the time that he needed to study for a university exam. But this did not harm his career, and Saad Hariri would eventually elevate al-Hassan to the rank of brigadier general and a position as the country’s intelligence chief.

    On Oct. 19, al-Hassan died in a car bomb attack that bore many similarities with the one that killed his boss seven years earlier: Both were in Beirut, both were in broad daylight, and both were carried out by professionals. Both attacks involved a huge amount of explosives that claimed the lives of many more people than just the intended targets.

    Al-Hassan was given a hero’s burial and interred only a few steps from the grave of Rafik Hariri in a cemetery near Martyrs’ Square in central Beirut. The circumstances surrounding his death have given rise to a number of questions. In fact, some wonder whether the 47-year-old might have even been a double agent, someone who had switched allegiances once or perhaps even several times. And if this is true, they ask, what does that say about those suspected of killing him?

    Whatever the answers might be, the terrorist attack of Oct. 19 continues to grow more and more mysterious, and the STL may consider investigating it. Responding to written questions, the International Criminal Tribunal says that one first needs to determine whether the attack was related to the Hariri bombing. Moreover, it adds that launching such an investigation would also require an expansion of the STL’s mandate by the United Nations and the Lebanese government, which covers 49 percent of the tribunal’s costs.

    Sources close to the tribunal say that al-Hassan originally stood at the top of the list of suspects in the Hariri attack. Indeed, investigators found it rather odd that Hariri’s head bodyguard would go missing in action on the day he died. What’s more, they established that al-Hassan spoke on the phone 24 times on the morning of Hariri’s death even though he claimed he had to study for the university exam. An internal STL document says that al-Hassan’s statements are “not very convincing” and have led to doubts about his alibi.

    Friends and Enemies

    Still, the fact that he was far away when the attack occurred and that Saad Hariri believed his oath of loyalty was somehow enough to get al-Hassan out of the line of fire. Likewise, before long, he became the special tribunal’s most important informant, providing investigators with details about the type of explosive used and recordings from mobile phones at the scene of the attack. The phone calls would eventually be matched to four members of Hezbollah — and spell the downfall of them all.

    In June 2011, the STL brought indictments against these four men, including Mustafa Badr al-Din, Nasrallah’s chief of intelligence. An enraged Nasrallah reacted by threatening to “cut off the hand” of anyone who tried to extradite him and the other men. The four have since disappeared and are rumored to have fled to Iran.

    However, such investigations weren’t enough for al-Hassan. He soon became one of the most important political players in the region, forging some astonishing alliances along the way. For example, he arranged a meeting between Saad Hariri and Syrian President Bashar Assad. After the meeting, the former refrained from making any more vehement accusations that Syria was behind his father’s murder. What’s more, in a move that was highly unusual in terms of protocol, al-Hassan himself had a private conversation with Assad in Damascus.

    At the same time, al-Hassan maintained extremely close ties with top-level officials in the intelligence apparatus of Saudi Arabia, which holds a critical stance toward the Syrian regime. Likewise, some Middle East insiders have even claimed that al-Hassan had ties to the Mossad, Israel’s foreign intelligence agency. He ultimately allayed these suspicions with deeds: Under his leadership, Lebanese intelligence blew the cover of an entire network of Israeli spies operating in the country.

    In recent months, the restless Lebanese intelligence chief had turned his attention to rebel forces in Syria. Just last summer, he apparently set a trap for Ali Mamlouk, who would be promoted in July from chief of Assad’s general intelligence directorate to head of his national security council. Via intermediaries, al-Hassan encouraged Mamlouk to supply Michel Samaha, a former minister of information in Lebanon and staunch ally of the Syrian regime, with explosives to be used in attacks. Samaha was arrested in early August and reportedly confessed. It was a serious loss of face for Assad — and a plausible reason for taking out the supposed turncoat al-Hassan.

    Possible Hezbollah Involvement

    Hezbollah might have also had a hand in the terrorist attack on al-Hassan, whose cooperation with the tribunal had made him a sworn enemy of the “Party of God.” In any case, al-Hassan had surely received warnings about an attack. Two days before the assassination, he traveled to Paris to bring his family to safety. The next day, while returning to Syria, he made a stopover in Germany. There, he met with his German counterpart, the head of the Federal Criminal Police Office (BKA), for what was presumably a regularly scheduled talk.

    In response to written questions, the STL confirms that the in absentia trial of the four Hezbollah members will begin on March 25, 2013, and that procedures allow “for evidence from unavailable persons to be admitted during the trial,” including that of al-Hassan. What’s more, the International Crimincal Court says that “Lebanon has an ongoing obligation to search for the accused” and the Lebanese authorities are obliged to report on a monthly basis. “We believe that justice should not be held hostage to the accused’s desire not to participate in the proceedings,” the tribunal wrote.

    The FBI now has agents in Beirut to aid inthe investigation into al-Hassan’s murder. It has reportedly determined that the explosives used to kill al-Hassan bear similarities to the ones used in the Hariri assassination. The planning and execution of the attack are also thought to point to the same group of perpetrators.

    Translated from the German by Josh Ward

    11/05/2012 01:02 PM

    By Erich Follath

    Find this story at 5 November 2012

    © SPIEGEL ONLINE 2012
    All Rights Reserved
    Reproduction only allowed with the permission of SPIEGELnet GmbH

    Mauritania extradites Gaddafi spy chief Senussi to Libya

    Extradition of Libyan dictator’s former head of military intelligence could shed fresh light on 1988 Lockerbie bombing

    Mauritania said on Wednesday that it had extradited Muammar Gaddafi’s infamous former spy chief, Abdullah al-Senussi, back to Libya, in a move that could shed fresh light on the 1988 Lockerbie bombing.

    Government sources in Mauritania said Senussi had been sent to Tripoli “on the basis of guarantees given by the Libyan authorities”. Senussi has been in custody in Mauritania since March, after slipping illegally into the country.

    Officials in Tripoli could not immediately confirm Senussi’s extradition, also reported by Mauritanian television. But foreign ministry spokesman Saad al-Shelmani said the country’s transitional post-Gaddafi government welcomed the news.

    He added: “We have been asking for this move for a very long time.”

    Senussi, Gaddafi’s former director of military intelligence and a brutal enforcer, is one of the world’s most wanted men. Libya, France and the international criminal court had all sought his extradition, with France seeking to question him in connection with the bombing of a French UTA passenger plane in 1989.

    The ICC has indicted him for crimes against humanity in Libya.

    Britain also has a strong interest in Senussi and is likely to seek to interview him in connection with the 1988 Lockerbie bombing, in which 270 died. At the time, Senussi headed Libya’s external security organisation. He is said to have recruited Abdel-Basset al-Megrahi, the man convicted of the bombing. Megrahi died at his home in Libya in May.

    The US is also seeking Senussi’s arrest in connection with Lockerbie.

    In an interview with the Guardian, Libya’s prime minister, Abdurrahim el-Keib, said that as well as his alleged role in the Lockerbie bombing, Senussi knew the identity of the killer of PC Yvonne Fletcher, shot dead outside the Libyan embassy in 1984.

    “He’s the black box,” Keib said, adding: “I guarantee he [Senussi] was almost directly or indirectly involved in most if not all of the crimes [of the former regime]. That doesn’t mean others weren’t involved. But he definitely knows who they were.”

    Senussi was married to Gaddafi’s sister-in-law, and was at the Libyan dictator’s side for over three decades. Leaked US diplomatic cables describe him as a trusted “senior regime figure”, “who had played a role as minder of the more troublesome Gaddafi offspring”.

    They added: “Sanussi … is usually in physical proximity to the tent in which Gaddafi holds meetings with visiting foreign dignitaries and, according to members of Gaddafi’s protocol office, personally oversees Gaddafi’s close protection detail”.

    Libya’s provisional government wants to try him in connection with numerous human rights abuses, including the massacre of 1,200 prisoners at the Abu Salim jail in 1996. During the 2011 Libyan civil war, he was blamed for orchestrating killings in the city of Benghazi and recruiting foreign mercenaries.

    Luke Harding, Ian Black and agencies in Nouakchott
    guardian.co.uk, Wednesday 5 September 2012 13.25 BST

    Find this story at 5 September 2012

    © 2012 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    UK spent millions training security forces from oppressive regimes

    Sudan and the Democratic Republic of the Congo received £2.4m in training and support for military and defence staff

    Sudan’s Omar al-Bashir, who has been indicted for genocide, war crimes and crimes against humanity by the international criminal court. Photograph: Ibrahim Usta/AP

    The UK government has spent millions of pounds on training military, police and security personnel from oppressive regimes that have arms embargoes in place, the Guardian has learned.

    In the last five years, Sudan and the Democratic Republic of the Congo have received from the UK government £2.4m between them in training and support for military and defence personnel.

    Sudan is the only country in the world where the sitting president, Omar al-Bashir, has been indicted for genocide, war crimes and crimes against humanity by the international criminal court, while in Congo extensive human rights abuses, including extra-judicial killings and torture, have been documented.

    The Enough Project, which works with the American actor George Clooney to expose human rights abuses in both Sudan and Congo, says the two countries are the scene of some of the world’s most serious mass atrocities.

    In information revealed in a freedom of information response from the Ministry of Defence a total of £75,406 has been spent on providing 44-week courses at the elite Royal Military Academy Sandhurst for Sudanese and Congolese forces. Other support includes military logistics, advanced command and staff courses, strategic intelligence and evaluating challenges to state sovereignty.

    A total of £952,301 was spent on international peace support, which includes border security and stabilisation.

    Much of the current focus of concern about human rights abuses in Sudan centres on conflict in the border areas with the newly formed country of South Sudan, such as Blue Nile, Nuba Mountains and South Kordofan, and the ongoing conflict in Darfur, where documented genocide shows 300,000 Darfuris have been killed and up to 4 million displaced. The Sudanese government has refused humanitarian aid access to the border areas.

    In Congo many and varied human rights abuses have been documented, especially against opponents of the president, Joseph Kabila. A UN report earlier this year highlighted “serious human rights violations, including killings, disappearances and arbitrary detentions” during last November’s presidential elections. At least 33 people were killed by government forces during the elections, and hundreds were arrested and said they had been tortured. A delegation of UK officials has been investigating claims of torture in Congo and is due to report back shortly.

    A leading Sudanese exile based in the UK, Dr Gebreil Fediel from Darfur, is challenging the legality of the UK government’s relationship with Sudan in the high court next month.

    His legal team is bringing enforcement proceedings against the government for failing to provide him with protection under the refugee convention and travel documents to enable him to attend peace talks around the world. These talks aim to bring an end to the appalling human rights situation in Sudan. He is the leader of a major Sudanese opposition movement, the Justice and Equality Movement.

    The high court judge Mr Justice Wyn Williams described the government’s approach to Fediel as “unreasonably restrictive” in January of this year.

    In a statement to the court Fediel accused the government of failing to provide him with protection because there was a deal between the two governments.

    “I believe the government of Sudan is requesting the UK government to treat me like this for political reasons. Their decisions to exclude and restrict me are underpinned by political and intelligence considerations.”

    He expressed concern about the military support and training provided by the UK: “If it was and is the intention of the UK authorities to teach Sudan’s police and security officers how to conduct these matters in a democratic manner, it has failed. The brutality and genocidal activities of government of Sudan state organs against its own citizens is widely documented.”

    In July the Foreign Office minister Lord Howell admitted about Sudan: “There is ample evidence that the military tactics being used raise concerns that the most serious crimes of concern to the international community may be being committed.”

    Fediel said that as well as the UK’s provision of military support to his government the UK had also been providing support and training to Sudanese police and security officials. He said that in May a group of senior police officers came to the UK for training.

    A letter from the former Foreign Office minister Ivan Lewis in 2010 stated: “The UK has a large police support programme in Democratic Republic of the Congo.”

    Aaron Hall, the associate director of research for the Enough Project, said: “We would hope that any nation providing military and security support to these countries would have conditions attached to that support based on the adherence to international human rights laws and standards. If credible evidence exists that shows violation of those laws and standards whether within those countries borders or externally, we would urge those governments providing support to immediately suspend that support, and further to work with international and regional partners to hold those responsible for human rights abuses accountable for their actions.”

    Jovanka Savic, Fediel’s solicitor, said: “There is an obligation under international law that requires states to bring to an end breaches of international law through legal means. This new evidence suggests that the UK is not helping to do this but is instead giving aid and assistance to the Sudanese government in a way that could be in breach of its international legal obligations. It is very concerning that support is being offered to DRC where many human rights abuses have been documented.”

    She said the UK’s actions against Fediel, in preventing or restricting him from attending peace talks around the world, was helping to prolong the human suffering and conflict in Sudan.

    “They are making this man’s life very difficult for political and arguably illegal reasons,” she said.

    The government provided a response from four departments – the Home Office, the Ministry of Defence, the Foreign Office and the Department for International Development.

    A spokesman said: “Strict criteria are applied to any training to ensure that it complies with overseas security and assistance human rights guidance. For each funding decision an assessment of the risk of human rights abuses is carried out. Her Majesty’s government conducts continual assessment of its programmes and human rights compliance is a cardinal criterion of this.

    “UK officials have contact with international criminal court indictees only when this is considered essential and on a case-by-case basis. No contact with President Bashir has come about as a result of these programmes.”

    However, the spokesman confirmed that some meetings had taken place between the previous and present ambassador to Sudan and Bashir. “The main occasions are when a British ambassador leaves or takes up their post in Khartoum.”

    The spokesman said that international peace support was delivered to UN peacekeeping missions in Sudan and South Sudan and funding was provided for the African Union panel leading the talks aimed at ending the conflict.

    He confirmed that nine senior national police officers from Sudan visited London in May to learn about policing and human rights in the UK, two of whom held the rank of major general. “The officers met the Sudanese ambassador at his London office as a protocol courtesy.” He said that community policing initiatives had been set up following the officers’ return to Sudan.
    The reaction from Africa

    Studies have shown that Congolese soldiers are responsible for at least 60% of reported rapes in the country. Last year the UN implicated them in the rape of at least 121 women over three days in the village of Nyakiele, in South Kivu province. This came after the gang-rape of at least 47 women by government troops in North Kivu.

    The UN’s high commissioner for human rights has said: “The Congolese army remains responsible for a significant number of human rights violations, including sexual violence.”

    The opposition Union for Democracy and Social Progress (UDPS) was at the sharp end of last year’s election crackdown and claims soldiers were used to intimidate voters and interfere with ballot papers. It expressed concern at the use of British resources to train and support the military.

    Albert Moleka, the party’s cabinet director and spokesman, said: “Training is a normal part of the co-operation of our two countries but we might say it is the responsibility of the DRC to use those who have been trained properly. That can only be done by a legitimate political authority. Unfortunately we don’t have a legitimate political authority. There is a huge gap of mistrust between the army and the population.”

    He added: “In our experience it is the elite troops with the best equipment who are used against the population. I think military co-operation should be attached with strict conditions that ensure force is never used against the people. That is difficult for outside countries to monitor.”

    Moleka said there was a long tradition of Congo’s military elite studying at academies in Britain and other foreign countries. “But when they come back, what functions do they occupy? How can they help their country? They’re not given the opportunity to bring what they learn to change the attitudes and behaviour of the army.”

    The Congolese army, badly paid and fed, is still struggling to maintain discipline after the integration of a Tutsi rebel militia following a 2009 peace treaty. Yet the international community, including the world’s biggest UN peacekeeping operation, has put faith in it to quell violence in the country’s war-torn east.

    In May, Human Rights Watch reported that Sudanese government forces were carrying out indiscriminate bombings and abuses against civilians in southern Kordofan. It called on Sudan to investigate the discovery of a cluster bomb in the region. Witnesses interviewed in Blue Nile also described serious abuses by the armed forces. The onslaughts have created tens of thousands of refugees living in appalling conditions.

    Diane Taylor, and David Smith in Johannesburg
    guardian.co.uk, Tuesday 25 September 2012 11.33 BST

    Find this story at 25 September 2012
    © 2012 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Researcher: CIA, NSA may have infiltrated Microsoft to write malware

    Did spies posing as Microsofties write malware in Redmond? How do you spell ‘phooey’ in C#?

    June 18, 2012, 2:46 PM — A leading security researcher has suggested Microsoft’s core Windows and application development programming teams have been infiltrated by covert programmer/operatives from U.S. intelligence agencies.

    If it were true it would be another exciting twist to the stories of international espionage, sabotage and murder that surround Stuxnet, Duqu and Flame, the most successful cyberwar weapons deployed so far, with the possible exception of Windows itself.

    Nevertheless, according to Mikko Hypponen, chief research officer of antivirus and security software vendor F-Secure, the scenario that would make it simplest for programmers employed by U.S. intelligence agencies to create the Stuxnet, Duqu and Flame viruses and compromise Microsoft protocols to the extent they could disguise downloads to Flame as patches through Windows Update is that Microsoft has been infiltrated by members of the U.S. intelligence community.

    [ FREE DOWNLOAD: 68 great ideas for running a security department ]

    Having programmers, spies and spy-supervisors from the NSA, CIA or other secret government agencies infiltrate Microsoft in order to turn its technology to their own evil uses (rather than Microsoft’s) is the kind of premise that would get any writer thrown out of a movie producer’s office for pitching an idea that would put the audience to sleep halfway through the first act.

    Not only is it unlikely, the “action” most likely to take place on the Microsoft campus would be the kind with lots of tense, acronymically dense debates in beige conference rooms and bland corporate offices.

    The three remarkable bits of malware that attacked Iranian nuclear-fuel development facilities and stole data from its top-secret computer systems – Flame Duqu and Stuxnet – show clear signs of having been built by the same teams of developers, over a long period of time, Hypponen told PC Pro in the U.K.

    Flame used a counterfeit Microsoft security certificates to verify its trustworthiness to Iranian users, primarily because Microsoft is among the most widely recognized and trusted computer companies in the world, Hypponen said.

    Faking credentials from Microsoft would give the malware far more credibility than using certificates from other vendors, as would hiding updates in Windows Update, Hypponen said.

    The damage to Microsoft’s reputation and suspicion from international customers that it is a puppet of the CIA would be enough to keep Microsoft itself from participating in the operation, even if it were asked.

    That doesn’t mean it didn’t happen.

    “It’s plausible that if there is an operation under way and being run by a US intelligence agency it would make perfect sense for them to plant moles inside Microsoft to assist in pulling it off, just as they would in any other undercover operation,” Hypponen told PC Pro. “It’s not certain, but it would be common sense to expect they would do that.”

    The suggestion piqued the imaginations of conspiracy theorists, but doesn’t have a shred of evidence to support it.

    It does have a common-sense appeal, however. Planting operatives inside Microsoft would probably be illegal, would certainly be unethical and could have a long-range disadvantage by making Microsofties look like tools of the CIA rather than simply tools.

    “No-one has broken into Microsoft, but by repurposing the certificate and modifying it with unknown hash collision technologies, and with the power of a supercomputer, they were able to start signing any program they wanted as if it was from Microsoft,” Hypponen said. “If you combine that with the mechanism they were using to spoof MS Update server they had the crown jewels.”

    Hypponen is one of a number of security experts who have said Stuxnet and Duqu have the hallmarks of software written by traditionally minded software engineers accustomed to working in large, well-coordinated teams.

    After studying the code for Duqu, security researchers at Kaspersky Labs said the malware was most similar to the kind of work done by old-school programmers able to write code for more than one platform at a time, do good quality control to make sure the modules were able to install themselves and update in real time, and that the command-and-control components ahd been re-used from previous editions.

    “All the conclusions indicate a rather professional team of developers, which appear to be reusing older code written by top “old school” developers,” according to Kaspersky’s analysis. “Such techniques are normally seen in professional software and almost never in today’s malware. Once again, these indicate that Duqu, just like Stuxnet, is a ‘one of a kind’ piece of malware which stands out like a gem from the large mass of “dumb” malicious program we normally see.”

    Earlier this month the NYT ran a story detailing two years worth of investigations during which a range of U.S. officials, including, eventually, President Obama, confirmed the U.S. had been involved in writing the Stuxnet and Flame malware and siccing them on Iran.

    That’s far from conclusive proof that the NSA has moved its nonexistent offices to Redmond, Wash. It doesn’t rule it out either, however.

    Very few malware writers are able to write such clean code that can install on a variety of hardware systems, assess their new environments and download the modules they need to successfully compromise a new network, Kaspersky researchers said.

    Stuxnet and Flame are able to do all these things and to get their own updates through Windows Update using a faked Windows Update security certificate.

    No other malware writer, hacker or end user has been able to do that before. Knowing it happened this time makes it more apparent that the malware writers know what they are doing and know Microsoft code inside and out.

    That’s still no evidence that Microsoft could be or has been infiltrated by spies from the U.S. or from other countries.

    It does make sense, but so do a lot of conspiracy theories.

    Until there’s some solid indication Flame came from inside Microsoft, not outside, it’s probably safer to write off this string of associative evidence.

    Even in his own blog, Hypponen makes fun of those who make fun of Flame as ineffective and unremarkable, but doesn’t actually suggest moles at Microsoft are to blame.

    Find this story at 18 June 2012

    By Kevin Fogarty

    © 1994 – 2012 ITworld. All rights reserved.

    Undercover Policing

    Caroline Lucas (Brighton, Pavilion, Green)

    It is a pleasure to hold this debate under your chairmanship, Mr Davies. I am very grateful for the opportunity to raise the issue of the rules governing undercover police infiltrators and informers.

    I am sure the House will agree that when it comes to the deployment of undercover police officers, transparency and accountability are of the utmost importance. In recent months, however, a number of cases have come to light that seem to expose serious abuses of any guidelines that we might reasonably assume inform what police officers working undercover can and cannot do. The cases raise important questions about whether such guidelines are ever enforced, whether individuals who breach them are properly held to account, and the extent to which infiltration of campaign groups is a legitimate, or even effective, tactic. Also, I have details of new allegations relating to the behaviour of one undercover officer that I believe require immediate investigation and raise questions about the convictions of two individuals.

    Since at least the 1968 protests against the Vietnam war, police chiefs, backed by successive Governments, have used the tactic of infiltration to secure more reliable intelligence about political demonstrations than could be provided by informants. Undercover police officers pose as political activists over several years, to gather reliable intelligence and perhaps disrupt campaigners’ activities. In the early days, such officers were part of a super-secret unit within special branch, called the special demonstration squad; more recently they have been under a second unit, the national public order intelligence unit.

    Up to nine undercover officers have been unmasked following the exposure of Mark Kennedy in late 2010. I will say a bit more about his case later, but the officers include Bob Lambert, know by the alias Bob Robinson. That officer pretended to be a committed environmental and animal rights campaigner between 1984 and 1988. By the summer of 1987, he had successfully infiltrated the Animal Liberation Front, a group that operated through a tightly organised underground network of small cells of activists, making it difficult to penetrate. In October 2011, after he was exposed as an undercover officer, Bob Lambert admitted:

    “In the 1980s I was deployed as an undercover Met special branch officer to identify and prosecute members of Animal Liberation Front who were then engaged in incendiary device and explosive device campaigns against targets in the vivisection, meat and fur trades.”

    Lambert has also admitted that part of his mission was to identify and prosecute specific ALF activists:

    “I succeeded in my task and that success included the arrest and imprisonment of Geoff Sheppard and Andrew Clarke.”

    The men Lambert referred to were ALF activists who were found guilty of planting incendiary devices in two Debenhams stores. Allegations about exactly what kind of role Lambert might have played in their convictions have come to light only recently.

    In July 1987, three branches of Debenhams, in Luton, Romford and Harrow, were targeted by the ALF in co-ordinated, simultaneous incendiary attacks, because

    the shops sold fur products. Sheppard and Clarke were tried and found guilty, but the culprit who planted the incendiary device in the Harrow store was never caught. Bob Lambert’s exposure as an undercover police officer has prompted Geoff Sheppard to speak out about the Harrow attack. He alleges that Lambert was the one who planted the third device and that he was involved in the ALF’s co-ordinated campaign. Sheppard has made a statement, which I have seen, in which he says:

    “Obviously I was not there when he targeted that store because we all headed off in our separate directions but I was lying in bed that night, and the news came over on the World Service that three Debenhams stores had had arson attacks on them and that included the Harrow store as well. So obviously I straightaway knew that Bob had carried out his part of the plan. There’s absolutely no doubt in my mind whatsoever that Bob Lambert placed the incendiary device at the Debenhams store in Harrow. I specifically remember him giving an explanation to me about how he had been able to place one of the devices in that store, but how he had not been able to place the second device.”

    In the same interview, Sheppard says that two months after the three Debenhams store were set on fire, he and another person were in his flat making four more fire bombs when they were raided by police. Sheppard alleges that the intelligence for the raid was so precise that it is now obvious that it “came from Bob Lambert”. Lambert knew that the pair were going to be there making another set of incendiary devices.

    Sheppard was jailed for four years and four months, and Clarke for more than three years. For Lambert, it was a case of job done—in fact, so well had he manipulated the situation that he even visited Sheppard in prison, to give him support before disappearing abroad. Until recently Sheppard had no reason whatsoever to suspect the man he knew as Bob Robinson—he assumed that Robinson had got away with it, fled the country and built a new life.

    It seems that planting the third incendiary device might have been a move designed to bolster Lambert’s credibility and reinforce the impression of a genuine and dedicated activist. He successfully went on to gain the precise intelligence that led to the arrest of Sheppard and Clarke, without anyone suspecting that the tip-off came from him, but is that really the way we want our police officers to behave?

    The case raises new questions about the rules governing undercover police infiltrators and informers, particularly when it comes to those officers committing a crime—an area in which the law is especially grey. Police chiefs can authorise undercover officers to participate in criminal acts to gain the trust of the groups they are trying to infiltrate and, in theory, to detect or prevent a more serious crime, but usually they are not allowed to be involved in planning or instigating the crime. As I understand it, the specific law on that is the Regulation of Investigatory Powers Act 2000, and that before its enactment, at the time of the Debenhams attacks, the rules were vague. They have not so far been made public.

    If Sheppard’s allegations are true, someone must have authorised Lambert to plant incendiary devices at the Harrow store, and presumably that same person may also have given the officer guidance on just how far he needed to go to establish his credibility with the ALF. We simply do not know, and in the absence of any

    proper framework or rules, the task of holding Lambert to account is very difficult. Even if strict protocols are in place to try to control the actions of undercover officers, who decides what the protocols say, and how can we hold those people to account, given the secrecy that surrounds such activities?
    Link to this Hansard source (Citation: HC Deb, 13 June 2012, c96WH)
    Add an annotation (e.g. more info, blog post or wikipedia article)

    Mark Reckless (Rochester and Strood, Conservative)

    Will the hon. Lady give way?
    Link to this Hansard source (Citation: HC Deb, 13 June 2012, c98WH)
    Add an annotation (e.g. more info, blog post or wikipedia article)

    Caroline Lucas (Brighton, Pavilion, Green)

    Yes, but very briefly, as I am short of time.
    Link to this Hansard source (Citation: HC Deb, 13 June 2012, c98WH)
    Add an annotation (e.g. more info, blog post or wikipedia article)

    Mark Reckless (Rochester and Strood, Conservative)

    Is not an alternative explanation that there were no protocols in place and that decisions were taken at the discretion of this officer, who was not properly controlled? To the extent that there were protocols, is it not clear that the guidance for undercover officers was coming from the Association of Chief Police Officers, which is an entirely unaccountable organisation?
    Link to this Hansard source (Citation: HC Deb, 13 June 2012, c98WH)
    Add an annotation (e.g. more info, blog post or wikipedia article)

    Caroline Lucas (Brighton, Pavilion, Green)

    I thank the hon. Gentleman for his intervention. The truth is that we simply do not know, and that is the problem. We need clarity, which is what I hope the Minister for Policing and Criminal Justice can help us with later.

    There is no doubt in my mind that anyone planting an incendiary device in a department store is guilty of a very serious crime and should have charges brought against them. That means absolutely anyone, including, if the evidence is there, Bob Lambert or, indeed, the people who were supervising him.

    Ironically, as we have seen, the use of undercover police infiltrators can make it much more difficult to secure successful convictions. Three Court of Appeal judges have overturned the convictions of 20 environmental protestors, ruling that crucial evidence recorded by an undercover officer, Mark Kennedy, operating under the false name of Mark Stone, was withheld from the original trial. The judges said that they had seen evidence that appeared to show that Kennedy was

    “involved in activities that went further than the authorisation he was given”,

    and that he was “arguably, an agent provocateur.” The latest allegations concerning Bob Lambert and the planting of incendiary devices prompt us to ask: has another undercover police officer crossed the line into acting as an agent provocateur, and how many other police spies have been encouraging protestors to commit crimes?

    Mark Kennedy’s exposure in 2010 has shone a light on how officers behave when they go undercover, and especially on the rules governing whether they are permitted to form intimate relationships with those on whom they are spying. Jon Murphy, Chief Constable of Merseyside and the police chiefs’ spokesman on the issue, claims that that is “grossly unprofessional” and “never acceptable”, yet one undercover police officer, Pete Black, claims that superiors knew officers had developed sexual relationships with protestors to give credibility to their cover stories and help gather evidence.

    Eight women who say that they were duped into forming long-term loving relationships with undercover policemen have started a legal action against the police. They have a copy of a letter from a Metropolitan police solicitor that asserts that the forming of personal and other relationships by a “covert human intelligence

    source” to obtain information is permitted and lawful under RIPA; so either rogue undercover officers have been breaking the rules set by senior officers, or senior officers have misled the public by saying that such relationships are forbidden. We need to know what the truth is, and we need any rules of engagement to be published and open to public and parliamentary scrutiny or challenge.

    The eight women allege that the men’s actions constitute a breach of articles 3 and 8 of the European convention on human rights. Article 3 asserts that no one shall be subject to inhuman or degrading treatment, and article 8 grants respect for private and family life, including the right to form relationships without unjustified interference by the state. The women go on to allege that the actions amount to common law tortious acts of deceit, misfeasance in public office and assault.

    Bob Lambert is one of the five men named in the legal action, as is Mark Kennedy. The Guardian has also reported that Bob Lambert secretly fathered a child with a political campaigner whom he had been sent to spy on, and later disappeared completely from the life of the child, concealing his true identity from the child’s mother for many years. Lambert has admitted having had a long-term relationship with a second woman to bolster his credibility as a committed campaigner, and he subsequently went on to head the special demonstration squad and mentor other undercover officers who formed deceitful relationships with women.

    The police authorities have made virtually no attempt to hold those or other men to account, or to examine whether they have broken any rules on relationships when undercover. The solicitors instructed by the Metropolitan police have taken a totally obstructive approach to the litigation, threatening to strike out the claims as having no foundation. Furthermore, police solicitors argue that cases can be heard only by the investigatory powers tribunal, in secret—a move that would prevent the women, whose privacy was invaded in the most intrusive manner imaginable, from hearing the evidence, such as the extent to which intimate moments were reported back to police chiefs. It seems that the police do not want anyone to be able to challenge their version of events or to scrutinise their actions. To paraphrase one of the women involved, it is incredible that in most circumstances the police need permission to search someone’s house, but if they want to send in an agent who may sleep and live with activists in their homes, that can happen without any apparent oversight.

    The rules governing undercover police infiltrators and informers are also remarkably deficient when it comes to giving false evidence in court to protect a secret identity. For example, Jim Boyling, who was exposed last year for infiltrating groups such as Reclaim the Streets using the pseudonym Jim Sutton, concealed his true identity from a court when he was prosecuted alongside a group of protestors for occupying a Government building during a demonstration. It is alleged that from the moment Boyling was arrested, he gave a false name and occupation, maintaining this fiction throughout the entire prosecution, even when he gave evidence to barristers under oath.

    Boyling was reported to have been present at sensitive discussions between other activists and their lawyers to decide how they would defend themselves in court, undermining the fundamental right of the activists to

    hold legally protected consultations with a lawyer and illicitly obtaining details of private discussions. A lawyer representing activists who were charged alongside Jim Boyling has noted:

    “This case raises the most fundamental constitutional issues about the limits of acceptable policing, the sanctity of lawyer-client confidentiality, and the integrity of the criminal justice system. At first sight, it seems that the police have wildly overstepped all recognised boundaries.”

    Yet Boyling’s actions may well have been authorised. Pete Black, who worked with Boyling in the same covert unit penetrating political campaigns, said that the case was not unique and that, from time to time, prosecutions were allowed to go ahead in order to build up credibility with the activists being infiltrated.

    The Metropolitan commissioner, Bernard Hogan-Howe, has defended undercover officers’ use of fake identities in court, claiming that there is no specific law that forbids it. However, I echo the concerns of Lord Macdonald, the former Director of Public Prosecutions, who said that Hogan-Howe’s defence was “stunning and worrying”. He commented that

    “at the very least, the senior officers who are sending these undercover PCs into court to give evidence in this way are putting them at serious risk of straying into perjury.”

    Bob Lambert, Mark Kennedy and Jim Boyling, as well as two other officers named in current legal actions against the police, John Barker and Mark Cassidy, have all crossed a line. Similarly, other undercover police officers may well have crossed such a line. The assumption is that they have been authorised and instructed to do so or at least, if that is not specifically the case, that a blind eye has been turned to some of their actions.

    Activists who have been infiltrated have called for one overarching, full public inquiry to examine what has gone on. Lord Macdonald has also called for such an inquiry to consider how we should control undercover operations, but the Government have ignored calls to set one up. Instead, the authorities have set up 12 different inquiries since January 2011, each held in secret and looking at only one small aspect of an undercover operation. Those inquiries have not been particularly thorough and have not resulted in follow-up action. For example, the Director of Public Prosecutions, Keir Starmer QC, ordered an investigation and report into allegations that the Crown Prosecution Service suppressed vital evidence in the case of the Ratcliffe-on-Soar environmental protestors. A key criticism of the CPS in that report is of the

    “failures, over many months and at more than one level, by the police and the CPS.”

    Nick Paul, the senior CPS lawyer who specialises in cases involving police misconduct, was not even interviewed as part of the investigation, and senior CPS staff have evaded disciplinary action. The CPS shows an ongoing reluctance to investigate past possible miscarriages of justice, and Keir Starmer is among those resisting calls for a more far-reaching inquiry.

    The new allegations that I have raised today make the case for a public inquiry even more compelling. So many questions remain unanswered, including whether Bob Lambert planted the third incendiary device and, if he did, who authorised him to do so and why. More widely, the public have a right to know why money is being spent on infiltrating campaign groups, with no apparent external oversight of the decision to infiltrate

    or of whether the methods used are necessary or proportionate. Why are the rules on such practices open to such abuse? Why are high-ranking police officers and, presumably, politicians sanctioning operations that put police officers at risk and undermine basic human rights?

    We need to have faith that police officers are beyond reproach, that robust procedures are in place to deal with any transgressions and that those making decisions about the deployment of police officers are accountable and subject to proper scrutiny. I hope the Minister will take this opportunity to review the various concerns I have raised, and that he can tell us that the Government will agree to set up a far-reaching public inquiry into undercover police infiltrators and informers, which will look back over past practices as well as look forward.
    Link to this Hansard source (Citation: HC Deb, 13 June 2012, c98WH)
    Add an annotation (e.g. more info, blog post or wikipedia article)
    11:16 am

    Nick Herbert (Minister of State, Justice; Arundel and South Downs, Conservative)

    May I say what a surprise, but nevertheless what a great pleasure, it is to see you in the Chair, Mr Davies? I congratulate Caroline Lucas on securing the debate. I am grateful to her for raising some of these issues, because it gives me an opportunity to set out the Government’s response. I recognise that the issues she has raised are serious.

    Undercover operations are sometimes necessary to protect the public and to prevent or detect crime. We should commend the difficult and often dangerous job performed by undercover officers. However, in the light of recent cases and concerns, including those raised by the hon. Lady, it is right to ask two principal questions that we must be able to answer with confidence. First, is there a system for ensuring that the use of police undercover deployment is consistent with human rights legislation, particularly the right to privacy and the right to a fair trial? Secondly, is the system working sufficiently well for the particular type of undercover deployment that has led to concerns, or do we need to take action to improve it and ensure that it provides the required assurance?

    Before I consider those two fundamental questions, it is important to point out that the deployment of Bob Lambert, a case raised by the hon. Lady, took place in the 1990s, before the Regulation of Investigatory Powers Act 2000—or RIPA, as it is known—was implemented. RIPA is the legislative framework that enables police and other public authorities using covert human intelligence sources, such as undercover officers, to ensure that they act in compliance with their duties under the Human Rights Act. A “covert human intelligence source” is the label used by the legislation to describe anyone who establishes or maintains a relationship for a covert purpose. That applies to a member of the public who comes forward to volunteer information about someone and who is asked by a public authority to find out more. It applies to a public authority test purchaser who engages the confidence of a supplier to buy illicit goods. It also applies to a member of a law enforcement agency who goes undercover to infiltrate and to pass intelligence back to that agency about an organisation planning disruption or criminal acts.
    Link to this Hansard source (Citation: HC Deb, 13 June 2012, c101WH)
    Add an annotation (e.g. more info, blog post or wikipedia article)

    Mark Reckless (Rochester and Strood, Conservative)

    Could the Minister clarify whether RIPA also applies to ACPO’s responsibility for an undercover officer and its status as a private company? Moreover, did ACPO have any involvement in the Lambert case, or did it become involved only in later operations?
    Link to this Hansard source (Citation: HC Deb, 13 June 2012, c102WH)
    Add an annotation (e.g. more info, blog post or wikipedia article)

    Nick Herbert (Minister of State, Justice; Arundel and South Downs, Conservative)

    I will clarify that point later, but my understanding is that the accountability lies with chief constables, not ACPO. I am aware of and share my hon. Friend’s concern about ACPO and its status. I hope and believe that it will be addressed, but if there is anything further to say about the matter, I will write to him.
    Link to this Hansard source (Citation: HC Deb, 13 June 2012, c102WH)
    Add an annotation (e.g. more info, blog post or wikipedia article)

    Mark Reckless (Rochester and Strood, Conservative)

    I am thinking in particular of the environmental protests at Ratcliffe-on-Soar, where it emerged that ACPO was responsible for the management of undercover officers. I am delighted that since then, Ministers have ensured the transfer of the powers involved to the Metropolitan police.
    Link to this Hansard source (Citation: HC Deb, 13 June 2012, c102WH)
    Add an annotation (e.g. more info, blog post or wikipedia article)

    Nick Herbert (Minister of State, Justice; Arundel and South Downs, Conservative)

    My hon. Friend is correct about the responsible unit, and that important change has enhanced accountability.

    RIPA applies to each of the instances that I have mentioned, because the true nature of the relationship, which involves reporting back covertly to a public authority what has been said or done, is hidden from the other person or people being talked to. In every case, RIPA requires that authorisation is only given if it is necessary and proportionate. RIPA sets out who can make a decision to deploy a covert source and for what purpose the deployment might be made. RIPA codes of practice provide practical guidance on how best to apply the regulatory framework and how to observe the human rights principles behind authorisations. External oversight and inspection is provided by the chief surveillance commissioner, and independent right of redress is provided by an investigatory tribunal for anyone who believes that they have been treated unlawfully.

    That is the current system, which was not in place when Lambert was deployed, but does it work? The published annual reports of the chief surveillance commissioner indicate that, in the main, it does, but that has not always been the case. That was shown graphically by the independent report produced by Her Majesty’s inspectorate of constabulary earlier this year on the deployment of undercover police officer Mark Kennedy. It showed that there had been failings in the application of the existing system and safeguards, but it went further by making a number of recommendations for ACPO to strengthen both internal review and external quality assurance of undercover officers deployed against domestic extremism. It also invited the Home Secretary to consider the arrangements for authorising the undercover police operations that present the most significant risks of intrusion. In particular, it proposed raising the internal level of police authorisations for the long-term deployments of undercover police officers under RIPA, and establishing independent, external prior approval by the chief surveillance commissioner for long-term deployments of undercover police officers.

    The Home Secretary welcomed the HMIC report, and since its publication the Home Office has been working with the inspectorate, ACPO, the chief surveillance commissioner and others on how best to implement its recommendations.
    Link to this Hansard source (Citation: HC Deb, 13 June 2012, c102WH)
    Add an annotation (e.g. more info, blog post or wikipedia article)

    Caroline Lucas (Brighton, Pavilion, Green)

    I am grateful to the Minister for setting out the situation as he sees it, but does RIPA allow undercover police to have sexual relationships with those they are trying to infiltrate? That is one of the points at issue: some say that it does and some say that it does not.
    Link to this Hansard source (Citation: HC Deb, 13 June 2012, c103WH)
    Add an annotation (e.g. more info, blog post or wikipedia article)

    Nick Herbert (Minister of State, Justice; Arundel and South Downs, Conservative)

    I will try to respond to the hon. Lady’s question before the end of my speech.

    One factor is how we target the type of deployment that causes concern, without imposing an unnecessary or burdensome bureaucracy across a much wider field where the current regime may be said to be working as Parliament intended. We need to ensure that we do not deter members of the public from coming forward to help the police in what can be difficult work. We also need to make sure that officers charged with sensitive, intrusive and dangerous policing in the community are given the support and protection they require. Above all, we need to avoid the mistakes identified in the HMIC report being made again. Our response, when we make it, will have that uppermost in mind.

    On the hon. Lady’s call for a public inquiry, the independent HMIC review looked at the broad issues raised by the Kennedy case, and made clear recommendations as to how the current system should be strengthened—a system that was not, in any case, in place when Lambert was deployed. We are considering our precise response to those recommendations. I do not think that it is necessary to conduct a public inquiry.

    The hon. Lady raised a number of specific issues, one of which was whether RIPA can be used to authorise a covert human intelligence source to break the law. In a very limited range of circumstances, an authorisation under RIPA part II may render lawful conduct that would otherwise be criminal, if it is incidental to any conduct falling within the Act that the source is authorised to undertake. That depends, however, on the circumstances of each individual case, and consideration should always be given to seeking advice from the legal adviser of the relevant public authority when such activity is contemplated. A covert human intelligence source who acts beyond the limits recognised by the law will be at risk of prosecution, and the need to protect the covert human intelligence source cannot alter that principle.

    The RIPA statutory guidance does not explicitly cover the matter of sexual relationships, but it does make it clear that close management and control should

    be exercised by the undercover officer’s management team. That will be a relevant factor. The absence of such management gave rise to concern in the Kennedy case.
    Link to this Hansard source (Citation: HC Deb, 13 June 2012, c103WH)
    Add an annotation (e.g. more info, blog post or wikipedia article)

    Caroline Lucas (Brighton, Pavilion, Green)

    Does the Minister agree that that sort of fudged, grey area means that for women who have had such an experience, and for women and, indeed, men who might have such an experience in the future, this is incredibly unsatisfactory? We simply do not have clear guidelines on whether the action and going that far is legitimate, and that undermines confidence in the system. The Minister has referred to other inquiries that have been conducted, but what has not been conducted is a public, overarching inquiry to consider all the relevant areas.

    Moreover, the Minister’s response to the case of Bob Lambert is extraordinarily complacent. Yes, RIPA was not in place at that point, so there can be no criticism that its guidance was not followed, but what is the Minister going to do now, given that the issue is in the public domain and that there could have been serious miscarriages of justice? How will the Minister follow up on that case in particular?
    Link to this Hansard source (Citation: HC Deb, 13 June 2012, c104WH)
    Add an annotation (e.g. more info, blog post or wikipedia article)

    Nick Herbert (Minister of State, Justice; Arundel and South Downs, Conservative)

    I would be happy to pursue the matter further with the hon. Lady, if she likes, but I am not persuaded that it would be appropriate to issue specific statutory guidance under RIPA about sexual relationships. What matters is that there is a general structure and system of proper oversight and control, rather than specific directions on behaviour that may or may not be permitted. Moreover, to ban such actions would provide a ready-made test for the targeted criminal group to find out whether an undercover officer was deployed among them. Specifically forbidding the action would put the issue in the public domain and such groups would know that it could be tested.

    The Government are certainly not complacent about the Lambert case. We were keen for an independent, wider review of the deployment of undercover officers by HMIC, which is now independent of the Government and reports to Parliament. We are satisfied that its recommendations will further strengthen the proper system of safeguards for the deployment of undercover officers that did not operate when Lambert was deployed.

    Sitting s uspended.

    Find this story at 13 June 2012

    Ex-police spy Mark Kennedy’s current business activities

    Mark Kennedy, who was exposed as a police infiltrator of various movements
    in the UK and beyond in October 2010, is still, after the collapse of his
    police career, actively seeking to operate as a private consultant. He
    appears to be based in the US, although this is not certain.

    Kennedy is advertising himself on “LinkedIn”, and his profile can be viewed at
    http://www.linkedin.com/pub/mark-kennedy/44/853/198

    An extract from this profile is listed here….

    “I have many years experience in covert operations and deployments,
    intelligence gathering, analysis and dissemination, statement taking,
    investigations and case preparation, evidential court apperances,
    surveillance and counter-surveillance skills and the use of technical
    covert, recording equipment.

    I have lectured for law enforcement agencies and services regarding
    infiltration tactics and covert deployments and have lectured for the
    private sector regarding risk management, the threat from extremist and
    protest groups and creating preventative protocols.

    My exeperience is drawn from 20 years as a British Police officer, the
    last ten of which were deployed as a covert operative working within
    extreme left political and animal rights groups throughout the UK, Europe
    and the US providing exacting intelligence upon which risk and threat
    assessment analysis could be made.

    That knowledge and experience is now drawn upon to provide expert
    consultation to the public / private sectors to provide investigative
    services, deliver informative lectures and training, provide risk and
    threat assessments to companies, corporations and their staff from the
    threat of direct action in all its forms. It is my intention to provide a
    enhance a better understanding of protest, the reasons why protest takes
    place and the subsequent appropriate management of protest and
    to assist in employing the appropriate pre-emptive policing and security
    considerations to mass mobilisations, protest and direct action as well as
    real time analysis and responces and to provide post event debriefing to
    staff effected by direct action.”

    The profile indicates Kennedy is based in Cleveland, Ohio, USA.

    The profile also reveals that in January 2010, shortly before leaving the
    police, he set up a company called “Stanage Consulting”.

    Stanage Consulting are registered at
    SUITE 2029
    6 SLINGTON HOUSE
    RANKINE ROAD
    BASINGSTOKE
    ENGLAND
    RG24 8PH

    This address is simply a forwarding service -see
    http://www.my-uk-mail.co.uk/frequentlyaskedquestions.htm

    This forwarding service also hosted another company set up by Kennedy
    called “Tokra”, linked to “Global Open”, which has since been dissolved –
    for background on this see
    http://www.indymedia.org.uk/en/2011/01/471916.html?c=on#c277723

    The other company listed by Kennedy on his LinkedIn profile is US- based
    “risk managers” Densus Group, for whom, since March 2012, he has acted as
    a consultant – see http://www.densusgroup.com

    To quote from the LinkedIn page again – “The Densus Group provides a range
    of specialty consultancy and training, primarily on behalf of government
    institutions and private firms in respect of risk analysis and threat
    assessment from protest groups and domestic extremism.”

    The Densus Group was very interested in the policing of the Pittsburgh G20
    summit protests (see
    http://www.bizjournals.com/pittsburgh/stories/2009/09/21/daily42.html?page=all)
    and is generally trying to sell its services to corporate clients
    concerned with combatting the US Occupy movement and similar groups (see
    http://darwinbondgraham.wordpress.com/tag/densus-group/)

    Thus, it seems that Kennedy is attempting to establish himself as a
    private consultant for corporate agencies, presumably especially in the
    US, where he seems to be based (despite a UK-based forwarding business
    address). Activists in the US (and elsewhere) should be aware of this.

    Find this story at 1 june 2012 

    Antiterrorismemaatregelen in Nederland

    uit het rapport:

    Conclusies

    1) De aanslagen van 11 september 2001 en de daarop volgende dreiging van terrorisme voor de gehele wereld hebben op veel terreinen grotegevolgen gehad. Terrorisme vormt in dit eerste decennium van de nieuweeeuw één van de grootste bedreigingen voor onze in- en externeveiligheid. Het stemt dan ook hoopvol dat de groep radicalen in ons landdie bereid is met geweld zijn politieke of religieuze doelen na te strevengaandeweg kleiner is geworden.

    2) In dit onderzoek – een zelfreflectie van de kant van het kabinet – isgekeken naar de maatregelen die zijn genomen om terrorisme tebestrijden. Ten aanzien van de beschikbare maatregelen in de strijd tegenterrorisme is de conclusie van dit onderzoek dat sprake is van een geredeaanleiding voor instelling of aanpassing van een maatregel en dat sprakeis van samenhang in de totstandkoming en toepassing van maatregelen.Dit is voor een belangrijk deel de resultante van de sterk aanwezige drangin Nederland om te leren hoe dit in ons land betrekkelijk nieuwefenomeen op de ‘beste’ manier – dat wil zeggen met nadruk op preventiedoor middel van proportioneel en effectief ingrijpen en met gebruikmakingvan legitieme middelen – kan worden bestreden. Uit de grotehoeveelheid studies en evaluaties die de afgelopen negen jaren isverschenen en de wijze waarop de lessen hieruit zijn verwerkt, blijkt datop het terrein van terrorismebestrijding sprake is van lerend vermogen.Centrale en lokale overheid alsmede uitvoerende diensten trekken leringuit de diverse afzonderlijke evaluaties en juridische oordelen en passendeze lessen toe.

    lees meer

    Operatie Ochtendgloren “Over de politie die niet echt wakker wordt na een nachtelijke phishing operatie”

    Opsporing in Nederland is verworden tot het afsluiten van snelwegen en wachten op de autodief, de transportcrimineel en de inbreker. Sinds 2000 is de ‘operatie Ochtendgloren’ onderdeel van het politiewerk. Een snelweg wordt midden in de nacht afgesloten en alle passerende voertuigen worden onderworpen aan een totale controle. Hierbij worden rijbewijs en verzekering gecontroleerd, maar ook openstaande boetes, belastingschulden en eventuele verblijfsvergunningen. Vaak is een pinautomaat aanwezig zodat verschuldigde bedragen gelijk afgerekend kunnen worden. Doorgaans zijn rond de 130 functionarissen bij de controle betrokken.

    lees meer

    Politiële gegevensverwerking en Privacy

    In dit proefschrift stellen we vast in hoeverre met de wijziging van het wettelijke regime rond de verwerking van persoonsgegevens door de politietegemoet is gekomen aan de knelpunten die onder het regime van de Wetpolitieregisters zijn geconstateerd. Sinds 1990 zijn er regels en normen voorhet gebruik van politiële gegevensverzamelingen. Aanvankelijk waren zeopgenomen in de Wpolr; vanaf 1 januari 2008 is de Wpolg van kracht. Metde invoering van de Wet politiegegevens heeft de wetgever tegemoet willenkomen aan de knelpunten die bij de uitvoering van de Wet politieregistersen de Wet bijzondere politieregisters naar voren zijn gekomen. De volgendeprobleemstelling (PS) is als leidraad van het onderzoek genomen.

    lees meer

    Verenigde politie van Europa

    Landelijke Informatie Coördinatie over activisme-extremisme
    Over de komst van een Europese politie, het uitwisselen van gegevens over buiten parlementaire actievoerders, een leugenachtige overheid en een politicus die alleen maar voor zijn eigen vrijheid van meningsuiting opkomt.

    Donderdag 12 februari 2009 was een gedenkwaardige dag. Groot-Brittannië weigerde het Tweede Kamerlid dhr. Wilders de toegang tot haar grondgebied. Een vliegtuig vol journalisten en fotografen vergezellen dhr. Wilders op weg naar Heathrow. Zijn verblijf op Britse bodem was van korte duur. Dhr. Wilders was van tevoren gewaarschuwd. De Britse overheid had aangegeven hem de toegang te weigeren. Een media moment is nooit weg en de voltallige Nederlandse journalistiek sukkelt toch wel achter de parlementaire blondine aan. In de brief aan dhr. Wilders schrijft de minister van Binnenlandse Zaken van Groot-Brittannië: “The Secretary of State is of the view that your presence in the UK would pose a genuine, present and sufficiently serious threat to one of the fundamental interests of society. The Secretary of State is satisfied that your statements about Muslims and their beliefs, as expressed in your film Fitna and elsewhere, would threaten community harmony and therefore public security in the UK.” Het Tweede Kamerlid krijgt dezelfde behandeling als radicale imams in het Verenigd Koninkrijk, een behandeling die deze geestelijken ook in Nederland te beurt valt. Volgens dhr. Wilders wordt zijn vrijheid van meningsuiting belemmerd en is hij de grote pleitbezorger van dit recht, iets dat een groot deel van het electoraat lijkt te beamen. Radicale meningen mogen niet worden gesmoord.

    lees meer

    << oudere artikelen  nieuwere artikelen >>