On Laughter and Forgetting Our EU Spying

I’ve long been intrigued by the response to the discovery of CIA spies in Germany, starting last week when seemingly everyone wanted to admit that the alleged spy was CIA’s. Unlike the Pakistani, Mexican, Afghan, and other precedents, the government either didn’t succeed or didn’t care to prevent Americans from learning about our overseas spies.

Now we’ve got competing explanations for why we spy in Germany.

According to Eli Lake source David Albright (whom Jim regularly embarrasses for his Iran propaganda), we spy on Germany because AQ Khan got much of his plans for Pakistan’s nuclear program in Germany. Lake also points to Germany’s close relations with Russia. The CIA has to spy on Germany, then, because Germany is not very good at spying on others, including Russian spies.

And of course, the forerunners to Russia’s modern spy services had plenty of experience operating on German soil. Vladimir Putin famously ran agents for the KGB from 1985 to 1990 out of Dresden, which was then in communist East Germany. His successors are still in the country, albeit on less friendly terms. “There is a huge Russian presence in Germany,” said the senior U.S. intelligence official.

Part of the current concern about Russia’s activities in Germany stems from unease about Berlin’s equivalent of the FBI, known as the Bundesamt für Verfassungsschutz (BFV). One former U.S. intelligence officer who worked on European issues said the BFV had a strong reputation for identifying and neutralizing domestic threats inside Germany, but was not very good hunting so-called “moles” – foreign agents burrowed into their spy services. “I can tell you they never watched us very carefully at all,” this official said. “That is almost definitely going to change now.”

Meanwhile, German Die Zeit editor Jochen Bittner relied on CIA’s former German Station Chief Joseph Wippl for explanation; Wippl provided a bizarre suggestion that CIA was accidentally treating Germany like it treats “Third World” countries, and anyway the Germans aren’t willing to do the dirty work to gain full membership in a Five Eyes like relationship.

I asked Joseph T. Wippl, who was the C.I.A.’s Berlin station chief in the early 2000s, why the agency had recruited German sources. “The C.I.A. has developed strongly in the direction of a third world agency, in that its officers work in places where the U.S. has great leverage over others and where there is no rule of law,” he said. “They are not used to or have not been trained to work in countries with similar democratic, constitutional institutions.” At the same time, he went on, the Germans had never seemed interested in the level of cooperation that might obviate this sort of unilateral snooping — the sort of treaty relationship that America has with Australia, Britain, Canada and New Zealand, the so-called Five Eyes intelligence alliance.

To suggest that the Germans could be treated as a Sixth Eye is a flattering idea. Yet I doubt the Germans would accept the honor. As is the case with America’s nuclear umbrella, we’re happy to have the protection while being still happier not to have to carry the responsibility. If Germany entered into a real intelligence alliance with America, the government would have to deal with a load of dirty knowledge — and lose the benefit of plausible deniability.

As you read Wippl’s comments, remember his own rather dubious exploits in Germany.

This whole conversation feels a lot like Keith Alexander’s spectacularly successful effort to use a few journalists to cover up his admission that we do spy in Europe, but only for targets — Chinese, Russian, and al Qaeda — that can be deemed not-European.

But it ignores the great deal of spying we do on the European Union, which has long served to strengthen Germany, but the recent collapse of which has eliminated the most viable competing reserve currency in the world.

There has been a tremendous adjustment in the European power base in recent years, which largely stems from the EU, which in turn largely stems from Germany’s successful effort at making the rest of the EU absorb the pain of the financial crisis. I guarantee you we were aggressively spying on that, all in the name of preparing for instability (but surely using that intelligence to preserve the dollar’s competitive advantages).

Meanwhile, all this takes place against the background of negotiations on the TTIP, in which the US would demand concessions from Europe that gut many of the better policies of the EU.

We may be concerned that the Germans have good reason to want closer relations with Russia than we want them to have. But we also have a financially competitive relationship with Germany, and there’s no reason to believe we’re not doing a ton of spying to our advantage. Key details of that spying has not (yet) been fully revealed. But I do wonder if that’s part of the issue here.

Did They Call Wiley Gill “Mohammed Raghead” Before Claiming Videogame Was a Flight Simulator?

The ACLU is suing the Federal Government for the standards it uses in Suspicious Activity Reports, which can record completely innocent actions. A lot of people are citing James Prigoff — an 86-year old photographer and retired business executive, who got tracked to his Sacramento, CA home for taking a picture of a well-known Boston landmark.

But given the denials about the tracking of Muslims in response to the Intercept story on NSA’s surveillance of 5 Muslim leaders, the SAR complaint of of Wiley Gill, a convert to Islam, deserves as much attention.

Gill describes how the cops in Chico, CA, had been tracking him both online and at the local mosque, when they invented the pretense of a domestic violence complaint to search his home without a warrant. They found something on video games loaded on his computer and deemed it a flight simulator.

The SAR was created on or about May 23, 2012, and purports to document an encounter between Mr. Gill and the Chico Police Department (“CPD”) on or about May 20, 2012. The SAR states that a CPD officer was investigating a domestic violence incident and believed the suspect may have fled into Mr. Gill’s residence. The SAR states that this was later discovered to be unfounded. It acknowledges that the CPD officer searched Mr. Gill’s home. The SAR asserts that Mr. Gill’s computer displayed a screen titled something to the effect of “Games that fly under the radar,” which appeared to be a “flight simulator type of game.” The SAR concludes by describing Mr. Gill’s “full conversion to Islam as a young WMA [white, male adult],” “pious demeanor,” and “potential access to flight simulators via the internet” as “worthy of note.”

Admittedly, the bias inherent to Gill’s SAR came from local cops, not the FBI or NSA. But I’d be willing to bet it responded to alerts (FBI and DHS both release them) about white converts to Islam.

The Intercept story, remember, described an internal document referring to targets as “Mohammed Raghead.” NSA has disclaimed any tie to that — even more aggressively than FBI did its own totally racist documents.

And while I presume whatever alerts to local cops led them to track Gill’s non-suspicious behavior said nothing explicitly racist, at some point the system reinforces a system under which Muslims get tracked, and others do not.

How is Abdullah Obtaining So Many Tapes of Phone Calls?

It is looking more and more likely that Abdullah Abdullah will continue his boycott of the vote-counting process in Afghanistan. As I noted Friday, thousands of his supporters took to the streets to protest the expected outcome and to call for fraudulent votes to be discarded. Abdullah’s camp released even more evidence Saturday, consisting of two audiotapes of conversations among officials in Paktika province regarding 20 ballot boxes which were found to be already stuffed with ballots on the night before the election. ToloNews informs us that one of the tapes was a conversation between the Paktika provincial Independent Election Commission (IEC) head and the executive assistant of Zia-ul-Haq Amarkhail (the head of the IEC, who resigned after Abdullah released the first set of tapes). The second tape purports to be yet another recording of Amarkhail himself, this time participating in a discussion (again with the provincial IEC head) of how to deflect blame for the stuffed ballot boxes found in Paktika:

Amarkhail begins by stressing his frustration about the situation with the ANA commander revealing information to the media about the ballot stuffing. The provincial IEC head told Amarkhail that a video was made of the men stuffing 20 ballot boxes with 12,000 votes and in each box exactly 600 votes were stuffed and that the ANA wants to “broadcast this through TOLO TV.”

Concerned and upset about their position, the provincial IEC head suggests to Amarkhail that they hold a press conference defaming the ANA commander by stating that these frauds were conducted by the commander and his men.

After proposing the idea, the Gov. of Paktika, Muhebullah Samim, takes the phone approving the idea of holding a press conference expressing to Amarkhail that this is their only way out is by blaming the commander that he forced the “boys to do this and the boys will admit to it. The boys are willing to say that the ANA commander has forced them to stuff boxes.”

Content with the idea, Amarkhail agrees to the plan and begins to tell the men what needs to be done and how.

In a followup article, ToloNews provides the most incriminating part of the discussion and notes that they had reported the discovery of the stuffed ballot boxes before the election on the day they were found by the army: Read more

Sonia Sotomayor, John Roberts, and the Riley Decision

In a piece just published at Salon, I look at John Roberts’ citation in his Riley v. California decision of Sonia Sotomayor’s concurrence in US v. Jones, the opinion every privacy argument has invoked since she wrote it two years ago. I argue Roberts uses it to adopt her argument that digital searches are different.

A different part of Sotomayor’s concurrence, arguing that the existing precedent holding that you don’t have a privacy interest in data you’ve given to a third party “is ill suited to the digital age,” has been invoked repeatedly in privacy debates since she wrote it. That’s especially true since the beginning of Edward Snowden’s leaks. Lawsuits against the phone dragnet often cite that passage, arguing that the phone dragnet is precisely the kind of intrusion that far exceeds the intent of old precedent. And the courts have – with the exception of one decision finding the phone dragnet unconstitutional – ruled that until a majority on the Supreme Court endorses this notion, the old precedents hold.

Roberts cited from a different part of Sotomayor’s opinion, discussing how much GPS data on our movements reveals about our personal lives. That appears amid a discussion in which he cites things that make cellphones different: the multiple functions they serve, the different kinds of data we store in the same place, our Web search terms, location and apps that might betray political affiliation, health data or religion. That is, in an opinion joined by all his colleagues, the chief justice repeats Sotomayor’s argument that the sheer volume of this information makes it different.

Roberts’ argument here goes beyond both Antonin Scalia’s property-based opinion and Sam Alito’s persistence-based opinion in US v. Jones.

Which seems to fulfill what I predicted in my original analysis of US v. Jones — that the rest of the Court might come around to Sotomayor’s thinking in her concurrence (which, at the time, no one joined).

Sotomayor, IMO, is the only one ready to articulate where all this is heading. She makes it clear that she sides with those that see a problem with electronic surveillance too.

I would take these attributes of GPS monitoring into account when considering the existence of a reasonable societal expectation of privacy in the sum of one’s public movements. I would ask whether people reasonably expect that their movements will be recorded and aggregated in a manner that enables the Government to ascertain, more or less at will, their political and religious beliefs, sexual habits, and so on.

[snip]

I would also consider the appropriateness of entrusting to the, in the absence of any oversight from a coordinate branch, a tool so amenable to misuse, especially in light of the Fourth Amendment’s goal to curb arbitrary exercises of police power to and prevent“a too permeating police surveillance,”

And in a footnote, makes a broader claim about the current expectation of privacy than Alito makes.

Owners of GPS-equipped cars and smartphones do not contemplate that these devices will be used to enable covert surveillance of their movements.

Ultimately, the other Justices have not tipped their hand where they’ll come down on more generalized issues of cell phone based surveillance. Sotomayor’s opinion actually doesn’t go much further than Scalia claims to when he says they can return to Katz on such issues–but obviously none of the other Republicans joined her opinion. And all those who joined Alito’s opinion seem to be hiding behind the squishy definitions that will allow them to flip flop when the Administration invokes national security.

Sotomayor’s importance to this decision likely goes beyond laying this groundwork two years ago.

There’s evidence that Sotomayor had a more immediate impact on this case. In a recent speech — as reported by Adam Serwer, who recalled this comment after yesterday’s opinion — Sotomayor suggested she had to walk her colleagues through specific aspects of the case they didn’t have the life experience to understand.

The Supreme Court has yet to issue opinions on many of its biggest cases this term, and Sotomayor offered few hints about how the high court might rule. She did use an example of a recent exchange from oral argument in a case involving whether or not police can search the cell phones of arrestees without a warrant to explain the importance of personal experience in shaping legal judgments.
“One of my colleagues asked, ‘who owns two cell phones, why would anybody?’ In a room full of government lawyers, each one of them has two cell phones,” Sotomayor said to knowing laughter from the audience. “My point is that issue was remedied very quickly okay, that misimpression was.”
The colleague was Chief Justice John Roberts, who along with Justice Antonin Scalia,seemed skeptical during oral arguments in Wurie v. United States that anyone but a drug dealer would need two cell phones.

“That’s why it’s important to have people with different life experiences,” Sotomayor said. ”Especially on a court like the Supreme Court, because we have to correct each other from misimpressions.”

In my Salon piece, I suggest that some years from today, some Court observer (I had Jeffrey Toobin in mind) will do a profile of how Sotomayor has slowly brought her colleagues around on what the Fourth Amendment needs to look like in the digital age.

I come away from this opinion with two strong hunches. First, that years from now, some esteemed court watcher will describe how Sonia Sotomayor has gradually been persuading her colleagues that they need to revisit privacy, because only she would have written this opinion two years ago.

Of course, it likely took Roberts writing the opinion to convince colleagues like Sam Alito. Roberts wrapped it up in nice originalist language, basically channeling James Madison with a smart phone. That’s something that surely required Roberts’ stature and conservatism to pull off.

But if this does serve as a renewed Fourth Amendment, with all the heft that invoking the Founders gives it, I’ll take it.

Unanimous: Cops Need a Warrant to Access Your Phone Data

SCOTUS just unanimously held that cops generally need a warrant to access your cell phone data. Chief Justice Roberts wrote the opinion. The opinion is here.

I’m reading now to figure out what it means. Will update accordingly.

This passage is getting widely cited:

These cases require us to decide how the search incident to arrest doctrine applies to modern cell phones, which are now such a pervasive and insistent part of daily life that  the proverbial visitor from Mars might conclude they were an important feature of human anatomy. A smart phone of the sort taken from Riley was unheard of ten years ago; a significant majority of American adults now own such  phones.

I’m amused by the way Roberts deals with the government’s belated encryption argument.

Encryption isa security feature that some modern cell phones use in addition to password protection. When such phones lock, data becomes protected by sophisticated encryption that  the password. Brief for United States as Amicus Curiae in No. 13–132, p. 11.

[snip]

And data encryption is even further afield. There, the Government focuses on the ordinary operation of a phone’s security features,apart from any active attempt by a defendant or his associates to conceal or destroy evidence upon arrest.

We have also been given little reason to believe that either problem is prevalent.

[snip]

Similarly, the opportunities for officers to search a password-protected phone before data becomes encrypted are quite limited. Law enforcement officers are very unlikely to come upon such a phone in an unlocked state because most phones lock at the touch of a button or, as a default, after some very short period of inactivity. See, e.g., iPhone User Guide for iOS 7.1 Software 10 (2014) (default lock after about one minute). This may explain why the encryption argument was not made until the merits stage in this Court, and has never been considered by the Courts of Appeals

Read more

The Law and EO-Breaking Report

One of the things I was most surprised about in the House Intelligence Authorization was a requirement that the Director of National Intelligence report violations of law or EO 12333 to the Intelligence Committees.

SEC. 510. ANNUAL REPORT ON VIOLATIONS OF LAW OR EXECUTIVE ORDER.

(a) Annual Reports Required.–The Director of National Intelligence shall annually submit to the congressional intelligence committees a report on violations of law or executive order by personnel of an element of the intelligence community that were identified during the previous calendar year.
(b) Elements.–Each report required under subsection (a) shall include a description of, and any action taken in response to, any violation of law or executive order (including Executive Order 12333 (50 U.S.C. 3001 note)) by personnel of an element of the intelligence community in the course of such employment that, during the previous calendar year, was determined by the director, head, general counsel, or inspector general of any element of the intelligence community to have occurred.
(b) Initial Report.–The first report required under section 510 of the National Security Act of 1947, as added by subsection (a), shall be submitted not later than one year after the date of the enactment of this Act.

The language was inserted into the bill by Jim Himes (who also added very laudable language requiring Senate approval for the NSA’s Inspector General).

The language appeared in the RuppRoge NSA “reform” bill; I presumed then that it was meant as false transparency — an effort to show off that just one NSA cleared individual  a year gets caught stalking an ex-girlfriend using its authorities.

And it may well be.

But I’m intrigued that Mike Rogers dedicated most of a Manager’s Amendment to the bill to tighten language from that section (in part limiting the reporting to actions “relating to intelligence activities”). And the hackish Ted Yoho submitted an amendment requiring a version of the report be shared with the House Oversight and Senate Homeland Security and Government Affairs Committees. I can’t imagine Yoho asking for it unless there were partisan hay to make out of it.

Now I want that report!

Mike Rogers’ Senior NSA Retiree Working For Foreign Government Cooling Off

I’m still working through the Intelligence Authorization and proposed amendments, which have been posted but which may or may not get a vote.

I’m particularly puzzled by an Amendment Mike Rogers submitted at the last minute, after having proposed it in committee but withdrawn it. The description of what he proposed reads,

Chairman Rogers offered an amendment to the amendment in the nature of a substitute to require a “cooling off” period before former Intelligence Community senior employees could work for a foreign government or a company controlled by a foreign government. The amendment would also establish notification and reporting requirements for former IC senior employees. He subsequently withdrew the amendment.

After having withdrawn that he submitted this amendment, but did not list it as a Manager’s Amendment (see below for the text).

Effectively, the Amendment seems to do two things. First, it requires high ranking intelligence community personnel (and this includes Congress, presumably up to and including Rogers himself) to tell their Agency when they start negotiating a new job with a company with foreign ties.

It would also prohibit those high ranking people from working for a company with foreign ties for a year — or two, if it pertains to something they worked on. It also requires former employees to disclose any payment they get from a foreign country or foreign owned company.

Now, this Amendment seems like a total no-brainer (indeed, the reporting requirements should be in place for all employers). It’s a measure to prevent top IC officials to go work for foreign governments.

So why didn’t this pass through committee? And why is Rogers submitting it now? What former high ranking official went to work for a foreign entity, raising the need for such a no-brainer law?

One more question: I wonder whether Israel will be included among the covered countries. Sure, it’s a close ally — precisely the kind that might hire away top IC talent. But it’s also an aggressive spy targeting the US. Precisely the kind of country that would make this kind of amendment even remotely controversial.

Update: Via Matt Stoller and billmon, this is presumably what this about:

A longtime adviser to the U.S. Director of National Intelligence has resigned after the government learned he has worked since 2010 as a paid consultant for Huawei Technologies Ltd., the Chinese technology company the U.S. has condemned as an espionage threat, The Associated Press has learned.

Theodore H. Moran, a respected expert on China’s international investment and professor at Georgetown University, had served since 2007 as adviser to the intelligence director’s advisory panel on foreign investment in the United States. Moran also was an adviser to the National Intelligence Council, a group of 18 senior analysts and policy experts who provide U.S. spy agencies with judgments on important international issues.

Though I’m not convinced Moran would be covered under this law. Plus, he disclosed his tie to Huawei.

Read more

Republicans Refuse to Expand Climate Change Analysis in Intelligence Authorization

I will have a few posts on the Intelligence Authorization that passed the House Intelligence Committee last week.  (h/t Steven Aftergood)

But before I talked about what made it into the bill, I’d like to highlight what isn’t in it: language requiring the Intelligence Community to consider climate change. The minority views reveal,

One of the bill’s weaknesses is that it does not do enough to enhance analysis of the national security implications of climate change, which the Intelligence Community refers to as environmental indications and warning. Whether by driving competition for scare [sic] resources, by opening the Arctic, or by increasing sea level and storm surge near our naval installations, climate change will have profound, destabilizing effects which need to be understood, anticipated, and accounted for. There may be disagreement about the causes of climate change, but the national security consequences are so significant that they cannot be ignored.

The intelligence community has been delving into this area in recent years (and appear to have renamed climate change “environmental indications and warning”). But thus far, the IC has stopped short of treating climate change as the threat to the US it clearly represents.

It appears Democrats on HPSCI tried to change that. And Republicans refused.

Someday the climate deniers will be held responsible for leaving our country vulnerable. And the Democrats will have left a record of those who should be held responsible.

The Source of the Intelligence Legitimacy Problem

Ben Wittes went to a secret meeting on “Intelligence Challenges” and came away with the realization that even as we are more reliant on intelligence, the public has grown more skeptical of the government’s use of it.

And from the beginning of the day, one theme has arisen repeatedly: call it the “intelligence legitimacy paradox.”

The paradox, about which more than one speakers has wrung his or her hands, is that the threat environment America faces is growing ever more complicated and multifaceted, and the ability to meet it is growing ever-more-deeply dependent on first-rate intelligence. Yet at precisely the same time, the public has grown deeply anxious about our intelligence authorities and our intelligence community is facing a profound crisis of legitimacy over its basic authorities to collect.

The explanation for the paradox, I think, is simple: technology. The core reason the American threat environment is so complicated is the spread of technology. It’s what gives rise to global terrorist groups, to cyber threats, and it’s what allows relatively weak nations to play in the big leagues of international power politics. But at the same time, technological change is also the fundamental reason for the intelligence legitimacy crisis. The more ubiquitously communications technology spreads and the more integrated it all becomes globally, after all, the more that surveillance of the bad guys—in all their complexity—requires the intelligence community to surveil systems that we all use every day too.

Curiously, Ben doesn’t consider some other far more likely possibilities, all of which I suspect are at least as important:

  • The government trumped up a war on false intelligence. The war killed hundreds of thousands, badly exacerbating the terrorist threat in front of us, and bankrupted our country.
  • The government chooses to apply “intelligence” to some problems — terrorists and cybertheft of defense contractors and crafting trade deals that send more manufacturing jobs overseas — but not to others — finding and holding accountable the people who ruined our economy. Intelligence no longer serves the average person’s interests, and at times serves interests very much opposed to the average person.
  • The intelligence community’s excessive secrecy, punctured by exposure that shows the secrets weren’t really all that secret and in fact were kept secret largely because the average person might object, discredit it. So too does the hypocrisy exposed when those secrets come out. So too does the government’s use of secrecy to gain an advantage when litigating against its citizens.

Technology may have contributed to the way these things delegitimized intelligence, because it made it easier to demonstrate the lies behind the Iraq War, the corruption of the press, the unwillingness to take on more pressing threats to the average person, the hypocrisy behind the secrecy of power.

And technology may make the threats the government deigns to fight more effective.

But underlying it, the legitimacy problems are more primary. They are earned by the intelligence community, not created by the technology it faces. They are exacerbated by an increasing distance between the intelligence world — those select with clearance — and the people they very distantly claim to serve.

Sure, it might be easier for the government to fight these threats if it hadn’t already squandered its legitimacy. But it squandered it in ways that are unrelated to technology.

Days after Last American Journalist Expelled from Yemen, Ray Davis-Like Story Breaks

On Monday, the last remaining American journalist in Yemen, Adam Baron, got kicked out.

Baron’s ordeal began at midnight Monday with a phone call from a security officer ordering him to report to an immigration office the following day because of missing papers in his residency file. Fearing that he was being set up by Al Qaeda – the phone call came a day after a French guard was killed in Sanaa – Baron’s friends refused to let him go. Instead, they sent a Yemeni to check the validity of the request; he found it to be true and said Baron had to report to the authorities.

At about noon on Tuesday, Baron appeared at the immigration office, where he was promptly stripped of his passport and cellphone and was told, “You’re no longer welcome in Yemen.” He was then kept in a holding cell and was told he would remain there until his associates could bring a plane ticket for his exit.

Baron’s friends immediately began calling officials on his behalf, but the politicians and sheikhs turned out to be powerless to reverse the order. A senior military figure told Baron’s friends that the deportation was because officials were worried about his safety, an explanation they dismissed as untrue.

Baron’s reporting has served as a crucial check to a lot of the officially sanctioned journalism from Yemen, not least on the actual outcome of drone strikes.

Which is why I find it interesting that this story — of one JSOC and one CIA official killing attempted abductors in Yemen, similar to the Ray Davis episode in Pakistan  — is only breaking now, several weeks after it happened.

Exactly what the two Americans were doing at the time of the shooting on April 24 is unclear. Some American officials said they were merely getting a haircut in a barbershop on Hadda Street in Sana, in an upscale district frequently visited by foreigners, playing down any suggestions that they were engaged in a clandestine operation.

Late Friday, both the Pentagon and C.I.A. declined to comment on the shooting, and referred all questions to the State Department.

[snip]

American officials refused to identify the Americans or their jobs in Yemen, where the Pentagon and the C.I.A. have been training Yemeni security forces in addition to carrying out the drone strikes. But a senior American official said one individual involved in the shooting was a lieutenant colonel with the elite Joint Special Operations Command and the other was a C.I.A. officer.

This is precisely the kind of story on which Baron has been critical in the past. But he won’t be around to put more local context on it.

Update:  WSJ’s Ellen Knickmeyer is apparently in Yemen right now; she’s based in the Gulf. Yemen tried to deny her entry when she arrived 2 weeks ago. Here’s her account of the killing:

The Yemeni Interior Ministry officials said the Yemeni attackers approached the barber shop as one American was inside. Meanwhile, a Western-looking man standing on the sidewalk shot and killed both attackers, two Yemeni shop workers who witnessed the confrontation from an adjoining, glass-fronted store said.

“He didn’t move” from where he was standing while he pulled out a handgun and shot, said one of two Yemeni witnesses of the Westerner who fired. The second witness, in the same shop, gave a similar account.

One of the Yemeni attackers was carrying what witnesses said was a machine gun, the witnesses said. The other carried only an electric stun-gun, witnesses said.

[snip]

Shopkeepers surrounding the barbershop said Westerners took away the shop’s barber the day after the shooting. The shop remained closed in early May, when two Wall Street Journal reporters came to speak to shopkeepers at the site.