Raymond Davis: Diplomatic Immunity v. US Impunity

What happens with the Raymond Davis case, in the end, will likely not have very much to do with the Vienna Conventions. For that matter, we likely will never have enough of the unadulterated facts to know what should happen under the Vienna Conventions. But let’s suspend reality and see where an examination of the Vienna Conventions and the competing facts in the Davis case might take us.

As several reports have pointed out, there are numerous Vienna Conventions and the two that are likely to apply to Davis are the Vienna Convention of 1961 on Diplomatic Relations and the Vienna Convention of 1963 on Consular Relations. The VCs get wrapped in and out of discussions of passports and visa – so let’s separate and reassemble.

Diplomatic Passport. Our State Department issues passports needed for travel to other countries. Because of the State Department’s sole control over this document, it is looked at skeptically by Pakistanis in the Davis matter. The US says that, while it was not on him when he was captured and while it may have some discrepancies with other documents, Raymond Davis has a US issued diplomatic passport. Some have gone so far as to make this the equivalent of having diplomatic immunity, without anything more.

But that’s not how it works. Diplomatic immunity is derived, under VC 1961, by being validly attached to the embassy (mission) of a nation in which the “diplomat” is located. A diplomatic passport has no effect to attach someone to an embassy or mission. For example, a diplomat validly attached to the embassy in Iraq could travel to Germany on a diplomatic passport, but would not have immunity in Germany if they were not validly attached to the German embassy. So the question isn’t whether or not Davis had a diplomatic passport (or whether, if so, it was issued to an alias or issued after the fact), but whether he was validly attached to the US embassy at the time of his altercation in Pakistan.

Attachment to the US Mission/Embassy. For someone other than the head of mission, the general rule is that the sending nation (US) can “freely appoint” diplomats to its mission staff (Article 7), with a few caveats, and are then merely required to notify the receiving nation’s foreign ministry of the appointment/addition. The first caveat, also in Article 7, is that if the person being appointed is a military Read more

Share this entry

Raymond Davis’ Work “with” the CIA

After the Guardian confirmed for the Anglo-American world what the rest of the world had already concluded–that Raymond Davis is some kind of spook–the government gave the American outlets that have been sitting on this knowledge the go-ahead to publish it.

The New York Times had agreed to temporarily withhold information about Mr. Davis’s ties to the agency at the request of the Obama administration, which argued that disclosure of his specific job would put his life at risk. Several foreign news organizations have disclosed some aspects of Mr. Davis’s work with the C.I.A., and on Monday, American officials lifted their request to withhold publication.

Yet even though the NYT claims they have been cleared by the government to describe Davis’ “specific job,” the article does no such thing.

Note how none of the usages in the story make it clear whether Davis works for the CIA, for Blackwater, for his own contracting company, or for JSOC:

The American arrested in Pakistan after shooting two men at a crowded traffic stop was part of a covert, C.I.A.-led team of operatives conducting surveillance on militant groups deep inside the country, according to American government officials.

[snip]

carried out scouting and other reconnaissance missions for a Central Intelligence Agency task force

[snip]

Mr. Davis has worked for years as a C.I.A. contractor, including time at Blackwater Worldwide, the controversial private security firm (now called Xe)

[snip]

The officials gave various accounts of the makeup of the covert task force and of Mr. Davis, who at the time of his arrest was carrying a Glock pistol, a long-range wireless set, a small telescope and a headlamp. An American and a Pakistani official said in interviews that operatives from the Pentagon’s Joint Special Operations Command had been assigned to the group to help with the surveillance missions. Other American officials, however, said that no military personnel were involved with the task force.

[snip]

Even before his arrest, Mr. Davis’s C.I.A. affiliation was known to Pakistani authorities, who keep close tabs on the movements of Americans.

[snip]

American officials said that with Pakistan’s government trying to clamp down on the increasing flow of Central Intelligence Agency officers and contractors trying to gain entry to Pakistan, more of these operatives have been granted “cover” as embassy employees and given diplomatic passports.

[snip]

American officials said he operated as part of the Central Intelligence Agency’s Global Response Service in various parts of the country, including Lahore and Peshawar.

[snip]

It is unclear when Mr. Davis began working for the C.I.A., but American officials said that in recent years he worked for the spy agency as a Blackwater contractor and later founded his own small company, Hyperion Protective Services. [my emphasis]

This article leaves open every single possibility–CIA, Blackwater, other contractor, JSOC–with the least likely being that Davis is an employee of the CIA (not least because according to the Pakistanis he makes $200,000). Though the article does make it clear we’re now extending official cover to contractors.

The most likely, I’d guess, is that we’re using Blackwater to employ JSOC folks to get around legal niceties.

Read more

Share this entry

Poppy Bush’s Virgin Born Intelligence Knowledge

Jack Goldsmith links to an interesting document from the RummyLeaks library: then Chief of Staff Donald Rumsfeld’s memo to President Ford reviewing possible candidates to replace William Colby as head of the CIA.

But Goldsmith doesn’t call out the most amusing part of the memo: the way that Rummy asserts that Poppy has the intelligence experience to do the job without pointing out where he got that experience.

Where Rummy thought someone had real experience with the CIA he laid that out: Harold Brown’s experience with the NRO and SALT,  his and John Foster’s experience with Defense Research and Engineering, Douglas Dillon’s membership on the Rockefeller Committee on the CIA, William Baker and Robert Galvin’s service on the Presidential Foreign Intelligence Advisory Board, Melvin Laird’s service on the Appropriations and Armed Services Committees and Gale McGee’s service on Foreign Relations and Appropriations Committees, Stanley Resor’s service as Secretary of the Army and as member of the Mutual and Balanced Force Reductions delegation, Elliott Richardson’s service as Secretary of Defense. Every single member of the Council on Foreign Relations had that detail noted. For a number of these (particularly those with a research focus, Rummy explained precisely how the experience applied).

But Rummy doesn’t really explain how Bush acquired his general familiarity with intelligence.

This is perhaps most obvious when you compare Rummy’s description of Bob Dole’s qualifications with those of Bush.

Robert J. Dole: 52 years old (this month); U.S. Senator (R-Kansas); Past Chairman, RNC; Lawyer, WWII Service.

Pros: Strong “law and order” image. Confirmable.

Cons: No background in intelligence; no management experience; RNC post raises question over politicization potential.

[snip]

George Bush: 51 years old; Member of Congress; US Ambassador to the UN and subsequently to USLO Peking; Oil producer; Politician.

Pros: Experience in government and diplomacy; generally familiar with the components of the intelligence community and their missions; management experience; high integrity and proven adaptability.

Cons: RNC post lends undesirable political cast.

After all, at this point of their life, these men shared many of the same resume points: they are nearly exact contemporaries, with World War II experience (though Rummy didn’t mention Poppy’s), time in Congress, and service at the head of the RNC. Yet according to Rummy, Bush had the intelligence experience to lead CIA and Dole did not.

Now, obviously, Bush’s service as Ambassador to the UN and–to an even greater degree–as Ambassador to China would clearly have put him in positions at the front line of the Cold War.

But of course Bush’s most direct experience to be Director of the CIA came from that innocuous other resume point: “oil producer.” Heck, Rummy doesn’t even note by name Bush’s leadership of Zapata Oil, which was reportedly a cover for Bay of Pigs preparation. Russ Baker even found a J. Edgar Hoover note indicating that “Mr. George Bush of the Central Intelligence Agency” was briefed on concerns that the Kennedy assassination would encourage anti-Castro groups to strike at Cuba.

Rummy doesn’t explain any of that background. But then, had he done so, he probably couldn’t have claimed (as he did) that “all 23” candidates “are outsiders to the CIA.”

Share this entry

Lindsey Graham Calls Raymond Davis an “Agent”

AFP has a report (notably picked up by Pakistan’s Dawn) on the Senate’s hand-wringing over whether we should tie aid to Pakistan to the release of Raymond Davis, the “consulate employee” who shot two alleged Pakistani spies. Here’s what Lindsey Graham had to say:

But Senator Lindsey Graham, the top Republican on Leahy’s subcommittee, strongly warned against any rollback of assistance to Pakistan, citing the need for help in the war in Afghanistan and the hunt for suspected terrorists.

“Our relationship’s got to be bigger than this,” Graham said.

“This is a friction point, this is a troubling matter, it doesn’t play well in Afghanistan. We can’t throw this agent over, I don’t know all the details, but we cannot define the relationship based on one incident because it is too important at a time when we’re making progress in Afghanistan,” he said. [my emphasis]

Lindsey, Lindsey, Lindsey! Under Ben Cardin’s proposed law criminalizing leaks (and, frankly, under existing law), you could go to jail for such honesty. Good thing you have immunity as a member of Congress.

Though in the spirit of Bob Novak–who claimed to be thinking of a political professional running congressional campaigns in Dick Cheney’s state when he called Valerie Plame an “operative”–I suppose Graham could claim he just thought Davis serves some kind of service employee at the consulate, one of the “agents” that help with visas or some such nonsense.

Not that that’ll help the tensions over this incident in Pakistan at all.

Share this entry

Stuxnet: The Curious Incident of the Second Certificate

“Is there any point to which you would wish to draw my attention?”

“To the curious incident of the dog in the night-time.”

“The dog did nothing in the night-time.”

“That was the curious incident,” remarked Sherlock Holmes.

Arthur Conan Doyle (Silver Blaze)

[From ew: William Ockham, who knows a whole lot more about coding than I, shared some interesting thoughts with me about the Stuxnet virus. I asked him to share those thoughts it into a post. Thanks to him for doing so!]

The key to unraveling the mystery of Stuxnet is understanding the meaning of a seemingly purposeless act by the attackers behind the malware. Stuxnet was first reported on June 17, 2010 by VirusBlokAda, an anti-virus company in Belarus. On June 24, VirusBlokAda noticed that two of the Stuxnet components, Windows drivers named MrxCls.sys and MrxNet.sys, were signed using the digital signature from a certificate issued to Realtek Semiconductor. VirusBlokAda immediately notified Realtek and on July 16, VeriSign revoked the Realtek certificate. The very next day, a new Stuxnet driver named jmidebs.sys appeared, but this one was signed with a certificate from JMicron Technology. This new Stuxnet driver had been compiled on July 14. On July 22, five days after the new driver was first reported, VeriSign revoked the JMicron certificate.

The question I want to explore is why the attackers rolled out a new version of their driver signed with the second certificate. This is a key question because this is the one action that we know the attackers took deliberately after the malware became public. It’s an action that they took at a time when there was a lot of information asymmetry in their favor. They knew exactly what they were up to and the rest of us had no clue. They knew that Stuxnet had been in the wild for more than a year, that it had already achieved its primary goal, and that it wasn’t a direct threat to any of the computers it was infecting in July 2010. Rolling out the new driver incurred a substantial cost, and not just in monetary terms. Taking this action gave away a lot of information. Understanding why they released a driver signed with a second certificate will help explain a lot of other curious things in the Stuxnet saga.

It’s easy to see why they signed their drivers the first time. Code signing is designed to prove that a piece of software comes from a known entity (using public key infrastructure) and that the software hasn’t been altered. A software developer obtains a digital certificate from a “trusted authority”. When the software is compiled, the certificate containing the developer’s unique private key is used to “sign” the code which attaches a hash to the software. When the code is executed, this hash can be used to verify with great certainty that the code was signed with that particular certificate and hasn’t changed since it was signed. Because drivers have very privileged access to the host operating system, the most recent releases of Microsoft Windows (Vista, Win7, Win2008, and Win2008 R2) won’t allow the silent installation of unsigned drivers. The Stuxnet attackers put a lot of effort into developing a completely silent infection process. Stuxnet checked which Windows version it was running on and which anti-virus software (if any) was running and tailored its infection process accordingly. The entire purpose of the Windows components of Stuxnet was to seek out installations of a specific industrial control system and infect that. To achieve that purpose, the Windows components were carefully designed to give infected users no sign that they were under attack.

The revocation of the first certificate by VeriSign didn’t change any of that. Windows will happily and silently install drivers with revoked signatures. Believe it or not, there are actually good reasons for Windows to install drivers with revoked signatures. For example, Realtek is an important manufacturer of various components for PCs. If Windows refused to install their drivers after the certificate was withdrawn, there would be a whole lot of unhappy customers.

The release of a Stuxnet driver signed with a new certificate was very curious for several reasons. As Symantec recently reported [link to large pdf], no one has recovered the delivery mechanism (the Trojan dropper, in antivirus lingo) for this driver. We don’t actually know how the driver showed up on the two machines (one in Kazakhstan and one in Russia) where it was found on July 17, 2010. This is significant because the driver is compiled into the Trojan dropper as resource. Without a new dropper, there’s no way for that version of the virus to have infected additional computers. And there is no evidence that I’m aware of that Stuxnet with the new driver ever spread to any other machines.

Read more

Share this entry

Confirmed: Our Government Has Criminalized Beauty Products

A year and a half ago, I warned that if you bought certain beauty supplies–hydrogen peroxide and acetone–you might be a terrorism suspect.

I’m going to make a wildarsed guess and suggest that the Federal Government is doing a nationwide search to find out everyone who is buying large amounts of certain kinds of beauty products. And those people are likely now under investigation as potential terrorism suspects.

Shortly thereafter, John Kyl basically confirmed that the government had been tracking certain people buying hydrogen peroxide.

Yesterday, FBI Director Robert Mueller did so in even more explicit terms.

Federal Bureau of Investigation Director Robert Mueller appeared to indicate for the first time Wednesday that his agency uses a provision of the PATRIOT Act to obtain information about purchases of hydrogren peroxide–a common household chemical hair bleach and antiseptic that can also be turned into an explosive.

The comment in passing by Mueller during a Senate Intelligence Committee hearing was noteworthy because critics have suggested that the FBI is using a provision in the PATRIOT Act to conduct broad surveillance of sales of lawful products such as hydrogen peroxide and acetone.

“It’s been used over 380 times since 2001,” Mueller said of the so-called business records provision, also known as Section 215. “It provides us the ability to get records other than telephone toll records, which we can get through another provision of the statutes. It allows us to get records such as Fedex or UPS records….or records relating to the purchase of hydrogen peroxide, or license records—records that we would get automatically with a grand jury subpoena on the criminal side, the [Section] 215 process allows us to get on the national security side.” (Emphasis original)

Emptywheel: where you read today about the civil liberties infringements your government will confirm years from now.

What Mueller didn’t confirm, but what we can pretty much conclude at this point, is that they’ve used the 215 provision to investigate as terrorists perfectly innocent (and possibly Muslim) purchasers of beauty supplies.

Recall how I first figured out the government was using Section 215 to track beauty supplies. After DiFi blabbed that they had used Section 215 in the Najibullah Zazi case, I examined the detention motion on Zazi to see what kind of evidence they used to justify refusing him bail. It included this:

Evidence that “individuals associated with Zazi purchased unusual quantities of hydrogen and acetone products in July, August, and September 2009 from three different beauty supply stores in and around Aurora;” these purchases include:

  • Person one: a one-gallon container of a product containing 20% hydrogen peroxide and an 8-oz bottle of acetone
  • Person two: an acetone product
  • Person three: 32-oz bottles of Ion Sensitive Scalp Developer three different times

The federal government argued, in part, that Zazi had to be denied bail because three people “associated with him” bought beauty supplies “in and around Aurora.”

Last February, Zazi accepted a plea agreement and has been cooperating with investigators; the government has twice delayed his sentencing, suggesting he’s still fully cooperating. Since that time, the only people arrested for participating in the actual plot–as opposed to obstructing justice by trying to hide the evidence of Zazi’s bomb-making, with which both Zazi’s father and uncle were charged–are in NY or Pakistan.

That is, it appears that Zazi had no accomplices “in and around Aurora.”

That’s particularly interesting given that Zazi is reported to have had few close ties in the Denver area. He only moved there in January 2009, 8 months before his arrest. And both his employer and the other worshipers at his mosque describe him as keeping to himself.

Unlike most drivers at ABC, who drove eight- or nine-hour shifts, Zazi routinely worked 16-to-18-hour days, often putting in as many as 80 hours a week ferrying passengers to and from DIA. “He was a regular kind of guy, but he worked hard and he wanted money,” says Hicham Semmaml, a Moroccan-born ABC driver. “I would have never suspected any of this.”

[snip]

“He kept to himself pretty much, and he never gave any outward signs of being connected with anybody,” Gross said.

[snip]

Zazi would turn up for afternoon prayers each Friday — Islam’s holy day — parking the ABC van in the parking lot outside the sprawling brick complex with its black dome and narrow minaret. Other regular worshippers agreed that he never spoke to anyone and usually rushed off immediately once the service ended.

All the currently available evidence suggests that these three Zazi “associates” buying beauty supplies turned out to be completely innocent. That would mean that one of the reasons the government said Zazi should be held without bail (there were plenty of others) basically amounts to innocent people with some attenuated tie to Zazi buying beauty supplies.

But consider what their beauty supply purchase has exposed them to–particularly if the association involved amounts to membership in the same mosque as him. Their purchase of beauty supplies undoubtedly made them a target for further investigation, presumably FBI agents asking questions of their neighbors and employers, probably the use of other PATRIOT provisions to track their calls and emails, and possibly even a wiretap.

So these three people, because they worshiped at the same mosque as Zazi or drove an airport van but presumably in the absence of any evidence of actual friendship with him had their lives unpacked by our government because they bought a couple bottles of beauty supplies.

Share this entry

Themis Applies JSOC Techniques to Citizens “Extorting” from Corporate Clients

I have a feeling I’ll be doing a lot of these posts, showing how Hunton & Williams asked “Themis” (the three firm team of HBGary, Palantir, and Berico Technologies) to apply counterterrorism approaches to combat First Amendment activities.

This particular installment comes from an early presentation and accompanying proposal Themis prepared for Hunton & Williams. These documents were attached to an email dated November 2, 2010 sent out by Berico Technologies’ Deputy Director. He explains that the presentation and proposal would be briefed to H&W the following day.

The Powerpoint includes a slide describing the purpose of Themis’ pitch to H&W.

Purpose: Develop a corporate information reconnaissance service to aid legal investigations through the open source collection of information on target groups and individuals that appear organized to extort specific concessions through online slander campaigns.

Now, this is in the period when H&W was only beginning to discuss the Chamber of Commerce project with Themis, long before the BoA pitch. That is, this is the period when they were discussing generalized opposition to Chamber of Commerce.

And of that they got “extortion”? “slander”?

Apparently the team members of Themis–several of whom, as veterans, would have sworn an oath to our Constitution–accepted the premise that union members and poorly financed liberals opposing the wholesale sellout of our politics to private corporations constituted “extortion” and “slander.”

These firms, two of which deny any ill will, were willing to describe political speech–the opposition of working people to the Chamber’s hijacking of our politics–as “extortion” and “slander.”

More shocking to me, though, is where the proposal uses a Special Operations model to describe what Themis planned to do for H&W. On a proposal bearing Berico Technologies’ document header, Themis places their proposed “Corporate Information Reconnaissance Cell” next to a Joint Special Operations Command F3EA “targeting cycle” with this explanation:

Team Themis will draw on our extensive operational and intelligence experience to rapidly make sense of the volumes of data we’ve collected through the application of proven analytical/targeting methodologies.  Drawing on the principles and processes developed and refined by JSOC in the “Find, Fix, Finish, Exploit, Analyze” (F3EA) targeting cycle, we will develop and execute a tailored CIRC intelligence cycle suited to enable rapid identification/understanding, refined collection/detection, focused application of effects, exploitation, and analysis/assessment.

Mind you, this is just a fancy graphic for “analysis”–the kind of stuff civilians do all the time. But Themis–led by Berico Technologies in this case–decided to brand it as a JSOC (Joint Special Operations Command) product, applying an American unconventional warfare model  to targeting political opponents engaging in free speech.

This is a bunch of veterans proposing to go to war against citizen activism on behalf the Chamber of Commerce and other corporations.

The proposal also highlights the JSOC experience of one Palantir team member.

He commanded multiple Joint Special Operations Command outstations in support of the global war on terror. Doug ran the foreign fighter campaign on the Syrian border in 2005 to stop the flow of suicide bombers into Baghdad and helped to ensure a successful Iraqi election. As a commander, Doug ran the entire intelligence cycle: identified high-level terrorists, planned missions to kill or capture them, led the missions personally, then exploited the intelligence and evidence gathered on target to defeat broader enemy networks.

Berico’s statement (from their CEO, Guy Filippelli, whose experience as Special Assistant to the Director of National Intelligence was also highlighted in the proposal) denied they would proactively target any Americans and spun the project itself as “consistent with industry standards for this type of work.”

Berico Technologies is a technical and analytic services firm that helps organizations better understand information critical to their core operating objectives. Our leadership does not condone or support any effort that proactively targets American firms, organizations or individuals.

[snip]

Late last year, we were asked to develop a proposal to support a law firm. Our corporate understanding was that Berico would support the firm’s efforts on behalf of American companies to help them analyze potential internal information security and public relations challenges. Consistent with industry standards for this type of work, we proposed analyzing publicly available information and identifying patterns and data flows relevant to our client’s information needs.

Yet it was Berico Technologies’ Deputy Director who sent out these documents adopting a military targeting approach for responding to citizens engaging in free speech.

Share this entry

Curveball: I Lied to Get Rid of Saddam

Almost eight years after he helped start a war, the Iraqi behind the US claim that Iraq had mobile weapons labs admitted in an interview with the Guardian that he lied. (h/t Hissypit)

Rafid Ahmed Alwan al-Janabi, codenamed Curveball by German and American intelligence officials who dealt with his claims, has told the Guardian that he fabricated tales of mobile bioweapons trucks and clandestine factories in an attempt to bring down the Saddam Hussein regime, from which he had fled in 1995.

The article as a whole provides fascinating details of how the German intelligence, BND, service basically fed Curveball the details he’d need to fabricate his lies.

But I’m particularly interested in two new details he reveals. First, BND and British intelligence met with Curveball’s boss in mid-2000; the boss debunked Curveball’s claims.

Janabi claimed he was first exposed as a liar as early as mid-2000, when the BND travelled to a Gulf city, believed to be Dubai, to speak with his former boss at the Military Industries Commission in Iraq, Dr Bassil Latif.

The Guardian has learned separately that British intelligence officials were at that meeting, investigating a claim made by Janabi that Latif’s son, who was studying in Britain, was procuring weapons for Saddam.

That claim was proven false, and Latif strongly denied Janabi’s claim of mobile bioweapons trucks and another allegation that 12 people had died during an accident at a secret bioweapons facility in south-east Baghdad.

The German officials returned to confront him with Latif’s version. “He says, ‘There are no trucks,’ and I say, ‘OK, when [Latif says] there no trucks then [there are none],'” Janabi recalled.

So this is yet another well-placed Iraqi who warned western intelligence that the WMD evidence that would eventually lead to war was baseless (one George Tenet and others haven’t admitted in the past).

And Curveball describes how BND returned to his claims in 2002, then dropped it, then returned to it just before Colin Powell’s Feruary 5, 2003 speech at the UN.

We’ve known the outlines of these details before. But it sure adds to the picture of the US dialing up the intelligence it needed — however flimsy — to start a war.

Share this entry

The HBGary Scandal: Using Counterterrorism Tactics on Citizen Activism

As I described on the Mike Malloy show on Friday and as Brad Friedman discusses in his post on being targeted by the Chamber of Commerce, the essence of the Chamber of Commerce/Bank of America/HBGary scandal is the use of intelligence techniques developed for use on terrorists deployed for use on citizens exercising their First Amendment rights.

ThinkProgress has a post making it clear that the Chamber of Commerce’s nondenial denials don’t hold up. In this post, I’ll begin to show the close ties between the tactics HBGary’s Aaron Barr proposed to use against Wikileaks and anti-Chamber activists and those already used in counterterrorism.

Barr Says He’s Done this with Terrorists

I will get into what we know of Barr’s past intelligence work in future posts, but for the moment I wanted to look just at his reference to analysis he did on FARC. Barr’s HBGary coder, who sounds like the smartest cookie of the bunch was balking at his analysis of Anonymous for several reasons–some of them ethical, some of them cautionary, and some of them technical. In the middle of an argument over whether what Barr was doing had any technical validity (the coder said it did not), Barr explained.

The math is already working out. Based on analysis I did on the FARC I was able to determine that Tanja (the dutch girl that converted to the FARC is likely managing a host of propoganda profiles for top leaders. I was able to associate key supporters technically to the FARC propoganda effort.

He’s referring to Tanja Anamary Nijmeijer, a Dutch woman who has been an active FARC member for a number of years. And while it’s not proof that Barr did his analysis on Nijmeijer for the government, she was indicted in the kidnapping of some American contractors last December and the primary overt act the indictment alleged her to have committed was in a propaganda function.

On or about July 25, 2003, JOSE IGNACIO GONZALEZ PERDOMO, LUIS ALBERTO JIMENEZ MARTINEZ, and TANJA ANAMARY NIJMEIJER, and other conspirators, participated in making a proof of life video of the three American hostages. On the video, the FARC announced that the “three North American prisoners” will only be released by the FARC once the Colombian government agrees to release all FARC guerrillas in Colombian jails in a “prisoner exchange” to take place “in a large demilitarized area.” The proof of life video was then disseminated to media outlets in the United States.

In any case, Barr is referring to an ongoing investigation conducted by the Miami and Counterterrorism Section of DOJ, with assistance from the DNI.

His “proof” that this stuff works is that it has worked in the past (he claims) in an investigation of Colombian (and Dutch) terrorists.

Read more

Share this entry

Senior Officials Wave Their SIGINT Around

You’ve probably already read this story detailing how Hosni Mubarak used his 18 day delay in resigning to rob the Egyptian people. While the whole thing is worth a read, I wanted to point out how a senior Western intelligence official makes a point of revealing that we’ve been aware of conversations among Mubarak’s thieving family members.

But a senior Western intelligence source claimed that Mubarak had begun moving his fortune in recent weeks.

We’re aware of some urgent conversations within the Mubarak family about how to save these assets,” said the source, “And we think their financial advisers have moved some of the money around. If he had real money in Zurich, it may be gone by now.” [my emphasis]

The reference to “urgent conversations” seems to suggest they were actually listening in on them. (It also raises the question of why we didn’t try to stop Mubarak from stealing the money, but I think we know the answer to that question.)

That’s similar to the way another senior official–this one identified as American–brags to CNN about the satellites we’re using to collect intelligence in Egypt. (h/t Tim Shorrock)

As the Obama administration reacted, Washington was using a variety of intelligence assets to see what was happening in Cairo and other Egyptian cities, CNN has learned.

The U.S. military and intelligence community are using “national technical means” in the sky over Egypt to gather information about the demonstrations and the deployment of Egyptian security forces.

The phrase “national technical means” is used by the U.S. government to generally refer to the use of reconnaissance satellites to gather imagery or signals intelligence.

A senior U.S. official with direct knowledge of the operation confirmed the intelligence-gathering but declined to be identified because of the sensitive nature of the matter.

The official declined to say to what extent the Egyptian government is aware of the activity. The official would not say specifically which intelligence-gathering elements were being used but indicated that operations were being conducted in a manner that would not be visible to the Egyptian populace.

The official said the decision to use intelligence-gathering assets came in part after violence erupted in the early days of the Cairo demonstrations. [my emphasis]

Now, it should surprise no one to know that the US has been collecting signals intelligence from Egypt. We would be focusing on Egypt anyway because of our Israeli and counterterrorism interests. And SIGINT will undoubtedly be more important as our relationship with Omar Suleiman shifts along with his position in the government. But normally it’s considered polite not to admit to using SIGINT so blatantly.

What seems to be a key intent of these public admissions of our spying is to disclose to whom we were listening–Mubarak’s family (and presumably other top officials)–and why we shifted our normal focus away from counterterrorism targets–because of Egyptian security forces had used violence against protesters.

In other words, this seems to be a message to top officials in Egypt–both Mubarak and our partners in Egypt’s military–that we’ve shifted our gaze away from counterterrorism and onto the government itself.

I thought we weren’t supposed to tell the people we were eavesdropping on that we were doing so?

Share this entry