Remember When Russia’s Enemy Helped the Mujahadeen Neutralize Russia’s Most Effective Weapon?

“Bluster”! “Exaggeration”!

Those are some of the words Joe Lieberman and some more credible people are using to dismiss Iran’s claim that it has accessed the data from the Sentinel drone it brought down last year.

Aside from “independent experts” pointing out the obvious fact that Iran could have gotten details about the Sentinel’s use to surveil Osama bin Laden’s compound from public reports (though how would it have gotten the specific dates?), the US security establishment has offered no detailed explanation of how Iran got the data it claims to have taken from the drone.

General Hajizadeh cited as evidence data that he said was extracted from the drone’s computer hard drives revealing its operations in the months before it went down in Iran — either because it was shot down, as Iranian officials have claimed, or because it experienced a technical failure, as the Americans have said.

The drone, he said, had undergone repairs in California in October 2010 and returned to Afghanistan in November 2010, where American officials have acknowledged it operated, though without specifying where its missions took it. He added that the drone’s computer memory revealed that it had flown over the compound in Pakistan where Osama bin Laden was killed in an American raid in May 2011.

“Had we not accessed the plane’s softwares and hard disks, we wouldn’t have been able to achieve these facts,” General Hajizadeh said, according to the news agency Fars.

The White House and American intelligence officials declined Sunday to comment on the new claims, though independent experts expressed skepticism. They noted that the information about the drone’s activities — including its use in the Bin Laden raid — could have been drawn from public reports about the sophisticated aircraft.

That may not entirely confirm that the data cited by Iran is accurate, but it sure doesn’t refute it.

That said, all these experts bewailing “bluster” have not mentioned the more obvious explanation behind Iran’s claim–even though just three days ago the news was filled with reports of Russia and China asking for information on the drone and much of the coverage of this latest fact acknowledges that in their stories.

Consider: while the OBL surveillance (though not the timing) was publicly reported, the maintenance records cited by the Iranians probably aren’t. But those details are more likely to be available not in the drone itself, but on Lockheed’s networks, which were hacked (though Lockheed claims no data was compromised) last year; everyone blames China for that hack. And if China has been able to access drone data off our networks like they’ve been able to access all our other weapons development data, then it would presumably make it a lot easier to break the encryption on the Sentinel drone itself.

Our fear-mongering about Iran, as well as our overthrow of Qaddafi and efforts to overthrow Assad, has far more to do with efforts to shore up Saudi–and therefore US–hegemony in the key oil-producing region of the world than nukes. And while China has been cozying up to the Saudis in ways that ought to make us rethink our unquestioning pursuit of Saudi goals, our efforts to eliminate any counter-weight to Saudi power in the region is a real threat to China (not to mention our ability to wage war in the African countries China has spent a decade cultivating by pressing a few buttons in Nevada). Precisely the same kind of threat we judged Russian expansion into Afghanistan to be in 1979 when we started funneling money–and ultimately, some years later, Stinger missiles–to the mujahadeen. The Stinger missiles took away Russia’s air superiority and with it their ambitions to keep Afghanistan and ultimately, their commitment to empire more generally.

So while it may comfort the public to be told Iran could never manage to reverse engineer our drone, the possibility that China and Iran may be making real progress in neutralizing our favorite new weapon would presumably worry the national security establishment. Just in time for Iran to enter negotiations and in such a way that the implicit threat from China is understood.

These blustery experts should have listened to me when I warned that China’s ability to access our defense networks with ease was far more dangerous than Bradley Manning and his Lady Gaga CD.

Does NCTC Have the Minimal Data Security to Guard Its New Not-Terrorist-Terrorist Database?

As I noted here and here, yesterday the Director of National Intelligence and DOJ rolled out new Guidelines allowing the National Counterterrrorism Center to acquire non-terrorist datasets from federal agencies–including US person data–so they can do pattern analysis on those datasets and pass off the resulting data to other agencies.

When intelligence officials wanted to explain to Charlie Savage how this would work, they pointed to a State Department dataset–visa applications–as one dataset NCTC might now access directly.

A person from Yemen applies for a visa and lists an American as a point of contact. There is no sign that either person is a terrorist. Two years later, another person from Yemen applies for a visa and lists the same American, and this second person is a suspected terrorist.

Under the existing system, they said, to discover that the first visa applicant now had a known tie to a suspected terrorist, an analyst would have to ask the State Department to check its database to see if the American’s name had come up on anyone else’s visa application — a step that could be overlooked or cause a delay. Under the new rules, a computer could instantly alert analysts of the connection.

The State Department is, of course, still reportedly recovering from the fact that because of DOD’s lax network security, 250,000 diplomatic cables got liberated for the world to see.

Not surprisingly, then, the new Guidelines appear determined to reassure original dataset owners that their data won’t be compromised by sharing it with NCTC (which can then share it with other elements of the Intelligence Community and even foreign allies). You can tell they’re serious about this, because it’s one of the places they occasionally use “shall” (in other sensitive areas, they use the squishier “will”).

For access to or acquisition of specific datasets, the DNI, or the DNI’s designee, shall collaborate with the data provider to identify any legal constraints, operational considerations, privacy or civil rights or civil liberties concerns and protections, or other issues, and to develop appropriate Terms and Conditions that will govern NCTC’s access to or acquisition of datasets under these guidelines.

[snip]

In addition to the [general requirements laid out for sharing this data], at the time when NCTC acquires a new dataset or a new portion of a dataset, the Director of NCTC shall determine, in writing, whether enhanced safeguards, procedures, and oversight mechanisms are needed.

Though this bold approach almost immediately breaks down, as the Guidelines not only revert to “will,” but–worse–dig out the passive voice when describing the data transfer.

Measures will be put into place to ensure that the dataset is received and stored in a manner to prevent unauthorized access and use prior to the completion of replication.

And when the Guidelines get into specifics, they use that passive “will” again.

Access to these datasets will be monitored, recorded, and audited. This includes tracking of logons and logoffs, file and object manipulation, and changes, and queries executed, in according with audit and monitoring standards applicable to the Intelligence Community.

Who will (“shall”) implement these data security measures? What if he or she fails to do so adequately?

It’s a really, really important question because–as this year’s intelligence authorizations make clear, the Intelligence Community does not yet have insider threat detection–the kind of security that would permit these audits–and they’re not going to get it until 18 months from now. Hell, they’re not even going to start getting it until 6 months from now!

(a) Initial Operating Capability.–Not later than October 1, 2012, the Director of National Intelligence shall establish an initial operating capability for an effective automated insider threat detection program for the information resources in each element of the intelligence community in order to detect unauthorized access to, or use or transmission of, classified intelligence.

Read more

Chain of Command: Some Violations of Military Discipline Are More Equal Than Others

The other day, Teddy Partridge noted a second instance of someone in the military–the previous one being the Commander-in-Chief–weighing in on Bradley Manning’s guilt.

Echoing his commander in chief in issuing statements that provide improper command influence in the trial of Bradley Manning, the Chairman of the Joint Chiefs of Staff, Gen. Martin Dempsey, stated unequivocally that Manning broke the law.

To review, here’s what Barack Obama said when asked about Bradley Manning in April 2011:

And if you’re in the military… And I have to abide by certain rules of classified information. If I were to release material I weren’t allowed to, I’d be breaking the law.

We’re a nation of laws! We don’t let individuals make their own decisions about how the laws operate. He broke the law.

It appears that President Obama’s highest military officer agrees with him:

The Joint Chiefs chairman also was asked about Manning, the alleged WikiLeaks contributor, and whether Dempsey thought Manning should be viewed as a political prisoner, whistle-blower or traitor.

“We’re a nation of laws. He did violate the law,” Dempsey said.

Meanwhile, Staff Sergeant Robert Bales has not even been charged yet–his lawyer, John Henry Browne, says the military has neither forensics nor a confession incriminating him!–but Generals are sending Browne messages wishing him the best in his defense of Bales.

Browne added that he has received hundreds of emails, including from some generals and other military figures, who wished him luck in the case.

Don’t get me wrong. I hope Browne does his best to give Bales a robust defense. And as I’ve noted repeatedly, I’m not at all convinced that the killings occurred as the military currently claims they did; if so I hope Browne proves that, too.

But I would be shocked if any generals wrote David Coombs, Bradley Manning’s lawyer, to wish him luck in defending a tough, unpopular client. Yet both men–Manning and Bales–are alleged to have violated military discipline in ways that hurt our efforts.

Update: Fixed my misspelling of Bales’ name.

The Rationale for NSA’s Bottomless Pit of Data: Hackers

In his must-read report on the bottomless data pit containing the NSA is building in Utah, James Bamford described the public explanations NSA Deputy Director Chris Inglis made when he broke ground on the facility.

[NSA deputy director Chris Inglis] arrived in Bluffdale at the site of the future data center, a flat, unpaved runway on a little-used part of Camp Williams, a National Guard training site. There, in a white tent set up for the occasion, Inglis joined Harvey Davis, the agency’s associate director for installations and logistics, and Utah senator Orrin Hatch, along with a few generals and politicians in a surreal ceremony. Standing in an odd wooden sandbox and holding gold-painted shovels, they made awkward jabs at the sand and thus officially broke ground on what the local media had simply dubbed “the spy center.” Hoping for some details on what was about to be built, reporters turned to one of the invited guests, Lane Beattie of the Salt Lake Chamber of Commerce. Did he have any idea of the purpose behind the new facility in his backyard? “Absolutely not,” he said with a self-conscious half laugh. “Nor do I want them spying on me.”

For his part, Inglis simply engaged in a bit of double-talk, emphasizing the least threatening aspect of the center: “It’s a state-of-the-art facility designed to support the intelligence community in its mission to, in turn, enable and protect the nation’s cybersecurity.” While cybersecurity will certainly be among the areas focused on in Bluffdale, what is collected, how it’s collected, and what is done with the material are far more important issues. Battling hackers makes for a nice cover—it’s easy to explain, and who could be against it? [my emphasis]

Inglis used hackers as cover for a spying facility that would collect and decrypt “all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital ‘pocket litter’.” That is, Inglis used the threat of hackers to cover up for the fact that the government was spying on everyone.

Mind you, this was back in January 2011–before Anonymous threatened to take the Toobz down at a time when a key Anonymous hacker was being run by the FBI. Indeed, Inglis used hackers as his excuse for collecting massive amounts of data on everyone in the thick of the WikiLeaks excitement.

Nevertheless, Bamford describes Inglis publicly misleading about the centrality of hackers in the purpose of the bottomless pit when in fact the purpose is far broader. Particularly given the FBI’s recently exposed role running hackers, Inglis’ “double-talk” raises real questions about all the fear-mongering about hackers.

Spooky AssadLeaks: The Provenance of the Emails

As I wrote in this post, I got interested in the provenance of a set of leaked Bashar al-Assad emails largely because of the way in which two of them were used to suggest, dubiously, Nir Rosen was an Assad agent.

The Guardian and Al Arabiya have both offered posts describing, in part, how they came by the emails, with the Guardian’s offering more details. The short version is:

March 15, 2011: Uprising escalates in Daraa.

Late March: “a young government worker in Damascus” handed off a slip of paper to a friend. The paper had four codes (plus or including the two email addresses, the Guardian is not clear) that would provide access to personal email accounts of Bashar al-Assad and his wife Asma. The friend was apparently supposed to pass them onto “a small group of exiled Syrians who would know what to do with them.”

June: “Two Syrian professionals in a Gulf state” obtain the emails. The Guardian doesn’t explain whether they were the original intended recipients, nor does it explain the delay. Though it does include a blurb describing their sudden awakening to politics that makes it clear the Guardian has spoken to at least one of the activists and replicated their self-narrative uncritically.

The uprising in the southern Syrian city of Deraa on 15 March had empowered them, as it had hundreds of thousands of others in the totalitarian state. They were now determined to do what they could to bring an end to more than four decades of rule by the Assad clan.

“It was clear who we were dealing with,” said one of the activists. “This was the president and his wife. There was no doubt.”

August 6: Sabu solicits Syrian MOD hacker to “disrupt govt communication systems.”

June to December: The emails are used with increasing frequency over time; Assad appears to build a PR strategy using them.

January: Anonymous (which had been infiltrated by the FBI since at least June, the same month the Syrian activists purportedly got the email codes) hacks Bashar al-Assad’s servers, accessing 78 different email accounts.

February 7: Anonymous releases the Assad emails which were published by Ha-aretz, claims the password was 12345. These are, at least in part, the very same emails being released today. Assad’s brother-in-law Firas al-Akhras emails him to tell him the inbox of the Ministry of Presidential Affairs had been leaked. All the emails are shut down.

March 15, 2012: The emails published.

In their narratives, neither the Guardian nor al Arabiya note that the FBI had been running Sabu since last June, precisely the same month the “activists” reportedly got the “secret codes” (12345?) that would allow them to access the Assad emails.

Now there are plenty of questions I have about this: Who was the mole, how did he or she get this information, who was the friend, what caused the 3-month delay. All of those questions, of course, are particularly interesting giving the coincidence of timing with the Sabu recruitment.

And why release these emails now? Just because of the one-year anniversary of Daraa, and the other events planned for the day?

Suffice it to say it feels a lot like outside entities–aside from whatever professionals-turned-activists purportedly monitored these accounts–were involved.

With that feeling in mind, two more details worth noting. First, al Arabiya’s story on how they got the emails focuses instead on what they didn’t publish: a bunch of “scandalous emails.”

Hundreds of “scandalous” emails were accordingly deleted by Al Arabiya.

By comparison, the Guardian said only it didn’t publish personal emails. Both sources, however, want people–perhaps including Assad?–to know that there were more emails that may be out there.

The other thing I find interesting is the detail the Guardian pays to Assad’s email habits.

[The Syrian activists in the Gulf state] soon noticed differences in the way the couple used their email accounts. “We had to be quick with Bashar’s emails,” one of the activists said. “He would delete most as soon as they arrived in his inbox, whereas his wife wouldn’t. So as soon as they went from unread to read we had to get them fast.”

Deleting emails as soon as they arrive shows a degree of awareness of web security. So too did the fact that Assad never attached his name or initials to any of the emails he sent. However, many of the emails that arrived in his inbox are addressed to him as president and contain intimate details of events and discussions that were not known outside of the inner sanctum and would have been very difficult to manipulate.

Even before I remembered that the same guy the Guardian claims was showing some web security used “12345” as his password, this entire passage sounded bogus, more like a way to provide cover for some other means to collect these emails that don’t involve more sophisticated wiretapping of packets, as opposed to email in-boxes.

But once you remember this is a guy who reportedly used “12345” as his password, then the entire claim Assad was practicing good security becomes laughable. Which makes this entire passage suspect.

There are two stories of how Bashar al-Assad got his emails hacked in the last year. In one version, Syrian activists managed to spy on their dictator in real time and are presumably releasing emails that lack a smoking gun (but did include “scandalous” emails) as a sort of anniversary present for Assad. The other story involves the FBI flipping at least one hacker and having him continue to hack at their command.

Or maybe there’s just one, far more intriguing story.

Spooky AssadLeaks: The Nir Rosen Connection

Something curious has happened in the last few days while I’ve been traveling. The Guardian and Al Arabiya have been publishing leaked emails from Bashar al-Assad and his wife, showing both to be callous assholes but not otherwise producing a smoking gun (though I do hope to return to what they show about how they evaded sanctions).

In the last day or so, attention has shifted to two emails (here’s a translation of the first) between Assad aides and Assad, mentioning the journalist Nir Rosen. A number of people read them to suggest Rosen was an agent of Assad’s, perhaps even exposing other Western journalists who were sneaking into Syria.

Rosen responded to the allegations here, saying in part,

I believe the trove of leaked emails from the Syrian government are indeed all real. The emails which contain my name are certainly real, I don’t mind saying. They are from people who were introduced to me and other western journalists as media and public relations advisers to the Syrian government or the president himself. They are the same people who arranged for the ABC News interview with Barbara Walters, for the Sunday Times interview with Bashar al Assad, for Agence France Presse, and for others to enter Syria. This is normal. How else does a journalist enter a country such as Syria?

In November 2011 after al Jazeera conducted a live interview with Iran’s president Ahmedinajad, I tried to persuade media advisers to the Syrian president that they should grant a similar one to al Jazeera’s English network. I sent them several emails trying to persuade them it was a good idea, including an email with my CV and biography. I also met with these media officials to try to persuade them.

And as this November email also shows, I forwarded them a link to a BBC program on Syria done by the heroic Paul Wood in order to try to persuade them that journalists are coming in anyway and they might as well let al Jazeera in formally.

Importantly, the fact that I had to send my resume and biography to establish my credentials for an interview bid with Assad and the very need for sending these things shows I was not an agent for them.

I suspect all sorts of people will continue to focus on Rosen.

If you haven’t been following his work, a number of people have pointed to Rosen as one of the very few people giving a nuanced picture of what is going on in Syria right now. As an example, in this Q&A he talks about the stalemate-degrading-into-civil-war Syria is in right now.

Only a “Hama” could change the equation. Nobody can say exactly what that would entail, because “Hama” has become an epithet, a symbol, it just means for something terrible to happen. So, until now there is no Hama-type event that the opposition or international media could use to give leaders in Turkey or the West a pretext for humanitarian intervention or to delegitimise the country’s leadership. Such an incident would have to be so grave that international opponents would use it to obliterate the Russian and Chinese veto in the United Nations, and to criminalise those two countries for their backing of the Syrian regime.

In any case, that’s the Nir Rosen background to the emails.

All of which led me to ask where the emails came from. I have no doubt they’re real (or at least most of them)–Rosen has confirmed the emails mentioning him appear to be real. Here’s the Guardian’s description of who did and did not confirm the authenticity of emails involving them.

But having the entire contents of one or two email inboxes is not the same as reliably understanding how they came to be obtained and published. That’s the question I’d like to look at in more detail in a follow-up post.

BAE F-35 Hack Confirmed

I’ve long complained that the government’s obsession with WikiLeaks is badly misplaced. After all, DOD and some of its contractors simply can’t keep their networks secure from Chinese hackers. So if our chief rival can take what it wants, why worry so much that actual American citizens have access to what China can take with abandon?

Case in point. The Australian has confirmed what was initially reported three years ago: China hacked BAE to steal performance information on the F-35.

CHINESE spies hacked into computers belonging to BAE Systems, Britain’s biggest defence company, to steal details about the design, performance and electronic systems of the West’s latest fighter jet, senior security figures have disclosed.

The Chinese exploited vulnerabilities in BAE’s computer defences to steal vast amounts of data on the $300 billion F-35 Joint Strike Fighter, a multinational project to create a plane that will give the West air supremacy for years to come, according to the sources.

[snip]

One of those present said: “The BAE man said that for 18 months, Chinese cyber attacks had taken place against BAE and had managed to get hold of plans of one of its latest fighters.”

This plane will have taken more than $385 billion to develop and will take $1 trillion to sustain. It is the most expensive weapons system in history. And yet for 18 months, the Chinese were just living on (at least) BAE’s networks taking what they wanted. How much of the considerable cost and rework on this program comes from the data on it China has stolen along the way?

In fact, I’m wondering whether China isn’t borrowing from our own playbook: during the Cold War, we made Russia go bankrupt by engaging in an arms race it couldn’t afford. China doesn’t need to do that. By hacking our data, they can just make us go bankrupt by setting up an arms race between our contractors and its hackers. With the result that we build a trillion dollar plane that it can already exploit.

And yet the government’s priority seems to be shutting up leakers who reveal its crimes, not networks that reveal our biggest military secrets.

What Is Government Covering Up with the Imprisonment of Yemeni Journalist?

Jeremy Scahill has a disturbing story of how President Obama intervened to make sure Yemen kept journalist Abdulelah Haider Shaye imprisoned even after domestic pressure convinced then President Ali Abdullah Saleh to release him.  [Note, I’ve adjusted the order of Scahill’s report to make Obama’s intervention more clear]

After Shaye was convicted and sentenced, tribal leaders intensified their pressure on President Saleh to issue a pardon. “Some prominent Yemenis and tribal sheikhs visited the president to mediate in the issue and the president agreed to release and pardon him,” recalls Barman. “We were waiting for the release of the pardon—it was printed out and prepared in a file for the president to sign and announce the next day.” Word of the impending pardon leaked in the Yemeni press. “That same day,” Barman says, “the president [Saleh] received a phone call from Obama expressing US concerns over the release of Abdulelah Haider.”

[snip]

On February 2, 2011, President Obama called Yemeni President Ali Abdullah Saleh. The two discussed counterterrorism cooperation and the battle against al Qaeda in the Arabian Peninsula. At the end of the call, according to a White House read-out, Obama “expressed concern” over the release of a man named Abdulelah Haider Shaye, whom Obama said “had been sentenced to five years in prison for his association with AQAP.”

[snip]

Saleh rescinded the pardon.

Shaye’s apparent crime?

Interviewing Anwar al-Awlaki–effectively the equivalent crime for which the US imprisoned Al Jazeera journalist Sami al-Hajj and wiretapped Lawrence Wright, independent contact with people associated with al Qaeda.

Although, as Scahill describes, Yemen trumped up a bunch of evidence to insinuate closer ties between Shaye and AQAP. Scahill also notes that one of the key claims made to justify the killing of Awlaki–his celebration of Nidal Hasasn’s attack on Fort Hood–came in part from Shaye’s reporting, which included a number of questions that challenged Awlaki and called him on his inconsistency.

Read the whole article–it’s infuriating.

I wanted to point out a few points of timing with respect to Shaye’s imprisonment, because I think the government may have specific reasons it wants Shaye to remain in prison.

Yemen’s intelligence agents first detained Shaye in July 2010. Then, he was arrested and detained on August 6, 2010. As Scahill notes, that was right as the US was ratcheting up its attempts to kill Awlaki (Awlaki was placed on the CIA kill list in April 2010, and the OLC memo authorizing his killing was completed in June 2010).

As it happens, that was also the period when State was just beginning to figure out which diplomatic cables might have been leaked to WikiLeaks. Mind you, State didn’t have a really good sense of what would be published until November of 2010, when the NYT happily told them.

But I do find it interesting that Obama’s call to Saleh came two months after WikiLeaks published this cable reporting a meeting between then CentCom Commander Petraeus and Saleh. As Scahill noted, the cable recorded Saleh boasting about lying about US airstrikes. But it also included this conversation about civilian casualties.

¶4. (S/NF) Saleh praised the December 17 and 24 strikes against AQAP but said that “mistakes were made” in the killing of civilians in Abyan. The General responded that the only civilians killed were the wife and two children of an AQAP operative at the site, prompting Saleh to plunge into a lengthy and confusing aside with Deputy Prime Minister Alimi and Minister of Defense Ali regarding the number of terrorists versus civilians killed in the strike. (Comment: Saleh’s conversation on the civilian casualties suggests he has not been well briefed by his advisors on the strike in Abyan, a site that the ROYG has been unable to access to determine with any certainty the level of collateral damage. End Comment.) Read more

Is This What Robert Mueller Meant by Cyber Expertise?

Back on February 3, I noted what I thought was the irony that, four days after FBI Director Robert Mueller bragged about FBI’s cybersecurity expertise–including its partnerships with counterparts overseas–Anonymous released an earlier hacked call between Scotland Yard and FBI.

Mueller: If I may interject, we have built up a substantial bit of expertise in this arena over a period of time, not only domestically but internationally. We have agents that are positioned overseas to work closely with–embedded with–our counterparts in a number of countries, and so we have, over a period of time, built up an expertise. That is not to say that NSA doesn’t have a substantial bit of expertise also, understanding where it’s located.

Mikulski: But it’s a different kind.

Mueller: Well, no, much of it is the same kind, much of it is the same kind, in terms of power, I think NSA has more power, in the sense of capabilities, but in terms of expertise, I would not sell ourselves short.

We now know that at the time of both the hack and Mueller’s comment, the FBI was running Hector Xavier Monsegur–Sabu–as a confidential informant–and the Scotland Yard call is one of the hacks they busted others for with his assistance last week.

In January 2012, O’CEARRBHAIL hacked into the personal e-mail account of an officer with Ireland’s national police service, the An Garda Siochana (the “Garda”). Because the Garda officer had forwarded work e-mails to a personal account, O’CEARRBHAIL learned information about how to access a conference call that the Garda, the FBI, and other law enforcement agencies were planning to hold on January 17, 2012 regarding international investigations of Anonymous and other hacking groups. O’CEARRBHAIL then accessed and secretly recorded the January 17 international law enforcement conference call, and then disseminated the illegally-obtained recording to others.

And meanwhile, all of the things Sabu was saying on his twitter account were closely monitored–if not written–by the FBI, including the comment about FBI’s informants, above, and the multiple “celebrations” of the Scotland Yard hack.

Read more

The NYPD’s Surveillance of Muslims and Occupy Wall Street Converges

I started my morning reading with this AP Q&A on the significance of their series on the NYPD’s spying on Muslims. There are several things missing: why does the NYPD profile only businesses they believe to be owned by Muslims, and not the American chains at which recent immigrants also congregate? Why doesn’t the Q&A discuss how the NYPD-on-the-Hudson got close to, but missed the two most significant plots of recent years; what does that say about the efficacy of all this spying? And why doesn’t the Q&A discuss the many informants the NYPD has deployed?

That said, the AP does get to the core reason why the NYPD’s program abuses the First Amendment:

Bloomberg and his aides have not addressed, however, why police kept intelligence files on innocuous mosque sermons and plans for peaceful protests. They’ve not explained why police noted which restaurants served “devout” Muslims, why police maintained lists of Muslims who changed their names or why innocent people attending Friday prayer services were photographed and videotaped.

Those activities, many Muslims said, make them feel like they’re under scrutiny just because of their religion.

After reading that Q&A, I then read this NYT article, talking about how the NYPD’s intelligence division–the CIA-on-the-Hudson again–has preemptively arrested some Occupy Wall Street protestors before they engaged in protest.

On Nov. 17, Kira Moyer-Sims was near the Manhattan Bridge, buying coffee while three friends waited nearby in a car. More than a dozen blocks away, protesters gathered for an Occupy Wall Street “day of action,” which organizers had described as an attempt to block the streets around the New York Stock Exchange.

Then, Ms. Moyer-Sims said, about 30 police officers surrounded her and the people in the car.

All four were arrested, said Vik Pawar, a lawyer for Ms. Moyer-Sims and two of the others, and taken to a police facility in the East Village. He said officers strip-searched them and ignored their requests for a lawyer.

These are the same tactics–or worse–as used when the NYPD targeted Muslims planning a peaceful protest of cartoons deemed blasphemous. But most troubling is the last anecdote the NYT reports (which the NYT might have known to contextualize if they had been reporting on the NYPD spying on Muslims). In one case, they NYPD and the FBI are targeting an Occupy activist who, as someone who appears to have changed his name from his birth name, would have been targeted closely under the NYPD program. And they appear to be insinuating a tie with Islamic terrorism.

Mark Adams, a 32-year-old engineer from Virginia, said he was arrested in November at an Occupy Wall Street protest in Midtown and was questioned by a police detective and an agent from the Federal Bureau of Investigation, who asked about his involvement with Occupy Wall Street, requested his e-mail address and inquired whether he had ever been to Yemen or met anyone connected to Al Qaeda.

Mr. Adams, a naturalized United States citizen who was born in Pakistan, said he was arrested during another protest in January and questioned by intelligence division detectives. In that instance, he said, the detectives asked him about specific names and addresses, asked about his work history, education and family, and questioned him about a trip he had made to Ireland.

Mr. Adams said he was disturbed that anyone would consider him a threat because of his ethnicity or political views. “It’s scary,” he said. [my emphasis]

As the AP reported last October, the NYPD conducts extensive checks and keeps records on those within the city who change their names from Arabic or Muslim-sounding names to something Americanized.

The NYPD monitors everyone in the city who changes his or her name, according to internal police documents and interviews. For those whose names sound Arabic or might be from Muslim countries, police run comprehensive background checks that include reviewing travel records, criminal histories, business licenses and immigration documents. Read more

image_print