Moles, Bugs, Whistleblowers: Spycatcher in the 21St Century
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Open Secrets
22 BACK PAGE LAW STORIES 15 January 2021 | www.newlawjournal.co.uk Open secrets In a tribute to John Le Carré, Athelstane Aamodt reflects on the operation & enforcement of official secrets laws © Kirsty Wigglesworth/AP/Shutterstock ne of the things that nearly communication of information’ under (the have. Further, the House of Lords’ decision everyone knew about the late now-abolished) s 2 of the Official Secrets most likely caused sales of the book to John Le Carré was that he had Act 1911. The basis for prosecuting them increase, thereby making things even Oworked in British Intelligence, was an article that they had written in the worse. The House of Lords eventually first for MI5 (domestic counter- magazine Time Out about the intelligence saw sense and in A-G v Guardian intelligence) and then for MI6 (foreign services. One of the photographs that had Newspapers Ltd (No 2) [1988] 3 All ER 545 intelligence). His life as an intelligence featured in the article was a photograph discharged the interim injunction on the officer provided ample inspiration for of the Post-Office Tower. The trial was a basis that the worldwide dissemination his many novels. For years, the British cause célèbre, with the first trial being of the book had already caused the Government would not even acknowledge abandoned after it was discovered that, harm that the British government had the existence of MI5 and MI6. MI5 was among other things, the security services complained about. Unsurprisingly, the first mentioned in parliament in 1952 and had been vetting the jury. -
Serious and Organised Crime Strategy
Serious and Organised Crime Strategy Cm 8715 Serious and Organised Crime Strategy Presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty October 2013 Cm 8715 £21.25 © Crown copyright 2013 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government Licence. To view this licence, visit http://www. nationalarchives.gov.uk/doc/open-government-licence/ or e-mail: [email protected]. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. Any enquiries regarding this publication should be sent to us [email protected] You can download this publication from our website at https://www.gov.uk/government/ publications ISBN: 9780101871525 Printed in the UK by The Stationery Office Limited on behalf of the Controller of Her Majesty’s Stationery Office ID 2593608 10/13 33233 19585 Printed on paper containing 75% recycled fibre content minimum. Contents Home Secretary Foreword 5 Executive Summary 7 Introduction 13 Our Strategic Response 25 PURSUE: Prosecuting and disrupting serious and 27 organised crime PREVENT: Preventing people from engaging 45 in serious and organised crime PROTECT: Increasing protection against 53 serious and organised crime PREPARE: Reducing the impact of serious and 65 organised crime Annex A: Accountability, governance and funding 71 Annex B: Departmental roles and responsibilities for 73 tackling serious and organised crime 4 Serious and Organised Crime Strategy Home Secretary Foreword 5 Home Secretary Foreword The Relentless Disruption of Organised Criminals Serious and organised crime is a threat to our national security and costs the UK more than £24 billion a year. -
Can Parliamentary Oversight of Security and Intelligence Be Considered More Open Government Than Accountability?
CAN PARLIAMENTARY OVERSIGHT OF SECURITY AND INTELLIGENCE BE CONSIDERED MORE OPEN GOVERNMENT THAN ACCOUNTABILITY? Stephen Barber ABSTRACT The nature of openness in government continues to be explored by academics and pub- lic managers alike while accountability is a fact of life for all public services. One of the last bastions of ‘closed government’ relates to the ‘secret’ security and intelligence ser- vices. But even here there have been significant steps towards openness over more than two decades. In Britain the Intelligence and Security Committee (ISC) of Parliament is the statutory body charged with scrutinising the agencies and since 2013 is more ac- countable itself to Westminster. This was highlighted by the first open evidence sessions involving the heads of the agencies which coincided with the unofficial disclosure of secret information by way of the so-called ‘WikiLeaks world’. This article examines scrutiny as a route to openness. It makes the distinction between accountability and open government and argues that the ‘trusted’ status of the ISC in comparison to the more independent Parliamentary Select Committees weakens its ability to hold govern- ment to account but, combined with the claim to privileged information and the acqui- escence of the agencies, makes its existence much more aligned to the idea of open gov- ernment Keywords - Westminster Select Committees, Intelligence and Security Committee, MI5 and MI6, scrutiny of public agencies. INTRODUCTION When the three heads of Britain’s security and intelligence services, Sir Iain Lobban (Director of GCHQ), Andrew Parker (Director General of MI5) and Sir John Sawers (Chief of MI6), appeared in Westminster on 7 November 2013, a new marker was set for open government. -
SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM
SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM HEINEMANN: AUSTRALIA First published in 1987 by HEINEMANN PUBLISHERS AUSTRALIA (A division of Octopus Publishing Group/Australia Pty Ltd) 85 Abinger Street, Richmond, Victoria, 3121. Copyright (c) 1987 by Peter Wright ISBN 0-85561-166-9 All Rights Reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. TO MY WIFE LOIS Prologue For years I had wondered what the last day would be like. In January 1976 after two decades in the top echelons of the British Security Service, MI5, it was time to rejoin the real world. I emerged for the final time from Euston Road tube station. The winter sun shone brightly as I made my way down Gower Street toward Trafalgar Square. Fifty yards on I turned into the unmarked entrance to an anonymous office block. Tucked between an art college and a hospital stood the unlikely headquarters of British Counterespionage. I showed my pass to the policeman standing discreetly in the reception alcove and took one of the specially programmed lifts which carry senior officers to the sixth-floor inner sanctum. I walked silently down the corridor to my room next to the Director-General's suite. The offices were quiet. Far below I could hear the rumble of tube trains carrying commuters to the West End. I unlocked my door. In front of me stood the essential tools of the intelligence officer’s trade - a desk, two telephones, one scrambled for outside calls, and to one side a large green metal safe with an oversized combination lock on the front. -
JTF-GTMO Detainee Assessment
S E C R E T //NOFORN I I 20320619 DEPARTMENTOF DEFENSE HEADQUARTERS,JOINT TASK FORCEGUANTANAMO U.S. NAVAL STATION,GUANTANAMO BAY, CUBA APO AE 09350 JTF-GTMO-CDR 19June 2007 MEMORANDUM FOR Commander,United StatesSouthem Command. 3511 NW 9lst Avenue. Miami,FL33172. SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) JTF-GTMO DetaineeAssessment 1. (S//NF) Personal Information: o JDIMSAIDRC ReferenceName: FahedA al-Harasi o Aliases and Current/True Name: Fahd Atiyah Hamza Hamid al-Harazi" Hassanal-Makki. FahedFahad" Khalid. Abu Hassan. al-Sharif. Abu Barak o Placeof Birth: Mecca. SaudiArabia (SA) o Date of Birth: 18 November 1978 o Citizenship: SaudiArabia o InternmentSerial Number (ISN): US9SA-000079DP 2. (U//T'OUO) Health: Detaineeis in good health. 3. (S//NF) JTF-GTMO Assessment: a. (S) Recommendation: JTF-GTMO recommendsthis detaineefor ContinuedDetention Under DoD Control (CD). JTF-GTMO previouslyassessed detainee for Continued Detentionwith TransferLanguage on 26May 2006. b. (S//NF) Executive Summary: Detaineeis reportedto be a memberof al-Qaida. He was identified as having attendedmilitant training and was an instructor at the al-Qaida al- Faruq Training Camp. Detaineewas in Afghanistan (AF) since 1999 during which he is assessedto have participated in hostilities againstUS and Coalition forces as a member of Classifiedby: MultipleSources REASON:E.O. 12958, AS AMENDED,Section 1.4(C) Declassi$on:20320619 S E C R E T //NOFORN I I 20320619 S E C R E T // NOFORN I I 20320619 JTF-GTMO.CDR SUBJECT: Recommendationfor ContinuedDetention Under DoD Control (CD) for GuantanamoDetainee, ISN: US9SA-000079DP(S) UsamaBin Laden's (UBL) 55th Arab Brigade.l Detainee'sname and aliaswere listed in recovereddocuments associated with al-Qaida, and the Saudi Ministry of Interior General Directorate of Investigations(Mabahith) identified him as a high priority detainee. -
Inside Russia's Intelligence Agencies
EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat. -
CIA Best Practices in Counterinsurgency
CIA Best Practices in Counterinsurgency WikiLeaks release: December 18, 2014 Keywords: CIA, counterinsurgency, HVT, HVD, Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan, Thailand,HAMAS, FARC, PULO, AQI, FLN, IRA, PLO, LTTE, al-Qa‘ida, Taliban, drone, assassination Restraint: SECRET//NOFORN (no foreign nationals) Title: Best Practices in Counterinsurgency: Making High-Value Targeting Operations an Effective Counterinsurgency Tool Date: July 07, 2009 Organisation: Central Intelligence Agency (CIA) Author: CIA Office of Transnational Issues; Conflict, Governance, and Society Group Link: http://wikileaks.org/cia-hvt-counterinsurgency Pages: 21 Description This is a secret CIA document assessing high-value targeting (HVT) programs world-wide for their impact on insurgencies. The document is classified SECRET//NOFORN (no foreign nationals) and is for internal use to review the positive and negative implications of targeted assassinations on these groups for the strength of the group post the attack. The document assesses attacks on insurgent groups by the United States and other countries within Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan and Thailand. The document, which is "pro-assassination", was completed in July 2009 and coincides with the first year of the Obama administration and Leon Panetta's directorship of the CIA during which the United States very significantly increased its CIA assassination program at the -
Wilson, MI5 and the Rise of Thatcher Covert Operations in British Politics 1974-1978 Foreword
• Forward by Kevin McNamara MP • An Outline of the Contents • Preparing the ground • Military manoeuvres • Rumours of coups • The 'private armies' of 1974 re-examined • The National Association for Freedom • Destabilising the Wilson government 1974-76 • Marketing the dirt • Psy ops in Northern Ireland • The central role of MI5 • Conclusions • Appendix 1: ISC, FWF, IRD • Appendix 2: the Pinay Circle • Appendix 3: FARI & INTERDOC • Appendix 4: the Conflict Between MI5 and MI6 in Northern Ireland • Appendix 5: TARA • Appendix 6: Examples of political psy ops targets 1973/4 - non Army origin • Appendix 7 John Colin Wallace 1968-76 • Appendix 8: Biographies • Bibliography Introduction This is issue 11 of The Lobster, a magazine about parapolitics and intelligence activities. Details of subscription rates and previous issues are at the back. This is an atypical issue consisting of just one essay and various appendices which has been researched, written, typed, printed etc by the two of us in less than four months. Its shortcomings should be seen in that light. Brutally summarised, our thesis is this. Mrs Thatcher (and 'Thatcherism') grew out of a right-wing network in this country with extensive links to the military-intelligence establishment. Her rise to power was the climax of a long campaign by this network which included a protracted destabilisation campaign against the Liberal and Labour Parties - chiefly the Labour Party - during 1974-6. We are not offering a conspiracy theory about the rise of Mrs Thatcher, but we do think that the outlines of a concerted campaign to discredit the other parties, to engineer a right-wing leader of the Tory Party, and then a right-wing government, is visible. -
Wikileaks and the Institutional Framework for National Security Disclosures
THE YALE LAW JOURNAL PATRICIA L. BELLIA WikiLeaks and the Institutional Framework for National Security Disclosures ABSTRACT. WikiLeaks' successive disclosures of classified U.S. documents throughout 2010 and 2011 invite comparison to publishers' decisions forty years ago to release portions of the Pentagon Papers, the classified analytic history of U.S. policy in Vietnam. The analogy is a powerful weapon for WikiLeaks' defenders. The Supreme Court's decision in the Pentagon Papers case signaled that the task of weighing whether to publicly disclose leaked national security information would fall to publishers, not the executive or the courts, at least in the absence of an exceedingly grave threat of harm. The lessons of the PentagonPapers case for WikiLeaks, however, are more complicated than they may first appear. The Court's per curiam opinion masks areas of substantial disagreement as well as a number of shared assumptions among the Court's members. Specifically, the Pentagon Papers case reflects an institutional framework for downstream disclosure of leaked national security information, under which publishers within the reach of U.S. law would weigh the potential harms and benefits of disclosure against the backdrop of potential criminal penalties and recognized journalistic norms. The WikiLeaks disclosures show the instability of this framework by revealing new challenges for controlling the downstream disclosure of leaked information and the corresponding likelihood of "unintermediated" disclosure by an insider; the risks of non-media intermediaries attempting to curtail such disclosures, in response to government pressure or otherwise; and the pressing need to prevent and respond to leaks at the source. AUTHOR. -
Harold Wilson Obituary
Make a contribution News Opinion Sport Culture Lifestyle UK World Business Football UK politics Environment Education Society Science Tech More Harold Wilson obituary Leading Labour beyond pipe dreams Geoffrey Goodman Thu 25 May 1995 09.59 EDT 18 Lord Wilson of Rievaulx, as he came improbably to be called - will not go down in the history books as one of Britain's greatest prime ministers. But, increasingly, he will be seen as a far bigger political figure than contemporary sceptics have allowed far more representative of that uniquely ambivalent mood of Britain in the 1960s and a far more rounded and caring, if unfulfilled, person. It is my view that he was a remarkable prime minister and, indeed, a quite remarkable man. Cynics had a field day ridiculing him at the time of his decline. Perhaps that was inevitable given his irresistible tendency to behave like the master of the Big Trick in the circus ring of politics - for whom there is nothing so humiliating as to have it demonstrated, often by fellow tricksters, that the Big Trick hasn't worked. James Harold Wilson happened to be prime minister leading a left wing party at a time when the mores of post-war political and economic change in Britain (and elsewhere) were just beginning to be perceived. Arguably it was the period of the greatest social and industrial change this century, even if the people - let alone the Wilson governments - were never fully aware of the nature of that change. Social relationships across the entire class spectrum were being transformed. -
Offensive Capabilities
GCHQ and UK Mass Surveillance Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and its allies, including the UK’s GCHQ.i The global surveillance infrastructure and hacking tools described in the previous chapters are not only used for obtaining information to be fed into intelligence reports and tracking terrorists. The agencies are also developing cyber-warfare capabilities, with the NSA taking the lead within the US armed forces. This militarisation of the internet saw U.S. intelligence services carried out 231 offensive cyber-operations in 2011ii. The UK's National Strategic Defence and Security Review from 2010 made hostile attacks upon UK cyberspace a major priorityiii. It is fair to assume that many countries are following suit and building cyber-warfare capabilities. Der Spiegel terms the development of these aggressive hacking tools as Digital Weapons. In their view D weapons which should join the ABC (Atomic, Biological and Chemical) weapons of the 20th century because of their indiscriminate nature. Here lies a fundamental problem. The modern world with connected global communications networks means that non-state actors such as civilians and businesses are now affected by the agencies’ activities much more frequently than before. The internet is used by everyone – cyberspace is mainly a civilian space – and the opportunity for collateral damage is huge. The papers leaked to Der Spiegel appear to show that signal agencies have little regard for the security and wellbeing of anyone who gets caught in the path of their operations. -
Download Chapman Pincher: Dangerous to Know Free Ebook
CHAPMAN PINCHER: DANGEROUS TO KNOW DOWNLOAD FREE BOOK Harry Chapman Pincher | 400 pages | 14 Feb 2014 | Biteback Publishing | 9781849546515 | English | London, United Kingdom Chapman Pincher - obituary Aitken, using information from retired CIA counterespionage chief James Jesus Angletonwrote a highly confidential letter in early to British Prime Minister Margaret Thatcheroutlining Angleton's suspicions of Hollis acting as a double agent. A reprint of the first edition in He won awards as Journalist of the Year inand Reporter of the Decade in Henry Chapman Pincher British journalist. His father's family was from north Yorkshire and his father was serving in the Northumberland Fusiliers Chapman Pincher: Dangerous to Know Chapman was born. Because he didn't want her to know. Sign up here to see what happened On This Dayevery day in Chapman Pincher: Dangerous to Know inbox! His most cherished professional compliment came from his political opposite, the left-wing historian E. He died with his family by his side, talking about his time in espionage and the power it gave him in his career. BBC News. Inbunden Engelska, In this he was as assiduous as he was ruthless in exploiting and careful in protecting them. Enlarge cover. Be on the lookout for your Britannica newsletter to get trusted stories delivered right to your inbox. During a stint in the army in the Second Chapman Pincher: Dangerous to Know War, Pincher developed an interest in weapons and how they worked — an interest which opened the door to an unexpected and exciting career. A good lunch". It was only the start of a career in which his name became synonymous with high-level exclusives from the most secret corners of government.