Espionage Info for Everyone — SPYCRAFT: Essentials

Bayard & Holmes

We are proud to announce the birth of our new book baby, SPYCRAFT: Essentials.

 

 

What do the main intelligence agencies do and where do they operate? How do they recruit personnel? What are real life honey pots and sleeper agents? What about truth serums and enhanced interrogations? And what are the most common foibles of popular spy fiction?

With the voice of over forty years of experience in the Intelligence Community, Bayard & Holmes answer these questions and share information on espionage history, firearms of spycraft, tradecraft techniques, and the personalities and personal challenges of the men and women behind the myths.

Though crafted with advice and specific tips for writers, SPYCRAFT: Essentials is for anyone who wants to learn more about the inner workings of the Shadow World.

 

Now available on Kindle, Nook, and Kobo, and in print at Amazon.

 

“For any author, SPYCRAFT: Essentials is the new bible for crafting stories of espionage. It’s also perfect for anyone who wants to know the lengths nations will go to keep or steal secrets and the methods they will use to do so. This is a bombshell of a book.”

~ James Rollins
New York Times Bestselling Author of The Demon Crown

 

“From novices to experts, I suspect everyone will find something in this book that they did not know before.”

~ Doug Patteson
Film Technical Advisor and Former CIA Officer

 

“Bayard and Holmes have done the unprecedented: crafted a fully informative, while wholly unclassified, overview on American spycraft with a special focus on preparing novelists for realistic scene writing. That said, this little treasure should not be limited to writers. Because it delivers solid, valuable information as a comprehensive primer on how the Intelligence Community really operates, SPYCRAFT: Essentials is a must-read for all involved Americans.”

~ Rob DuBois
Retired US Navy SEAL and NSA Collector

 

“An instant classic. Detailed, insightful, and authentic, SPYCRAFT: Essentials for Writers is my go-to reference for all things espionage.”

~ Grant Blackwood
New York Times Bestselling Author of the Briggs Tanner series

 

“An essential addition to every thriller writer’s library. If you want to know how the Intelligence Community really works, read SPYCRAFT: Essentials and you’ll get it right every time. Piper Bayard and Jay Holmes know their stuff!”

~Diane Capri
Award Winning New York Times and USA Today Bestselling Author of the Hunt for Jack Reacher series

Americans Tricked Into Working For Russia

Bayard & Holmes

~ Piper Bayard

 

Actual Photo of Russian Subversion In Progress

 

Subversion, subversion, subversion . . . When Americans are divided and allow ourselves to see our own countrymen as the “other,” we give our enemies, such as Russia, opportunities to tear our nation apart. When Americans say, “I disagree with you, but you are my brother, and that’s what matters most,” we stand strong against interlopers.

America’s enemies would encourage our internal divisions and self-hatred as a nation. In doing so, they don’t only prey on the haters among us. They prey upon well-meaning people who would work to solve our social problems.

These Americans Were Tricked Into Working for Russia. They Say They Had No Idea.

They probably didn’t.

Gaza — An Exercise in Subtle Intelligence

Bayard & Holmes

~ Jay Holmes

Intelligence work is usually thought of as being conducted by costly and sometimes high tech methods. A glance at the intelligence budgets of the US, Russia, China, and a few others would confirm that view.

For the most part, that view is accurate.

 

canstock-2016-sep-spy-satellite

We expect our intelligence agencies to use extravagantly expensive satellites, planes, drones, submarines, ships, and listening stations. They do, and those methods often lead to obtaining critical intelligence.

We also expect agencies to conduct Human Intelligence, or “HUMINT.” HUMINT requires vast amounts of personnel around the globe and at home to penetrate the governments, military, and industries of states that are of concern to us. It’s expensive, but it does indeed get results. It never gets as many results as we would like, but it gets a lot more than if we didn’t try.

Teams of analysts rely on these and other sources to create best guesses about what is going on in the world. With so much data of various forms arriving all day, every day, every week at the desks of various teams, it’s not always easy to sift through the chaff to find the best wheat. The collective experience of an analytical team is a huge factor in this. Modern computers with good software help improve the results.

With so much high dollar, high tech spying going on, it’s easy to miss subtler pieces of intelligence that become available to us. Yet sometimes, these seemingly mundane, inglorious bits of information can give us important insights.

One current example of an important subtle bit of information is staring us in the face in the Gaza Strip.

In a land where bombs, missiles, assassinations, and kidnappings are daily events, sets of well-proven expectations enter into our judgements about the current situation in Gaza. One clearly verifiable phenomena occurring in Gaza today is the change amongst Palestinian voters regarding the upcoming elections, which will possibly be held this October.

In the 2005 elections, Hamas ran on a We Hate Israel So You Must Love Us platform. That platform plank was supported by another tried-and-true Hamas marketing method, the Love Us and Vote for us or We Kill You method.

 

canstock-2016-sep-burning-flags-of-palestine-and-israel

Unlike the Palestinian West Bank, where the Fatah political group held sway, in Gaza, Hamas had most of the guns and controlled most of the local media so Hamas got the votes. The Vote for Us or We Kill You method is effective for winning elections. It’s far less effective at governing. Hamas has demonstrated the difference very clearly.

Thanks to Hamas, Gaza is an economic disaster, a health disaster, and a hellish place for Palestinian children to live.

The basic fact that Hamas is even worse than the governments in places like Chicago or DC when it comes to completing the basic tasks of government is no great intelligence coup. As long as Hamas could show that they were hurting Israel, they could keep their outside financial support from Europe, various fellow terrorist governments, the UN, etc. The question of whether or not Hamas would govern anything other than the usual Kill the Jews program was generally ignored by many Palestinians and many outsiders.

So here is the good news.

Unlike during the 2005 campaign, Palestinians are frequently and sometimes openly speaking against Hamas. Hamas’s chief rival, Fatah, is happy about that. But when we look more closely, the Palestinians in Gaza are not expressing much love for Fatah either.

The most important piece of intelligence data in Gaza today has to do with the Palestinian people in Gaza.

They are less impressed than ever with suicide bombs in Israel, missiles fired into Israel, kidnapping of Israelis, etc. The majority of the Palestinian public in Gaza is now most concerned with fixing Gaza. They want real schools, real health care, jobs, and reconstruction of the many bombed out areas of Gaza. Crushing Israel is not on most of their wish lists.

Both Fatah and Hamas are aware of this shift in their respective voters.

Both groups have responded with massive social media campaigns. Both parties have adopted newer platforms, or at least are presenting them in social media. In fact, I’ll be disappointed if we don’t get a few Gaza trolls attacking this article.

The problem for both groups, but especially for Hamas, is that few Palestinians are buying Hamas’s shiny new You’re Better Off Today Than You Were Six Years Ago campaign.

Palestinians are openly laughing at Hamas’s ridiculous claims of having improved life in Gaza. It hasn’t, and the folks in Gaza know it and admit it.  In particular, young Palestinian adults are mocking Hamas’s social media campaign. They routinely convert Hamas campaign videos into dark comedy.

None of this means that we should expect a sudden and dramatic change in life in Gaza after the October elections.

The Palestinian public may not be able to exercise a democratic choice. A panicking Hamas is capable of anything. But an important implication for intelligence on Gaza should not be ignored. The Kill the Jews sales pitch is no longer a sufficiently popular product with the voters in Gaza.

canstock-2016-sep-palestine-and-israel-flags

Over time, this may lead to improvement in Gaza and a lessening of the conflict with Israel. A few decades ago, an Israeli woman told me, “There will be peace in Israel and Palestine when Palestinians love their children more than they hate Israeli children.” I have always been certain that she was right. That day may be arriving in Gaza.

ANTHROPOID — Espionage Legend on the Big Screen

Bayard & Holmes

~ Piper Bayard & Jay Holmes

ANTHROPOID brings one of history’s legendary espionage events to the big screen – the WWII assassination of SS-Obergruppenführer Reinhard Heydrich by two Czech paratroopers and a few Czech resistance fighters.

 

2016 Aug Anthropoid Movie Poster

 

Heydrich, also known as the Butcher of Prague, was the architect of Hitler’s death camps and third in command after Hitler and Himmler. Jan Kubis (played by Jamie Dornan) and Jozef Gabcik (played by Cillian Murphy) trained for months in the UK and then parachuted into Nazi-occupied Czechoslovakia. Once in Prague, they met up with the dwindling group of Czech resistance fighters, who helped them plan and execute Operation Anthropoid. Heydrich was the highest ranking Nazi officer assassinated during WWII.

Piper Bayard:

This movie is a symphony compared to a Bourne movie rock concert.

If you’re looking for unrealistic characters who do unrealistic things to thwart unrealistic villains with unrealistic explosions and quippy dialogue, this is not the movie for you.  On the other hand, if you enjoy historically accurate war dramas about real events and real people, then you will likely find ANTHROPOID captivating and informative.

ANTHROPOID thankfully makes no effort to glamorize espionage, war, or the ordinary people made extraordinary by the demands of integrity and circumstance.

Courage falters, equipment fails, and humans make stupid mistakes, while at the same time they rise over and over again with a stubborn courage and devotion to their mission and to the Czechoslovakian people. While historical sources differ on the details, the main events surrounding the assassination are well portrayed.

 

Jamie Dornan as Jan Kubis and Cillian Murphy as Jozef Gabcik

Jamie Dornan as Jan Kubis and
Cillian Murphy as Jozef Gabcik

 

The tension and conflict are well drawn in spite of a script that is at times a bit stiff.

The stakes are clear. There is no doubt that not only are the lives of the Czech resistance fighters on the line, but also the lives of their families and the people of Czechoslovakia. The drama is not manufactured, but rather real, and raw, and tremendous in the fact that in spite of all human fears and failings, Jan Kubis and Jozef Gabcik carried on and succeeded in one of the greatest assassinations in history.

Jay Holmes:

In the way of disclosure, I must explain that I could not view Anthropoid with the objectivity that a reviewer should always employ.

Though I was not alive at the time of the operation, and I am not of Czech descent, I admire the operatives that conducted the operation, and I have always considered the Nazis to be contemptible. That combination makes it difficult for me to be completely objective in reviewing a movie like ANTHROPOID, but I am happy to share my impressions.

 

The real Jan Kubis and Jozef Gabcik Image by UK Govt., public domain

The real Jan Kubis and Jozef Gabcik
Image by UK Govt., public domain

 

Most war movies and action films that depict historic events are created with an emphasis on watchability, and the pace of events, the characters, and the dialogue sacrifice accuracy to make them more fun to watch. ANTHROPOID is not fun to watch, but it is an excellent movie all the same.

I am fairly well read on Operation Anthropoid, and I was once fortunate enough to meet a retired member of British Intelligence that had helped prepare the mission.

It is my impression that the movie ANTHROPOID succeeded in closely portraying the actions and moods of the men and women that were involved in the operation. For me, this made the movie more acceptable. It seems to me that the writer, producer, and actors were perhaps somewhat reverent in their attention to detail and accuracy. The movie may be the best memorial to Operation Anthropoid yet created. As such, I applaud it.

 

Reinhard Heydrich's car after the attack. Image in German Federal Archive, public domain

Reinhard Heydrich’s car after the attack.
Image in German Federal Archive, public domain

 

Interestingly, the process of researching and producing the movie has reawakened the Czech public’s interest in the event.

The Czech Government has now agreed to do forensic work to try to identify bodies from unmarked graves of that period and location to try to locate and rebury the Czech resistance fighters involved in Operation Anthropoid, and give them a proper military burial. I commend the Czech people for pursuing this course. The makers of Anthropoid can be proud that their movie has a tangible result beyond, and more important than, the box office.

Our Rating:

Overall the early reviews of the movie have been tepid. We will depart from the trend and give Anthropoid the Bayard and Holmes .44 magnum – our highest rating.

If the events of WWII and the moral questions surrounding those events matter to you, or if you are interested in raw espionage legend and the feats of real operatives, then you should make the short pilgrimage to see ANTHROPOID. Enjoy the symphony.

 

 

Lt. Cmdr. Edward Lin Charged with Spying for China…And US Made It Easy

Bayard & Holmes

~ Jay Holmes

Once again, the US government has allowed your tax money and the nation’s security to be compromised in ridiculous fashion.

On Friday, April 8, 2016, the US Navy charged an active-duty maritime reconnaissance officer with passing US military secrets to a foreign government. The US Navy filed multiple charges, including espionage, against Lieutenant Commander Edward Lin during an Article 32 hearing in Norfolk, Virginia.

 

Lt. Cmdr. Edward Lin Image by US Naval Institute

Lt. Cmdr. Edward Lin
Image by US Naval Institute

 

Originally, the US Navy had not released the suspect’s name or the name of the country for which he (allegedly) spied because the Navy had designated the case as a “‘National Security Case.”

A “National Security Case,” according to the US military, is one which “ . . . to any serious degree, involves the compromise of a military or defense advantage over any foreign nation or terrorist group; involves an allegation of willful compromise of classified information, affects our military or defense capability to successfully resist hostile or destructive action, overt or covert; or involves an act of terrorism.”

The Navy explained that, “NCIS and FBI are still investigating the details of this case, and, therefore, we cannot provide any additional details at this time.” Since then, unidentified Navy officers have identified the accused as Lt. Cmdr. Lin and the beneficiary of Lin’s espionage work as Communist China.

You remember China? It’s that country that has been rapidly expanding its military and is claiming large areas of international waters as their national domain. Yes, that China.

Though redacted, the charging document describes a depressing story in which Lin transported secret information out of the country without permission and then lied about his whereabouts when he returned to duty. The charging documents allege that Lin successfully committed espionage twice and attempted espionage on three other occasions. Lin is currently in pre-trial confinement at the Naval Consolidated Brig in Chesapeake, Virginia.

Given that Lin had a high security clearance and served on E-P3E Aries II reconnaissance aircraft, he likely did tremendous damage to the US.

The technical and operational information that Lin was entrusted to safeguard constitutes an intelligence coup for Communist China. The reporting on this case will understandably focus on Lin’s access as an officer in the Commander, Patrol and Reconnaissance Group.

However, Lin had access to a whole other trove of treasure for China.

He served as the Congressional Liaison for the Assistant Secretary of the Navy for Finance Management and Comptroller from 2012 to 2014. In his position as liaison to Congress, Lin would have had access to a vast array of sensitive information from every part of the US Navy.

It would be easy to assume that Edward Lin went to great lengths to succeed at such a villainous subterfuge. He didn’t. It was all too easy, and anyone could do it.

Most of the outrage – all of which Lin and my beloved Navy deserve – will be directed toward Edward Lin. In my opinion, Lin is just one small aspect of a much larger problem that we should not continue to ignore.

How did the US Navy, the FBI, and the rest of the US government manage to miss Lin’s (alleged) spying for what was likely more than a decade?

In the case of the FBI, we can forgive them if their pathetically small counterintelligence efforts missed Lin. Given their lack of resources and minimal mandate, the only surprise from the FBI counterintelligence team would be if they ever actually stumble upon an espionage operation. I am not knocking the FBI agents tasked with counterintelligence. They are undoubtedly as well trained and dedicated as other FBI agents, but they simply lack the means to conduct anything like an effective counterintelligence operation.

As for the US Navy, the Department of Defense, the Executive Branch and the Legislative Branches, I am much less forgiving. For one thing, Lin was a Taiwanese-born Taiwanese citizen until he was 14 years old. I disagree with the current policy that allows foreign born naturalized citizens to so easily gain high security clearances. I’m sure it’s the more politically correct thing to do, but it’s an asinine policy.

This is not the first time that the United States has lavished secret information on a Taiwanese born “alleged” spy.

Refer to the Wen Ho Lee* case if you are uncertain of the wisdom of this policy. In any event the proof is in the pudding, or in this case, the proof is in the feast that Lin served up to hostile Communist China.

If Lin is indeed guilty, then he deserves a life sentence of hard labor at Leavenworth or some obscure distant location. Most of my cohorts in the US Military and the US Intelligence Community will likely disagree with me and would prefer for Lin to be executed.

I can’t agree to that because I don’t support the death penalty. All judicial proceedings depend on the integrity and wisdom of those involved in prosecutions, and I can’t ignore that people are not perfect. For example, the government that is prosecuting Lin is the same government that was stupid enough and careless enough to make it easy for Lin to rob the taxpayers blind and endanger our national security. We now know about Edward Lin, which begs a question . . . Who do we not know about?

Regardless of the outcome of Lin’s trial, we, as American citizens, should start demanding better security standards to protect our national security and the billions of dollars in technology that we are all financing. Until our politicians have reason to think that the public is paying attention to our pathetically poor security policies, they will have no motive to fix it.

I hope that all of our readers will look beyond Edward Lin and tell their Congressweasels and their White House to start acting like adults on issues of national security. Edward Lin, if guilty, is a dangerous criminal, but this is a democracy, and We the People allowed him to do what he did.

 *   *   *   *   *   *   *   *   *   *   *   *   *

* Note to Wen Ho Lee:  I am not the New York Times. Don’t dream of sending lawyers in my direction. You and I have met before. I meant what I said . . . Does your hand still hurt?

Apple vs. FBI — What This Case Means for YOU

Bayard & Holmes

~ Piper Bayard & Jay Holmes

and

Guest Author & Information Security professional Chris Magill

The FBI wants Apple to rewrite code for iPhones in order to break into a phone used by one of the San Bernardino terrorists. Apple said no. They are now embroiled in a lawsuit.

On March 1, the FBI admitted exactly WHY it needs Apple’s help. The FBI was in the phone, with access to everything it needed. Then someone at the FBI changed the phone’s password. They forgot the password. Now, the FBI can’t get back in the phone.

In other words, the FBI is asking that it be allowed to gut the constitutional rights of every American in perpetuity because it made a sophomoric boo-boo.

This begs some questions . . .

1)  Why doesn’t the FBI just ask the NSA for the information?

The cat got out of the Snowden bag a few years ago that the NSA collects and stores every electronic communication that takes place in America, including and especially phone communications. Investigating the San Bernardino jihadis and their play pals is EXACTLY why the NSA collects and stores these communications. If the NSA can’t give the information to the FBI, they need to give US citizens a refund of the untold fortunes they have wasted on this data collection. (See Spooks Without Boundaries by Piper Bayard.)

2)  If the NSA for any reason can’t give the FBI the information it needs, why doesn’t the FBI ask Israel or one of the Five Eyes nations?

Again, thanks to the Snowden cat, it is public knowledge that the White House allows Israel and the Five Eyes nations (Canada, UK, NZ, Australia) access to the raw data that the NSA collects on Americans. If the NSA can’t give the FBI the info, we’re sure that for a few shekels, Israel would be happy to find it for them.

3)  What does this lawsuit mean for the American citizen?

To give you the best information possible, we have invited Information Security professional and privacy advocate Chris Magill to answer that question for us . . .

Internet bugs Canstock

Apple vs. the FBI: What This Case Means for YOU

By Chris Magill

Apple and the FBI are currently locked in a struggle over your right to privacy. The Federal government has asked the courts to require Apple to change its code to allow FBI agents to read protected data on an iPhone believed to belong to one of the San Bernardino attackers. It also wants this capability to be applied to all iPhones, even yours.

So, the question becomes should private citizens be allowed communications capabilities which cannot be read by the government?

By law, there already are communications which are protected from government eyes. For example, attorney-client privilege prevents the government from listening in on private conversations when discussing legal strategies. As Americans, we also have the protections of the right to Freedom of Speech and the right to Freedom of Assembly. Allowing government access to our phones without a warrant destroys these rights.

What is cryptography?

Cryptography is a mathematical operation that replaces plain text with scrambled characters that can only be correctly interpreted by someone who holds the secret “key.”

Cryptography has existed for thousands of years. It was a vital means of protecting communications during the Revolutionary War. Thomas Jefferson greatly improved cryptography after the founding of our country when he developed the Wheel Cipher while serving as George Washington’s Secretary of State. Yes, the United States once had a Secretary of State who understood the importance of cryptography. In the iPhone, the iMessage feature encrypts instant messages between recent iPhone versions, making it very difficult to be read by anyone other than the intended recipient, even with access to the device.

What is a backdoor?

A backdoor is an easy-to-decrypt method for governments to read content on devices that would otherwise be very difficult to access.

Think of it as though the Federal Government sought to require you to leave your patio door unlocked in case a police officer needs to access your living room during an investigation. Obviously this would be ridiculous. Only a tiny fraction of homes would ever need to be entered by police, yet everyone would be at risk from criminals entering the unsecured door. Backdoors are a dangerous idea for two reasons. First, they require a known weakness, which can then be exploited by hackers or online thieves. And second, backdoors enable government to bypass the judicial branch to spy on citizens in violation of our rights.

Aren’t bad guys protected by cryptography?

Yes, in the same way that bad guys are protected by the Constitution.

We have constitutional protections against unlawful search and seizure. These protections should also apply to the communications we share and the contents of our devices we rely on in our daily lives. The iPhone isn’t the strongest available way to pass secret messages. A determined adversary will find communications methods that can only be countered by diligent, labor-intensive traditional law enforcement and counterintelligence methods.

I haven’t broken the law, so I have nothing to hide. How does this affect me?

By the 1980s, the Justice Department estimated there were approximately 3,000 criminal offenses spanning more than 23,000 pages of Federal law. Even if you are the best attorney in the world, it’s unlikely you could even know for sure whether you’ve never violated any of them.

If the government decides to prosecute you, they have a huge arsenal of regulations to select from which you will have to defend against. Skilled cyber criminals, spies, and terrorist organizations already have access to encryption that is theoretically unbreakable. The bad guys don’t rely on commercial encryption products in consumer devices.

A government backdoor does not make you any safer from terrorism.

It does make it easier for governments to find and target those who disagree with them. This is a concern in modern day America. Ask any conservative group targeted by Lois Lerner’s IRS. With government access to a backdoor to your phone, finding people who have a differing political view becomes as simple as a Google search.

What else can happen if cryptography is compromised?

This has happened in the recent past. In 2011, Comodo was compromised by a nation state-affiliated hacker group.

Comodo is a registration authority that creates cryptographic certificates which tell your web browser the web sites you visit are who they claim to be. Fake certificates were created that enabled the government of Iran to intercept and read the personal emails of citizens using Gmail and Hotmail. We will likely never know how many Iranian dissidents were rounded up and imprisoned (or worse) as a result of this compromise. Weak encryption makes it easier for oppressive governments to spy on their own citizens and crush dissent. Weak cryptography is also a factor in most, if not all, data breaches. If your identity was stolen in any of the countless data breaches, such as Target, Home Depot, Experian, or OPM, you probably have weak or compromised cryptography to thank.

What next?

Governments have an insatiable appetite to know everything about their citizen’s activities, acquaintances, political views, and beliefs. They also have a desire to prevent citizens from having capabilities that are difficult for them to counter.

The Apple vs FBI case is not about terrorism or crime. This case is about control of the transfer of ideas.

You are the government. You select your representatives. They work for you. They derive their authority from you. You have the power to demand that they stop. Tell your representatives to block efforts to weaken freedom of speech by banning civilian access to strong encryption. Tell them to prevent the government from requiring tech companies to enable spying through commercial products.

Allowing the government to secretly spy on all Americans is the digital equivalent of book burning. Ideas that are found distasteful to whichever administration holds power can be sought out and banned, and those citizens with undesirable views targeted for retaliation or punishment. Far from protecting us from terrorists, such actions only serve to weaken our democracy.

Sources:

TechTarget: “A breach at a registration authority caused Comodo to issue nine fraudulent certificates, enabling an attacker to impersonate some major websites and servers.”

http://searchsecurity.techtarget.com/news/1529110/Comodo-warns-of-serious-SSL-certificate-breach

CNet: “Apple’s iMessage encryption trips up feds’ surveillancehttp://www.cnet.com/news/apples-imessage-encryption-trips-up-feds-surveillance/

Chris Magill is an Information Security professional and privacy advocate. When he isn’t helping companies manage their cryptographic systems and hunting down hackers, Chris enjoys spending time on his small ranch with his family in the Pacific Northwest chasing horses around. His LinkedIn profile is https://www.linkedin.com/in/cmagill

America is Not a Location

By Piper Bayard

America is not a location. America is an ideal. It is the dream of a country in which freedom is paramount, and it is secure because the government is the servant of the people.

Because America is an ideal, Americans are not born. Rather, America, itself, must be born anew with each generation. Each generation has the choice of embracing the American ideal of a government that answers to the people, or of rejecting that ideal in favor of a more paternalistic system of government.

 

Actual photo of ideal elected American official at work.

Actual photo of ideal American government at work.

 

When the government spies on us with everything from street corner cameras to warrantless searches of random individuals to collection and analysis of our every electronic transmission and phone communication, we are no longer the masters, and the government is no longer our servant. It is our ruler. It is a parent searching our rooms and opening our mail on the off chance that we might be doing something it doesn’t want us to do. That is exactly what is happening now.

The difference between the government being the servant and the government being the master can be boiled down to one thing:  a warrant.

When an agency such as the NSA, FBI, DHS, etc., is required to obtain a warrant, an official paper trail is created by which the people can force the government to answer for who and how it searches, why it searches, and what it obtains. It is a record by which citizens can hold the government accountable for its actions in a court of law.

Since Edward Snowden dropped his NSA whistleblower bomb, the White House has gone from denying that the U.S. spies on its own citizens to unashamedly stating that it will continue to collect and analyze data on American citizens in the name of “national security.”

 

meme by bizarrojerri.wordpress.com

meme by bizarrojerri.wordpress.com

 

At this point, numerous disturbing facts have become public information:

  • Through various means, our government is collecting and storing every digital transaction American citizens make – every email, every phone communication, every bank transaction, every credit and debit card transaction, every check remittance, and every online health and education record.
  • Our government allows the other Five Eyes countries – Canada, New Zealand, the U.K., Australia – as well as Israel and unnamed others access to this raw data on American citizens.
  • Our government has written agreements with these countries for their unlimited access to our raw data, with only smoke and mirror oversight of what data they collect or how they use it. It is an “honor among eavesdroppers” arrangement.
  • Our government trades information about American citizens and intelligence operations with corporations in exchange for their data on American citizens.
  • When trigger words* like “snow,” “bust,” or “sick” alert one of the countless analysts in both the government and the private sector who are tasked with pawing through this hoarder’s mountain of raw data, they are free to peruse and interpret the threads of our lives at their personal discretion.
  • Everything these analysts do is off the public record. No probable cause. No individual warrant. No accountability.

 

U.S. Government Serving Up Americans to the World

U.S. Government Serving Up Americans to the World

 

The administration rationalizes all of these acts with the all-encompassing buzzwords “national security” and the Foreign Intelligence Surveillance Act (FISA).

Originally, FISA was enacted to allow data collection on foreign terrorists. Warrants were based on probable cause, and the judges of the FISA court approved them. These boundaries slipped substantially with the Patriot Act. Now, under the current administration, there are no meaningful boundaries at all, with the FISA court essentially rubberstamping every administrative request* to spy on American citizens that comes their way, issuing blanket orders that are nothing but fishing trips, subjecting Americans to data collection and retention with no probable cause.

One example of a typical FISA-approved blanket order is the Top Secret order to Verizon Wireless signed on April 25, 2013, which was published by The Guardian on June 6, 2013.

This order was requested by the FBI, which in turn receives its orders from the White House. It forces Verizon Wireless to give the NSA information on ALL telephone calls in its system on an “ongoing daily basis.” Telephone calls originating and terminating in foreign countries are specifically excluded—the height of irony considering the original purpose of FISA was solely to collect data on suspect foreigners. For full text of this order, see Verizon Forced to Hand Over Telephone Data–Full Court Ruling Dated April 25, 20143 (below).

At its core, our government has given itself authority and provision to maintain a wiretap on every American and foreigner within U.S. borders.

No probable cause. No discretion. No accountability to the public. Each and every one of us is now assumed guilty until proven innocent. Each and every one of us now answers to the government master that was once our servant, turning the American ideal on its ear.

 

Ideal photo of actual U.S. government at work.

Ideal photo of actual U.S. government at work.

 

Spy on suspected terrorists. Do it unapologetically. Do it inside or outside our borders. But let there be probable cause. Let there be warrants. Let there be public records. Let there be accountability. If we are to remain American, we must not allow the government to exercise such omnipotent power with impunity.

Freedom is the essence of the American ideal. It is about shouldering the responsibility for ourselves, for our safety, and for our governance. It is not about perfect security from cradle to grave. When we abdicate our responsibility for our freedom in favor of comfort and the illusion of safety, we become wards of the state. What were once our rights as responsible adults are now merely our privileges as subjects, granted or withheld by our rulers at their whim and discretion.

We must demand more of our leaders. Freedom can be won, and freedom can be surrendered, but Freedom will never be given back once successfully taken by the ruling class. Unbridled surveillance of American citizens is that taking.

Like nuclear weapons, the surveillance train has left the station. But like nuclear weapons, we have the choice about how we will use that technology. America is at a crossroads. Will our generation shoulder the responsibility for our freedom and set firm boundaries on the actions of our government? Or will we devolve into a location on a map? The choice belongs to each of us.

 

This Means You

This Means You

*   *   *   *   *   *   *   *   *   *   *   *   *

Verizon Forced to Hand Over Telephone Data–Full Court Ruling Dated April 25, 2013. The Guardian, June 6, 2013.

NSA Collecting Phone Records of Millions of Verizon Customers Daily, Glenn Greenwald, The Guardian, June 6, 2013.

NSA PRISM Program Taps in to User Data of Apple, Google, and others. Glenn Greenwald, The Guardian, June 6, 2013.

Obama Blasts Media ‘Hype’ Over Secret Program, Calling Them ‘Modest Encroachments on Privacy’. Brett LoGiurato, Business Insider, June 7, 2013.

US, British Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program. Barton Gellman and Lora Poitras, The Washington Post, June 7, 2013.

Here’s the Law the Obama Administration is Using as Legal Justification for Broad Surveillance. Brett LoGiurato, Business Insider, June 7, 2013.

Obama: No One is Listening to Your Calls. Michael Pearson, CNN Politics, June 9, 2013.

Edward Snowden: The Whistleblower Behind the NSA Surveillance Revelations. Glenn Greenwald, Ewen MacAskill, and Lora Poitras, The Guardian, June 9, 2013.

US Agencies Said to Swap Data with Thousands of Firms, Michael Riley, Bloomberg, June 14, 2013.

British Spy Agency Taps Cables, Shares with US NSA , Reuters, June 21, 2013. (Info on Five Eyes)

NSA Shares Raw Intelligence Including Americans’ Data with Israel, Glenn Greenwald, The Guardian, September 11, 2013.

NSA and Israeli Intelligence:  Memorandum of Understanding–Full Document, The Guardian, September 11, 2013.

What Makes US-Israeli Intelligence Co-operation ‘Exceptional’?, Matthew Brodsky, The Guardian, September 13, 2013.

Judge Upholds NSA’s Bulk Collection of Data on Calls, Adam Liptak and Michael S. Schmidt, New York Times, December 27, 2013.

Foreign Intelligence Surveillance Act Court Orders 1979 – 2014, Electronic Privacy Information Center, May 1, 2014.

 

 

 

5 Espionage Myths — The November Man

 

By Piper Bayard

 

The November Man movie poster

The November Man movie poster

 

The November Man is an espionage movie in which an ex-CIA operative is brought back by the Company for a personal mission in Moscow, only to find himself pitted against his protégé. It is a fast action thriller starring Pierce Brosnan and Luke Bracey that rockets viewers through the Russian and Serbian shadow world with everything from brutal assassins to rogue top-level operatives. It is also a comprehensive collection of espionage myths.

 

Myth One – CIA operatives are all ready and willing to off their own at any given moment just because a bureaucrat orders it.

Truth – US intelligence operatives are not murderous automatons who blindly kill whomever they are told to, up to and including their mentors and protégés.

 

It was common in Stalin’s KGB for Soviet operatives to kill each other. In fact, the KGB had a special branch for the express purpose of targeting fellow agents. However, such pointless slaughter has never been part of the US intelligence culture. Americans don’t put up with that crap. Presidents come and go with their various agendas, and long after they are booking their lecture tours and cutting ribbons on their presidential libraries, operatives are still on the job. Our intelligence community consists of flesh and blood human beings who would not live long if they didn’t question and comprehend their missions. They are not slovenly attack dogs to be released on any target that a transient bureaucratic overlord decides is inconvenient to their political goals, particularly when that target is one of their own.

 

Myth Two – Operatives think nothing of killing innocent people.

Truth – People who randomly kill innocents are serial killers and criminal psychopaths, not highly trained intelligence operatives.

 

Killing is serious business, and the intelligence community has had standing orders for decades to avoid civilian casualties as much as possible. An operative who randomly kills innocent people would be quickly weeded out. Such behavior is unacceptable in the intelligence community.

 

Myth Three – Operatives can’t have families.

Truth – Operatives, like anyone else, can have loved ones and families that they adore.

 

While it is true that many field operatives are either single or divorced, that is due to the nature of the job and not to any taboo about bonding with other humans. The fact is that few spouses are up for, “I need to go. Can’t say where. Can’t say when I’ll be home. Sorry, but I can’t leave you a number, either.” The lifestyle is very hard on relationships, and spouses must be as committed to leading the double life as the operative is. Not many are, and they are not to blame for that. However, as my writing partner proves, some do sustain marriages and family ties for decades.

 

Myth Four – People can be killers, or they can love, but they can’t do both.

Truth – Dedicated operatives often go into the field because they DO love.

 

The notion that someone who is trained to kill the likes of Bin Laden can’t love is patently absurd. Many operatives go into the field because they are unwilling to sit still and do nothing while brutal despots butcher innocent people.

 

Myth Five – Assassins look like assassins.

Truth – Assassins look like the school secretary, the grocery store manager, the bank teller, the janitor, or anyone else who can blend in with a crowd.

 

It is not required for operatives to speak in foreign accents and wear either tailored business suits or black leather.

 

Russian Assassin from The November Man

Russian Assassin from The November Man

 

 

While not a common myth, another notable fiction in The November Man is the notion that bullets from handguns travel at four times the speed of sound . . . Excuse me? A handgun? More like a hand held rocket launcher. Clearly, Hollywood is holding out on the Navy.

 

If you care nothing for accuracy about espionage or human nature in your spy thrillers, then go ahead and spend the $13 and enjoy Pierce Brosnan doing what he does best. However, if you do know anything at all about firearms, operatives, psychology, history, NATO, or intelligence work, this movie will make your head explode at a velocity of four times the speed of sound.

Iranian Spy in Route to Tehran Caught with Highly Classified Documents

By Jay Holmes

On December 9, 2013, former defense contractor employee Mozaffar Khazaee, a.k.a. Arash Kazaie, was arrested at Newark Liberty International Airport in New Jersey and charged with trying to ship highly classified military documents to Tehran, Iran. The documents in question included manuals and blue prints for  the U.S. Air Force’s F-35 Joint Strike Fighter.

F-35 Lightning II Joint Strike Fighter image by U.S. Air Force

F-35 Lightning II Joint Strike Fighter
image by U.S. Air Force

Facts:

Khazaee is a native of Iran who became a naturalized U.S. citizen in 1991. Surprisingly, he reportedly still holds Iranian citizenship. If that is true, then we are all left to wonder how someone who chooses to remain an Iranian citizen was allowed to receive U.S. citizenship, and how they were able to access highly classified materials.

According to prosecutors, Federal agents began investigating Khazaee in November 2013, when U.S. Customs agents inspected packages he had sent that were destined for Iran. According to court filings, the shipping documents accompanying the packages listed household goods, but a search revealed boxes of documents, including technical manuals, specification sheets, and other materials related to jet engines and to the Joint Strike Fighter program.

Thus far, the U.S. Attorney’s office has charged Khazaee with transporting, transmitting and transferring in interstate or foreign commerce goods obtained by theft, conversion, or fraud. He faces a maximum of 10 years in prison and a fine of $250,000 if convicted. I assume that charges of espionage or other charges related to mishandling of classified documents will be filed at a later date.

Until August 2013, Khazaee worked as an engineer for defense contractors. The U.S. Prosecutors have not yet named any contractors, but Pratt & Whitney spokesmen indicated that Khazaee was in their employ until August of 2013, and that the company is cooperating fully in an investigation of Khazaee.

Khazaee appeared today before U.S. Magistrate Judge James B. Clark III in Newark and remains in custody pending his transport to Connecticut for further proceedings.

Perspective:

Here in the United States, the F-35 project is considered by most to be a very expensive, very over-budget, and very behind schedule defense project to produce the main modern fighter to be used by most of the fighter and strike squadrons in the U.S. Air force, The U.S. Navy, and the U.S. Marine Corps. Some U.S. Air Force squadrons tasked with pure air supremacy roles would be equipped with the more expensive and higher speed F-32 Raptor. Australia, Canada, Denmark, Italy, the Netherlands, Norway, Turkey, and the UK are also involved in the research and development of the F-35 as their future front line fighter. In addition, Israel and Japan have agreements in place to purchase the fighter for their Air Forces.

The intercepted documents would have been immensely important to the Iranian government. One of Iran’s major military goals for the last thirty years has been to build an industry that could produce a modern fighter aircraft capable of standing up to American and European fighters. The documents that Khazaee was attempting to deliver to Iran would have helped Iran tremendously in achieving that goal. It also would have helped Iran to better formulate countermeasures against any F-35s deployed against them.

Another damage Khazaee already achieved is the harm to relations between U.S. defense contractors and their counterparts in the nations partnering in the development of the F-35. We in the U.S. have been appropriately demanding about the security procedures and the vetting of employees by the allied defense contractors involved in the project. These same corporations that the U.S. instructed are now reading about a spy case involving an alleged Iranian citizen, and they could feel a bit betrayed by the lack of project security here in the U.S.

As spy stories go, we are just beginning to hear the facts and allegations. The self-serving explanations and finger-pointing will come later, and only then if the major media outlets decide to cover what this old spook considers an important case.

So far, two oddities–besides Khazaee’s security clearance–beg further questioning. How did an engineer like Khazaee manage to live this many years without hearing about “new” technologies like high-speed scanners and flash drives? How did he plan this out without deciding to reduce the shipping cases to CDs with home-copied music overlaying deeper encrypted data containing the blue prints, manuals, etc.?  The other big question is why didn’t Iran assign a capable handler to Khazaee while he was working on a case that would be of paramount importance for the Iranian government? On any given day, the Iranian fascist regime busies legions of Iranian intelligence personnel with prowling the streets of the U.S., Canada, Argentina, Brazil, and Europe and reporting to fourteen different intelligence agencies. The number changes from day to day as the Iranian mullahs’ chief gophers struggle to reorganize, rename, and re-budget their many competing spy agencies. So again the question: with all those would-be spies and assassins clogging the gutters of the West, why wasn’t the spy-craft-challenged Khazaee simply turning the documents over to a capable Iranian handler?

One can easily imagine Khazaee’s taxpayer funded attorney offering up the classic “he’s way too dumb to be a spy” defense. If not for the fact that Khazaee had been caught red-handed, such a defense might work. If the spook doesn’t fit, you gotta acquit.

The fact that such a valuable and dangerous national treasure as the plans for the F-35 were accessed by Khazaee or anyone like him is annoying enough. But on top of that, it comes at a time when our government is telling us that our nation’s safety is wholly dependent upon the NSA’s careful collection of all of our own citizens’ phone calls, text messages, emails, library records, and grocery lists. While Congress and the White House are expecting us to cheerfully accept a loss in fundamental constitutional rights in the name of “security,” we now discover that same government granted an Iranian citizen access to highly classified documents.

It will be interesting to see whether the major media outlets will bother to question how Khazaee was granted a security clearance. Given how poorly our defense contractors guarded such prized information in this case, we must ask how many spies have been able to steal the same data without our knowing it. If only all the enemies of freedom were as clumsy and clownish as Khazaee. Sadly, they are not. I hope that the NSA and DHS can take a bit of time out of their busy schedule of eavesdropping on honest citizens to investigate the question.

*   *   *   *   *   *   *   *   *   *   *   *   *

Come to our web site and join in the comments.

Bayard & Holmes

Iranian Spy in Route to Tehran Captured with Highly Classified Documents

Life in the Cold

By Piper Bayard

Independence Day was not the end of our fight for freedom, but only the beginning. Most of the men who signed our Declaration of Independence lost their fortunes and their lives in the battle. It is a battle that has been fought by each generation since 1776, as freedom is a great responsibility that we must continually earn, and not something bought and paid for once in the past that we can now take for granted.

My generation is the Cold War generation. This Independence Day, I would honor those of the intelligence community who served quietly, often giving everything to protect us from the threat of nuclear annihilation.

The following is an excerpt from “From Inside the Cold War,” written by my writing partner, “Jay Holmes,” who is a veteran of that conflict. A conflict which, in spite of the wishful thinking and historical ignorance of younger politicians, continues in a very real way to this day. In it, he gives us a window into his world and what it is like for him and his compatriots to walk through ours.

Anonymous Man Canstock

*   *   *   *   *   *   *   *   *   *   *   *   *

From the end of World War II in 1945 until the fall of the Soviet government in Russia in 1991, Western nations faced off with the Soviet Union and its allies and captive satellite states in what became known as the “Cold War.” Basically, the Soviet Union, led by the ruthless Joseph Stalin, felt that it was its duty to spread communism throughout the world, while Western nations governed by democracies felt it was their responsibility to keep the entire world from falling under Soviet domination. . . .

Most Western citizens think of the Cold War as being without casualties, except during the proxy wars in Korea and Viet Nam. Few Westerners will even remember that the allied nations fought a war against Soviet-backed communists in Greece from 1946 -1949, or that the United Kingdom struggled with a communist guerrilla war in Malaysia until 1960. Beyond the publicly acknowledged battle fields in Korea, South East Asia, Lebanon, Grenada, and Panama, the United States thus far acknowledges 382 American servicemen killed in combat against communist forces between 1945 and 1991. This figure does not include the officially acknowledged civilian losses of the CIA and other civilian personnel, nor does it include the deaths of “denied” personnel working under “deep cover.”

I believe the figure of 382 to be wildly low and a long, smoldering debate is currently underway in DOD and CIA circles concerning casualty figures during the Cold War. It is unclear how they should be counted and how much information should be released. After a lifetime of living in a necessary state of denial, “old hands” have well-founded fears about releasing too much information. For one thing, releasing dates and locations of deaths will assist belligerent parties in identifying and killing those who assisted US efforts. Our word was given that our friends would never be exposed, and they never should be.

For nearly four decades, the deaths of American Cold War combatants were explained away as accidents and sudden acute illnesses. Wives and mothers buried their husbands and sons without ever knowing what happened. The battlefield deaths of most of America’s Cold War combatants will likely remain unrecognized for years to come in order to protect the living. Some day, if a future generation gets around to dealing with the information, it will likely seem too distant for anyone to pay much attention to it. This is a natural consequence of the type of battles fought.

If it seems sad, we should remember that it is far less sad than the alternatives would have been. Armageddon was avoided. Freedom was not lost. That matters, at least to me and to those who have gone before me. My brothers paid a price. I knew none who were unwilling to pay that price quietly. None can now regain their lives by being identified.

When we review espionage activities from the Cold War, it is easy to take an academic view. If the seriousness of some of the participants seems almost comical from our current perspective, they seemed far less humorous at the time that they occurred. The events seem distant now, and the causes may have been forgotten by many, and never understood by some. I point out the issue of casualties in an attempt to describe an important aspect of clandestine activities during the Cold War. The contestants on all sides played for keeps.

Between the bright lights of international diplomacy and the dark cloud of the threat of nuclear war, life in the shadows in between was a bit different. Some of us feel as though we have lived in a parallel world far away from this one. We walked through this world every day, careful not to leave too many footprints here on our way to somewhere else. That other world became our home. This world where we trust our neighbors and love our children, is the world that we desperately wanted to see remain intact. But in a sense, we will always be visitors here in this world that we hold so dear. For some of us, our home remains somewhere else, far away.

~ Jay Holmes

Two Worlds Canstock

 *   *   *   *   *   *   *   *   *   *   *   *   *
From our world to your world, Holmes, thank you.