EU Schengen Area Under Threat From US Regime

From de Veer Magazine
Jump to: navigation, search
Schengen Overview, i2c Analysis Group, Identity Analysis and Comparison Division, CHECKPOINT, CIA, US. Courtesy: Wikileaks

By Ann-Marie de Veer
Saturday 17 January 2015

On the 21 December 2104, Wikileaks released two classified documents by a hitherto unknown entity within the US Central Intelligence Agency (CIA) called the i2c Analysis Group. The i2c Group, part of the CHECKPOINT Identity and Travel Intelligence Program within the Directorate of Science and Technology at the CIA, offers support and advice on travelling for its operatives, and much more.

The first document, Surviving Secondary: An Identity Threat Assessment of Secondary Screening Procedures at International Airports - September 2011, details what CIA operatives can expect and how to survive the secondary screening procedures at international airports when using false travel documents. The second document, Schengen Overview - January 2012, focuses on the watchlist and border control systems of the Schengen Area of the European Union (EU) and in particular, how these systems are implemented, their individual shortcomings and their combined failures in not being fully interoperable.

Clearly, the EU, as far as the US regime are concerned, are just another enemy in their quest for global dominance.

As the Schengen Overview document states:

CHECKPOINT (i2c) collects, analyzes, and disseminates information to help US intelligence personnel protect their identities and operational activities while abroad.

The history of the Shengen Area started on the 14 June 1985 when Belgium, France, West Germany, Luxembourg and the Netherlands created the original borderless region of the EU when they signed the Schengen Agreement near Schengen, Luxembourg: a symbolic ceremony held at the confluence of France, Germany and Luxembourg aboard a boat on the river Moselle. Five years later the Schengen Convention was introduced to supplement the Agreement and in 1995 both the Schengen Agreement and the Convention were incorporated into European law with opt-outs for Ireland and the UK. Now, as of January 2015, the Schengen Area consists of 26 European countries and employs a common Visa policy where internal passport and border controls have been abolished allowing unrestricted travel among its people.

While the first document, Surviving Secondary: An Identity Threat Assessment of Secondary Screening Procedures at International Airports - September 2011, serves more as an aide-memoire to an aspiring CIA operative bound for unfriendly soil to engage in nefarious activities, the latter confirms a much more sinister approach by the US regime to those who they claim to be their friends.

As the Schengen Overview document makes clear, the identification of weaknesses in the individual systems used by the EU Schengen Area and their lack of interoperability are to be exploited:

Schengen Information System (SIS) and SIRENE
SIS and SIRENE pose a minimal identity threat to US-documented operational travelers entering or exiting the Schengen area because the systems focus on illegal immigration and criminal activities and because US travelers typically receive minimal scrutiny. The identity threat is further minimized because the systems are not designed to track all travelers’ history into and out of the Schengen area.
The CIA has previously exploited this system because it was aware of its narrow focus and its inability to track all travellers.


SIS II
The European Union plans to deploy the second generation of SIS—SIS II—in March 2013. SIS II will incorporate biometric capabilities but will still pose only a minimal identity threat to US operational travelers because it will be used primarily to identify watchlisted criminals and illegal immigrants entering or exiting the Schengen area.
The CIA currently exploits this updated system, again because it is aware of its narrow focus and inability to track all travellers.


Schengen Visa
The Schengen visa poses a minimal risk to operational travelers because US tourist-passport holders do not require visas to enter the Schengen area.
The CIA has previously exploited the EU/US visa-free waiver program.


Visa Information System (VIS)
VIS poses a low identity threat for operational travelers because nonofficial US travelers do not require visas to enter the Schengen area. It is unclear whether US official- and diplomatic- passport holders traveling to France, Greece, or Spain will be required to provide biometrics when obtaining their visas. The identity threat for non-US-documented travelers required to obtain Schengen visas will increase as VIS is rolled out worldwide.
The CIA currently exploits the updated EU/US visa free waiver program.


Entry/Exit System (EES)
The implementation of EES is dependent on the deployment of SIS II and VIS and is scheduled to become operational by 2015. EES is an automatic system that will record and store the time and place of entries and exits by non-EU travelers, including those who do not require visas. The European Commission is considering requiring travelers who do not require visas to provide biometric data at their first place of entry into the Schengen area, which would increase the identity threat level for all US travelers.
The CIA continues to exploit the EU/US visa free waiver program but acknowledges the limited threat of identification if the collection of biometric data is implemented.


EURODAC
EURODAC poses a minimal threat to US operational travelers because its primary focus is irregular immigration and asylum applicants. EURODAC (European Dactyloscopie) is a fingerprint database that allows EU member states to identify asylum applicants and persons who have been apprehended while unlawfully crossing an external border.
FRONTEX
FRONTEX poses a limited identity threat to US operational travelers in Europe because it lacks operational authority and does not process personal data. The identity threat is further diminished because FRONTEX primarily focuses on illegal immigration and because EU and Schengen member states retain the responsibility for their own border security.
Treaty of Prum
The Treaty of Prum is a multi-country agreement on cross-border police cooperation and would not typically affect operational travelers. The treaty—which was signed on 27 May 2005 by Austria, Belgium, France, Germany, Luxembourg, the Netherlands, and Spain—focuses on terrorism, crossborder crime, and illegal immigration.
EURODAC, FRONTEX and the Treaty of Plum are not a threat to the CIA but knowledge of their operations has previously, and will continue to be, exploited.


Naturally, the collection of biometric data for all travellers to the Schengen Area of the EU would, as the Schengen Overview document indicates, increase the threat of compromising a CIA operatives identity but, given the lack of systems integration throughout the EU, this risk is minimal for the immediate future. Nonetheless, the CIA, and the NSA in particular, view this development more as an opportunity than a threat given that when the Schengen Area systems are fully operational and integrated they will not only be able to insert false negatives for agents entering the area but also insert false positives for those who they wish to target.

The fact that the CIA are using their knowledge of, and access to, privileged information of the EU Schengen Area border control and management systems for their own nefarious purposes while claiming the EU is its friend is reprehensible. There can be no doubt about the motives of the US regime in targeting its European allies: the use of human intelligence (HUMINT) by the CIA in monitoring, infiltrating, recruiting informers, raising false flag operations and coup d'état's are the tradecraft of an Empire desperate to maintain regional hegemony. Recent examples of their subterfuge in Europe include the coup d'état in Ukraine in February 2014, the recruitment of a member of the German BND as a double agent in July 2014 and the Paris false flag operation in January 2015.

That the EU, and the Schengen Area in particular, are under threat from the US regime is patently obvious as evidenced by their activities since the end of WWII and explains why they choose to maintain such close ties to the region.

Keep your friends close, and your enemies closer.
孙武, 《孙子兵法》 (Sun Wu, 'Art of War')