Feeds

German government orders local CIA station chief to pack his bags

Sour Krauts arrest second local in domestic spy ring probe

Seven Steps to Software Security

The German government has ordered the local station chief of the CIA to leave the country immediately – after a second German government official was arrested in an investigation into US surveillance on its erstwhile ally.

"The representative of the US intelligence services at the embassy of the United States of America has been told to leave Germany," said government spokesman Steffen Seibert, the BBC reports.

The German government took the matter very seriously, Seibert said, and added that while the relationship between his country and the US was important to both parties, any dealings must take place with "mutual trust and openness."

In June the German parliament launched an investigation into US surveillance within the country, a move prompted by leaks from NSA whistleblower Edward Snowden. On July 4, a member of the German security agency was arrested and five days later a member of the state's defense department was also cuffed by cops.

The news of internal spying has caused outrage among the German public and placed relationships between the US and its ally under great strain. German chancellor Angela Merkel said spying on Germany was a "waste of energy."

"In the Cold War maybe there was general mistrust. Today we are living in the 21st Century. Today there are completely new threats," she said.

White House press secretary Josh Earnest told reporters on Thursday that President Obama and Chancellor Merkel had discussed the matter by telephone last week just before the first German arrest and are in fairly frequent contact.

"I’m still able to say that there is an important, functioning national security relationship and intelligence-sharing relationship between the United States and Germany," he said.

"And the reason that that relationship persists is because it is so important to the national security of Germany and to the national security of the United States." ®

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.