• Buro Jansen & Janssen, gewoon inhoud!
    Jansen & Janssen is een onderzoeksburo dat politie, justitie, inlichtingendiensten, overheid in Nederland en de EU kritisch volgt. Een grond- rechten kollektief dat al 40 jaar, sinds 1984, publiceert over uitbreiding van repressieve wet- geving, publiek-private samenwerking, veiligheid in breedste zin, bevoegdheden, overheidsoptreden en andere staatsaangelegenheden.
    Buro Jansen & Janssen Postbus 10591, 1001EN Amsterdam, 020-6123202, 06-34339533, signal +31684065516, info@burojansen.nl (pgp)
    Steun Buro Jansen & Janssen. Word donateur, NL43 ASNB 0856 9868 52 of NL56 INGB 0000 6039 04 ten name van Stichting Res Publica, Postbus 11556, 1001 GN Amsterdam.
  • Publicaties

  • Migratie

  • Politieklachten

  • Indian army spooks carried out covert operations in Pakistan

    NEW DELHI – The Indian military intelligence unit set up by former army chief General VK Singh was involved in sensitive covert operations in Pakistan and was even on the trail of 26/11 mastermind and Lashkar-e-Taiba chief Hafiz Saeed, officials associated with it have told HT.
    “Our main task was to combat the rising trend of state-sponsored terrorism by the ISI and we had developed contacts across the Line of Control in a bid to infiltrate Hafiz Saeed’s inner circle,” an official who served with the controversial Technical Services Division (TSD) said.
    Asked for an official response, an army spokesperson said, “The unit has been disbanded. Details of the unit, which was the subject matter of an inquiry, are only known to the Chief and a few senior officers. It is for the defence ministry now to initiate any further inquiries.”
    The spook unit was set up after the 26/11 Mumbai attacks on a defence ministry directive asking for the creation of covert capability.
    Army documents, perused by HT, reveal the senior-most officers signed off on the formation of this unit. File No A/106/TSD and 71018/ MI give details of approvals by the Director General Military Intelligence, vice-chief and chief of army staff.
    The TSD – disbanded after allegations that it spied on defence ministry officials through off-the-air interceptors – was raised as a strategic force multiplier for preparing, planning and executing special operations “inside depth areas of countries of interest and countering enemy efforts within the country by effective covert means”.
    But it then got caught in an internecine battle between army chiefs. The TSD – which reported directly to Gen VK Singh – used secret service funds to initiate a PIL against current chief General Bikram Singh. As reported by HT in October 2012, secret funds were paid to an NGO to file the PIL, in a bid to stall Bikram Singh’s appointment as chief.
    However, covert ops were the unit’s essential mandate and deniability was built into it and it reads, “The proposed organization (TSD) will enable the military intelligence directorate to provide a quick response to any act of state-sponsored terrorism with a high degree of deniability.” Its task was to carry out special missions and “cover any tracks leading to the organisation”.
    Though covert operations were formally shut down by IK Gujral when he was PM in 1997, sources reveal the TSD carried out several such operations within and outside the country – such as Op Rehbar 1, 2 and 3 (in Kashmir), Op Seven Sisters (Northeast) and Op Deep Strike (Pakistan). Controversy is dogging the unit once again after disclosures in The Indian Express that secret service funds were also used to destabilise the Omar Abdullah government in Held Kashmir. The BJP has raised questions over the timing of the disclosures. While the defence ministry has had the inquiry report since March, the revelations have come soon after Singh shared the stage with the saffron party’s PM candidate Narendra Modi last Sunday.

    September 23, 2013
    The Nation Monitoring

    Find this story at 23 September 2013

    © The Nation

    Random afluisteren in India

    In het voorjaar van 2010 was India een paar weken in de ban van een afluisterschandaal, maar vervolgens verdween dat in de vergetelheid. Dit is opmerkelijk gezien de staat van dienst van de inlichtingenwereld in India. Schandalen die gewone Indiërs raken, maar ook corruptie, slecht management, verkeerde technologie en apparatuur en bovenal incompetentie lijken de boventoon te voeren bij de NTRO, die verantwoordelijk wordt gehouden voor het schandaal. NTRO, National Technical Research Organisation, gebruikt IMSI Catchers om voor lange tijd en op grote schaal politici, ambtenaren, zakenmensen, beroemdheden en gewone Indiërs af te luisteren.

    Het gebruik van een IMSI catcher moet nauwlettend gecontroleerd worden. Het afluisterschandaal in India laat zien wat de gevaren zijn van het toelaten van het apparaat in een veiligheidsstelsel. Een IMSI catcher is een mobiele zendmast. Het International Mobile Subscriber Identity nummer is een uniek nummer dat aan een SIM kaart voor een mobiele telefoon is gekoppeld. Aan het IMSI nummer zit tevens een uniek telefoonnummer. Het IMSI nummer bestaat uit drie groepen getallen, 111/22/3333333333. Aan het nummer is te zien uit welk land de SIM kaart komt. De eerste cijfers (111) staan voor het land, Nederland heeft bijvoorbeeld 204 als code. De tweede set cijfers (22) onthullen de provider, KPN heeft bijvoorbeeld 08 en Vodafone 04. De laatste cijfers, maximaal tien cijfers, zijn het unieke abonnementsnummer. Dit is niet hetzelfde als het telefoonnummer. Telefoons waar twee SIM kaarten in zitten, hebben ook twee IMSI nummers.
    De IMSI catcher fungeert als mobiele antenne die het gsm verkeer in de buurt opvangt, hierbij gaat het alleen om uitgaande gesprekken. Bij gewone mobiele telefoons vindt de versleuteling van de conversaties plaats in de dichtstbijzijnde mast. De IMSI catcher hoeft de informatie dus niet te kraken, maar kan simpelweg de gesproken of geschreven data lezen. De catcher moet het telefoonverkeer wel doorgeleiden naar een reguliere mast anders kan er geen contact worden gemaakt met de persoon die door de gsm wordt gebeld. De catcher fungeert als tussenstation om de data ofwel direct af te vangen ofwel niet versleuteld door te geleiden. Het doel van de catcher is natuurlijk ook? om het telefoonnummer van een beller te achterhalen. Voor opsporingsinstanties die het gsm nummer van een verdachte niet kunnen traceren is dit een handig middel. Men plaatst een catcher in de buurt van de persoon in kwestie, vangt de nummers allemaal af en kan nagaan welk nummer men moet hebben. Bij politie-invallen kan het apparaat ook zijn dienst bewijzen door op locatie het telefoonverkeer te monitoren, vooral als binnen een onderzoek niet alle gsm-nummers bekend zijn. Tevens kan de catcher worden gebruikt voor spionage doeleinden, vooral spionage die de overheid niet aan de grote klok wil hangen. Bij het afluisteren met een IMSI catcher heeft men namelijk geen medewerking van een Telecom provider nodig. De IMSI catcher laat echter wel een spoor achter die een gebruiker kan wijzen op onregelmatigheden in de transmissie en het apparaat is niet altijd succesvol. De IMSI catcher was tot begin 2011 ook te koop door particulieren. Verschillende bedrijven in New Delhi, Gurgaon en Noida boden de ‘off-the-air-monitoring’ systemen aan. In 2011 besloot de regering de handel van de apparaten aan banden te leggen. Private ondernemingen bleken namelijk gebruik te maken van de catcher.

    NTRO
    In India is de IMSI Catcher op grote schaal ingezet voor spionage doeleinden, zo onthulde het weekblad Outlook in het voorjaar van 2010. Vanaf waarschijnlijk eind 2006 tot en met april 2010 werden politieke tegenstanders, mensen die promotie zouden maken, leden van het kabinet en allerlei andere politieke en niet politieke figuren door één van de Indiase geheime diensten afgeluisterd. De gesprekken werden afgeluisterd, opgenomen en bewaard. De dienst die verantwoordelijk is voor het afluisteren is de National Technical Research Organisation, de NTRO. De NTRO werd na de Kargil oorlog in 1999 opgezet. Dit conflict ontstond toen het Pakistaanse leger posities in het district Kargil, in de regio Kashmir innam. India reageerde furieus en verdreef de Pakistanen uit een groot deel van Kargil. De laatste posities werden door Pakistan verlaten na diplomatieke druk. De Kargil Review Committee concludeerde in 1999 dat een van de redenen van het uit de hand lopen van het conflict gebrekkige inlichtingen was. De Defence Intelligence Agency (DIA) en de National Technical Facilities Organization (NTFO) die al snel NTRO werd gedoopt, werden opgezet.
    De NTRO begon zijn werkzaamheden in april 2004. De NTRO is de Indiase stofzuiger van data, zowel internet als telecommunicatie data, en monitort het Indiase grondgebied en luchtruim. De NTRO gebruikt hiervoor allerlei technische hulpmiddelen, van satellieten tot IMSI catchers. De Technology Experiment Satellite (TES), een satelliet die is uitgerust met een camera die foto’s kan maken van voorwerpen van een meter, is een van de hulpmiddelen. De satelliet werd in oktober 2001 gelanceerd en de beelden worden beheerd door de Indian Space Research Organisation (ISRO). Beelden worden ook commercieel verhandeld door een bedrijf dat verbonden is aan de ISRO, Antrix Corporation. BBC News rapporteerde dat India door TES ook beelden bezit van de oorlog in Afghanistan. In 2001 was India het tweede land naast de Verenigde Staten dat een satelliet bezit die beelden kan genereren van voorwerpen van een meter groot. Een van de functionarissen die centraal staat in de introductie van de afluister praktijken door de NTRO is dhr. Narayanan. Narayanan heeft decennia lang een centrale rol gespeeld in de Indiase inlichtingenwereld. Hij was hoofd van het Intelligence Bureau van 1988 tot 1992, en diende daarbij onder vijf verschillende minister-presidenten. Daarna nam hij een adviserende rol op zich onder de directe verantwoordelijkheid van de minister-president van India. In zijn rol als National Security Advisor (NSA) introduceerde hij de nieuwe afluistertechnologie in India in 2005. Narayanan wordt wel de ‘super spook’ van India genoemd, omdat hij zijn gehele wat? leven? al in de kringen van de Research and Analysis Wing (R&AW), het Intelligence Bureau en de NSA heeft bewogen. Zijn verhouding met minister-president Manmohan Singh was toen hij National Security Advisor niet close. Hij had bezwaren tegen de nucleaire samenwerking tussen Amerika en India en de toenadering van India en Pakistan. In de Wikileaks Cables over India die begin 2011 zijn vrijgegeven door The Hindu wordt Narayanan echter wel omschreven als een belangenbehartiger van de relatie met de Verenigde Staten. In een van de berichten wordt hij omschreven als de smeerolie voor zaken die voor de Amerikanen interessant zijn.
    De NTRO valt onder de verantwoordelijkheid van de inlichtingendienst buitenland van India, de Research and Analysis Wing (R&AW), hoewel het een zekere mate van onafhankelijkheid heeft. De NTRO faciliteit waar het afluisteren van de communicatie met het buitenland wordt gedaan ligt in de buurt van Kala Ghoda, zuidelijk Mumbai. Bij Malad, dat in de buurt ligt van Kala Ghoda, komen de datakabels die internet- en telecommunicatie tussen continenten mogelijk maken het Indiase vasteland binnen. De NTRO zit er letterlijk boven op. Hierbij gaat het om communicatie tussen India en het buitenland. De inlichtingendiensten van India hebben daarnaast genoeg binnenlandse capaciteit om de iedere Indiase burger af te luisteren.

    Afluisteren
    Het afluisterschandaal van de NTRO werd eind april 2010 door het weekblad Outlook onthuld. In de editie van 3 mei van dat jaar zegt een senior inlichtingenofficier dat de NTRO geen toestemming nodig heeft om een telefoon te tappen. Het gaat volgens hem om het onderscheppen van een signaal tussen de gsm en de antenne. Volgens de officier gaat het daarom niet om het afluisteren van een telefoonnummer. Het apparaat zou signalen binnen een cirkel van twee kilometer kunnen onderscheppen. De medewerker van de NTRO lijkt te suggereren dat er helemaal niets mis is met het afluisteren met behulp van een IMSI catcher, het signaal wordt gewoon opgevangen en bewaard. Op dezelfde wijze lijkt de minister van Binnenlandse Zaken van India, P. Chidambaram, de storm rond het afluisterschandaal te willen sussen. In een van de eerste reacties verklaarden bronnen binnen de regering dat het ging om een proef van de NTRO. De regering had geen opdracht gegeven, dus is zij niet verantwoordelijk, en er hoeft geen onderzoek te komen. Volgens de minister waren in de bestanden van de NTRO ook geen bewijzen gevonden van het afluisteren van politici. Tevens wees de regering erop dat de NTRO niet zelfstandig operaties uitvoert, maar werkt onder auspiciën van andere diensten. Bij deze diensten zou het gaan om zeven inlichtingendiensten: het Intelligence Bureau, de Research and Analysis Wing, de Directorate of Revenue Intelligence, Enforcement Directorate, Narcotics Control Bureau, Economic Intelligence Unit and Directorate-General of Investigations, Income-Tax (CBDT). Een oud medewerker van de NTRO voegde daar in de Economic Times van 24 april 2010 nog aan toe dat de dienst slechts onderzoek doet naar technische hulpmiddelen. Volgens hem luistert de dienst geen individuen af en wordt het NTRO in diskrediet gebracht door verongelijkte werknemers.
    Ook de politie heeft de bevoegdheid om af te luisteren. De minister van Binnenlandse Zaken stelde dat ruim dertig instanties in de verschillende Indiase deelstaten de mogelijkheid hebben om te tappen en af te luisteren. Volgens minister Chidambaram ligt daarom de macht tot het uitvoeren van deze observaties niet alleen op nationaal niveau, maar ook op deelstaatniveau. Dat dit ook daadwerkelijk aan de hand is werd in dezelfde periode geïllustreerd door een afluisterschandaal van de CBDT. Deze dienst had lobbyisten van de telecommunicatie industrie afgeluisterd ten tijde van de toewijzing van mobiele breedband netwerken met de 2G technologie. Bij deze onthulling werd niet de CBDT beschuldigd van illegale taps, maar kregen de bedrijven het te verduren. De afgeluisterde gesprekken onthulden de grote invloed van de industrie op de besluitvorming van de regering. De CBDT luisterde de lobbyisten af in het kader van een onderzoek naar belastingfraude. Zowel politiek als binnen de juridische wereld worden er vraagtekens gezet bij het afluisteren van mensen die worden verdacht van belastingfraude.
    Hoewel de onthulling in de Outlook erg gedetailleerd was, was het antwoord van de minister en de dienst dat er niets aan de hand is. Er wordt niet afgeluisterd en er is geen bewijs gevonden dat het is gebeurd, luidde het officiële regeringsstandpunt. De Indiase Telecomwet van 1885 en de toegevoegde wijziging van 2008 maken afluisteren echter wel mogelijk. Bij het afluisteren gaat het om uitzonderlijke situaties en niet om een standaard regel. Het was dus wel degelijk een schending van wettelijke regels. In de week erna bevestigden enkele inlichtingenofficieren anoniem dat er op grote schaal afgeluisterd wordt. Naast de vier politici waarover Outlook in het nummer van 3 mei 2010 publiceerde bleken er veel meer mensen te zijn afgeluisterd. Het gaat daarbij naast politici om ambtenaren, zakenmensen, gewone Indiërs en beroemdheden. Volgens de anonieme officieren werden de gesprekken zonder wettelijke toestemming afgeluisterd . De officieren vertellen in de Outlook van 10 mei 2010 dat zij de opdrachten mondeling kregen of soms op een geel memo papiertje. Volgens de officieren waren de afluisteroperaties allemaal illegaal , zonder toestemming van de NSA of het kabinet van de minister-president. Er mocht ook geen administratie van worden bijgehouden. De IMSI catchers werden ingezet om bijvoorbeeld in Delhi, de hoofdstad van India, rond te rijden om gsm verkeer op te vangen. Eigenlijk waren het ‘fishing operaties’ op zoek naar dat ene gesprek dat mogelijk een gevaar kan zijn voor de nationale veiligheid. Het systeem scant alle nummers zonder onderscheid te maken en kan alles opnemen. Op elk willekeurig moment kan het apparaat dat in India is gebruikt maximaal 64 gesprekken opnemen. Sommige gesprekken werden vernietigd, andere werden bewaard. Het wordt uit het interview met de medewerkers niet duidelijk wie er verantwoordelijk was voor het besluit om gesprekken al dan niet te vernietigen. In The Times of India worden anonieme bronnen aangehaald die zeggen dat het afluisteren van de politici was uitgevoerd door “junior officials”, maar dat hun werk deel uitmaakt van een grotere operatie.
    Volgens de medewerkers van de inlichtingendiensten gaat het om in totaal vijf apparaten die door de NTRO gebruikt worden. Van de ritten van de auto met de IMSI Catcher worden twee logboeken bijgehouden. Het ene logboek bevat geen enkel detail van de operatie. Het andere logboek is “top secret” en bevat gedetailleerde informatie over de locatie waar het apparaat heeft afgeluisterd. De precieze route, bestemmingen, data en tijden zijn in dat logboek te vinden. Medewerkers van de inlichtingendienst vertelden dat het niet alleen de NTRO hoeft te zijn die verantwoordelijk is voor het tappen. Verschillende van de zeven inlichtingendiensten en zelfs de politie hebben een IMSI catcher. Bronnen in de inlichtingenwereld hebben het weekblad Outlook aangegeven dat er in totaal 90 apparaten zijn aangeschaft door de verschillende instanties. Vooral in regio’s waar veel moslims wonen gebeurt dit volgens de officier. De inlichtingenofficieren die in Outlook worden geïnterviewd worden ondersteund in hun verhalen door een oud- directeur van het Intelligence Bureau (IB), dhr. Dhar. Hij vertelde het Indiase weekblad Tehelka dat de NTRO namen moet hebben gekregen om af te luisteren. Tevens verklaart hij dat politieke leiders regelmatig inlichtingendiensten de opdracht geven om mensen af te luisteren zonder schriftelijke toestemming. Medewerkers van diensten die weigeren aan deze afluisterpraktijken mee te doen, worden ontslagen volgens de oud-directeur van het Intelligence Bureau.

    Iedereen is verdacht
    Het is onduidelijk wat het doel is van de afluisteroperatie die zeker vier jaar heeft geduurd. Hoewel de verantwoordelijk minister in zijn eerste reactie had aangegeven niets van het afluisteren af te weten, gaven regeringsbronnen aan de The Times of India toe dat de NTRO wel toezicht uitvoerde. Welk toezicht wordt door de Times niet vermeld. Volgens de bronnen staan die activiteiten onder directe verantwoordelijkheid van de National Security Advisor of het kabinet van de minister-president waaronder de Research and Analysis Wing en de NTRO valt. Bij de NSA zou het gaan om dhr. Narayanan, de man die aan de wieg stond van het afluisteren in 2005. In de Indiase media worden ook verbanden gelegd met de lange traditie van de Indian National Congress (INC), een regeringspartij, om de oppositie in diskrediet te brengen door het verzamelen van politiek gevoelige informatie door het inzetten van inlichtingendiensten. Het dagblad The Pioneer vergelijkt het met de werkwijze van de Indiase roddelpers, maar dan veel serieuzer. Volgens de krant gaat het er bij het afluisteren om om te achterhalen wie elkaar ontmoeten, met wie iemand contact heeft, met wie personen van de elite slapen en vergelijkbare vragen uit de roddelbladen. Het lijkt er volgens de krant op dat de inlichtingendiensten de levens van politieke spelers in kaart probeert te brengen.
    De Indian National Congress (INC) is echter niet de enige politieke partij die deze middelen inzet. Het lijkt erop dat het binnen de Indiase democratie de gewoonte is om de oppositie op allerlei manieren in de gaten te houden. De wijze waarop de oppositie het schandaal gebruikte om de regering onder druk te zetten, lijkt deze stelling ook te ondersteunen. De oppositie is geschokt en wil uitleg van de minister-president, maar daadwerkelijke wettelijke hervormingen werden niet met zoveel woorden geëist.
    De verantwoordelijk minister voor de afluisteroperatie is Chidambaram. Chidambaram is lid van de Indian National Congress (INC). Onder de afgeluisterde politici bevond zich ook de minister voor Consumentenzaken, voedsel en distributie, Sharad Pawar van de Nationalist Congress Party (NCP), een afsplitsing van de INC. De NCP neemt op dit moment ook deel aan de regering samen met het INC. Ook leden van de partij van de minister van Binnenlandse Zaken zoals dhr. Digvijay Singh werden afgeluisterd, evenals leden van de oppositie, zoals het hoofd van de Communistische Partij India, dhr. Karat. Het afluisteren vond niet alleen nationaal plaats, ook in deelstaten van India zoals in Bihar werden hoge politici afgeluisterd, zoals de premier van Bihar, dhr. Kumar.
    De onderwerpen van de gesprekken die Outlook in haar bezit heeft, zijn uiteenlopend. Bij de gesprekken van de minister van Consumentenzaken ging het om het grote schandaal rond de Indian Premier League (IPL), de Indiase cricket competitie, IPL-gate, waar sprake was van witwassen van geld en het vooraf bepalen van de winnaar van een wedstrijd. De premier van Bihar belde een collega om te lobbyen voor meer geld voor zijn deelstaat. En van de communistische partij zijn gesprekken bewaard uit 2008 toen er oppositie werd gevoerd tegen de aankoop van nucleaire technologie van de Verenigde Staten. Hoewel Karat tegenstander was van de overeenkomst tussen India en de Verenigde Staten stond hij onderhandelingen met minister-president Singh niet in weg. Hij fungeerde ook als een belangrijke exponent van de oppositie in India tegen de overeenkomst. De gegevens over de afluisterpraktijk van de NTRO geven nu aan dat dhr. Karat toen is afgeluisterd. Uiteindelijk bleef de Communistische Partij bij haar standpunt om tegen te stemmen, maar de regering behaalde toch een nipte overwinning. De Samajwadi Party (SP) en tien leden van de BJP, beide oppositie partijen, hielpen de regering aan haar meerderheid. De overeenkomst met de Amerikanen kon doorgaan. Naar nu blijkt werden er tijdens de onderhandelingen over het akkoord met de Amerikanen parlementariërs omgekocht. In documenten van de Amerikaanse vertegenwoordiging in India die door Wikileaks zijn buitgemaakt, blijkt dat de Amerikanen op de hoogte waren van de steekpenningen die parlementariërs ontvingen om voor te stemmen. Of de afgeluisterde gesprekken hebben bijgedragen aan het omkopen van leden van het parlement is niet duidelijk.

    DE NTRO als schandaal
    De NTRO heeft absoluut geen schoon blazoen. De korte historie van de dienst kent al vele schandalen, gebrekkig functioneren, politieke benoemingen en tekenen van corruptie. India kent geen Commissie van Toezicht op de Inlichtingen en Veiligheidsdiensten, wel een algemene controledienst, te vergelijken met de algemene Rekenkamer. De regering stelde dhr. P.V. Kumar van de Comptroller and Auditor General of India (CAG) aan om de misstanden bij de NTRO te onderzoeken. Kumar is een oud medewerker van de Research and Analysis Wing en werd na zijn onderzoek begin 2011 aangesteld om de NTRO te leiden. In hoeverre er een einde is gekomen aan de misstappen is dan ook niet duidelijk. Een van de schandalen naast het afluisteren van politici is de benoeming van de tweede man van de dienst, dhr. Vijararaghavan, en zijn betrokkenheid bij een deal met het Amerikaanse bedrijf CISCO. Na de deal met CISCO werd de dochter van Vijararaghavan door CISCO in dienst genomen. De positie van de tweede man staat ook ter discussie omdat hij naast zijn functie bij de NTRO ook nog zijn oude functie als hoofd van Defence Research and Development Organisation (DRDO) vervult en tevens directeur is van een lobbygroep van de elektronica-industrie. Ook diverse andere benoemingen worden door de CAG onderzocht op hun onvolkomenheden. Het gerechtshof in Delhi oordeelde verder dat er een onderzoek moet komen naar administratieve en financiële onregelmatigheden bij de aanstelling van ruim zeventig werknemers. Vacatures zouden zijn opgevuld met niet capabele mensen zonder de juiste opleiding en voor sommige functies is zelfs geen vacature uitgeschreven, maar die zijn onderhands opgevuld.
    Naast het personeelsbeleid zijn er ook vragen gerezen over de aankoop van apparatuur door de dienst. Een medewerker schafte zonder overleg met het agentschap dat over de aankopen van gevoelige apparatuur gaat, computers aan die vitale Chinese onderdelen bevat. De spanningen tussen India en China fluctueren al decennia lang tussen gespannen en vriendschappelijk. De laatste jaren gaat het beter, maar tien jaar geleden had de verhouding tussen de twee landen een nieuw dieptepunt bereikt na Indiase kernproeven. En dat de relatie verre van close is maakten Canadese onderzoekers van de Information Warfare Monitor (IWM) duidelijk toen zij India erop wezen dat begin 2010 Chinese hackers zich de toegang hadden verschaft tot computers van het Indiase leger. IWM had de Indiase overheid er een jaar eerder al op gewezen dat haar computers en servers kwetsbaar waren voor aanvallen uit vooral China. Op de computers die in 2010 gehackt zijn, zou informatie staan over het raketprogramma van India, de artillerie-brigades van Assam, luchtmachtbases en andere militaire informatie. De Canadese onderzoekers produceerden een rapport over de Chinese elektronische infiltratie, ‘Shadow in the Cloud’. In mei 2010 bleek dat de schade van de Chinese spionage operatie aanzienlijk is. Computers en servers van diplomatieke vestigingen van India in Kabul, Moskou, Dubai, Abuja, in de Verenigde Staten, Servië, België, Duitsland, Cyprus, het Verenigd Koninkrijk en Zimbabwe waren door de Chinezen overgenomen. Ook het kantoor van de National Security Advisor was besmet en zelfs bedrijven als Tata, YKK India en DLF Limited. Naast deze militair en economisch strategische spionage hadden de Chinezen het ook gemunt op de Tibetaanse gemeenschap in Dharamshala.
    Een andere medewerker kocht satelliet communicatiemiddelen van een bedrijf uit Singapore (Singapore Technologies), een bedrijf dat door de Indiase overheid op een zwarte lijst was geplaatst. Bij de aanbesteding van de satelliet communicatie apparatuur kwamen de specificaties van de NTRO precies overeen met het product van Singapore Technologies. In andere gevallen, zoals bij de aanschaf van onbemande vliegtuigen van het Israëlische bedrijf Israel Aerospace Industries (IAI) is door het NTRO geen aanbesteding uitgeschreven volgens de onderzoekers van CAG. De onbemande vliegtuigen moesten in januari 2010 aan de grond worden gehouden, omdat bleek dat de NTRO onveilige en open radiofrequenties gebruikte voor de besturing van de vliegtuigen. Volgens de India Today zouden ook de onbemande vliegtuigen van het Indiase leger op deze manier worden bediend. Bij grote uitgaven dient de NTRO een aanbesteding te doen en toestemming te vragen aan de National Security Advisor en uiteindelijk de minister-president. Ook dit laatste is bij diverse aankopen door de dienst niet gebeurd.
    Naast deze personele en technische misstappen wordt de kwaliteit van het werk van de dienst in het publieke debat in India in twijfel getrokken. Hoewel haar taak het verzamelen van informatie over mogelijke terroristische aanslagen, cyber crime, opstanden en illegale grensoverschrijdingen is, heeft de dienst geen enkel duidelijk succes geboekt. De aanslagen van 26 november 2008 in Mumbai worden gezien als het bewijs van de mislukking van de dienst. Toch lijkt de dienst onaantastbaar, zoals zoveel inlichtingendiensten. Twee jaar later was het opnieuw raak. Op basis van informatie van de inlichtingendiensten werd een man gearresteerd die verantwoordelijk werd gehouden van de aanslag op de “Duitse bakkerij”, een populaire uitgaansgelegenheid voor toeristen in Pune. Minister Chidambaram feliciteerde de inlichtingendiensten, maar ze bleken het bij het verkeerde eind te hebben. De man moest worden vrijgelaten wegens ontlastend bewijs.
    En hoewel de NTRO de stofzuiger is van data van Indiase burgers staat zij net als de andere spelers in de Indiase inlichtingenwereld bekend om het ‘kwijtraken’ van gevoelige data. In 2003 was de Defence Research and Development Organisation (DRDO) plotseling 53 computers kwijt. Toen zij werden teruggevonden, ontbraken de harde schijven. Op de harde schijven stonden geheime codes voor communicatie met inlichtingendiensten en het leger. In 2006 raakte een belangrijke wetenschapper van de DRDO zijn laptop kwijt op het vliegveld van Delhi. Op de laptop bewaarde de wetenschapper geheime informatie over het Indiase kernwapenarsenaal en raketsystemen. En in 2008 raakte een directeur van de NTRO zijn laptop met geheime informatie over de kernwapenprogramma’s in Pakistan, China en Noord Korea kwijt in Washington DC.

    Het schandaal staat niet op zich
    De NTRO is niet de enige dienst die tekenen vertoont van verval. Ook de dienst waaruit zij is voortgekomen, de Research and Analysis Wing, wordt geteisterd door technische, personele, administratieve en financiële schandalen. Eigenlijk is het niet onlogisch dat er schandalen optreden binnen de Indiase inlichtingenwereld. Met zoveel onregelmatigheden is het bijna vanzelfsprekend dat er schandalen plaatsvinden die ook Indiase burgers raken. Het NTRO schandaal staat dan ook niet op zich. Vergelijkbare afluisterpraktijken zijn de afgelopen decennia aan het licht gekomen. In de jaren tachtig kwam aan het licht dat de Indiase overheid politieke leiders afluisterde. Daarnaast werden ook toen toonaangevende journalisten in de gaten gehouden. In 1990 – 1991 was het opnieuw raak met een nieuw afluisterschandaal. De Peoples Union for Civil Liberties (PUCL), een burgerrechtenbeweging, bracht de zaak voor de rechter. Tijdens de rechtzaak gaf de CBI, Central Bureau of Investigation, toe dat op grote schaal journalisten, parlementariërs en leden van het kabinet zowel op nationaal als op deelstaatniveau waren afgeluisterd. Het CBI gaf toe dat deze afluisterpartij onwettig was.
    En is er wat veranderd na het schandaal in het voorjaar van 2010 dat de Indiase politiek enkele weken bezig hield? Nee, in juli van hetzelfde jaar werd de IMSI Catcher als nieuw gepresenteerd in een operatie met de codenaam Fox, alsof het om een nieuwe strijd ging tegen terrorisme en criminele bendes. De media waren het schandaal van twee maanden eerder al weer vergeten.

    Find this story at 20 April 2013

    No bugs found in former Nortel building, Defence officials now say

    The Conservative government says Defence officials have assured it that no listening devices have been found at the former Nortel campus,

    OTTAWA — The Conservative government says Defence officials have assured it that no listening devices have been found at the former Nortel campus, contradicting previous security concerns raised by both former Nortel and government intelligence employees.

    Former Nortel employees have contacted the Citizen to say that the listening devices were found when Department of National Defence officials did their initial security sweeps of the facility, purchased for DND’s new home.

    DND documents also indicate that concerns about the security surrounding the former Nortel campus were raised last year within the department. A briefing document for then-Defence minister Peter MacKay warned that the public announcement that the DND was moving into the complex before it could be properly secured created a major problem.

    “This not only raises the level of difficulty of verifying appropriate security safeguards in the future, it will probably dramatically increase security costs and cause delays to reach full operational capability,” MacKay was told in April 2012 by Canadian Forces security officers.

    Last year senior Nortel staff acknowledged that the company had been the subject of a number of spy and computer hacking operations over a decade, with the main culprits suspected of being associated with China.

    Michel Juneau-Katsuya, a former senior officer with the Canadian Security Intelligence Service, said the spy agency also determined that Nortel had been targeted. “We knew it was well penetrated,” he told the Citizen. “When I was the Chief of Asia-Pacific we warned Nortel.”

    But Julie Di Mambro, spokeswoman for Defence Minister Rob Nicholson, said Tuesday the government has now received assurances from DND. “Security officials have assured us that they have not discovered any bugs or listening devices,” she noted in an email. “Our government continues to be vigilant when it comes to maintaining the security of information and personnel.”

    No further details were provided.

    The purchase and refit of the Nortel campus has emerged as a political issue, with opposition MPs and others questioning whether the Conservative government’s plan to spend almost $1 billion on the purchase and renovations of the site makes financial sense. Retired lieutenant-general Andrew Leslie, now an adviser for Liberal Leader Justin Trudeau, told CTV on Monday that he thought it was a bad idea to spend such a large amount of money on a new military headquarters.

    The government spent $208 million to buy the property, with an additional $790 million to be spent on renovating the buildings for DND’s needs, according to a presentation made to the Senate by Treasury Board officials. The cost to prepare the site involves everything from creating new offices to installing secure computer networks.

    Asked last week for details about the listening devices and whether they were still functioning, the DND responded with a statement to the Citizen that it takes security at its installations seriously. “The Department of National Defence and Canadian Armed Forces cannot provide any information regarding specific measures and tests undertaken to secure a location or facility for reasons of national security,” noted an email from DND spokeswoman Carole Brown. “The DND/CAF must maintain a safe and secure environment at all of its facilities, in order to maintain Canada’s security posture at home and abroad.”

    In February, MacKay was also briefed about the poor state of DND security. Among the points raised in the presentation was that the Defence Department’s “security posture does not currently meet government standards,” according to documents obtained by Postmedia.

    The case of Royal Canadian Navy officer Jeffrey Delisle, who spied for the Russians, was specifically mentioned on the same page as the presentation noted that “repeated audits have called for improvement, but insufficient action has occurred.” Those audits calling for improved security included reviews by internal auditors and the federal auditor general’s office.

    Phil McNeely, Liberal MPP for Ottawa-Orléans, said he is concerned the government and the DND did not do its due diligence before the Nortel campus was purchased. McNeely, who opposes the DND move to Nortel, said he is worried taxpayers are “now stuck with a $208 million lemon.”

    An internal security study by Nortel suggested that the hackers had been able to download research and development studies and business plans starting in 2000. The hackers also placed spyware so deep into some employee computers it escaped detection, the Wall Street Journal reported last year.

    Another spy operation was launched against Nortel from the Philippines, security officials determined. That operation involved freelance computer hackers who were working for a “foreign power.”

    By David Pugliese, OTTAWA CITIZEN October 1, 2013

    Find this story at 1 October 2013

    © Copyright (c) The Ottawa Citizen

    Mysterious listening devices found at future headquarters of defence department

    Former Nortel campus was subject of decade-long industrial espionage
    A bird’s eye view of the former Nortel campus in Ottawa, bought by the Department of National Defence in 2010.

    OTTAWA — Workers preparing the former Nortel complex as the new home for the Department of National Defence have discovered electronic eavesdropping devices, prompting new fears about the security of the facility.

    It’s not clear whether the devices were recently planted or left over from an industrial espionage operation when Nortel occupied the complex.

    Asked for details about the listening devices and whether they were still functioning, the DND responded with a statement to the Citizen that it takes security at its installations seriously.

    The DND/CAF must maintain a safe and secure environment at all of its facilities

    “The Department of National Defence and Canadian Armed Forces cannot provide any information regarding specific measures and tests undertaken to secure a location or facility for reasons of national security,” noted an email from DND spokeswoman Carole Brown. “The DND/CAF must maintain a safe and secure environment at all of its facilities, in order to maintain Canada’s security posture at home and abroad.”

    Recently released DND documents, however, indicate that concerns about the security surrounding the former Nortel campus at 3500 Carling Ave. were raised last year.

    A briefing document for then Defence Minister Peter MacKay warned that the public announcement the DND was moving into the complex before it could be properly secured created a major problem. “This not only raises the level of difficulty of verifying appropriate security safeguards in the future, it will probably dramatically increase security costs and cause delays to reach full operational capability,” MacKay was told in April 2012 by Canadian Forces security officers.

    The briefing note was released under the Access to Information law.

    Last year it was also revealed that Nortel had been the target of industrial espionage for almost a decade, with the main culprits thought to be hackers based in China. An internal security study by Nortel suggested that the hackers had been able to download research and development studies and business plans starting in 2000.

    The hackers also placed spyware so deep into some employee computers it escaped detection, the Wall Street Journal reported last year.

    The Conservative government has earmarked almost $1 billion for its plan to move military personnel and Department of National Defence staff to the former Nortel campus. That includes $208 million to buy the property, with an additional $790 million to be spent to renovate the buildings for DND’s needs, according to a presentation made to the Senate by Treasury Board officials. The cost to prepare the site involves everything from creating new offices to installing secure computer networks.

    Recently, however, the federal government has noted it could be open to revisiting its plans to have the DND occupy the facility. Public Works has been considering whether other government departments might make their home there instead.

    “Public Works and Government Services Canada is currently reviewing its plans for the renovation and future occupancy of the Carling Campus in light of the current environment of fiscal restraint to ensure that the use of the campus provides best value for taxpayers,” Brown added in her email.

    The DND originally estimated the cost of preparing the Nortel site for its needs would be $633 million, according to department documents obtained by the Citizen through the Access to Information law.

    Although DND is planning for the move, cabinet has not yet made the final decision authorizing the department to occupy the Nortel site.

    Some have questioned the move at a time of cost-cutting, particularly since the DND will still continue to occupy key buildings such as its main headquarters, the Major-General George R. Pearkes Building on Colonel By Drive, as well as its facility on Star Top Road. The DND’s presence in the Louis St. Laurent Building, the National Printing Bureau building and the Hotel de Ville building in Gatineau will also continue.

    The department has estimated it would save $50 million a year by moving many of its employees in the Ottawa area into the Nortel campus but it has not provided a breakdown on how it came up with that figure.

    In justifying the move, the department noted it would save money through reduced cab fares, less need for commissionaires to guard offices and an atmosphere that allows people to work better together.

    David Pugliese, Ottawa Citizen
    Published: September 30, 2013, 10:38 am

    Find this story at 30 September 2013

    © COPYRIGHT – POSTMEDIA NEWS

    Malaysia protests at ‘US and Australia spying’ in Asia

    Malaysia has protested at the alleged spying, saying “such activities are not done among close friends”
    Continue reading the main story

    The Malaysian government has summoned the heads of the US and Australian diplomatic missions in Kuala Lumpur over a row about an alleged American-led spying network in Asia.

    The Malaysian foreign ministry said the reports of spying could “severely damage” relations.

    It said a protest note was handed over.

    China and Indonesia have already protested at the claims that Australian embassies were being used to monitor phones and collect data for the US.

    Malaysian Foreign Minister Anifah Aman said “such activities are not done amongst close friends”.

    Mr Anifah said his Australian counterpart, Julie Bishop, replied that it was not her government’s policy to comment on intelligence matters, but she accepted Malaysia’s concerns.

    The Sydney Morning Herald (SMH) has reported that Australian diplomatic posts in Asia were being used to intercept phone calls and data.

    The reports were based on a US National Security Agency document leaked by whistleblower Edward Snowden.

    Australia’s Department of Foreign Affairs and Trade has declined to comment on the reports.

    Prime Minister Tony Abbott said: “Every Australian governmental agency, every Australian official… operates in accordance with the law.”

    Find this story at 2 November 2013

    BBC © 2013 The BBC

    Canada’s electronic watchers enjoy secrecy second to none

    Unlike in Britain and the United States, Parliament is not involved in holding Canada’s intelligence gathering agency to account.

    Creepy truth: American spies with access to everyone’s data do occasionally succumb to the urge to snoop illegally through their love lives, peering into the private communications of former paramours.
    Creepier truth: if you’re Canadian, you have no way of knowing whether one of your own spies does it to you.
    Hypothetically, they don’t. Legally, they can’t. But that’s the problem, say critics of the fast-growing Communications Security Establishment Canada (CSEC), the Ottawa agency that scours global telephone logs, email and Internet trails for worrisome patterns — with CSEC it’s all hypothetical because Canada’s electronic watchers enjoy a secrecy second to none.
    Nearly six months after former computer specialist Edward Snowden began tearing back the curtain on America’s National Security Agency with a series of stunning disclosures about the true extent of U.S. mass surveillance, Canada’s CSEC remains a silent bystander.
    Apart from a single report by journalist Glenn Greenwald accusing CSEC of eavesdropping on Brazil’s mining and energy ministry, Canada’s electronic spies have thus far escaped the brunt of Snowden’s cascading disclosures.
    That’s good, right? Sure it is. But it also leaves Canadians, including Parliament, almost completely in the dark on what the underscrutinized CSEC actually does, even as outraged Americans and Britons shine a bright light on — and mobilize to change — the ways their own governments consume private data.
    “Canadians who think they are in the clear on these ongoing scandals need to grasp that we are the ones who need the debate the most,” said Ron Deibert, director of the University of Toronto’s Citizen Lab.
    “The Canadian checks and balances just aren’t there. We have no parliamentary oversight of CSEC, no adequate independent entity to watch the watchers and act as a constraint on misbehaviour. It just doesn’t exist now.
    “It’s not a question of people shrugging and saying, ‘Well, I’ve got nothing to hide.’ The real problem is oversight — and the potential for abuse if left unchecked.”
    It’s an idea that even CSEC’s former chief, John Adams, concedes would be helpful.
    Adams doesn’t think “oversight” is realistic, but supports the robust “review” of CSEC’s activities and sees the value in having a committee of security-cleared parliamentarians “fully briefed on what CSEC is doing.
    “It would be an opportunity for them to provide feedback and observations and raise concerns perhaps about what CSEC is doing and CSEC could also use that forum as an opportunity to talk about what they might be doing or consider doing or to bounce off of them some thoughts,” said Adams.
    “It would be an opportunity for (Parliament) to have some public debate but it would be a limited public debate because they’d have to be sworn to secrecy.”
    This review does exist in the United States, though many argue the checks and balances have been abused and subverted in light of Snowden’s NSA disclosures.
    Yet in the U.S., as the scandal grew, so too did Congressional scrutiny, with American politicians like Sen. Ron Wyden of Oregon leading the pushback against secrecy.
    A case in point came in August, when the leak of a top-secret document revealed the NSA broke privacy rules and overstepped its legal authority thousands of times a year after 2008, when the agency was granted broad new powers by Congress.
    Most of the violations were “unintentional,” but that sparked congressional queries for details on cases involving wilful misconduct by NSA spies. As pressure mounted, the NSA took the extraordinary measure of a public statement, acknowledging that a handful of its officers had used the agency’s enormous eavesdropping power to spy on romantic interests.
    Those instances, though rare, were common enough to warrant their own spycraft label — LOVEINT, or “love intelligence.” Most of the officials involved resigned, were dismissed or were demoted to a lower pay grade with limited security clearance, the agency said.
    But that’s only one piece of a much broader debate taking place in Washington, as two competing pieces of legislation emerge with the intent to rein back NSA powers and place congressional checks and balances on a stronger footing. An important element of that debate is whether America’s massive metadata effort — the gathering up of the entire haystack of phone and Internet communications — is worth the cost.
    These questions are hardly ever asked north of the border, even though Canada is a partner in the so-called Five Eyes, sharing intelligence-gathering chores alongside the U.S., Britain, Australia and New Zealand.
    Little is known of what that entails, precisely, although the Globe and Mail penetrated one layer of the CSEC bubble in June. The newspaper disclosed that a secret Canadian metadata surveillance program first launched in 2005 under then-prime minister Paul Martin was frozen amid privacy concerns, only to be reinstated in 2011 under new rules.
    Hundreds of pages of records on the program, obtained through Access to Information requests, came back with large passages blacked out on grounds of national security, the Globe reported.
    The lone watchdog agency overseeing CSEC, the Office of the CSE Commissioner, has given its blessing to the metadata program. But critics say the office and its staff of eight, which until recently received its funding directly from the Department of National Defence, as does CSEC, remains too close to Canada’s security establishment to effectively safeguard privacy concerns.
    Once a year CSEC’s watchdog reports to Canadians. But far more often, it reports secretly to the defence minister with recommendations for adjustments in how CSEC conducts its business. In his most recent public report, released in August, outgoing commissioner Robert Decary ended his three-year term proclaiming that all activities complied with Canadian law with the exception of “a small number of records (which) suggested the possibility that some activities may have been directed at Canadians, contrary to the law . . . I was unable to reach a definitive conclusion.”
    Decary, in a final assessment of his time as CSEC watchdog, wrote that he saw little value in a confrontational relationship. “With my years of experience, I see the office more CSEC’s conscience than as a sword of Damocles,” he wrote.
    But even Decary nudged Canada’s spymasters toward greater openness, writing that “I believe that the ice has been broken and that the security and intelligence agencies understand they can speak more openly about their work without betraying state secrets or compromising national security.
    “The greater the transparency, the less skeptical and cynical the public will be.”
    University of Ottawa scholar Wesley Wark, who specializes in national security and the history of intelligence agencies, says the CSEC watchdog is simply not enough.
    Unlike Britain and the United States, Canadian oversight leaves a “gaping hole . . . a big gap” because Parliament is not involved in holding intelligence agencies to account as Adams suggested, Wark told The Star.
    The issue has simmered for years, said Wark, with failed attempts, most recently in 2005, to create a British-style Committee of Parliamentarians on National Security.
    But oversight actually grew worse in 2011, said Wark, when CSEC was deemed an independent agency within the Department of National Defence, effectively eliminating a requirement to report to the national security adviser and Privy Council office. “It took that away entirely,” said Wark, “and put it all within (DND), where it’s very easy for CSEC to disappear down its secret hole.
    “There’s a question about who is really in charge and who’s deciding to apportion CSEC resources in terms of current operations,” he said.
    Among the key questions Wark says remain unanswered is how much bang CSEC gets for its buck. And whether, in Canada’s haste to satisfy the obligations of its Five Eyes commitments, we sell Canadian interests short.
    Deibert, who this year published Black Code: Inside the Battle for Cyberspace, argues that while parliamentary oversight remains an admirable goal, the evolving issue of privacy-versus-surveillance warrants something more ambitious.
    “I would go further: There needs to be somebody who is not part of Ottawa culture, who is adversarial, something with the authority and credibility of the Privacy Commission’s office,” said Deibert.
    “Parliamentary oversight is necessary. But you also need oversight that doesn’t depend on favours or look through the lens of partisan politics.
    “I just don’t think, as a society, Canada has caught up with the epochal scope of what has changed in the last 10 years. We’ve gone through the most profound transformation in how we communicate. Mobile and broadband technologies have turned us inside out — and at the same time these Cold War agencies are now turning their gaze inwards on us.
    “It’s no longer spy-versus-spy and concern over foreign states with nuclear weapons. Now it’s about somebody blowing themselves up in a shopping mall. And so the threat model has turned toward all of society.”
    Canada’s security agencies cannot do their jobs in total transparency, of course. Some degree of secrecy is crucial. But that is no hindrance, if a committee of Parliament were to be vetted and cleared — a commonplace practice in other jurisdictions — and thus able to absorb firsthand the full heft of CSEC activities.
    But if CSEC’s critics and former bosses agree on at least some increased scrutiny, Adams doesn’t buy into all the Snowden hype. He shrugs, for example, at the furor that followed October’s disclosure of U.S. eavesdropping on German Chancellor Angela Merkel’s cellphone.
    “Every leader in the world knows that people would love to know what they’re thinking, where they’re heading . . . anyone who doesn’t think that is happening is in never-never land,” Adams said.
    “It’s not illegal but it’s embarrassing. There are 12 rules and 11 of them are, ‘Don’t get caught.’ ”

    By: Mitch Potter Washington Bureau, Michelle Shephard National Security
    Reporter, Published on Sat Nov 09 2013

    Find this story at 9 November 2013

    © Copyright Toronto Star Newspapers Ltd. 1996-2013

    Canadian embassies eavesdrop, leak says

    A new leak suggests that Canada is using some of its embassies abroad for electronic-eavesdropping operations that work in concert with similar U.S. programs.

    A U.S. National Security Agency document about a signals intelligence (SigInt) program codenamed “Stateroom” was published this week by Germany’s Der Spiegel magazine. The document, a guide to the program, was among material obtained by former NSA contractor Edward Snowden.

    “STATEROOM sites are covert SIGINT collection sites located in diplomatic facilities abroad,” the leaked document says. “SIGINT agencies hosting such sites include … Communication Security Establishments [sic] or CSE (at Canadian diplomatic facilities).”

    The leaked document does not give the locations of the alleged listening posts. It says that, in general, such surveillance equipment is often concealed “in false architectural features or roof maintenance sheds” atop embassies. “Their true mission is not known by the majority of diplomatic staff at the facility,” it adds

    A Parliamentarian who on Tuesday introduced a motion to increase scrutiny of federal intelligence agencies said the document shows Canadians do not know enough about the Communications Security Establishment Canada (CSEC).

    “We really don’t know what they’re up to,” said Jack Harris, the NDP’s long-serving defence critic. “… We’re dealing with the secret work of spies and intelligence and whether what is being done is what ought to be done.”

    Government representatives at CSEC and Foreign Affairs declined to comment directly on the leak. A spokeswoman for Defence Minister Rob Nicholson, who gives CSEC its direction, also declined to comment.

    In 1995, former CSEC employee Mike Frost wrote in his memoir, Spyworld, that he set up “listening posts” at Canadian embassies. His book says CSEC signals intelligence technicians during the Cold War were funded and mentored by NSA counterparts who taught them how to conceal a piece of spy machinery inside what appeared to be an office safe.

    One 1972 caper recounted in the book involved agents cutting a five-foot satellite dish into 12 wedges and smuggling the equipment into Moscow before reassembling it in the attic of the Canadian embassy there. Reports were then passed back to Canada in diplomatic bags, according to the book. It was a standard courtesy for CSEC to turn off its listening gear in Moscow when important British or U.S. allies visited, according to Spyworld.

    Newly leaked material indicates that close partnerships still exist among the so-called “Five Eyes” – the alliance of intelligence agencies from English-speaking countries that agree not to spy on each other while collecting intelligence on just about everybody else.

    The Five Eyes agencies may have teamed up to spy on BlackBerrys belonging to foreign diplomats at a 2009 meeting of the G20 in London, according to a previously published leak from Mr. Snowden, who now lives in Moscow as the United States seeks to arrest him on espionage charges.

    According to the Stateroom document, Britain, Canada, the United States and Australia still run interrelated surveillance operations from their embassies. (New Zealand, the fifth “eye,” is not mentioned.)

    “It’s not surprising, but it is certainly significant that it is disclosed,” said Wesley Wark, a Canadian professor who specializes in intelligence matters. “… There is still great value in having close access to telecommunications around the world, particularly if you are interested in cellphone communications.”

    Mr. Wark’s point about “close” spying contrasts with a more far-reaching 21st century surveillance methodology highlighted earlier this month.

    A leaked 2012 presentation showed that CSEC officers analyzed communications flow around Brazil’s energy ministry. This suggests CSEC has access to vast databases of previously logged global telecommunications traffic – giving the agency a very far reach in determining which telephones and computer servers in the world might yield the most intelligence for Canada.

    COLIN FREEZE
    The Globe and Mail
    Published Tuesday, Oct. 29 2013, 11:59 AM EDT
    Last updated Tuesday, Oct. 29 2013, 9:54 PM EDT

    Find this story at 29 October 2013

    © Copyright 2013 The Globe and Mail Inc.

    Five reasons our international eavesdropping isn’t worth the cost

    Few things can get a government leader into hot water with important international partners faster than getting caught intercepting their mail, literally or electronically, as both President Barack Obama and Prime Minister Stephen Harper can attest. Similarly, few things can be as seductive to government officials as intelligence, and few things more politically risky. What governments can do technologically should not dictate what they will do politically; capacity unbounded by a well-managed overarching political strategy can lead to errors in judgment with serious and far-reaching consequences.

    The reality is that the value of intelligence can be, and frequently is, over-rated.

    The revelations by Edward Snowden keep coming, undermining trust in the United States among its allies. The U.S. National Security Administration, one of reportedly 15 American intelligence agencies with an estimated cumulative budget of $75-billion, has been outed for gathering data from friend and foe alike. In France, the NSA apparently vacuumed up 70 million digital communications in a single month. In Spain, the number was reportedly 60 million electronic communications. The United Nations Secretary General has been a target as have Mexico’s current and former presidents and the German Chancellor. The Germans, who long endured the espionage predations of the old East German Stasi, and who considered themselves a steadfast ally of Washington, are particularly distressed that Chancellor Angela Merkel has been an NSA target.

    What kind of ally would bug the German Chancellor’s mobile phone for a decade? In what respect exactly was Chancellor Merkel a security risk to the Americans? If Presidents Bush and Obama wanted to know what she thought, why did they not just pick up the phone and ask her, or meet with her at any of the numerous summits they attended together? The alleged bugging of the communications of 34 other leaders around the world that Mr. Snowden claims happened will doubtless produce more unhappy surprises. In Brazil the United States was revealed to be spying both on the communications of President Dilma Rouseff and on the Brazilian national oil company Petrobras. Meanwhile, Canada’s Communications Security Establishment was revealed to be spying on the Brazilian Ministry of Mining and Energy.

    The repercussions are potentially very serious. The sheer scale of electronic eavesdropping and the impudence with which it is undertaken have hit nerves worldwide. Consumers in this digital age, who paradoxically are more ready to tolerate the pervasive incursions of foreign corporations into their lives than the snooping of foreign governments, are up in arms. Allied governments, whose outrage appears partly but not wholly tactical, are threatening a range of retaliations. The European Parliament has sent a delegation to Washington seeking explanations. The Germans, who want to be removed from the NSA targets list, as do others, have dispatched their intelligence chiefs to Washington this week to seek cooperation.

    Meanwhile, the European Union parliament is threatening to delay U.S.-EU free trade negotiations and contemplating privacy legislation that would force American internet companies like Google and Yahoo on the pain of heavy fines to get EU approval before complying with U.S. warrants seeking e-mails and search histories of EU citizens. Germany and Brazil are promoting a resolution at the UN that would call on states to respect privacy rights under the 1976 International Covenant on Civil and Political Rights particularly as regards the extraterritorial surveillance of private communications of citizens in foreign jurisdictions. Perhaps the most significant cost of the Snowden revelations is that American (and Canadian) policy to promote multi-stakeholder governance of the Internet and to limit its regulation by governments is in serious jeopardy. NSA meta-data dragnets around the world have made the case for greater national control of the Internet more persuasively than the Chinese, Russians and Iranians ever could. Meanwhile, Deutsche Telekom among others is launching a new encrypted service using only data centres located on German soil. The Balkanization of the Internet looms.

    The gap between American words and American deeds has grown too wide for foreign governments and their publics to ignore. This week’s protestations by American leaders that American spying saves lives, including European lives, are seen as self-serving piffle. No lives were at stake in the German Chancellor’s office, nor were there any terrorists, as one Brazilian legislator observed, at the bottom of any Brazilian oil well. The excuse that ”they all do it” is equally unpersuasive. Although the French Direction Générale de la Sécurité Extérieure, the German Nachtrichtendienst and the Brazilian Agência Brasileira de Inteligência do do it, the point is not who else is dissembling but how effective intelligence is and at what political, financial and moral costs it is purchased. In Washington, after initially blowing off others’ concerns, the Obama administration and Congress are having second thoughts about the wisdom of spying on allies.

    Here are five lessons we can draw from all this for Canada.

    First, secrets are hard to keep in the digital world. The intelligence leadership and their political masters should presume that they will see their decisions on The front page of the Globe and Mail one day.

    Second, intelligence is a means not an end, and not all its purposes – national security, counter-terrorism, communications security, commercial secrets and economic advantage – are equally compelling. Mature judgment is a must if sound decisions are to be made about the risks that are worth running – or not. For example, at a time when our Governor-General, Prime Minister, Foreign Minister, Trade Minster and other ministers had visited Brazil to court the government, was it really worth spying on the Brazilian Ministry of Energy and Mines, as we are alleged to have done?

    Third, membership in the Five Eyes intelligence-sharing group (the US, UK, Canada, Australia and New Zealand), which dates from the end of the Second World War, entails costs as well as benefits and needs to be kept under sober review. Rubbing shoulders with the American intelligence community can be intoxicating, a poor condition in which to make important judgments.

    Fourth, intelligence can be and frequently is over-rated. Spending on intelligence and diplomacy needs to be re-balanced. While intelligence operates beyond the pale of international law, diplomacy is both legally sanctioned and uncontroversial, and effective, in its creation of trusting relationships, effective. It does not make sense at a time when intelligence expenditures have grown dramatically, and CSEC is erecting a billion-dollar building in Ottawa, that the Foreign Affairs department is selling off assets abroad to cover a shrinking budget.

    Fifth, leadership matters. The key challenge is not so much to do things right as it is to do the right things. Oversight to ensure that Canadian laws are not being broken is important and needs reinforcement, but coherent, strategic policy leadership that ensures that the intelligence tail never wags the foreign policy dog is crucial. Technological capacity should never trump political judgment.

    The Globe and Mail
    Paul Heinbecker
    Wednesday, October 30, 2013

    Find this story at 30 October 2013

    © Copyright 2013 The Globe and Mail Inc.

    Canadian embassies in U.S.-led spying efforts: Der Spiegel documents; Documents leaked by Snowden say CSEC took part in spying

    Canadian Prime Minster Stephen Harper responds to questions as German Chancellor Angela Merkel looks on during a joint news conference on Parliament Hill, in Ottawa, Thursday August 16, 2012.
    Photo: THE CANADIAN PRESS/Fred Chartrand
    comment

    Canadian embassies have been used to house equipment that collected signals intelligence as part of a U.S.-led spying effort, according to documents reportedly leaked by whisteblower Edward Snowden.

    German news magazine Der Spiegel published a series of documents provided by Snowden, a former contractor of the National Security Agency (NSA), that detail a surveillance program codenamed “Stateroom.” According to Der Spiegel, the NSA together with the CIA placed secretive eavesdropping stations at diplomatic outposts to collect signals intelligence, also known as SigInt, on the host countries.

    At U.S.-owned facilities, this was known as the “Special Collection Service,” according to the documents. However, one leaked page also indicates that Canadian diplomatic facilities were used and suggests that Communications Security Establishment Canada (CSEC) took part in the project.

    The document also mentions the use of British and Australian diplomatic facilities. These monitoring stations, according to Der Spiegel, are concealed and typically placed on the upper floors or rooftops of embassies or consulates. The equipment is used to intercept communications, Der Spiegel reported.

    “These sites are small in size and in number of personnel staffing them,” the document says. “They are covert, and their true mission is not know by the majority of the diplomatic staff at the facility where they are assigned.”

    Der Spiegel notes: “The presence of these spying units ranks among the agency’s best-guarded secrets. After all, they are politically precarious: There are very few cases in which their use has been authorized by the local host countries.”

    The documents were published along with stories looking at how the U.S. spies on European countries and specifically Germany. Last week, Der Spiegel reported they had documents showing the U.S. was monitoring German Chancellor Angela Merkel’s mobile phone.

    The report caused a diplomatic rift and Merkel’s government summoned the U.S. ambassador seeking answers. U.S. President Barack Obama has said he didn’t know the NSA was monitoring the communications of allied world leaders.

    The document mentioning Canadian facilities is a glossary accompanying a Stateroom guide. Canada and CSEC are listed in the definition for “Stateroom sites,” which are “covert SIGINT collection sites located in diplomatic facilities abroad.”

    Canada is part of Five Eyes, the name of a sort of allied club of Western countries that has pledged not to spy on one another. Australia and the U.K. — the two other countries named in the document — are also members along with the U.S. and New Zealand. There’s speculation that in the wake of Snowden’s leaks, some countries — like Germany — are going to want to join the club.

    As Canadian intelligence blog Lux Ex Umbra points out, a book written by former CSEC employee Mike Frost in 1994 alleged that surveys were done in the 1980s by CSEC to find Canadian embassies suitable for monitoring stations. CSEC has never confirmed that allegation and according to the Canadian Press, will not comment on the latest report in Der Spiegel.

    Lauren Strapagiel
    Published: October 29, 2013, 4:16 pm
    Updated: 2 weeks ago

    Find this story at 29 October 2013

    © 2013 Postmedia Network Inc.

    CSEC aided in U.S.-led spying efforts on diplomats

    New revelations indicate that Canada’s ultra-secretive spy agency CSEC may have taken part in U.S.-led efforts to spy on diplomats.

    Canada has used diplomatic facilities abroad to house electronic eavesdropping operations allied with American global surveillance programs, according to a recently leaked U.S. document.

    A slide presentation leaked to Germany’s Der Spiegel magazine suggests that Communications Security Establishment Canada (CSEC) took part in a broader U.S.-led effort known as “Stateroom” that collect “SigInt” (signals intelligence) from secret installations inside embassies and consulates. Such spying often takes place without the knowledge of the diplomats posted to these missions, the document says.

    CSEC could not immediately respond to questions about the leaked document, but generally says it does not break Canadian laws and that it cannot comment on the methods that it uses to collect foreign intelligence.

    The document recording Canada’s participation in “Stateroom” was published this week by Der Spiegel magazine in a broader piece about U.S. spying in Germany. The report focused on evidence that Chancellor Angela Merkel’s mobile phone was targeted for surveillance. The disclosure has prompted German officials to openly mull expelling U.S. diplomats.

    Relying “mostly” on leaked NSA documents from former U.S. contractor Edward Snowden, Der Spiegel published a leaked “Stateroom Guide” glossary that directly referenced CSEC. On Monday, Canadian blogger Bill Robinson drew attention to the passage on his “Lux Ex Umbra” intelligence blog.

    “STATEROOM sites are covert SIGINT collection sites located in diplomatic facilities abroad,” the leaked document says. “SIGINT agencies hosting such sites include … Communication Security Establishments or CSE (at Canadian diplomatic facilities).”

    No locations are given for the alleged CSEC outposts in embassies abroad.

    The leaked U.S. document goes on to says that such surveillance equipment is concealed – “in false architectural features or roof maintenance sheds” –– and that such operations are highly compartmentalized. “They are covert, and their true mission is not known by the majority of diplomatic staff at the facility where they are assigned.”

    Article by Colin Freeze for The Globe and Mail

    Find this article at 29 October 2013

    © Copyright 2013 The Globe and Mail Inc.

    Spy agency won’t say if it uses Canadian embassies; The national eavesdropping agency is refusing to comment on allegations that it mounts foreign operations through Canada’s embassies abroad.

    The German magazine Der Spiegel this week cites presentation slides leaked by Edward Snowden, a former contractor with the National Security Agency, CSEC’s American counterpart.
    OTTAWA—The national eavesdropping agency is refusing to comment on allegations that it mounts foreign operations through Canada’s embassies abroad.

    Lauri Sullivan, a spokeswoman for Communications Security Establishment Canada, says the agency does not comment “on our foreign intelligence collection activities or capabilities.”

    German magazine Der Spiegel says Canada is using diplomatic facilities to support surveillance operations in league with key allies the United States, Britain and Australia.

    Word of the Canadian reference — first reported by blogger Bill Robinson, who closely tracks CSEC — came as the NDP unsuccessfully sought support in the House of Commons to create a parliamentary committee that would look into stronger oversight for the intelligence community.

    The magazine report published this week cites presentation slides leaked by Edward Snowden, a former contractor with the National Security Agency, CSEC’s American counterpart.

    One slide indicates the Canadian spy agency hosts “Stateroom” sites — a term for covert signals-intelligence gathering bases hidden in consulates and embassies.

    “These sites are small in size and in number of personnel staffing them,” says the slide. “They are covert, and their true mission is not known by the majority of the diplomatic staff at the facility where they are assigned.”

    Der Spiegel alleges that the U.S. NSA, Britain’s Government Communications Headquarters and Australia’s Defense Signals Directorate also host such covert stations, with equipment installed on rooftops or upper floors of embassy buildings — protected from view by screens or false structures.

    It’s just the latest of several references to the Ottawa-based spy service in Snowden’s cache of leaked materials.

    Earlier documents suggest Canada helped the U.S. and Britain spy on participants at the London G20 summit four years ago. Britain’s Guardian newspaper published slides describing the operation, including one featuring the CSEC emblem.

    More recently, Brazil demanded answers following accusations CSEC initiated a sophisticated spy operation against the South American country’s ministry of mines and energy.

    CSEC, tasked with gathering foreign intelligence of interest to Canada, has a staff of more than 2,000 — including skilled mathematicians, linguists and computer analysts — and a budget of about $350 million.

    The recent revelations — including concerns that CSEC gathers information about Canadians in the course of its foreign spying — have sparked criticism from civil libertarians and opposition politicians.

    An NDP motion put forward Tuesday by defence critic Jack Harris called for a special committee to study the intelligence oversight systems of other countries and make recommendations “appropriate to Canada’s unique circumstances.” The committee would have reported its findings by May 30 next year.

    The motion quickly went down to defeat. The Conservative government maintains CSEC is already subject to scrutiny by an independent commissioner who has never found an instance of the spy service straying outside the law.

    By: Jim Bronskill The Canadian Press, Published on Tue Oct 29 2013

    Find this story at 29 October 2013

    © Copyright Toronto Star Newspapers Ltd. 1996-2013

    Slides reveal Canada’s powerful espionage tool

    Security experts say that Canadian intelligence has developed a powerful spying tool to scope out and target specific phones and computers so as to better set up hacking and bugging operations.

    The outlines of the technology are contained in the slides of a PowerPoint presentation made to allied security agencies in June, 2012. Communications Security Establishment Canada (CSEC) called the tool “Olympia,” showing how its analysts sifted through an immense amount of communications data and zeroed in on the phones and computer servers they determined merited attention – in the demonstration case, inside the Brazilian Ministry of Energy and Mines.

    Within weeks, CSEC figured out who was talking to whom by plugging phone numbers and Internet protocol addresses into an array of intelligence databases. In this way it “developed a detailed map of the institution’s communications,” Paulo Pagliusi, a Brazilian security expert who examined the slides, told The Globe.

    The slides are part of a large trove of documents that have been leaked by Edward Snowden, the former contractor with the U.S. National Security Agency (NSA) whose disclosures have set off a debate over whether the agency has improperly intruded on the privacy of Americans. Other disclosures have raised questions about its spying on foreign governments, sometimes with the assistance of allied intelligence agencies.

    The Globe and Mail has collaborated with the Brazil-based American journalist Glenn Greenwald, based on information obtained from the Snowden documents. Mr. Snowden, who went into hiding in Hong Kong before the first cache of NSA documents was leaked, has been charged by the United States with espionage and theft of government property. Russia has granted him temporary sanctuary.

    Canadian officials declined to comment on the slides. Responding to an e-mail requesting comment on whether Canada co-operated with its U.S. counterpart in tapping into Brazilian communications, CSEC spokesman Andy McLaughlin said the agency “cannot comment on its foreign intelligence activities or capabilities.” Prime Minister Stephen Harper said earlier this month that he is “very concerned” about reports CSEC focused on the Brazil ministry.

    Any ability to sift through telecommunications data for specific leads can be valuable for electronic-eavesdropping agencies, especially the capacity to map out – without necessarily listening into – an organization’s Internet or voice communications. This, in turn, can help isolate specific devices for potential hacking operations. By developing “Olympia” as a method for doing just this, Canada added to its spymasters’ toolkit.

    The PowerPoint presentation by CSEC was first reported by Brazil’s Fantastico TV program, which earlier reported the NSA spying, in conjunction with Mr. Greenwald. Brazilian officials expressed outrage at the United States, but their criticism of Canada was more fleeting. They say they now intend to put public employees on an encrypted e-mail system.

    The CSEC presentation – titled Advanced Network Tradecraft – described a technological reconnaissance mission aimed at the Brazilian energy ministry in April and May of 2012. According to the presentation, the agency knew very little about the ministry going in, apart from its Internet domain name and a few associated phone numbers. The presentation never makes clear CSEC’s intentions for targeting the Brazilian ministry.

    The leaked slides also suggest Canada sought to partner with the NSA, with one slide saying CSEC was “working with TAO to further examine the possibility” of a more aggressive operation to intercept Internet communications.

    “TAO” refers to “tailored access operations,” said Bruce Schneier, a privacy specialist for the Berkman Center for the Internet and Society at Harvard. “It’s the NSA ‘blackbag’ people.” (A “blackbag job” refers to a government-sanctioned break-and-enter operation – hacking in this case – to acquire intelligence.)

    It is not clear whether CSEC or the NSA followed up with other actions involving the Brazilian ministry.

    COLIN FREEZE AND STEPHANIE NOLEN
    WASHINGTON and RIO DE JANEIRO — The Globe and Mail
    Published Saturday, Oct. 19 2013, 8:00 AM EDT

    Find this story at 19 October 2013

    © Copyright 2013 The Globe and Mail Inc.

    Canadian spies met with energy firms, documents reveal; Government agency that allegedly spied on Brazil had secret meetings with energy companies

    Observers have suggested that Canada’s actions are related to potential competition to its tar sands. Photograph: Orjan F Ellingvag/Corbis

    The Canadian government agency that allegedly hacked into the Brazilian mining and energy ministry has participated in secret meetings in Ottawa where Canadian security agencies briefed energy corporations, it has emerged.

    Claims of spying on the ministry by Communications Security Establishment Canada (CSEC) come amid the Canadian government’s increasingly aggressive promotion of resource corporations at home and abroad, including unprecedented surveillance and intelligence sharing with companies.

    According to freedom of information documents obtained by the Guardian, the meetings – conducted twice a year since 2005 – involved federal ministries, spy and police agencies, and representatives from scores of companies who obtained high-level security clearance.

    Meetings were officially billed to discuss “threats” to energy infrastructure but also covered “challenges to energy projects from environmental groups”, “cyber security initiatives” and “economic and corporate espionage”.

    The documents – heavily redacted agendas – do not indicate that any international espionage was shared by CSEC officials, but the meetings were an opportunity for government agencies and companies to develop “ongoing trusting relations” that would help them exchange information “off the record”, wrote an official from the Natural Resources ministry in 2010.

    At the most recent meeting in May 2013, which focused on “security of energy resources development”, meals were sponsored by Enbridge, a Canadian oil company trying to win approval for controversial tar sands pipelines.

    Since coming to power, Conservative prime minister, Stephen Harper, has used his government apparatus to serve a natural resources development agenda, while creating sweeping domestic surveillance programs that have kept close tabs on indigenous and environmental opposition and shared intelligence with companies.

    Harper has transformed Canada’s foreign policy to offer full diplomatic backing to foreign mining and oil projects, tying aid pledges to their advancement and jointly funding ventures with companies throughout Africa, South America and Asia.

    Keith Stewart, an energy policy analyst with Greenpeace Canada, said: “There seems to be no limit to what the Harper government will do to help their friends in the oil and mining industries. They’ve muzzled scientists, gutted environmental laws, reneged on our international climate commitments, labelled environmental critics as criminals and traitors, and have now been caught engaging in economic espionage in a friendly country. Canadians, and our allies, have a right to ask who exactly is receiving the gathered intelligence and whose interests are being served.”

    Observers have suggested that Canadian spying on Brazil is related to the country’s auctioning of massive offshore oil finds, potential competition to Canada’s tar sands, and Canada’s desire to gain competitive advantage for more than 40 Canadian companies involved in Brazil’s mining sector.

    “There is very substantial evidence that the spying Canada was doing for economic reasons aimed at Brazil is far from an aberration,” Guardian columnist Glenn Greenwald told Canadian media on Tuesday. Greenwald hinted that he will be publishing further documents on CSEC.

    “We’ve already seen how Canadian embassies around the world essentially act as agents for Canadian companies – even when they’re implicated in serious human rights abuses,” said Jamie Kneen of MiningWatch Canada, an NGO watchdog. “We just had no idea how far they were willing to go.”

    Martin Lukacs and Tim Groves
    theguardian.com, Wednesday 9 October 2013 12.08 BST

    Find this story at 9 October 2013

    © 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.

    Brazil spying allegations part of a ‘war game scenario,’ former official says

    A former high-ranking member of Canada’s spy service says he suspects the leaked documents that purport to show Ottawa was spying on Brazil are in fact part of a pretend “wargame scenario.”

    “There’s no smoking gun here. It’s again more little snippets and snapshots from the Snowden revelations; they actually mislead more than they inform,” says Ray Boisvert, until last year a deputy director of the Canadian Security Intelligence Service.

    “I don’t believe it’s likely Brazil was targeted.”

    A Brazilian television report on Sunday said Canada’s electronic eavesdropping agency, the Communication Security Establishment Canada (CSEC) targeted the ministry that manages the South American nation’s vast mineral and oil resources. The report was based on documents leaked by former U.S. National Security Agency contractor Edward Snowden.

    Mr. Boisvert, who left the Canadian Security Intelligence Service in 2012, said the top priority for CSIS and CSEC is counter-terrorism. The directive from on high was national security, not infiltrating a Brazilian government department of mining.

    “When I worked there, very closely with CSEC and I was a top-line operational leader, we were all too busy chasing bad guys who want to kill people,” the former CSIS official said.

    “At the end of the day CSIS and CSEC have a mandate to go after foreign powers if those are acting in a way that’s inimical to our interests, so the poster child for that would be Iran. Everything from nuclear proliferation to state-sponsored terror,” he said.

    “Brazil seems highly unlikely to me,” Mr. Boisvert said.

    He said one regular practice of security organizations, however, is war-gaming.

    “I’m more inclined to think that this is probably a case of a hypothetical scenario,” Mr. Boisvert said.

    “CSEC does war gaming just like the military and in their case they look at [computer] networks. Before they go after a target, they will play a game on paper,” he said.

    “I have got a funny feeling that is all Snowden has: is just that exploratory war game piece saying ‘OK, what would we do, boys and girls, if we had to do this?’ ”

    When pressed Monday for comment on allegations that CSEC spied on Brazilians, the Harper government gave repeated indirect answers to the question, saying the CSE does not conduct surveillance on Canadians.

    “This organization cannot and does not target Canadians under Canadian law,” Defence Minister Rob Nicholson said.

    Canadians and Brazilians are both working on a United Nations peacekeeping mission in Haiti and Mr. Nicholson rejected the suggestion the revelations might hurt relations between Canada and Brazil.‎ “I believe our collaboration and friendship will continue,” Mr. Nicholson said.

    “It’s wise not to get involved with commenting on foreign intelligence gathering activities and so I don’t do that.”

    Mr. Boisvert said he assumes the Canadian government is reaching out to Brazil to explain what really happened.

    STEVEN CHASE
    OTTAWA — The Globe and Mail
    Published Monday, Oct. 07 2013, 1:12 PM EDT

    Find this story at 7 October 2013

    © Copyright 2013 The Globe and Mail Inc.

    Charges that Canada spied on Brazil unveil CSEC’s inner workings

    Leaked documents showing that Canada’s electronic intelligence-gathering agency targeted the Brazilian government threaten to disrupt relations between the countries – and thrust the secretive CSEC into the public spotlight.

    On Sunday night, Brazil’s flagship Fantastico investigative program on the Globo television network revealed leaked documents suggesting that Communications Security Establishment Canada (CSEC) has spied on computers and smartphones affiliated with Brazil’s mining and energy ministry in a bid to gain economic intelligence.

    The report, attributed to documents first obtained by the former U.S. government contractor Edward Snowden, includes frames of a CSEC-earmarked presentation that was apparently shared with the United States and other allies in June, 2012.

    “Brazilian Ministry of Mines and Energy (MME),” a title page of the leaked case study reads. “New target to develop.”

    The presentation then rhetorically asks “How can I use the information available in SIGINT [signals-intelligence] data sources to learn about the target?” before delving into specific hacking techniques.

    The documents were part of a collaboration with Globo by Glenn Greenwald. The Rio de Janeiro-based journalist and confidante of Mr. Snowden has spent the past four months steadily disclosing a treasure trove of leaked materials recording the electronic eavesdropping practices of the United States and its allies.

    Washington has been reeling from the disclosures. In Brazil, they have caused the most serious rift between the two nations in years – after the first revelations about NSA espionage were made last month, Brazilian president Dilma Rousseff canceled an official state visit to Washington; it was to be the first in 18 years and was intended to showcase the growing economic and political ties between the two countries. Instead Ms. Rousseff went to the UN General Assembly where she complained of “totally unacceptable” U.S. spying in her country. She gained a considerable bump in personal approval ratings after lashing out at the U.S. over the NSA activity, which has elicited a reaction of deep offense from many Brazilians.

    ***

    http://www.theglobeandmail.com/news/world/five-highlights-from-the-canada-brazil-spying-revelations/article14721506/

    Five highlights from the Canada-Brazil spying revelations Add to

    GLOBE STAFF

    The Globe and Mail
    Published Monday, Oct. 07 2013, 11:02 AM EDT

    Canada’s signals-intelligence agency has been spying on Brazil’s Mines and Energy Ministry, according to documents the former U.S. government contractor Edward Snowden leaked to Brazil’s Globo television network.

    Globo obtained a copy of a slide presentation made by someone at the Communications Security Establishment Canada (CSEC). The document was shown at a June 2012 gathering of members of the “Five Eyes,” the signals-intelligence alliance of Canada, the United States, Britain, Australia and New Zealand.

    Here are some highlights that can be gleaned from the slides:

    1. Using a program called Olympia, CSEC took aim at Brazil’s Ministry of Mines and Energy, describing it as a “new target to develop” despite “limited access/target knowledge.”

    2. One of the slide shows that CSEC focused on ministry portable devices and was able to identify their carriers (such as Brasil Telecom S.A. or Global Village Telecom), the kind of hardware being used (for example a Nokia 3120 or an Android-based Motorola MRUQ7) and metadata about where calls were placed, in countries such as Peru, Venezuela, Poland, Singapore, Great Britain.

    Another slide in the presentation explains how analysts cross-referenced a handset’s SIM card with the network telephone number assigned to it and the handset’s unique number (IMEI).

    3. CSEC metadata collection included calls made from the Ministry of Mines and Energy to the Brazilian embassy in Peru and the head office of OLADE, the Latin American Energy Organization, in Quito, Ecuador.

    One slide titled showed how the Canadians connected an IP addresses assigned to the ministry to e-mail communications with Canada, Eritrea, Saudi Arabia, Thailand, Afghanistan, Jordan and South Africa.

    4. Another phone monitored by CSEC belonged to Paulo Cordeiro de Andrade Pinto, a career diplomat who was ambassador to Canada from 2008 to 2011, and is now Brazil’s Under Secretary for Middle East and Africa.

    5. CSEC’s next step was going to be the collection of e-mails and cooperation with a hacking specialists working for a secret unit of the U.S. National Security Agency.

    “I have identified MX [email] servers which have been targeted to passive collection by the Intel analysts,” says a slide titled “Moving Forward.”

    The slide mentions TAO (Tailored Access Operations), an NSA unit specializes in installing spyware and tracking devices and has been reported to have played a role in the hunt for Osama Bin Laden.

    “I am working with TAO to further examine the possibility for a Man on the Side operation,” the CSEC slide says, alluding to a form of online eavesdropping.

    The impact for Canada of these revelations could be equally grave: they come at a time when Brazil has become a top destination for Canadian exports, when a stream of delegations from the oil and gas industries are making pilgrimages to Rio de Janeiro to try to get a piece of the booming offshore oil industry, and when the Canadian government is eager to burnish ties with Brasilia. Foreign Affairs Minister John Baird visited Brazil in August, and spoke repeatedly about the country as a critical partner for Canadian business.

    American lawmakers have introduced several bills that aim to rein in the U.S. National Security Agency’s domestic surveillance programs.

    Throughout all this, Canada’s electronic eavesdropping agency has kept a relatively low profile, never before emerging as the central figure in any Snowden-leaked spying program. Although it has existed since the Second World War, CSEC has rarely discussed any of its operations in public.

    CSEC has a $350-million budget and 2,000 employees. By law, it has three mandates – to safeguard Canadian government communications and computers from foreign hackers, to help other federal security agencies where legally possible, and to gather “foreign intelligence.”

    The federal government is building a new $1-billion headquarters for CSEC on the outskirts of Ottawa.

    Given wide latitude by its political and bureaucratic masters to collect what “foreign intelligence” it can, CSEC is exceedingly discreet. The spy agency’s leaders rarely make any public remarks. When they do, they tend only to speak vaguely of the agency’s role in fighting terrorism.

    But economic espionage appears to be a business line for CSEC. Former Carleton University Professor Martin Rudner has pointed out that the spy agency started recruiting economists and business analysts in the mid-1990s.

    “CSE[C] operations in economic intelligence have gone rather beyond the strictly defensive to also help promote Canadian economic competitiveness,” Mr. Rudner wrote in an essay published in 2000. He added that the spy agency is rumoured to have given the Canadian government a leg up during NAFTA negotiations with Mexico, and also eavesdropped on the 1997 APEC summit.

    Mr. Rudner added that Ottawa officials don’t necessarily share with Canadian businesses what CSEC surveillance turns up. Instead, he writes, they “sometimes provide advice and counsel by way of helping to promote Canadian trade, without necessarily revealing their sources in economic intelligence.”

    While CSEC’s role in conducting economic espionage has been alluded to before, how it does this job has not. The significance of the documents obtained by Globo in Brazil is that they speak to how “metadata” analysis by CSEC can be used to exploit a rival country’s computer systems.

    The CSEC-labeled slides about the “Olympia” program describe the “Brazilian Ministry of Mines and Energy” as a “new target to develop” despite “limited access/target knowledge.”

    The presentation goes on to map out how an individual’s smartphone – “target’s handset” – can be discerned by analysis, including by cross-referencing the smartphone’s Sim card with the network telephone number assigned to it and also to the handset’s unique number (IMEI).

    The “top secret” presentation also refers to attacks on email servers.

    “I have identified MX [email] servers which have been targeted to passive collection by the Intel analysts,” one slide says, without explaining who the speaker is.

    The slide suggests the presenter hoped to reach out to American superhackers – the NSA’s “Tailored Access Operations” group – for a more specialized operation: “I am working with TAO to further examine the possibility for a Man on the Side operation.”

    A “Man on the Side” operation is a form of interception. According to a recent Guardian column, the NSA has installed secret servers on the Internet that can be used “impersonate a visited Web site” that a target plans to visit. The rerouting of the target’s traffic opens his or her computer or mobile device to invasion by the impersonating website.

    The “Top Secret” presentation obtained by Globo is an exceedingly rare disclosure. In Ottawa, CSEC’s employees are sworn to secrecy and visitors to its complex have to check their smartphones, iPads, laptops and memory sticks at the door.

    The CSEC-labeled presentation appears to have been shared with the NSA, the agency Mr. Snowden once worked for. He had retained access to the NSA’s data repositories as a security-cleared private contractor, prior to copying reams of material early this year and then flying with it to Hong Kong this summer.

    Mr. Snowden leaked the materials to Mr. Greenwald in Hong Kong, prior to flying to Russia to seek asylum. The U.S. government wants to try him on espionage charges.

    The leaked “CSEC – Advanced Network Tradecraft” presentation about the Olympia spying program kicks off with an allusion to Greek mythology.

    It alludes to how Zeus and his sibling deities waged a 10-year battle to overthrow an older order of gods, known as the Titans. “And they said to the Titans ‘Watch Out OLYMPIAns in the house!” reads a slide in the presentation.

    COLIN FREEZE AND STEPHANIE NOLEN
    TORONTO AND RIO DE JANEIRO — The Globe and Mail
    Published Monday, Oct. 07 2013, 7:14 AM EDT

    Find this story at 7 October 2013

    © Copyright 2013 The Globe and Mail Inc.

    << oudere artikelen  nieuwere artikelen >>