Former CIA and NSA employee source of intelligence leaks

Started by merithyn, June 09, 2013, 08:17:17 PM

Previous topic - Next topic

Syt

http://www.guardian.co.uk/uk/2013/jun/16/gchq-intercepted-communications-g20-summits

QuoteGCHQ intercepted foreign politicians' communications at G20 summits

Exclusive: phones were monitored and fake internet cafes set up to gather information from allies in London in 2009

Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts, according to documents seen by the Guardian. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic.

The revelation comes as Britain prepares to host another summit on Monday – for the G8 nations, all of whom attended the 2009 meetings which were the object of the systematic spying. It is likely to lead to some tension among visiting delegates who will want the prime minister to explain whether they were targets in 2009 and whether the exercise is to be repeated this week.

The disclosure raises new questions about the boundaries of surveillance by GCHQ and its American sister organisation, the National Security Agency, whose access to phone records and internet data has been defended as necessary in the fight against terrorism and serious crime. The G20 spying appears to have been organised for the more mundane purpose of securing an advantage in meetings. Named targets include long-standing allies such as South Africa and Turkey.

There have often been rumours of this kind of espionage at international conferences, but it is highly unusual for hard evidence to confirm it and spell out the detail. The evidence is contained in documents – classified as top secret – which were seen by the Guardian. They reveal that during G20 meetings in April and September 2009 GCHQ used what one document calls "ground-breaking intelligence capabilities" to intercept the communications of visiting delegations.

This included:

• Setting up internet cafes where they used an email interception programme and key-logging software to spy on delegates' use of computers;

• Penetrating the security on delegates' BlackBerrys to monitor their email messages and phone calls;

• Supplying 45 analysts with a live round-the-clock summary of who was phoning who at the summit;

• Targeting the Turkish finance minister and possibly 15 others in his party;

• Receiving reports from an NSA attempt to eavesdrop on the Russian leader, Dmitry Medvedev, as his phone calls passed through satellite links to Moscow.

The documents suggest that the operation was sanctioned in principle at a senior level in the government of the then prime minister, Gordon Brown, and that intelligence, including briefings for visiting delegates, was passed to British ministers.

A briefing paper dated 20 January 2009 records advice given by GCHQ officials to their director, Sir Iain Lobban, who was planning to meet the then foreign secretary, David Miliband. The officials summarised Brown's aims for the meeting of G20 heads of state due to begin on 2 April, which was attempting to deal with the economic aftermath of the 2008 banking crisis. The briefing paper added: "The GCHQ intent is to ensure that intelligence relevant to HMG's desired outcomes for its presidency of the G20 reaches customers at the right time and in a form which allows them to make full use of it." Two documents explicitly refer to the intelligence product being passed to "ministers".


One of the GCHQ documents. Photograph: Guardian

According to the material seen by the Guardian, GCHQ generated this product by attacking both the computers and the telephones of delegates.

One document refers to a tactic which was "used a lot in recent UK conference, eg G20". The tactic, which is identified by an internal codeword which the Guardian is not revealing, is defined in an internal glossary as "active collection against an email account that acquires mail messages without removing them from the remote server". A PowerPoint slide explains that this means "reading people's email before/as they do".

The same document also refers to GCHQ, MI6 and others setting up internet cafes which "were able to extract key logging info, providing creds for delegates, meaning we have sustained intelligence options against them even after conference has finished". This appears to be a reference to acquiring delegates' online login details.

Another document summarises a sustained campaign to penetrate South African computers, recording that they gained access to the network of their foreign ministry, "investigated phone lines used by High Commission in London" and "retrieved documents including briefings for South African delegates to G20 and G8 meetings". (South Africa is a member of the G20 group and has observer status at G8 meetings.)


Another excerpt from the GCHQ documents. Photograph: Guardian

A detailed report records the efforts of the NSA's intercept specialists at Menwith Hill in North Yorkshire to target and decode encrypted phone calls from London to Moscow which were made by the Russian president, Dmitry Medvedev, and other Russian delegates.

Other documents record apparently successful efforts to penetrate the security of BlackBerry smartphones: "New converged events capabilities against BlackBerry provided advance copies of G20 briefings to ministers ... Diplomatic targets from all nations have an MO of using smartphones. Exploited this use at the G20 meetings last year."

The operation appears to have run for at least six months. One document records that in March 2009 – the month before the heads of state meeting – GCHQ was working on an official requirement to "deliver a live dynamically updating graph of telephony call records for target G20 delegates ... and continuing until G20 (2 April)."

Another document records that when G20 finance ministers met in London in September, GCHQ again took advantage of the occasion to spy on delegates, identifying the Turkish finance minister, Mehmet Simsek, as a target and listing 15 other junior ministers and officials in his delegation as "possible targets". As with the other G20 spying, there is no suggestion that Simsek and his party were involved in any kind of criminal offence. The document explicitly records a political objective – "to establish Turkey's position on agreements from the April London summit" and their "willingness (or not) to co-operate with the rest of the G20 nations".

The September meeting of finance ministers was also the subject of a new technique to provide a live report on any telephone call made by delegates and to display all of the activity on a graphic which was projected on to the 15-sq-metre video wall of GCHQ's operations centre as well as on to the screens of 45 specialist analysts who were monitoring the delegates.

"For the first time, analysts had a live picture of who was talking to who that updated constantly and automatically," according to an internal review.

A second review implies that the analysts' findings were being relayed rapidly to British representatives in the G20 meetings, a negotiating advantage of which their allies and opposite numbers may not have been aware: "In a live situation such as this, intelligence received may be used to influence events on the ground taking place just minutes or hours later. This means that it is not sufficient to mine call records afterwards – real-time tip-off is essential."

In the week after the September meeting, a group of analysts sent an internal message to the GCHQ section which had organised this live monitoring: "Thank you very much for getting the application ready for the G20 finance meeting last weekend ... The call records activity pilot was very successful and was well received as a current indicator of delegate activity ...

"It proved useful to note which nation delegation was active during the moments before, during and after the summit. All in all, a very successful weekend with the delegation telephony plot."

I am, somehow, less interested in the weight and convolutions of Einstein's brain than in the near certainty that people of equal talent have lived and died in cotton fields and sweatshops.
—Stephen Jay Gould

Proud owner of 42 Zoupa Points.

garbon

So I've spoken to several members of my extended family on this NSA business and for the most part they don't care. They think it is concerning in principle but then say that a) they don't really have anything to hide and b) if it prevents some terrorist attacks then it's an okay evil. :(
"I've never been quite sure what the point of a eunuch is, if truth be told. It seems to me they're only men with the useful bits cut off."
I drank because I wanted to drown my sorrows, but now the damned things have learned to swim.

Berkut

I think there is a lot of either very careful or very not careful use of terms with ambiguous meanings going on here.

An analyst "can" listen to a phone call. Does that mean he can, as in he has the technical capability, or does that mean he can, as in he is allowed to do so?

There also seems to be some, again, either very careful or very sloppy use of qualifiers.

"It was thought that an analyst would need a court order to lsiten to a phone call made by an American, but recent reports show that an anlayst can in fact listen to a phone conversation based on their own evaluation".

That seems very alarming, until you parse it and realize what it is saying is that an analyst needs a court order to listen to a US citiznes conversation, but can listen to one from outside the US without such authorization...which is exactly how I think it has always worked. I don't expect some analyst in Dubai to need to run to a US court to eaves drop on someone in Dubai. I am pretty sure the CIA doesn't need permission from any courts to spy on non-Americans.

I wonder how much of this is intentionally misleading.
"If you think this has a happy ending, then you haven't been paying attention."

select * from users where clue > 0
0 rows returned

Siege

Quote from: garbon on June 16, 2013, 03:53:07 PM
So I've spoken to several members of my extended family on this NSA business and for the most part they don't care. They think it is concerning in principle but then say that a) they don't really have anything to hide and b) if it prevents some terrorist attacks then it's an okay evil. :(

So shortsighted.
Do they even realize how this thing works?
All data is stored, and 15 years from now, when one of your relatives happen to say anything stupid, all his data and contacts will be investigated.

This thing does not help STOP terrorists.


"All men are created equal, then some become infantry."

"Those who beat their swords into plowshares will plow for those who don't."

"Laissez faire et laissez passer, le monde va de lui même!"


garbon

Quote from: Siege on June 16, 2013, 04:28:19 PM
Quote from: garbon on June 16, 2013, 03:53:07 PM
So I've spoken to several members of my extended family on this NSA business and for the most part they don't care. They think it is concerning in principle but then say that a) they don't really have anything to hide and b) if it prevents some terrorist attacks then it's an okay evil. :(

So shortsighted.
Do they even realize how this thing works?
All data is stored, and 15 years from now, when one of your relatives happen to say anything stupid, all his data and contacts will be investigated.

This thing does not help STOP terrorists.

I'm not sure that they are particularly worried abut that happening when they are in their 70s.
"I've never been quite sure what the point of a eunuch is, if truth be told. It seems to me they're only men with the useful bits cut off."
I drank because I wanted to drown my sorrows, but now the damned things have learned to swim.

The Minsky Moment

The NSA can conduct surveillance without a warrant? Jerold Nadler is shocked, SHOCKED.

I guess he never read the operative law,  the very first section of FISA is about warrantless surveillance.
The purpose of studying economics is not to acquire a set of ready-made answers to economic questions, but to learn how to avoid being deceived by economists.
--Joan Robinson

The Minsky Moment

It is truly shocking to learn that a spy agency engages in spying.

The next revelation is going to be that the army has killed people.
The purpose of studying economics is not to acquire a set of ready-made answers to economic questions, but to learn how to avoid being deceived by economists.
--Joan Robinson

Josephus

So I read today the guy is a liberterian, loves computer games and RPGs.

:hmm: We should invite him on here.
Civis Romanus Sum<br /><br />"My friends, love is better than anger. Hope is better than fear. Optimism is better than despair. So let us be loving, hopeful and optimistic. And we'll change the world." Jack Layton 1950-2011

Syt

Well, he does look a wee bit like Tamas' long lost brother.
I am, somehow, less interested in the weight and convolutions of Einstein's brain than in the near certainty that people of equal talent have lived and died in cotton fields and sweatshops.
—Stephen Jay Gould

Proud owner of 42 Zoupa Points.

garbon

Quote from: Josephus on June 17, 2013, 07:48:05 AM
So I read today the guy is a liberterian, loves computer games and RPGs.

:hmm: We should invite him on here.

Why do you want to kill Languish?
"I've never been quite sure what the point of a eunuch is, if truth be told. It seems to me they're only men with the useful bits cut off."
I drank because I wanted to drown my sorrows, but now the damned things have learned to swim.

HVC

He'd leak all the back room secrets then run away to the paradox forums.
Being lazy is bad; unless you still get what you want, then it's called "patience".
Hubris must be punished. Severely.

Brazen

All you need to know about NSA surveillance: an infographic.

garbon

Quote from: HVC on June 17, 2013, 07:52:29 AM
He'd leak all the back room secrets then run away to the paradox forums.

I just thought we'd see most of our members hauled off after the NSA reads through everything. :P
"I've never been quite sure what the point of a eunuch is, if truth be told. It seems to me they're only men with the useful bits cut off."
I drank because I wanted to drown my sorrows, but now the damned things have learned to swim.

Brazen

Quote from: Berkut on June 16, 2013, 04:12:41 PM
"It was thought that an analyst would need a court order to listen to a phone call made by an American, but recent reports show that an analyst can in fact listen to a phone conversation based on their own evaluation".
This derived from a misrepresented comment from Democrat representative Jerrold Nadler, full story here:
http://news.yahoo.com/jerrold-nadler-does-not-think-nsa-listen-u-163036644.html

The Minsky Moment

#419
Domestic phone calls can be tapped without court order if the conversation is between two "foreign powers" (as defined) and no "US person" (as defined) is a party to the call.  Various other requirements are involved but this has been the case since FISA was enacted in the 1970s.

The AG, on finding of "an emergency situation," can authorize immediate acquisition of foreign intelligence information even if a US person is involved, and then has 7 days to get an ex post authorization fron the FISA court.  That is from the FISA amendments passed in 2008 in the wake of the revelations about the use of FISA to conduct surveillance by the prior administration, which gave rise to virtually the exact same debate being played out.  Short memories . . .

Nadler's confusion is a little bit suprising - the FISA amendments which added the latter provision went through the House Judiciary Committee - of which he is a member - in 2008.
The purpose of studying economics is not to acquire a set of ready-made answers to economic questions, but to learn how to avoid being deceived by economists.
--Joan Robinson