Senior Police Officer Suggests Companies Allowing People To Use Strong Crypto Are ‘Friendly To Terrorists’

Last November, we ran through the list of senior law enforcement officers on both sides of the Atlantic who all came out with suspiciously similar whines about how strong crypto was turning the internet into a “dark and ungoverned” place. Judging by this story in Reuters, others want to join the choir:

Some technology and communication firms are helping militants avoid detection by developing systems that are “friendly to terrorists”, Britain’s top anti-terrorism police officer said on Tuesday.

That remark comes from Assistant Commissioner Mark Rowley, who is the UK’s National Policing Lead for Counter-Terrorism, replacing Cressida Dick. Here’s the problem according to Rowley:

“Some of the acceleration of technology, whether it’s communications or other spheres, can be set up in different ways,” Rowley told a conference in London.

“It can be set up in a way which is friendly to terrorists and helps them … and creates challenges for law enforcement and intelligence agencies. Or it can be set up in a way which doesn’t do that.”

“Set up in a way which is friendly to terrorists and helps them” obviously means using strong crypto; “set up in a way which doesn’t do that” therefore means with compromised crypto. Like his colleagues, Rowley too blames the current mistrust between the intelligence agencies and computer companies on Edward Snowden:

“Snowden has created an environment where some technology companies are less comfortable working with law reinforcement and intelligence agencies and the bad guys are better informed,” Rowley told Reuters after his speech.

Well, no, actually. That “environment” has been created by the NSA and GCHQ working together to break into the main online services, and undermine key aspects of digital technology, with no thought for the collateral damage that ruining internet security might cause for the world. Rowley is also quoted as saying:

“We all love the benefit of the internet and all the rest of it, but we need [technology companies’] support in making sure that they’re doing everything possible to stop their technology being exploited by terrorists. I’m saying that needs to be front and centre of their thinking and for some it is and some it isn’t.”

The technology is not being “exploited” by terrorists, it’s being used by them, just as they use telephones or microwaves or washing machines. That’s what those devices are there for. The idea that trying to make broken internet technologies should be “front and center” of technology companies’ thinking bespeaks a complete contempt for their users.

This constant refrain about how awful strong crypto is, and how we must break it, is simply the intelligence services implicitly admitting that they find the idea of doing their job in a free society, where people are able to keep some messages private, too hard, so they would be really grateful if technology companies could just fall in line and make life easier by destroying privacy for everyone.

Link (Techdirt)

Britain Used Spy Team to Shape Latin American Public Opinion on Falklands

Faced with mounting international pressure over the Falkland Islands territorial dispute, the British government enlisted its spy service, including a highly secretive unit known for using “dirty tricks,” to covertly launch offensive cyberoperations to prevent Argentina from taking the islands.

A shadowy unit of the British spy agency Government Communications Headquarters (GCHQ) had been preparing a bold, covert plan called “Operation QUITO” since at least 2009. Documents provided to The Intercept by National Security Agency whistleblower Edward Snowden, published in partnership with Argentine news site Todo Notícias, refer to the mission as a “long-running, large scale, pioneering effects operation.”

At the heart of this operation was the Joint Threat Research and Intelligence Group, known by the acronym JTRIG, a secretive unit that has been involved in spreading misinformation.

The British government, which has continuously administered the Falkland Islands — also known as the Malvinas — since 1833, has rejected Argentine and international calls to open negotiations on territorial sovereignty. Worried that Argentina, emboldened by international opinion, may attempt to retake the islands diplomatically or militarily, JTRIG and other GCHQ divisions were tasked “to support FCO’s [Foreign and Commonwealth Office’s] goals relating to Argentina and the Falkland Islands.” A subsequent document suggests the main FCO goal was to “[prevent] Argentina from taking over the Falkland Islands” and that new offensive cyberoperations were underway in 2011 to further that end.

Tensions between the two nations, which fought a war over the small archipelago in the South Atlantic Ocean in 1982, reached a boil in 2010 with the British discovery of large, offshore oil and gas reserves potentially worth billions of dollars.

The British government frames the issue as one of residents’ self-determination. Prime Minister David Cameron maintains that the islands will remain British as long as that was the will of their inhabitants, “full stop, end of story.”

Argentine President Cristina Kirchner, known for her provocative, left-leaning foreign policy since taking office in 2007, rallied regional and international leaders to pass resolutions in international bodies supportive of Argentina’s claim to the islands and stand against what she called the U.K.’s “downright colonialism.”

Even the United States, Britain’s closest ally, declined to support the U.K. position, instead offering to mediate a resolution between the two sides in 2010. Prime Minister Cameron rejected the proposal, calling it “disappointing.”

GCHQ’s efforts on Argentina and the Falklands between 2008 and 2011, the time period the documents cover, were broad and not limited solely to JTRIG. Surveillance of Argentine “military and Leadership” communications on various platforms was a “high priority” task. Despite the Obama administration’s unwillingness to publicly back their ally, NSA assistance was ongoing as of 2010. According to an NSA “Extended Enterprise Report” dated June 2008, based on NSA officials’ meetings with GCHQ representatives, Argentina was “GCHQ’s primary interest in the region.”

Link (The Intercept)

The Orwellian Re-Branding of “Mass Surveillance” as Merely “Bulk Collection”

Just as the Bush administration and the U.S. media re-labelled “torture” with the Orwellian euphemism “enhanced interrogation techniques” to make it more palatable, the governments and media of the Five Eyes surveillance alliance are now attempting to re-brand “mass surveillance” as “bulk collection” in order to make it less menacing (and less illegal). In the past several weeks, this is the clearly coordinated theme that has arisen in the U.S., U.K., Canada, Australia and New Zealand as the last defense against the Snowden revelations, as those governments seek to further enhance their surveillance and detention powers under the guise of terrorism.

This manipulative language distortion can be seen perfectly in yesterday’s white-washing report of GCHQ mass surveillance from the servile rubber-stamp calling itself “The Intelligence and Security Committee of the UK Parliament (ISC)”(see this great Guardian editorial this morning on what a “slumbering” joke that “oversight” body is). As Committee Member MP Hazel Blears explained yesterday (photo above), the Parliamentary Committee officially invoked this euphemism to justify the collection of billions of electronic communications events every day.

The Committee actually acknowledged for the first time (which Snowden documents long ago proved) that GCHQ maintains what it calls “Bulk Personal Datasets” that contain “millions of records,” and even said about pro-privacy witnesses who testified before it: “we recognise their concerns as to the intrusive nature of bulk collection.” That is the very definition of “mass surveillance,” yet the Committee simply re-labelled it “bulk collection,” purported to distinguish it from “mass surveillance,” and thus insist that it was all perfectly legal.

Link (The Intercept)

The CIA Campaign to Steal Apple’s Secrets

RESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept.

The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released.

By targeting essential security keys used to encrypt data stored on Apple’s devices, the researchers have sought to thwart the company’s attempts to provide mobile security to hundreds of millions of Apple customers across the globe. Studying both “physical” and “non-invasive” techniques, U.S. government-sponsored research has been aimed at discovering ways to decrypt and ultimately penetrate Apple’s encrypted firmware. This could enable spies to plant malicious code on Apple devices and seek out potential vulnerabilities in other parts of the iPhone and iPad currently masked by encryption.

The CIA declined to comment for this story.

The security researchers also claimed they had created a modified version of Apple’s proprietary software development tool, Xcode, which could sneak surveillance backdoors into any apps or programs created using the tool. Xcode, which is distributed by Apple to hundreds of thousands of developers, is used to create apps that are sold through Apple’s App Store.

The modified version of Xcode, the researchers claimed, could enable spies to steal passwords and grab messages on infected devices. Researchers also claimed the modified Xcode could “force all iOS applications to send embedded data to a listening post.” It remains unclear how intelligence agencies would get developers to use the poisoned version of Xcode.

Researchers also claimed they had successfully modified the OS X updater, a program used to deliver updates to laptop and desktop computers, to install a “keylogger.”

Link (The Intercept)

Australian Secretary Of Defense Not Concerned About Phone Hack; Doesn’t Think People Want To Spy On His Phone

If you were the Secretary of Defense of a large country, you might think you’d be slightly concerned that foreign agents would want to spy on you. Not so down in Australia apparently, where the current Secretary of Defense, insists that he’d be “surprised” if anyone wanted to find out what was on his phone. Seriously.

We’ve written about the recent story, revealed in documents leaked by Ed Snowden, that the NSA and GCHQ were able to hack into the systems of Gemalto, the world’s largest maker of SIM cards for mobile phones, and obtain the encryption keys used in those cards. While Gemalto insists that the hack didn’t actually get those encryption keys, not everyone feels so comfortable with Gemalto’s own analysis of what happened.

Senator Scott Ludlam (who we’ve written about a few times before) reasonably found the story of the Gemalto hack to be concerning, and went about asking some questions of the government to find out what they knew about it. The results are rather astounding. First he had asked ASIO, the Australian Security Intelligence Organization, and they said it wasn’t their area, but it might be ASD (the Australian Signals Directorate). The video below shows Ludlam asking the ASD folks for more information about the hack and being flabbergasted that they basically say they haven’t even heard about the hack at all:

Right at the beginning, the first person says he’s not aware of the situation, and Ludlam asks “are you aware of the broad outlines?” and gets a “no I am not” response, leading to a rather dry “Really?!? Okay, this is going to be interesting” reply from Ludlam. It goes on in this nature for a while, with the various people on the panel playing dumb, and Ludlam repeatedly (and rightly) appearing shocked that they appear to have no idea about the story.

But the really incredible part comes in the last minute of the video, in which Ludlam asks the Australian Secretary of Defense, Dennis Richardson, about his own concerns about his phone being spied on:

Ludlam: Do you use an encrypted phone, Mr. Richardson?

Richardson: No, I don’t.

Ludlam: Right. Okay. Do you use a commercial — I’m not asking you to name names — but do you use a commercial telecommunications provider?

Richardson: Yeah, yeah, yes.

Ludlam: So there might be a SIM card in your phone or mind. Does this alarm you at all?

Richardson: No.

Ludlam: No?

Richardson: No.

Ludlam: Why is that?

Richardson: Well, because I don’t particularly deal with people who… if anyone wants to listen to my telephone calls they can. I’d be surprised if they do, but I don’t particularly have conversations which I’m particularly worried about.

[Laughter all around the room]

Ludlam: So it’s okay if foreign spooks have hacked every mobile handset in the country because you don’t have anything in particular…

Richardson: It’s possible some might try to.

Ludlam: It’s possible some just have.

Richardson: [shrugs] Well, it’s possible.

So there you have it, folks. The Australian Secretary of Defense says that anyone is allowed to listen in to his calls, because there’s nothing secret about any of them. I’m not quite familiar with public records/freedom of information laws in Australia, but is it possible for someone to put in a request for recording all of the Secretary of Defense’s phone calls?

Link (Techdirt)

Head Of UK Parliamentary Committee Overseeing Intelligence Agencies Resigns After Being Caught In Sting

The UK government’s response to Snowden’s leaks has been twofold: that everything is legal, and that everything is subject to rigorous scrutiny. We now know that the first of these is not true, and the second is hardly credible either, given that the UK’s main intelligence watchdog has only one full-time member. There’s one other main oversight body, the UK’s Intelligence and Security Committee of Parliament (ISC), which is tasked with examining:

the policy, administration and expenditure of the Security Service, Secret Intelligence Service (SIS), and the Government Communications Headquarters (GCHQ).

The ISC was criticized as part of a larger condemnation of intelligence oversight by another UK Parliament committee. The head of the ISC, Sir Malcolm Rifkind, was reported by the Guardian as dismissing those criticisms as “old hat,” as if that somehow made them acceptable. Rifkind has now been caught up in a rather more serious row, which involves reporters from the UK’s Channel 4 and The Telegraph newspaper posing as representatives of a Chinese company:

PMR, a communications agency based in Hong Kong was set up, backed by a fictitious Chinese businessman. PMR has plenty of money to spend and wants to hire influential British politicians to join its advisory board and get a foothold in the UK and Europe.

Here’s what Channel 4 and the Telegraph allege happened in their meeting with Rifkind:

Sir Malcolm also claimed he could write to a minister on behalf of our company without saying exactly who he was representing

Sir Malcolm added that he could see any foreign ambassador in London if he wanted, so could provide ‘access’ that is ‘useful’

Rifkind said that he was “self-employed” — in fact, he is a Member of Parliament, and receives a salary of £67,000 per year — and that his normal fee was “somewhere in the region of £5,000 to £8,000” for half a day’s work. There’s no suggestion that Rifkind made any reference during the sting to his role as head of the ISC, but that’s not really the point. He was offering a Chinese company access to influential people purely because he would get paid to do so, and that is surely not the kind of person you would want to grant the high-level security clearance Rifkind enjoys.

Link (Techdirt)

European Lawmakers Demand Answers on Phone Key Theft

European officials are demanding answers and investigations into a joint U.S. and U.K. hack of the world’s largest manufacturer of mobile SIM cards, following a report published by The Intercept Thursday.

The report, based on leaked documents provided by NSA whistleblower Edward Snowden, revealed the U.S. spy agency and its British counterpart Government Communications Headquarters, GCHQ, hacked the Franco-Dutch digital security giant Gemalto in a sophisticated heist of encrypted cell-phone keys.

The European Parliament’s chief negotiator on the European Union’s data protection law, Jan Philipp Albrecht, said the hack was “obviously based on some illegal activities.”

“Member states like the U.K. are frankly not respecting the [law of the] Netherlands and partner states,” Albrecht told the Wall Street Journal.

Sophie in ’t Veld, an EU parliamentarian with D66, the Netherlands’ largest opposition party, added, “Year after year we have heard about cowboy practices of secret services, but governments did nothing and kept quiet […] In fact, those very same governments push for ever-more surveillance capabilities, while it remains unclear how effective these practices are.”

“If the average IT whizzkid breaks into a company system, he’ll end up behind bars,” In ’t Veld added in a tweet Friday.

The EU itself is barred from undertaking such investigations, leaving individual countries responsible for looking into cases that impact their national security matters. “We even get letters from the U.K. government saying we shouldn’t deal with these issues because it’s their own issue of national security,” Albrecht said.

Still, lawmakers in the Netherlands are seeking investigations. Gerard Schouw, a Dutch member of parliament, also with the D66 party, has called on Ronald Plasterk, the Dutch minister of the interior, to answer questions before parliament. On Tuesday, the Dutch parliament will debate Schouw’s request.

Additionally, European legal experts tell The Intercept, public prosecutors in EU member states that are both party to the Cybercrime Convention, which prohibits computer hacking, and home to Gemalto subsidiaries could pursue investigations into the breach of the company’s systems.

According to secret documents from 2010 and 2011, a joint NSA-GCHQ unit penetrated Gemalto’s internal networks and infiltrated the private communications of its employees in order to steal encryption keys, embedded on tiny SIM cards, which are used to protect the privacy of cellphone communications across the world. Gemalto produces some 2 billion SIM cards a year.

The company’s clients include AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers. “[We] believe we have their entire network,” GCHQ boasted in a leaked slide, referring to the Gemalto heist.

Link (The Intercept)

THE GREAT SIM HEIST HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE

AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden.

The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data.

The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. The company operates in 85 countries and has more than 40 manufacturing facilities. One of its three global headquarters is in Austin, Texas and it has a large factory in Pennsylvania.

In all, Gemalto produces some 2 billion SIM cards a year. Its motto is “Security to be Free.”

With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.

Link (The Intercept)

GCHQ Will Have To Start Letting Everyone Know Whether Or Not They’ve Been Illegally Spied On

Last December, the IPT (Investigatory Powers Tribunal) ruled that GCHQ’s surveillance programs didn’t violate human rights, despite being broad and untargeted dragnets. This ruling — in response to several legal challenges brought in the wake of the Snowden leaks — was unsurprising. The IPT has overwhelmingly supported GCHQ’s spying efforts in the past, having only sided against it in one-half of one percent of the challenges brought against it.

The IPT’s ongoing support of the UK’s intelligence community is unsurprising. To declare any of its programs as illegal or in violation of citizens’ rights would be to implicate itself for its near-constant approval of surveillance programs. That makes its February decision a bit of an aberration. In response to Privacy International’s legal challenge, it changed course slightly, declaring certain elements of the GCHQ’s spying efforts “illegal” — specifically, information sharing with the NSA. But this was only a partial capitulation. The IPT went on to say that this was once illegal but now was not, thanks to its December 2014 ruling. In some bizarre way, the legal complaints brought against the GCHQ managed to legalize its once-illegal partnership with the NSA.

However, its February decision makes it clear that operations prior to December 2014 were illegal, and provides an opening for UK citizens to force a bit more transparency on their intelligence community.

Because the IPT found the intelligence sharing to be illegal, anyone, inside or outside the UK, can file a complaint to the IPT and ask if their communications were part of that illegal sharing, and be legally entitled to an answer. [Privacy International’s Eric] King explained, “If they don’t find anything, it’s likely they respond ‘no determination’. If they do find something, the IPT is obliged to give a declaration to the individual that their communications were illegally interfered with.”

This is far more transparency than has been granted by the NSA, which still responds to similar inquiries about files on citizens (from those citizens themselves) with its omnipresent Glomar declaration, neither confirming nor denying the collected results of its domestic surveillance programs.

Link (Techdirt)